Answers to Review Questions

1. B. Firewalls provide protection by controlling traffic entering and leaving a network.

2. A. Network-based IDSs aren’t suitable for protecting against email spoofing.

3. B. A DMZ provides a network segment where publicly accessible servers can be deployed without compromising the security of the private network.

4. C. Switches can create VLANs. Broadcast storms aren’t transmitted between one VLAN and another.

5. C. Illegal or unauthorized zone transfers are a significant and direct threat to DNS servers.

6. D. At a blind FTP site, users can upload but not download. An anonymous FTP site is one where users don’t authenticate and possibly where only anonymous access is allowed. Only through SFTP or by using FTP inside ...

Get CompTIA Security+™: Review Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.