Ch. 10 Quiz

Ace your homework & exams now with Quizwiz!

What protocol is responsible for assigning IP addresses to hosts on most networks?

Dynamic Host Configuration Protocol (DHCP)

Henry is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall?

25

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?

443

Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive portal

Implicit deny is when firewalls look at message addresses to determine whether a message is being sent around an unending loop.

False

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

Presentation

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer.

True

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

The three main categories of network security risk are reconnaissance, eavesdropping and denial of service.

True

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)

What wireless security technology contains significant flaws and should never be used?

Wired Equivalent Privacy (WEP)

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

Hub

Barbara is investigating an attack against her network. she notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

Smurf

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator


Related study sets

Marketing Flashcards: Pre- and Post-Midterm Combined

View Set

Chapter 28: Developing the Role of the Leader

View Set

Management quiz for chapter 9,10,11 and 12

View Set

7 Habits of Highly Effective People

View Set

Chapter 2 Testing in the Context of the Software Development Lifecycle

View Set