b. is also called subnet addressing
2. A virtual LAN (VLAN) allows devices to be grouped __________.
a. logically
3. Convergence combines voice, data, and video traffic __________.
a. over a single IP network
4. Each of the following is a convergence security vulnerability except __________.
a. convergence resource attacks (CRA)
5. Which of the following is not true regarding a demilitarized zone (DMZ)?
a. It contains servers that are only used by internal network users.
6. Network address translation (NAT) __________.
c. removes private addresses when the packet leaves the network
7. Each of the following is a variation available in network access control (NAC) implementations except __________.
c. network or local
8. Another name for a packet filter is a __________.
b. firewall
9. The __________ establishes the action that a firewall takes on a packet.
b. rule base
10. A(n) __________ intercepts internal user requests and then processes that request on behalfof the user.
a. proxy server
11. A reverse proxy __________.
b. routes incoming requests to the correct server
12. A honeypot is used for each of the following except __________.
b. filter packets before they reach the network
13. A __________ watches for attacks but only takes limited action when one occurs.
a. network intrusion detection system(NIDS)
14. A multipurpose security appliance integrated into a router is known as a(n) __________.
b. integrated network security hardware device
15. Each of the following can be used to hide information about the internal network except__________.
d. protocol analyzer
16. The difference between a network intrusion detection system(NIDS) and a network intrusion prevention system (NIPS) is that __________.
c. a NIPS can take extended actions to combat the attack
17. A variation of NAT that is commonly found on home routers is