1. Which of the following is true about subnetting? D. It is also called subnet addressing
2. A virtual LAN (VLAN) allows devices to be grouped_____________. B. Logically
3. Which of the following devices is easiest for an attacker to take advantage of to capture and analyze packets? A. Hub
4. Which of the following is not an attack against a switch? B. ARP address impersonation
5. Which of the following is not true regarding a demilitarized zone (DMZ)? D. It contains servers that are used by internal network users.
6. Which of the following is true about network address translation (NAT)? B. It removes private addresses when the packet leaves the network.
7. Which of the following is not an advantage of a load balancer? A. The risk of overloading a desktop client is reduced.
8. Which of the following is another name for a packet filter? D. Firewall
9. A ________________ firewall allows the administrator to create sets of related parameters that together define one aspect of the device's operation. D. settings-based
10. A (n) ______________ intercepts an internal user request and then processes that request on behalf of the user. C. proxy server
11. A reverse proxy __________. D. routes incomming request to the correct server
12. Which is the preferred location for a spam filter? A. Install the spam filter with the SMTP server
13. A ________ watches for attacks and sounds an alert only when one occurs. C. network intrusion detection system (NIDS)
14. A multipurpose security device is known as a (n) ____________. C. All in one network security appliance
15. Each of the following can be used to hide information about the internal network except _________. A. a protocol analyzer
16. What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?