Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 1: Network Security > Answers to Review Questions

Answers to Review Questions

1. B. Firewalls provide protection by controlling traffic entering and leaving a network.

2. A. Network-based IDSs aren’t suitable for protecting against email spoofing.

3. B. A DMZ provides a network segment where publicly accessible servers can be deployed without compromising the security of the private network.

4. C. Switches can create VLANs. Broadcast storms aren’t transmitted between one VLAN and another.

5. C. Illegal or unauthorized zone transfers are a significant and direct threat to DNS servers.

6. D. At a blind FTP site, users can upload but not download. An anonymous FTP site is one where users don’t authenticate and possibly where only anonymous access is allowed. Only through SFTP or by using FTP inside SSL or a VPN link is all traffic encrypted.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint