complete solution
Which of the following best describes a network address translation?
a. A network address translation (NAT) is a device that combines several security
functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption,
intrusion protection, and web filtering.
b. A network address translation (NAT) can detect applications using deep packet
inspection by examining the packet payloads and determining if they are carrying
any malware.
c. A network address translation (NAT) enables a private IP network to connect to
the internet.
d. A network address translation (NAT) blocks specific websites or attacks that
attempt to exploit known vulnerabilities in specific client software.
c. A network address translation (NAT) enables a private IP network to connect to the
internet.
Which of the following outlines the process of a proxy server?
a. User - internet - reverse proxy - forward proxy - user
b. User - reverse proxy - Internet - forward proxy - user
c. User - forward proxy - user - reverse proxy - Internet
d. User - forward proxy - Internet - reverse proxy - user
d. User - forward proxy - Internet - reverse proxy - user
In an interview, you are asked to analyze the following statements regarding
secure network designs and choose the correct one. Which of the following
should you choose?
a. Workgroup switches reside at the top of the hierarchy and carry traffic between
switches.
b. Load balancers can detect and stop protocol attacks directed at a server or
application.
c. Zero trust is designed to make a system trusted.
d. Switches can transfer packets when VLAN members on one switch need to
communicate with members connected to another switch.
, b. Load balancers can detect and stop protocol attacks directed at a server or
application.
Which of the following best describes a host-based firewall?
a. A host-based firewall is a hardware firewall that protects multiple endpoint
devices.
b. A host-based firewall is a software firewall that protects multiple endpoint
devices.
c. A host-based firewall is a software firewall that protects a single endpoint
device.
d. A host-based firewall is a hardware firewall that protects a single endpoint
device.
c. A host-based firewall is a software firewall that protects a single endpoint device.
An employee at your enterprise is caught violating company policies by
transferring confidential data to his private email. As a security admin, you are
asked to prevent this from happening in the future. Which of the following actions
should you perform?
a. You should set up a NAC.
b. You should set up an ACL.
c. You should set up a DLP.
d. You should set up a VPN.
c. You should set up a DLP.
After encountering a network attack in your enterprise network, the chief network
security engineer assigned you a project. The project was to create a vulnerable
network that is similar to your enterprise network and entices the threat actor to
repeat the attack. This is to analyze the behavior and techniques the attacker is
using to ensure better defenses to your enterprise network in the future. Which of
the following appliances should you use?
a. You should set up behavioral IDS monitoring.
b. You should use a honeypot.
c. You should use a proxy server.
d. You should set up network access control.
b. You should use a honeypot.
In an interview, Max was asked to tell one difference between a software firewall
and a virtual firewall. How should Max answer?
a. Virtual firewalls are used on almost all devices, whereas software firewalls are
mostly used by enterprises.
b. Software firewalls can protect all the endpoints in a network, whereas virtual
firewalls can protect only one device.