Chapter 7 & 8 (firewalls)

Ace your homework & exams now with Quizwiz!

Which of the following are true of a circuit proxy filter firewall? (select two)

Verifies sequencing of session packets. Operates at the Session layer.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the chance with the least amount of effort possible. What should you do?

Wait for convergence to take place.

You are configuring a firewall to allow access to a server hosted on the demitiarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server?

Web server and email server

You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the inter. Now, you must configure the firewall on your network to allow time synchronization traffic through. Which of the following ports are you most likely to open on the firewall?

123

Haley configures a Web site using Windows 2016 default values. What are the HTTP port and SSL port settings?

80 for HTTP; 443 for SSL

You connect your computer to a wireless network available at the local library. You find that you can access all Web sites you want on the Internet except for two. What might be causing the problem?

A proxy server is blocking access to the websites.

Which of the following is a characteristic of static routing when compared to dynamic routing?

All routes must be manually updated on the router. Static routing requires that entries in the routing table are configured manually. Network entries remain in the routing table until manually removed. When changes to the network occur, static entries must be added or removed.

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?

BGP - an advanced distance vector protocol (also called a path vector protocol)

Which of the following routing protocols is used by routers on the internet for learning and sharing routes?

BGP is the protcol used on the internet.

you have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network.

Convergence - a term used to describe when all routers have the same (or correct) routing information.

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.0.0.0/16. What will the router do with the packet?

Drop the packet.

Which of the following routing protocols is classified as a hybrid routing protocol?

EIGRP

Which of the following are characteristics of a circuit-level gateway? (select two)

Filters by session Stateful

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0 The router receives a packet addressed to network 10.0.0/16. What will the router do with the packet?

Forward the packet to the net hop router specified by the route to network 0.0.0.0

Which of the following are true about reverse proxy? (select two)

Handles request from the internet to a server in a private network. can perform load balancing, authentication, and caching.

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?

Host-based firewall

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use?

IGP (interior gateway protocol)

You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?

IP address

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?

If the network is connected to the internet using multiple ISPs

You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?

Install a proxy server. Allow internet access only through the proxy server.

Which of the following tasks do routers perform? (Select two.)

Maintain information about paths through an inter-network. Route data based on logical network addresses.

When multiple routes to a destination exist, what is used to select the best possible route?

Metric. Routers use metric values to identify the distance, or cost, to a destination network.

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?

OSPF divides a large network into areas.

Which of the following best describes OSPF?

OSPF is a classless link state routing protocol

Which of the following routing protocols uses relative link cost as the metric?

OSPF is a link-state routing protocol used for routing within an AS.

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not.

Which of the following is a firewall function?

Packet filtering

Which of the following protocols has a limit of 15 hops between any two networks?

RIP networks are limited in size to a maximum of 15 hops between any two networks.

Which of the following statements about RIP is true?

RIP uses hop counts as the cost metric. RIP is distance vector routing protocol.

Based on the diagram, which type of proxy server is handling the client's request?

Reverse proxy server.

You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 1720. What is the source of this network traffic?

Someone us using voice over IP (VoIP) to make a telephone call.

You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (select all that apply)

Source address of a packet. Port number. Destination address of a packet.

You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 2427. What is the source of this network traffic?

The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network.

What information does the 'next hop' entry in a routing table identify?

The first router in the path to the destination network.


Related study sets

Purchasing and Buyer Behavior Final Exam Review: Ch.3

View Set

Nursing PrepU Drugs Acting on GI Secretions

View Set

Community Nutrition Exam 3: Chapters 11, 12, 13, 15

View Set

PSYC-101 Quiz 4 (Chapters 5, 6, & 7) *

View Set

Maternal/Pediatric HESI practice

View Set

Quiz 4 Civil Liberties and Civil Rights

View Set