CIS 401 Chapter 5 Quiz

Ace your homework & exams now with Quizwiz!

What technology is the most secure way to encrypt wireless communications? a. tcp b. wep c. wpa d. udp

C

What technology allows you to hide the private IPv4 address of a system from the Internet? a. SSL b. RADIUS c. PPTP d. NAT

D

Piper is a network technician developing the IP addressing roadmap for her company. Options are IPv4 & IPv6. Which addressing system should she designate for primary use on her roadmap and why? IPv6 is only slowly being adopted. She should make IPv4 the primary addressing scheme in her roadmap until IPv6 is more widely adopted. a. IPv6 is rapidly replacing IPv4 worldwide. She should make IPv6 the b. primary addressing scheme in her roadmap. c. Few commercial businesses still use IPv4. She should feature IPv6 strongly in her roadmap rather than have her company fall behind technologically. d. There will be adequate IPv4 addresses available well into the future. She should make IPv4 the primary addressing scheme.

A

Helen is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) Reference Model is she working? a. Application b. Physical c. Presentation d. Session

B

Sam recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? a. Packet filtering b. Application proxying c. Stateful inspection d. Network address translation

B

What layer of the OSI Reference Model is most commonly responsible for encryption? a. Application b. Presentation c. Session d. Transport

B

Early ethernet networks required all devices be connected by a single wire, forcing each to take turns on a LAN. Today, this situation is alleviated with each device having a dedicated wire connection to a _________ that controls traffic on the LAN. a. firewall b. router c. switch d. server

C

Phoebe is a network engineer. She would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology is best to use? a. Network access control (NAC) b. Virtual private network (VPN) c. Virtual LAN (VLAN) d. Transport Layer Security (TLS)

C

To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives. a. ping b. IP address c. Media Access Control (MAC) address d. network port

D

What firewall topology supports the implementation of a DMZ? a. Bastion host b. multilayered firewall c. border firewall d. screened subnet

D

What protocol is responsible for assigning Internet Protocol (IP) addresses to hosts on many networks? a. Simple Mail Transfer Protocol (SMTP) b. Domain Name Services (DNS) c. Transport Layer Security (TLS) d. Dynamic Host Configuration Protocol (DHCP)

D

To create the most secure network, configure the firewall to allow all messages except the ones that are explicitly denied. This is a default permit approach also known as "Black Listing". T/F

False

IP Addresses are assigned to computers by the manufacturer T/F

False - they are assigned by the ISP


Related study sets

OWare- Essentials Of Communication 3. Interpersonal Relationships

View Set

Physiological Psychology and Psychopharmacology

View Set

ARRT The Fetal Genitourinary System - Chapter 29 (Review Questions)

View Set