24.2.6 Check Your Understanding – Identify the Impact of the Technology on Security and Monitoring Answers

1. Which of the following spreads malware-infected files and creates vulnerabilities on a network?

  • ACL
  • Encryption
  • Tunneling
  • NAT/Pat
  • P2P==

Explanation: P2P spreads malware-infected files and creates vulnerabilities on a network.

2. Which of the following can be defeated by packets containing spoofed IP addresses?

  • P2P
  • TOR
  • ACL
  • encryption
  • NAT/PAT

Explanation: ACL can be defeated by packets containing spoofed IP addresses.

3. Which of the following makes message contents and file attachments unreadable?

  • NAT/PAT
  • TOR
  • Load balancing
  • Encryption
  • ACL

Explanation: Encryption makes message contents and file attachments unreadable.

4. Which of the following hides identity details of users who are browsing the web?

  • TOR
  • P2P
  • ACL
  • NAT/PAT
  • Load balancing

Explanation: TOR hides identity details of users who are browsing the web.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x