Info sec chapter 10

Ace your homework & exams now with Quizwiz!

Ogden Morrow is creating a firewall rule that will allow inbound mail to the organization. What TCP port must he allow through the firewall?

25

What is the maximum value of any octet (8 bits) in an IPv4 IP address?

255

Nelson recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

Laurie would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive Portal

What protocal is responsible for assigning IP addresses to hosts on most networks?

Dynamic host configuration protocol (DHCP)

Internet Control Message Protocal (ICMP) is a method of IP addressing assignemtn that uses an alternate, public IP .

False

What type of firewall security feature limits the volume of traffic from individual hosts?

Flood Guard

Samantha is troublshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working?

Presentation

What firewall approach is shown in the figure?

Screened subnet, or demilitarized zone

Halliday has a high-volume virtual private network (VPN). He would like to use a device that would best handle thr required processing power. What type of device should he use?

VPN concentrator

Helen would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)

What type of network connects systems over the largest geographic area?

Wide area network (WAN)

What wirless security technology contains significant flaws and should never be used?

Wired Equivalent Privacy (WEP)

What is NOT a sevice commonly offered by unified threat management (UTM) devices?

Wireless network access

A packet filtering firewall remembers information about the status of a network communication

false

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

switch

A network attacker wants to know IP addresses used on a network, remote acces procedures and weaknesses in network systems.

true

A network protocal governs how networking equipment interacts to deliver data across the netwrok

true

The term "rputer" desribes a device that connects two or more networks and selectively interchanges packets of data between them.

true

Wade is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network should be replaced to alleviate these issues?

Hub


Related study sets

Operating System Overview (Quiz 1)

View Set

Intermediate Accounting - Chpt 12

View Set

Chapter 47: Mobility and Immobility

View Set

Prep U Chapter 26 Safety and Security

View Set