Looking for Network Security test answers and solutions? Browse our comprehensive collection of verified answers for Network Security at lms.upes.ac.in.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
| Column A | Column B |
|---|---|
| A. Router | 1. Connects devices in a LAN |
| B. Switch | 2. Forwards data based on IP address |
| C. Firewall | 3. Protects the network from unauthorized access |
| D. Hub | 4. Broadcasts data to all devices |
| Column A | Column B |
|---|---|
| A. Eavesdropping | 1. Active attack |
| B. DoS attack | 2. Passive attack |
| C. Malware | 3. Unauthorized software attack |
| D. Intrusion | 4. Unauthorized access |
| Column A | Column B |
|---|---|
| A. Application Layer | 1. TCP, UDP |
| B. Transport Layer | 2. HTTP, FTP |
| C. Internet Layer | 3. IP |
| D. Network Interface Layer | 4. Ethernet |
| Column A | Column B |
|---|---|
| A. Internal Network | 1. Publicly accessible area |
| B. External Network | 2. Secure organizational network |
| C. DMZ | 3. Area between internal and external network |
| D. Trusted Zone | 4. Protected internal environment |
| Column A | Column B |
|---|---|
| A. Router | 1. Connects multiple networks |
| B. Switch | 2. Connects devices in LAN |
| C. Repeater | 3. Strengthens signals |
| D. Gateway | 4. Connects different networks |
Which of the following is a secure network zone?
Network segmentation improves security by:
Which of the following is used to divide a network into segments?
Which network device works as a traffic controller between networks?
A firewall mainly filters traffic based on: