A+ 1101 Networking Questions Part 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which frequencies does Zigbee operate on?

2.4 GHz, 900 MHz, and 868 MHz Zigbee is a specification based on IEEE 802.15.4. The WPANs operate on 2.4 GHz, 900 MHz, and 868 MHz frequencies.

What is a forward proxy server?

A forward proxy server manages traffic that is leaving and entering the network from the outside.

Which type of embedded device microprocessor is custom designed to perform a specific function?

ASIC. These chips are typically custom-designed and used by a company in a single product. The process to develop these chips is very expensive, time-consuming, and resource-intensive, but they offer high performance with low power consumption.

What keeps track of various network devices while ensuring that the software is secure

An endpoint management server is a way to keep track of various devices while ensuring that software is secure. Many companies that need small IT department overhead use this option.

Which of the following proxy server roles stores frequently accesses data so that a user's request never has to leave the network for retrieval?

Caching. Caching allows frequently accessed data to be stored on the local proxy server so that a user's request never has to leave the network for retrieval.

Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your employer's needs?

DCS A DCS is a customized, all-in-one package that contains the needed PLCs, SCADA controller, and HMI. DCSs are typically custom-designed for specific needs.

Which of the following are IoT systems that work together to make communication between two endpoints possible?

Data storage, and Gateway system Two of the four IoT systems that work together for endpoint communication include the gateway system and data storage. The gateway system connects an IoT device to the cloud, while data storage is the system in the cloud that stores, processes, and analyzes the data.

A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: No one from the internet should be able to access her internal network. Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. A system should be put in place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria?

Implement an all-in-one UTM security appliance. The network criteria specified by your client requires several different network devices to be implemented, including a firewall, an email scanner, a content filter, and an intrusion prevention system. The most cost-effective way to best meet your client's criteria would be an all-in-one UTM security appliance.

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install?

In this scenario, the best option would be to install a Unified Threat Management (UTM) appliance. A UTM combines multiple functions into one single device, including the firewall, IPS, content filtering, VPN support, and much more.

You would like to control internet access based on user, time of day, and websites visited. Which of the following actions would BEST meet your criteria?

Install a proxy server. Allow internet access only through the proxy server, to control internet access based on user, time of day, and websites visited. You would configure these rules on the proxy server, and all internet access requests would be routed through the proxy server using these rules.

Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic?

Intrusion detection detects intrusions and alerts the network. However, it does not block traffic. Instead Intrusion protection detects and blocks network traffic that is not recognized by its profile.

Which of the following BEST describes the Edge Technology layer of the IoT architecture?

It includes all the hardware parts in the IoT system. The Edge Technology layer of the IoT architecture includes all the hardware parts in the IoT system, such as sensors and RFID tags.

Which algorithm is used by an Application layer load balancer?

Least pending request. This algorithm monitors all pending requests and routes them to the most available server. This algorithm allows the load balancer to instantly make adjustments in case there's a sudden surge of incoming connections while still monitoring all server loads.

Which network protocol do controller systems use to communicate with each other?

Modbus. Modbus is a special network protocol that controller systems use to communicate with each other. Modbus originally ran through a serial interface, but has evolved to work over Ethernet and TCP/IP.

What are two major concerns regarding IoT devices?

Privacy, Hacking IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Additionally, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data.

Which of the following internet appliances filters specific internet content categories and also keeps internal users anonymous?

Proxy server. A proxy server is an appliance that typically monitors all incoming and outgoing network traffic and determines if the traffic is allowed or not. The network administrator can configure the proxy server to block specific content categories, such as gambling websites. The proxy server also keeps internal users anonymous since all outgoing traffic shows as coming from the proxy server.

An after-school care center allows children to browse the internet. They want to limit the websites that the children can access. Which of the following network hosts would MOST likely provide this service?

Proxy server. One function of a proxy server is to intercept requests from a client browser and either forward them on to the internet or deny access to that request. Also cache web pages.

What type of operating system do embedded devices use?

Real-time operating system. his operating system handles processes in a deterministic manner.

As a network administrator for your company, you want to set up a network device that manages internal traffic between servers and clients. Which of the following would BEST meet your requirements?

Reverse proxy server. A reverse proxy server is placed between the servers and client machines internally to monitor traffic between them.

Which of the following is a disadvantage of using a UTM?

UTMs have a single point of failure, which can lead to security breaches and total network failures.

Which of the following is an inherent vulnerability of embedded devices?

Unknown environments Embedded devices are sealed systems, which means that they are typically unknown environments. This means that the security administrator will not always know which hardware is in the device.

Which of the following proxy server roles allows users to connect to the internet anonymously with their data encrypted during transmission?

VPN. A VPN allows users to connect to the internet anonymously. All the data is encrypted, and not even the ISP can see the contents of the traffic.

Which of the following load balancer algorithms takes each server's active connections and processing power into consideration?

Weighted least connections. The weighted least connections algorithm distributes traffic based on each server's active connections and processing power.

What is the maximum distance between hops that is allowed by a Z-Wave device on a mesh network?

Z-Wave devices allow up to 250 feet between hops on a mesh network.

What are the two mesh protocols that are used most often with IoT devices?

Z-Wave, Zigbee Zigbee and Z-Wave are two radio protocols that many IoT devices work with because they are designed for low-data rate, low-power applications. These protocols link all IoT devices to form a mesh network.


Set pelajaran terkait

Chapter 4, 5, and 6 Review Questions

View Set

BMKT 325- Principles of Marketing- 1

View Set

VT 8 DiAGN0STiC iMAGiNG final review

View Set

Arc Length & Circumference, Area of Sector, Circles, and Segments

View Set