Network Protection Systems
You'll build your knowledge of network protection systems.
Created Date
03.24.15
Last Updated
03.24.15
Viewed 122 Times
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
Topics of this game:
-
This single device combines the functionality of two or more network protection systems.
-
This device is used to send packets to different network segments and operates at layer 3 of the OSI model.
-
This hardware device controls access to all traffic entering and/or leaving a network.
-
A basic security feature that maps internal private addresses to public external addresses.
-
Derived from NAT. Allows thousands of private IP addresses to be mapped to one public IP address.
-
Used to filter traffic based on source IP address, destination IP address, ports, or services.
-
Is used to make filtering decisions based upon a session state. Packets are inspected individually.
-
Layer 7 inspection occurs at what layer of the OSI model?
-
One firewall is a bad security design. Two firewalls should be placed on the edges of the _________.
-
This type of intrusion system sends an alert once an exploit is detected.
-
This type of intrusion system performs an action and sends an alert when an intrusion is detected.
-
A ______ based intrusion system protects critical computers, servers, or virtual machines.
-
This network device lures attackers towards false information.
User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.