Chapter 5 Quiz

Ace your homework & exams now with Quizwiz!

What is the maximum value for any octet in an Internet Protocol version 4 (IPv4) address?

255

Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive portal

What protocol is responsible for assigning Internet Protocol (IP) addresses to hosts on many networks?

Dynamic Host Configuration Protocol (DHCP)

True or False? A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

False

True or False? A packet-filtering firewall remembers information about the status of a network communication.

False

True or False? Another name for a border firewall is a demilitarized zone (DMZ) firewall.

False

True or False? Internet Protocol version 4 (IPv4) uses the Internet Control Message Protocol (ICMP) within a network to automatically assign an Internet Protocol (IP) address to each computer.

False

True or False? Physical access to network equipment is required to eavesdrop on a network connection.

False

True or False? The ping utility identifies the path that packets travel through a network.

False

Carrie is a network technician developing the Internet Protocol (IP) addressing roadmap for her company. While IP version 4 (IPv4) has been the standard for decades, IP version 6 (IPv6) can provide a much greater number of unique IP addresses. Which addressing system should she designate for primary use on her roadmap and why?

IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted.

Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?

Network access control (NAC)

What firewall approach is shown in the figure, assuming the firewall has three network cards?

Screened subnet

Hakim is a network engineer. He is configuring a virtual private network (VPN) technology that is available only for computers running the Windows operating system. Which technology is it?

Secure Socket Tunneling Protocol (SSTP)

There are a large number of protocols and programs that use port numbers to make computer connections. Of the following, which ones do not use port numbers? Simple Mail Transfer Protocol (SMTP) or Post Office Protocol v3 (POP3) Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS) Secure Sockets Layer (SSL) or Transport Layer Security (TLS) File Transfer Protocol (FTP) data transfer or FTP control

Secure Sockets Layer (SSL) or Transport Layer Security (TLS)

Hajar is investigating a denial of service attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

Smurf

True or False? A firewall can be used to segment a network.

True

True or False? A home user connecting to a website over the Internet is an example of a wide area network (WAN) connection.

True

True or False? A network protocol governs how networking equipment interacts to deliver data across the network.

True

True or False? A protocol is a set of rules that govern the format of messages that computers exchange.

True

True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

True

True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.

True

True or False? Each layer of the Open Systems Interconnection (OSI) Reference Model needs to be able to talk to the layers above and below it.

True

Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

VPN concentrator

Wen is a network engineer. He would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use?

Virtual LAN (VLAN)

Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives.

network port

A ________ is used to identify the part of an Ethernet network where all hosts share the same host address.

subnet mask

On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN.

switch

What network port number is used for unencrypted web-based communication by default?

80

Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

True or False? The computer game Solitaire operates at the Application Layer of the Open Systems Interconnection (OSI) Reference Model.

False

True or False? The type of wireless access point antenna in use, rather than its placement, can present a security risk.

False

True or False? To create the most secure network, configure the firewall to allow all messages except the ones that are explicitly denied.

False

Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?

Fibre Channel over Ethernet (FCoE)

What type of firewall security feature limits the volume of traffic from individual hosts?

Flood guard

True or False? The Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

True

True or False? The Physical Layer of the Open Systems Interconnection (OSI) Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.

True

True or False? The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

True or False? Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of protocols that operates at both the Network and Transport layers of the Open Systems Interconnection (OSI) Reference Model.

True

Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working?

Physical

Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called?

Media Access Control (MAC) address filtering


Related study sets

Marketing Ch. 19 Overview Assignment

View Set

Week 3 (Microbial Growth, Metabolism)

View Set

Chapter 63: Caring for Clients with Orthopedic and Connective Tissue Disorders

View Set