1601 Chapter 10 Practice Questions

Ace your homework & exams now with Quizwiz!

What technology is the most secure way to encrypt wireless communications?

WPA

2. A subnet mask of a network is based on IP address?

False

4. ICMP is a method of IP address assignment that uses an alternate, public IP address to hide systems real IP address?

False

A packet-filtering firewall remembers information about the status of a network communication.

False

DHCP provides systems with their MAC addresses.

False

IP addresses are assigned to computers by the manufacturer:

False

The basic job of a __________ is to enforce an access control policy at the border of a network

Firewall

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

Hub

What technology allows you to hide the private IPv4 address of a system from the Internet?

NAT

The basic model for how you can build and use a network and its resources is known as the ________.

Open Systems Interconnection (OSI) Reference Model

5. What type of firewall has no memory of packets it has encountered in the past and must make decisions for each packet it receives?

Packet filtering firewall

What layer of the OSI Reference Model is most commonly responsible for encryption?

Presentation Layer

A ________ is a device that interconnects two or more networks and selectively interchanges packets of data between them.

Router

Which VPN technology allows users to initiate connections over the WEB?

SSL

What firewall topology supports the implementation of a DMZ?

Screened subnet

Which simple network device helps to increase network performance by using the MAC address to send network traffic only to its intended destination?

Switch

_____________is a suite of protocols that was developed by the Department of Defense to provide a highly reliable and fault-tolerant network infrastructure.

TCP/IP

3. Implicit deny is when a firewall looks at message address to determine whether a message is being sent around an unending loop?

True

A secure virtual private network (VPN) creates an authenticated and encrypted channel across some form of public network.

True

The physical layer of OSI model translates the binary one and zeros of computer language to the language of the transport medium?

True

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

The three basic types of firewalls are packet filtering, application proxy, and stateful inspection.

True

Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

WiFi

A(n) ___________ is a critical element in every corporate network today; allowing access to an organization's resources from almost anywhere in the world.

Wide area network (WAN)


Related study sets

Chapter 3 - Organizational Commitment

View Set

Cultural Characteristics of South and Southeast Asia, Natural Resources and Economies of South Asia

View Set

Chapter 74 Drug Therapy for Gout

View Set

Module 2.4 Base de données - 1er test

View Set

Physics Unit 3 and Unit 4 25/09/2020

View Set

Chapter 9 The Voyage Through the Life Span

View Set