Professional Documents
Culture Documents
JP Arlos 8788
JP Arlos 8788
I. Matching Type
a B
1. If an attacker has a physical access to a cable he/she can simply tap that cable
and see all the data passing through the cable
Aswer:D
2. This applied to control which computers can connect to network. With this
technology it provide a list of acceptable MAC address to WAP a. Packet filtering
Answer:C b. IPSec
3. It is use for building a local network which use a standard communication c. Data Link Layer
protocol which is embedded to soft and software devices
d. Network
Answer:E Eavesdropping
4. A management and control protocol for IP. It delivers message between hosts e. Ethernet Network
about the health of the network
f. Border Routers
Answer:J
g. Session layer
5. It compares received traffic to a set of rules that define which traffic it will
permit to pass through the firewall h. MAC Address
Filtering
Answer:H
i. Network
6. This a responsible for maintaining communication between computers. It Reconnaissance
creates, maintain, and disconnect communication that takes place between
processors over network j. ICMP
Answer:F
Answer:I
Answer:G
Answer:B
Answer:H