- A. LDAP Show
- In order for clients to authenticate to network resources, some sort of directory server on the network must maintain a database of account information, such as usernames, passwords, and any other authentication credentials. Often this is accomplished in AD(active directory) or something more Linux-focused like OpenLDAP or 389 Directory Server. LDAP (lightweight directory access protocol)
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching terms Terms in this set (20)Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port? switchport port-security Which of the following is not one of the three AAA services provided by RADIUS and TACACS+? Access Control Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? access-list acl_2 permit http any any Active Directory and 389 Directory Server are both compatible with which directory access protocol? LDAP What kind of firewall blocks traffic based on application data contained within the packets? Content-filtering firewall What feature of Windows Server allows for agentless authentication? AD (Active Directory) What software might be installed on a device to authenticate it to the network? Agent At what layer of the OSI model do proxy servers operate? Layer 7 Which of the following features is common to both an NGFW and traditional firewalls? User authentication Which NGFW feature allows a network admin to restrict traffic generated by a specific game? Application awareness What are the two primary features that give proxy servers an advantage over NAT? Filter content and file caching What kinds of issues might indicate a misconfigured ACL? Wrong people being able to log in. Any traffic that is not explicitly permitted in the ACL is __________, which is called the __________. dropped, implicit deny What's the essential difference between an IPS and an IDS? IDS (intrusion detection system) creates alerts when suspicious activity happens. What causes most firewall failures? Not being configured correctly Why is a BPDU filter needed at the demarc? To disable STP on specific ports. For example, you might use a BPDU filter on the demarc, where ISP's service connects with a business's network, to prevent the ISP's WAN topology from mixing with the corporate network's topology for the purpose of plotting STP paths. Why do network administrators create domain groups to manage user security privileges? To simplify the process of granting rights to users Only one __________ exists on a network using STP. Root bridge What kind of ticket is held by Kerberos's TGS? TGT (Ticket-Granting Ticket) EAPoL is primarily used with what kind of transmission? Wireless Sets with similar termsChapter 7 thru Chapter 12_Computer Network Fundame…57 terms Slevell5116 Network+ Domain 1: Network Architecture168 terms Yakkuza SYS401 Quiz 450 terms david_severns Network+ Chapter 1 Questions29 terms jtaylor617 Sets found in the same folderNetwork+ Chapter 515 terms tuyentran2015 Network + post assignment91 terms amit_kumar586 Unit 12 Quiz & Think Critically20 terms Narcle Security in Network Design (chapter 10)10 terms amit_kumar586 Other sets by this creatorA+ Software Midterm20 terms Narcle Ethical Hacking 0130 terms Narcle Unit 11 Quiz & Think Critically20 terms Narcle Network+ Pre-Course Assessment30 terms Narcle Other Quizlet setsPharmacology II - Exam 4 - OA, FM, Gout, OP, and B…58 terms cfkuhns A&P Study Questions103 terms kennedy_blue Mr. Dorgan's AP Euro Part Three14 terms Astarael WORLD CIV FINAL #624 terms Chalk433 Related questionsQUESTION The DES algorithm is an example of what type of cryptography? 6 answers QUESTION T/F UDP and TCP source and destination ports are standardized. 8 answers QUESTION What is the problem with caching? 10 answers QUESTION 5) If a hacker takes over an application, he or she gets all the privileges of the application on the computer. 3 answers What kind of firewall can block designated types of traffic based on application data contained within packets quizlet?A stateless firewall blocks designated types of traffic based on application data contained within packets.
Can block designated types of traffic based on application data contained within packets?christ please help me with this.. What are firewalls quizlet?What is a firewall? hardware or software system that prevents unauthorized access to or from a network. - used to separate a trusted network from an untrusted network. - basically act like a filter and stops untrusted network traffic or packets. It protects the network from external attacks.
Where is a network firewall placed quizlet?A network-based firewall is installed on the edge of a private network or network segment.
|