Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

John Paul Arlos

I. Matching Type

a B

1. If an attacker has a physical access to a cable he/she can simply tap that cable
and see all the data passing through the cable

Aswer:D

2. This applied to control which computers can connect to network. With this
technology it provide a list of acceptable MAC address to WAP a. Packet filtering

Answer:C b. IPSec

3. It is use for building a local network which use a standard communication c. Data Link Layer
protocol which is embedded to soft and software devices
d. Network
Answer:E Eavesdropping

4. A management and control protocol for IP. It delivers message between hosts e. Ethernet Network
about the health of the network
f. Border Routers
Answer:J
g. Session layer
5. It compares received traffic to a set of rules that define which traffic it will
permit to pass through the firewall h. MAC Address
Filtering
Answer:H
i. Network
6. This a responsible for maintaining communication between computers. It Reconnaissance
creates, maintain, and disconnect communication that takes place between
processors over network j. ICMP

Answer:F

7. It a gathering of information about a network for use in the future attacks

Answer:I

8. Is a suite of protocols designed to connect sites securely.

Answer:G

9. It is a subject to direct attack from an outside source. Multilayered defense is


far and more secure. The Lone defense router can protect internal resources
but is subject to attack itself

Answer:B

10. This is responsible for transmitting information on computers connected to the


same local area network (LAN).. Device manufacturers assign each hardware
device a unique MAC address

Answer:H

You might also like