DCOM 211 Mid Term Guide question n answers rated A+ 2023/2024
DCOM 211 Mid Term GuideOpen Systems Interconnection (OSI) Match the title of the layer with its responsibility - correct answer 7) Application - Provides services/protocols to applications 6) Presentation - Data formating, compression/encryption 5) Session - Controls conversation / Sessions, Integrity & Reliability, Descriptive naming 4) Transport - Fragmentation / Sequencing of data, Reliable delivery, Error recovery, Flow control, Multiplexing (ports) 3) Network - Fragmentation/Sequencing for Maximum Transmission Unit (MTU), & Routing 2) Data-Link - Data formating, compression/encryption 1) Physical - Media interface, Transmission method, Signal Strength, Topology ____ _____ protects the entire packet when IPsec uses either Authentication Header (AH) or Encapsulation Security Payload (ESP). - correct answer Tunnel Mode Provides support for IPS services deliverd by Cisco - correct answer Cisco ASA AIP-SSM The purpose of _____ _____ is simply to control access to specific network segments by defining which traffic can pass through them. - correct answer Packet Filters Firewalls can be configured to separate multiple network segments to provide security to the systems that reside within them with different security levels & polices between them. - correct answer Demiliterized Zones (DMZ) Within Internet Key Exchange (IKE) protocol Phase 1 negotiations, several attributes are exchanged: (Choose 5 that apply) - correct answer Encryption algorithms Hashing algorithms Diffie-Hellman groups Authentication method Vendor-specific attributes The word firewall commonly describes systems or devices that are placed between a trusted & untrusted network. - correct answer True Deep packet inspection allows firewalls to look at specific layer 7 payloads to protect against security threats. - correct answer True Virtual Private Network (VPNs) utilize which protocols for implementation? (Choose all that apply) - correct answer Secure Socket Layer (SSL) Internet Protocol security (IPsec) Point-to-point tunneling protocol (PPTP) Layer 2 tunneling protocol A virtual firewall that was designed using the Cisco ASA Software architecture to secure tenant edge in multitenant environments. - correct answer Cisco ASA 100V Cloud Firewall Stateful inspection firewalls provide enhanced benefits when compared to simple packet-filtering firewalls. - correct answer True Provides key features used for perimeter security. - correct answer Network Firewalls ____ _____ protects upper-layer protocols, such as User Datagram Protocol (UDP) & Transmission Control Protocol (TCP) when IPsec uses either Authentication Header (AH) or Encapsulation Security Payload (ESP) - correct answer Transport Mode Open Systems Interconnection (OSI) Match the title of the layer # - correct answer 7) Application 6) Presentation 5) Session
Written for
- Institution
- Dcom
- Course
- Dcom
Document information
- Uploaded on
- November 10, 2023
- Number of pages
- 14
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal