Network+ Guide to Networks - Eighth Edition - Chapter 10 - Review Questions
What kinds of issues might indicate a misconfigured ACL?
- A problematic connection between two hosts - A problematic connection between some applications - A problematic connection between ports on two hosts
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
Application Awareness
What kind of firewall blocks traffic based on application data contained within the packets?
Content-filtering firewall
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
Any traffic that is not explicitly permitted in the ACL is __________________, which is called the ___________________.
denied by default implicit deny
What causes most firewall failures?
firewall misconfiguration
Only one ______________________ exits on a network using STP.
root bridge
EAPoL is primarily used with what kind of transmission?
wireless
Why is a BPDU filter needed at the demarc?
A BPDU filter can be used to disable STP on specific ports. For example, you might use a BPDU filter on the demarc, where ISP's service connects with a business's network, to prevent the ISP's WAN topology from mixing with the corporate network's topology for the purpose of plotting STP paths.
What feature of Windows Server allows for agentless authentication?
AD (Active Directory)
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Access Control
What software might be installed on a device in order to authenticate it to the network?
Agent
What's the essential difference between an IPS and an IDS?
IDS (intrusion detection system) can only detect and log suspicious activity IPS (intrusion prevention system) stands between the attacker and the network host, and can prevent traffic from reaching the protected network or host
At what layer of the OSI model do proxy servers operate?
Layer 7
What kind of ticket is held by Kerberos's TGS?
TGT (Ticket-Granting Ticket)
Which of the following features is common to both an NGFW and traditional firewalls?
User authentication
What are two primary features that give proxy servers an advantage over NAT?
Web Page Caching and Content Filtering
Which of the following ACL commands would permit web-browsing traffic from any IP address?
access-list acl_2 permit http any any
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
switchport port-security
Why do network administrators create domain groups to manage user security privileges?
to assign rights that meet the needs of those groups.