Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

MIS 320 Final Exam Questions and Answers 2023 with complete solution

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A
Geüpload op
04-09-2023
Geschreven in
2023/2024

MIS 320 Final Exam Questions and Answers 2023 with complete solution Which of the following best describes a network address translation? a. A network address translation (NAT) is a device that combines several security functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption, intrusion protection, and web filtering. b. A network address translation (NAT) can detect applications using deep packet inspection by examining the packet payloads and determining if they are carrying any malware. c. A network address translation (NAT) enables a private IP network to connect to the internet. d. A network address translation (NAT) blocks specific websites or attacks that attempt to exploit known vulnerabilities in specific client software. c. A network address translation (NAT) enables a private IP network to connect to the internet. Which of the following outlines the process of a proxy server? a. User - internet - reverse proxy - forward proxy - user b. User - reverse proxy - Internet - forward proxy - user c. User - forward proxy - user - reverse proxy - Internet d. User - forward proxy - Internet - reverse proxy - user d. User - forward proxy - Internet - reverse proxy - user In an interview, you are asked to analyze the following statements regarding secure network designs and choose the correct one. Which of the following should you choose? a. Workgroup switches reside at the top of the hierarchy and carry traffic between switches. b. Load balancers can detect and stop protocol attacks directed at a server or application. c. Zero trust is designed to make a system trusted. d. Switches can transfer packets when VLAN members on one switch need to communicate with members connected to another switch.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

MIS 320 Final Exam Questions and Answers 2023 with
complete solution
Which of the following best describes a network address translation?

a. A network address translation (NAT) is a device that combines several security
functions like packet filtering, anti-spam, anti-phishing, anti-spyware, encryption,
intrusion protection, and web filtering.

b. A network address translation (NAT) can detect applications using deep packet
inspection by examining the packet payloads and determining if they are carrying
any malware.

c. A network address translation (NAT) enables a private IP network to connect to
the internet.

d. A network address translation (NAT) blocks specific websites or attacks that
attempt to exploit known vulnerabilities in specific client software.
c. A network address translation (NAT) enables a private IP network to connect to the
internet.
Which of the following outlines the process of a proxy server?

a. User - internet - reverse proxy - forward proxy - user

b. User - reverse proxy - Internet - forward proxy - user

c. User - forward proxy - user - reverse proxy - Internet

d. User - forward proxy - Internet - reverse proxy - user
d. User - forward proxy - Internet - reverse proxy - user
In an interview, you are asked to analyze the following statements regarding
secure network designs and choose the correct one. Which of the following
should you choose?

a. Workgroup switches reside at the top of the hierarchy and carry traffic between
switches.

b. Load balancers can detect and stop protocol attacks directed at a server or
application.

c. Zero trust is designed to make a system trusted.

d. Switches can transfer packets when VLAN members on one switch need to
communicate with members connected to another switch.

, b. Load balancers can detect and stop protocol attacks directed at a server or
application.
Which of the following best describes a host-based firewall?

a. A host-based firewall is a hardware firewall that protects multiple endpoint
devices.

b. A host-based firewall is a software firewall that protects multiple endpoint
devices.

c. A host-based firewall is a software firewall that protects a single endpoint
device.

d. A host-based firewall is a hardware firewall that protects a single endpoint
device.
c. A host-based firewall is a software firewall that protects a single endpoint device.
An employee at your enterprise is caught violating company policies by
transferring confidential data to his private email. As a security admin, you are
asked to prevent this from happening in the future. Which of the following actions
should you perform?

a. You should set up a NAC.
b. You should set up an ACL.
c. You should set up a DLP.
d. You should set up a VPN.
c. You should set up a DLP.
After encountering a network attack in your enterprise network, the chief network
security engineer assigned you a project. The project was to create a vulnerable
network that is similar to your enterprise network and entices the threat actor to
repeat the attack. This is to analyze the behavior and techniques the attacker is
using to ensure better defenses to your enterprise network in the future. Which of
the following appliances should you use?

a. You should set up behavioral IDS monitoring.
b. You should use a honeypot.
c. You should use a proxy server.
d. You should set up network access control.
b. You should use a honeypot.
In an interview, Max was asked to tell one difference between a software firewall
and a virtual firewall. How should Max answer?

a. Virtual firewalls are used on almost all devices, whereas software firewalls are
mostly used by enterprises.

b. Software firewalls can protect all the endpoints in a network, whereas virtual
firewalls can protect only one device.

Geschreven voor

Vak

Documentinformatie

Geüpload op
4 september 2023
Aantal pagina's
10
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
katoinyambi96 stuvia
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
49
Lid sinds
3 jaar
Aantal volgers
31
Documenten
1267
Laatst verkocht
4 maanden geleden

4.5

6 beoordelingen

5
4
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen