Chapter 5 Quiz1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?

Fibre Channel over Ethernet (FCoE)

Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive portal

True or False? A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

False

True or False? A packet-filtering firewall remembers information about the status of a network communication.

False

True or False? Another name for a border firewall is a demilitarized zone (DMZ) firewall.

False

True or False? Internet Protocol version 4 (IPv4) uses the Internet Control Message Protocol (ICMP) within a network to automatically assign an Internet Protocol (IP) address to each computer.

False

Carrie is a network technician developing the Internet Protocol (IP) addressing roadmap for her company. While IP version 4 (IPv4) has been the standard for decades, IP version 6 (IPv6) can provide a much greater number of unique IP addresses. Which addressing system should she designate for primary use on her roadmap and why?

IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted.

Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called?

Media Access Control (MAC) address filtering

Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?

Network access control (NAC)

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working?

Physical

Hakim is a network engineer. He is configuring a virtual private network (VPN) technology that is available only for computers running the Windows operating system. Which technology is it?

Secure Socket Tunneling Protocol (SSTP)

There are a large number of protocols and programs that use port numbers to make computer connections. Of the following, which ones do not use port numbers? Simple Mail Transfer Protocol (SMTP) or Post Office Protocol v3 (POP3) Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) Secure Sockets Layer (SSL) or Transport Layer Security (TLS) File Transfer Protocol (FTP) data transfer or FTP control

Secure Sockets Layer (SSL) or Transport Layer Security (TLS)

Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

Smurf

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator

Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives.

network port

A ________ is used to identify the part of an Ethernet network where all hosts share the same host address.

subnet mask

On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN.

switch


Kaugnay na mga set ng pag-aaral

Chapter 7: Social Class: The Structure of Inequality

View Set

Healthy Wealthy and Wise Chapter 6/13 Quiz

View Set

Organizational Behavior Final Study Guide

View Set

ATI RN Nursing Care of Children Practice B

View Set

geography of N. america quiz questions

View Set

Chapter 11: The Muscular System 11.1-11.3

View Set