This website uses cookies to ensure you get the best experience on our website.
Privacy Policy
OK
Wisc-Online Arcade Logo
Toggle navigation
Learn
Games
Play Games
Build Games
Courses
Image Library
Search
User Profile
Sign Up
Sign In
Sign In
Sign Up
Network Protection Systems
|
See more in
Information Technology
You'll build your knowledge of network protection systems.
By
Baeten
Created Date 03.24.15
Last Updated 03.24.15
Viewed 119 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
Download text-based alternate version
Tweet
Vote Up
Vote Down
153
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
You need to be logged in to use this feature.
Log In
or
Register
Topics of this game:
This single device combines the functionality of two or more network protection systems.
This device is used to send packets to different network segments and operates at layer 3 of the OSI model.
This hardware device controls access to all traffic entering and/or leaving a network.
A basic security feature that maps internal private addresses to public external addresses.
Derived from NAT. Allows thousands of private IP addresses to be mapped to one public IP address.
Used to filter traffic based on source IP address, destination IP address, ports, or services.
Is used to make filtering decisions based upon a session state. Packets are inspected individually.
Layer 7 inspection occurs at what layer of the OSI model?
One firewall is a bad security design. Two firewalls should be placed on the edges of the _________.
This type of intrusion system sends an alert once an exploit is detected.
This type of intrusion system performs an action and sends an alert when an intrusion is detected.
A ______ based intrusion system protects critical computers, servers, or virtual machines.
This network device lures attackers towards false information.
Questions
Feedback
Ask a Question
New Question
Cancel
|
Save
Start a new Discussion
New Discussion
Cancel
|
Save