InfoSec Ch5
A ___ is a device that interconnects two or more networks and selectively interchanges packets of data between them.
Router
True or False? A network protocol governs how networking equipment interacts to deliver data across the network.
True
True or False? A protocol is a set of rules that govern the format of messages that computers exchange.
True
True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.
True
True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.
True
True or False? Each layer of the Open Systems Interconnection (OSI) Reference Model needs to be able to talk to the layers above and below it.
True
True or False? The Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).
True
True or False? The Physical Layer of the Open Systems Interconnection (OSI) Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.
True
True or False? The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.
True
True or False? Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of protocols that operates at both the Network and Transport layers of the Open Systems Interconnection (OSI) Reference Model.
True
What is the maximum value for any octet in an Internet Protocol version 4 (IPv4) address? A. 255 B. 129 C. 513 D. 65
A. 255
The basic job of a __________ is to enforce an access control policy at the border of a network. A. Firewall B. Router C. Switch D. Access point
A. Firewall
Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called? A. Media Access Control (MAC) address filtering B. Uniform Resource Locator (URL) filtering C. Subnetting D. Service set identifier (SSID) broadcasting
A. Media Access Control (MAC) address filtering
Which VPN technology allows users to initiate connections over the web? A. SSL/TLS B. PPTP C. IPSec D. ICMP
A. SSL/TLS
A secure virtual private network (VPN) creates an authenticated and encrypted channel across some form of public network. A. True B. False
A. True
What protocol is responsible for assigning Internet Protocol (IP) addresses to hosts on many networks? A. IP B. Transport Layer Security (TLS) C. Simple Mail Transfer Protocol (SMTP) D. Dynamic Host Configuration Protocol (DHCP)
D. Dynamic Host Configuration Protocol (DHCP)
What technology allows you to hide the private IPv4 address of a system from the Internet? A. SSL B. RADIUS C. PPTP D. NAT
D. NAT
What firewall topology supports the implementation of a DMZ? A. Bastion host B. Multilayered firewall C. Border firewall D. Screened subnet
D. Screened subnet
__________ is a suite of protocols that was developed by the Department of Defense to provide a highly reliable and fault- tolerant network infrastructure. A. DHCP B. VPN C. IPSec D. TCP/IP
D. TCP/IP
True or False? A border router can provide enhanced features to internal networks and help keep subnet traffic separate.
False
True or False? Internet Protocol version 4 (IPv4) uses the Internet Control Message Protocol (ICMP) within a network to automatically assign an Internet Protocol (IP) address to each computer.
False
True or False? Physical access to network equipment is required to eavesdrop on a network connection.
False
True or False? To create the most secure network, configure the firewall to allow all messages except the ones that are explicitly denied.
False
True or False? A firewall can be used to segment a network.
True
True or False? A home user connecting to a website over the Internet is an example of a wide area network (WAN) connection.
True
On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN. A. Switch B. Firewall C. Server D. Router
A. Switch
The three basic types of firewalls are packet filtering, application proxy, and stateful inspection. A. True B. False
A. True
DHCP provides systems with their MAC addresses. A. True B. False
B. False
IP addresses are assigned to computers by the manufacturer. A. True B. False
B. False
What layer of the OSI Reference Model is most commonly responsible for encryption? A. Application B. Presentation C. Session D. Transport
B. Presentation
Which simple network device helps to increase network performance by using the MAC address to send network traffic only to its intended destination? A. Hub B. Switch C. Router D. Gateway
B. Switch
A __________ is a critical element in every corporate network today, allowing access to an organization's resources from almost anywhere in the world. A. Local area network (LAN) B. Wide area network (WAN) C. Dynamic Host Configuration Protocol (DHCP) D. None of the above
B. Wide area network (WAN)
The basic model for how you can build and use a network and its resources is known as the __________. A. Dynamic Host Configuration Protocol (DHCP) model B. International Organization for Standardization (ISO) model C. Open Systems Interconnection (OSI) Reference Model D. None of the above
C. Open Systems Interconnection (OSI) Reference Model
What technology is the most secure way to encrypt wireless communications? A. TCP B. WEP C. WPA D. UDP
C. WPA
Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives. A. Internet Protocol (IP) address B. ping C. network port D. Media Access Control (MAC) address
C. network port