InfoSec Ch5

Ace your homework & exams now with Quizwiz!

A ___ is a device that interconnects two or more networks and selectively interchanges packets of data between them.

Router

True or False? A network protocol governs how networking equipment interacts to deliver data across the network.

True

True or False? A protocol is a set of rules that govern the format of messages that computers exchange.

True

True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

True

True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.

True

True or False? Each layer of the Open Systems Interconnection (OSI) Reference Model needs to be able to talk to the layers above and below it.

True

True or False? The Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

True

True or False? The Physical Layer of the Open Systems Interconnection (OSI) Reference Model must translate the binary ones and zeros of computer language into the language of the transport medium.

True

True or False? The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

True or False? Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of protocols that operates at both the Network and Transport layers of the Open Systems Interconnection (OSI) Reference Model.

True

What is the maximum value for any octet in an Internet Protocol version 4 (IPv4) address? A. 255 B. 129 C. 513 D. 65

A. 255

The basic job of a __________ is to enforce an access control policy at the border of a network. A. Firewall B. Router C. Switch D. Access point

A. Firewall

Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called? A. Media Access Control (MAC) address filtering B. Uniform Resource Locator (URL) filtering C. Subnetting D. Service set identifier (SSID) broadcasting

A. Media Access Control (MAC) address filtering

Which VPN technology allows users to initiate connections over the web? A. SSL/TLS B. PPTP C. IPSec D. ICMP

A. SSL/TLS

A secure virtual private network (VPN) creates an authenticated and encrypted channel across some form of public network. A. True B. False

A. True

What protocol is responsible for assigning Internet Protocol (IP) addresses to hosts on many networks? A. IP B. Transport Layer Security (TLS) C. Simple Mail Transfer Protocol (SMTP) D. Dynamic Host Configuration Protocol (DHCP)

D. Dynamic Host Configuration Protocol (DHCP)

What technology allows you to hide the private IPv4 address of a system from the Internet? A. SSL B. RADIUS C. PPTP D. NAT

D. NAT

What firewall topology supports the implementation of a DMZ? A. Bastion host B. Multilayered firewall C. Border firewall D. Screened subnet

D. Screened subnet

__________ is a suite of protocols that was developed by the Department of Defense to provide a highly reliable and fault- tolerant network infrastructure. A. DHCP B. VPN C. IPSec D. TCP/IP

D. TCP/IP

True or False? A border router can provide enhanced features to internal networks and help keep subnet traffic separate.

False

True or False? Internet Protocol version 4 (IPv4) uses the Internet Control Message Protocol (ICMP) within a network to automatically assign an Internet Protocol (IP) address to each computer.

False

True or False? Physical access to network equipment is required to eavesdrop on a network connection.

False

True or False? To create the most secure network, configure the firewall to allow all messages except the ones that are explicitly denied.

False

True or False? A firewall can be used to segment a network.

True

True or False? A home user connecting to a website over the Internet is an example of a wide area network (WAN) connection.

True

On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a ___________ that controls a portion of the LAN. A. Switch B. Firewall C. Server D. Router

A. Switch

The three basic types of firewalls are packet filtering, application proxy, and stateful inspection. A. True B. False

A. True

DHCP provides systems with their MAC addresses. A. True B. False

B. False

IP addresses are assigned to computers by the manufacturer. A. True B. False

B. False

What layer of the OSI Reference Model is most commonly responsible for encryption? A. Application B. Presentation C. Session D. Transport

B. Presentation

Which simple network device helps to increase network performance by using the MAC address to send network traffic only to its intended destination? A. Hub B. Switch C. Router D. Gateway

B. Switch

A __________ is a critical element in every corporate network today, allowing access to an organization's resources from almost anywhere in the world. A. Local area network (LAN) B. Wide area network (WAN) C. Dynamic Host Configuration Protocol (DHCP) D. None of the above

B. Wide area network (WAN)

The basic model for how you can build and use a network and its resources is known as the __________. A. Dynamic Host Configuration Protocol (DHCP) model B. International Organization for Standardization (ISO) model C. Open Systems Interconnection (OSI) Reference Model D. None of the above

C. Open Systems Interconnection (OSI) Reference Model

What technology is the most secure way to encrypt wireless communications? A. TCP B. WEP C. WPA D. UDP

C. WPA

Because network computers or devices may host several services, programs need a way to tell one service from another. To differentiate services running on a device, networking protocols use a(n) ________, which is a short number that tells a receiving device where to send messages it receives. A. Internet Protocol (IP) address B. ping C. network port D. Media Access Control (MAC) address

C. network port


Related study sets

APUSH Chapter 17 - Check Your Understanding

View Set

Chapter 15.2: WI Life State Laws

View Set

Contract Law - California Real Estate License

View Set

PrepU Ch. 7 Legal Dimensions of Nursing Practice

View Set