100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

MIS 320 Final Exam Questions and Answers 2023 with complete solution

Rating
-
Sold
-
Pages
10
Grade
A
Uploaded on
04-09-2023
Written in
2023/2024

MIS 320 Final Exam Questions and Answers 2023 with complete solution Which of the following best describes a network address translation? a. A network address translation (NAT) is a device that combines several security functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption, intrusion protection, and web filtering. b. A network address translation (NAT) can detect applications using deep packet inspection by examining the packet payloads and determining if they are carrying any malware. c. A network address translation (NAT) enables a private IP network to connect to the internet. d. A network address translation (NAT) blocks specific websites or attacks that attempt to exploit known vulnerabilities in specific client software. c. A network address translation (NAT) enables a private IP network to connect to the internet. Which of the following outlines the process of a proxy server? a. User - internet - reverse proxy - forward proxy - user b. User - reverse proxy - Internet - forward proxy - user c. User - forward proxy - user - reverse proxy - Internet d. User - forward proxy - Internet - reverse proxy - user d. User - forward proxy - Internet - reverse proxy - user In an interview, you are asked to analyze the following statements regarding secure network designs and choose the correct one. Which of the following should you choose? a. Workgroup switches reside at the top of the hierarchy and carry traffic between switches. b. Load balancers can detect and stop protocol attacks directed at a server or application. c. Zero trust is designed to make a system trusted. d. Switches can transfer packets when VLAN members on one switch need to communicate with members connected to another switch.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
September 4, 2023
Number of pages
10
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

MIS 320 Final Exam Questions and Answers 2023 with
complete solution
Which of the following best describes a network address translation?

a. A network address translation (NAT) is a device that combines several security
functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption,
intrusion protection, and web filtering.

b. A network address translation (NAT) can detect applications using deep packet
inspection by examining the packet payloads and determining if they are carrying
any malware.

c. A network address translation (NAT) enables a private IP network to connect to
the internet.

d. A network address translation (NAT) blocks specific websites or attacks that
attempt to exploit known vulnerabilities in specific client software.
c. A network address translation (NAT) enables a private IP network to connect to the
internet.
Which of the following outlines the process of a proxy server?

a. User - internet - reverse proxy - forward proxy - user

b. User - reverse proxy - Internet - forward proxy - user

c. User - forward proxy - user - reverse proxy - Internet

d. User - forward proxy - Internet - reverse proxy - user
d. User - forward proxy - Internet - reverse proxy - user
In an interview, you are asked to analyze the following statements regarding
secure network designs and choose the correct one. Which of the following
should you choose?

a. Workgroup switches reside at the top of the hierarchy and carry traffic between
switches.

b. Load balancers can detect and stop protocol attacks directed at a server or
application.

c. Zero trust is designed to make a system trusted.

d. Switches can transfer packets when VLAN members on one switch need to
communicate with members connected to another switch.

, b. Load balancers can detect and stop protocol attacks directed at a server or
application.
Which of the following best describes a host-based firewall?

a. A host-based firewall is a hardware firewall that protects multiple endpoint
devices.

b. A host-based firewall is a software firewall that protects multiple endpoint
devices.

c. A host-based firewall is a software firewall that protects a single endpoint
device.

d. A host-based firewall is a hardware firewall that protects a single endpoint
device.
c. A host-based firewall is a software firewall that protects a single endpoint device.
An employee at your enterprise is caught violating company policies by
transferring confidential data to his private email. As a security admin, you are
asked to prevent this from happening in the future. Which of the following actions
should you perform?

a. You should set up a NAC.
b. You should set up an ACL.
c. You should set up a DLP.
d. You should set up a VPN.
c. You should set up a DLP.
After encountering a network attack in your enterprise network, the chief network
security engineer assigned you a project. The project was to create a vulnerable
network that is similar to your enterprise network and entices the threat actor to
repeat the attack. This is to analyze the behavior and techniques the attacker is
using to ensure better defenses to your enterprise network in the future. Which of
the following appliances should you use?

a. You should set up behavioral IDS monitoring.
b. You should use a honeypot.
c. You should use a proxy server.
d. You should set up network access control.
b. You should use a honeypot.
In an interview, Max was asked to tell one difference between a software firewall
and a virtual firewall. How should Max answer?

a. Virtual firewalls are used on almost all devices, whereas software firewalls are
mostly used by enterprises.

b. Software firewalls can protect all the endpoints in a network, whereas virtual
firewalls can protect only one device.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
katoinyambi96 stuvia
Follow You need to be logged in order to follow users or courses
Sold
46
Member since
2 year
Number of followers
31
Documents
1267
Last sold
3 months ago

4.5

6 reviews

5
4
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions