ISEC Chapter 10 Practice Questions

Ace your homework & exams now with Quizwiz!

What layer of the OSI Reference Model is most commonly responsible for encryption?

Presentation Layer

4. ICMP is a method of IP address assignment that uses an alternate, public IP address to hide systems real IP address?

False

A packet-filtering firewall remembers information about the status of a network communication.

False

DHCP provides systems with their MAC addresses.

False

IP addresses are assigned to computers by the manufacturer:

False

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues?

Hub

What technology allows you to hide the private IPv4 address of a system from the Internet?

NAT

The basic model for how you can build and use a network and its resources is known as the ________.

Open Systems Interconnection (OSI) Reference Model

A ________ is a device that interconnects two or more networks and selectively interchanges packets of data between them.

Router

Which VPN technology allows users to initiate connections over the WEB?

SSL

What firewall topology supports the implementation of a DMZ?

Screened subnet

2. A subnet mask of a network is based on IP address?

True

3. Implicit deny is when a firewall looks at message address to determine whether a message is being sent around an unending loop?

True

The physical layer of OSI model translates the binary one and zeros of computer language to the language of the transport medium?

True

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

The three basic types of firewalls are packet filtering, application proxy, and stateful inspection.

True

What technology is the most secure way to encrypt wireless communications?

WPA

Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity?

WiFi

A(n) ___________ is a critical element in every corporate network today; allowing access to an organization's resources from almost anywhere in the world.

Wide area network (WAN)

The basic job of a __________ is to enforce an access control policy at the border of a network

Firewall

5. What type of firewall has no memory of packets it has encountered in the past and must make decisions for each packet it receives?

Packet filtering firewall

Which simple network device helps to increase network performance by using the MAC address to send network traffic only to its intended destination?

Switch

_____________is a suite of protocols that was developed by the Department of Defense to provide a highly reliable and fault-tolerant network infrastructure.

TCP/IP

A secure virtual private network (VPN) creates an authenticated and encrypted channel across some form of public network.

True


Related study sets

BIOL220 Development: Reproduction

View Set

Chp 20 Financing the Real Estate Transaction

View Set

翰林-104(下)-BOOK 2-文法選擇(第三次月考) $$$

View Set