Week 4 practice quiz, Digital Dark Arts
1.
What traffic would an implicit deny firewall rule block?
The process of converting log entry fields into a standard format is called _______.
A ______ can protect your network from DoS attacks.
Using different VLANs for different network devices is an example of _______.
How do you protect against rogue DHCP server attacks?
What does Dynamic ARP Inspection protect against?
What kind of attack does IP Source Guard protect against?
A reverse proxy is different from a proxy because a reverse proxy provides ______.
What underlying symmetric encryption cipher does WEP use?
What key lengths does WEP encryption support? Check all that apply.
What's the recommended way to protect a WPA2 network? Check all that apply.
If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture? Check all that apply.
What could you use to sniff traffic on a switch?
What does tcpdump do?
Compared to tcpdump, wireshark has a much wider range of supported _______.
A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
What does a Network Intrusion Prevention System do when it detects an attack?
Comments