This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Network Protection Systems

| See more in Information Technology

You'll build your knowledge of network protection systems.

TBaeten
By
Created Date 03.24.15
Last Updated 03.24.15
Viewed 119 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • This single device combines the functionality of two or more network protection systems.
  • This device is used to send packets to different network segments and operates at layer 3 of the OSI model.
  • This hardware device controls access to all traffic entering and/or leaving a network.
  • A basic security feature that maps internal private addresses to public external addresses.
  • Derived from NAT. Allows thousands of private IP addresses to be mapped to one public IP address.
  • Used to filter traffic based on source IP address, destination IP address, ports, or services.
  • Is used to make filtering decisions based upon a session state. Packets are inspected individually.
  • Layer 7 inspection occurs at what layer of the OSI model?
  • One firewall is a bad security design. Two firewalls should be placed on the edges of the _________.
  • This type of intrusion system sends an alert once an exploit is detected.
  • This type of intrusion system performs an action and sends an alert when an intrusion is detected.
  • A ______ based intrusion system protects critical computers, servers, or virtual machines.
  • This network device lures attackers towards false information.