GBA 6780 - Chapter 10 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows? -Router -Hub -Access point -Switch

Switch

Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall? -22 -25 -53 -80

25

What is the maximum value for any octet in an IPV4 IP address? -65 -129 -255 -513

255

Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow? -143 -443 -989 -3389

3389

Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy? -Remote Authentication Dial-In User Service (RADIUS) -Lightweight Extensible Authentication Protocol (LEAP) -Captive Portal -Protected Extensible Authentication Protocol (PEAP)

Captive portal

T/F: A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

False

T/F: A subnet mask is a partition of a network based on IP addresses

False

T/F: IP addresses are eight-byte addresses that uniquely identify every device on the network.

False

T/F: The Transport Layer of the OSI Reference Model creates, maintains, and disconnects communications that take place between processes over the network.

False

What type of firewall security feature limits the volume of traffic from individual hosts? -Loop protection -Network separation -Stateful inspection -Flood guard

Flood guard

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working? -Application -Presentation -Session -Data Link

Presentation

What firewall approach is shown in the figure? -Border firewall -Bastion host -Screened subnet -Multilayered firewall

Screened subnet

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? -Teardrop -Land -Smurf -Cross-site scripting (XSS)

Smurf

T/F: A firewall is a basic network security defense tool.

True

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use? -Firewall -Unified threat management (UTM) -Router -VPN concentrator

VPN concentrator

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use? -Firewall -Virtual LAN (VLAN) -Virtual private network (VPN) -Transport Layer Security (TLS)

Virtual LAN (VLAN)

What type of network connects systems over the largest geographic area? -Wide area network (WAN) -Metropolitan area network (MAN) -Local area network (LAN) -Storage area network (SAN)

Wide area network (WAN)

What wireless security technology contains significant flaws and should never be used? -Wired Equivalent Privacy (WEP) -Wi-Fi Protected Access (WPA) -WPA2 -Remote Authentication Dial-In User Service (RADIUS)

Wired Equivalent Privacy (WEP)

What is NOT a service commonly offered by unified threat management (UTM) devices? -URL filtering -Wireless network access -Malware inspection -Content inspection

Wireless network access

What protocol is responsible for assigning IP addresses to hosts on most networks? -Dynamic Host Configuration Protocol (DHCP) -Transport Layer Security (TLS) -Virtual LAN (VLAN) -Simple Mail Transfer Protocol (SMTP)

Dynamic Host Configuration Protocol (DHCP)


Ensembles d'études connexes

Chapter 3: Toxic Effects of Drugs

View Set

Chapter 3: Working with Financial Statements

View Set

Midterm 2 - Nutrition Through Life

View Set

Psych 101 Ch 1; The Science of Psychology (Study set)

View Set

Графіка. Фонетика. Орфоепія. Типові завдання на ЗНО з цих тем.

View Set