1601 Chapter 10 Practice Questions
What technology is the most secure way to encrypt wireless communications?
WPA
2. A subnet mask of a network is based on IP address?
False
4. ICMP is a method of IP address assignment that uses an alternate, public IP address to hide systems real IP address?
False
A packet-filtering firewall remembers information about the status of a network communication.
False
DHCP provides systems with their MAC addresses.
False
IP addresses are assigned to computers by the manufacturer:
False
The basic job of a __________ is to enforce an access control policy at the border of a network
Firewall
Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?
Hub
What technology allows you to hide the private IPv4 address of a system from the Internet?
NAT
The basic model for how you can build and use a network and its resources is known as the ________.
Open Systems Interconnection (OSI) Reference Model
5. What type of firewall has no memory of packets it has encountered in the past and must make decisions for each packet it receives?
Packet filtering firewall
What layer of the OSI Reference Model is most commonly responsible for encryption?
Presentation Layer
A ________ is a device that interconnects two or more networks and selectively interchanges packets of data between them.
Router
Which VPN technology allows users to initiate connections over the WEB?
SSL
What firewall topology supports the implementation of a DMZ?
Screened subnet
Which simple network device helps to increase network performance by using the MAC address to send network traffic only to its intended destination?
Switch
_____________is a suite of protocols that was developed by the Department of Defense to provide a highly reliable and fault-tolerant network infrastructure.
TCP/IP
3. Implicit deny is when a firewall looks at message address to determine whether a message is being sent around an unending loop?
True
A secure virtual private network (VPN) creates an authenticated and encrypted channel across some form of public network.
True
The physical layer of OSI model translates the binary one and zeros of computer language to the language of the transport medium?
True
The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.
True
The three basic types of firewalls are packet filtering, application proxy, and stateful inspection.
True
Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?
WiFi
A(n) ___________ is a critical element in every corporate network today; allowing access to an organization's resources from almost anywhere in the world.
Wide area network (WAN)