96 Chapter 4 ■ Communication and Network Security (Domain 4)
- What type of firewall design is shown in the following image?
Firewall
Private Network
Router
Internet
A. Single tier
B. Two t i e r
C. Three tier
D. Next generation
- During a review of her organization’s network, Angela discovered that it was suffering
from broadcast storms and that contractors, guests, and organizational administrative
staff were on the same network segment. What design change should Angela recommend?
A. Require encryption for all users.
B. Install a firewall at the network border.
C. Enable spanning tree loop detection.
D. Segment the network based on functional requirements. - ICMP, RIP, and network address translation all occur at what layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
For questions 73–75, please refer to the following scenario:
Ben is an information security professional at an organization that is replacing its physi-
cal servers with virtual machines. As the organization builds its virtual environment, it is
decreasing the number of physical servers it uses while purchasing more powerful servers
to act as the virtualization platforms.
- The IDS Ben is responsible for is used to monitor communications in the data center using
a mirrored port on the data center switch. What traffic will Ben see once the majority of
servers in the data center have been virtualized?
A. The same traffic he currently sees
B. All inter-VM traffic
C. Only traffic sent outside the VM environment
D. All inter-hypervisor traffic