Quiz 10 - Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What wireless security technology contains significant flaws and should never be used?

Wired Equivalent Privacy (WEP)

What protocol is responsible for assigning IP addresses to hosts on most networks?

Dynamic Host Configuration Protocol (DHCP)

What type of firewall security feature limits the volume of traffic from individual hosts?

Flood guard

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

Presentation

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application Proxying

What type of network connects systems over the largest geographic area?

Wide area network (WAN)

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?

443 HTTP over Secure Sockets Layer (SSL)

What firewall approach is shown in the figure?

Screen subnet

Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall?

25 - Simple Mail Transfer Protocol (SMTP)

What is the maximum value for any octet in an IPv4 IP address?

255

What is NOT a service commonly offered by unified threat Management (UTM) devices?

Wireless network access

Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow?

3389

Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive portal

David would like to connect a fibre channel storage device to systems over a standard data network. What protocol can he use?

Fibre Channel over Ethernet (FCoE)

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

Hub

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

Smurf Smurf attack - A network attack in which forged Internet Control Message Protocol (ICMP) echo request packets are sent to IP broadcast addresses from remote locations to generate DoS attacks.

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)

Gary is configuring a smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

Wi-Fi


Ensembles d'études connexes

Module 3: Learning and Development

View Set

2.3 Financial Markets Instruments, Econ Old Exam Midterm 1, M&B: Ch 3 TB, Econ Chapter 5,6, & 7, CH. 2: MONEY & PAYMENTS SYSTEM, Chapter 3, Econ 3229 practice test 1, Chapter 6, Exam 2 Chapter 7, Money and Banking chapter 6

View Set

29 Art History: Impressionism, 28 Art History: Romanticism, Neoclassical, Neoclassical, 26 Art History: 18th Century Art in Europe, 25 Art History: Rococo Style, 23 Art History: Native American Art in North America, Native American Art in North Ameri...

View Set

Chapter 8 End of Book Questions CSCI 290

View Set

Shock, trauma, burns, hemodynamics,

View Set

6th Grade Language Arts 2nd Semester

View Set