Deck 23: Media Topologies
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/57
Play
Full screen (f)
Deck 23: Media Topologies
1
Jack wants to implement a 10 Mbps network that could run through a maximum length of 185 meters. Which connector should he use?
A)ST
B)RJ-45
C)BNC
D)RCA
A)ST
B)RJ-45
C)BNC
D)RCA
ST
2
Jack is in the process of designing a cost-effective corporate network. The network should satisfy the minimum requirements of 75 hosts in the segment, maximum distance of 150 meters in the segment, and a 10 Mbps transfer rate. Which of the following standards should he use?
A)10Base2
B)10BaseFL
C)100BaseTX
D)10Base5
A)10Base2
B)10BaseFL
C)100BaseTX
D)10Base5
10Base5
3
How would you differentiate an RJ-11 connector from an RJ-45 connector?
A)RJ-11 has 4 contacts, while RJ-45 has 8 contacts.
B)RJ-11 is circular and RJ-45 is rectangular.
C)RJ-11 is rectangular and RJ-45 is circular.
D)RJ-11 has 8 contacts, while RJ-45 has 4 contacts.
A)RJ-11 has 4 contacts, while RJ-45 has 8 contacts.
B)RJ-11 is circular and RJ-45 is rectangular.
C)RJ-11 is rectangular and RJ-45 is circular.
D)RJ-11 has 8 contacts, while RJ-45 has 4 contacts.
RJ-11 has 4 contacts, while RJ-45 has 8 contacts.
4
Jack has messed up the routing connections on his company's internal network. He now wants to connect his PC to the router's console port. Which type of cable must he use?
A)RJ-11
B)Rollover
C)RJ-45
D)Co-axial
A)RJ-11
B)Rollover
C)RJ-45
D)Co-axial
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following cabling standards can support a maximum transfer rate of 1 Gbps?
A)CAT3
B)CAT5e
C)CAT5
D)CAT4
A)CAT3
B)CAT5e
C)CAT5
D)CAT4
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
6
A splitter is a frequency-filtering device used in a DSL connection. What does a splitter do?
A)Blocks all signals to the phone and sends these signals to the modem.
B)Sends the signals to both the phone and the modem.
C)Sends all signals below 3.4 KHz to the phone and signals above 3.4 KHz to the modem.
D)Sends all signals above 3.4 KHz to the phone and signals below 3.4 KHz to the modem.
A)Blocks all signals to the phone and sends these signals to the modem.
B)Sends the signals to both the phone and the modem.
C)Sends all signals below 3.4 KHz to the phone and signals above 3.4 KHz to the modem.
D)Sends all signals above 3.4 KHz to the phone and signals below 3.4 KHz to the modem.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a shortcoming of a DSL connection?
A)The distance from the CO cannot exceed 18,000 feet.
B)The speed is affected at peak usage.
C)The user cannot make telephone calls while using the Internet.
D)DSL speeds cannot exceed 512 Kbps.
A)The distance from the CO cannot exceed 18,000 feet.
B)The speed is affected at peak usage.
C)The user cannot make telephone calls while using the Internet.
D)DSL speeds cannot exceed 512 Kbps.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
8
Jack wants to install a 100BaseT network in his office. What type of cabling must he use?
A)CAT 5 UTP
B)Fiber optic
C)Thicknet
D)CAT 3 UTP
A)CAT 5 UTP
B)Fiber optic
C)Thicknet
D)CAT 3 UTP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
9
The administrator of a web server hosting xyz.com has set a TTL value for DNS equal to 36000 at 11:00 a.m. By what time of day would a user's request need to reach xyz.com's name server for DNS resolution?
A)1:00 p.m.
B)11:00 a.m.
C)11:00p.m.
D)9:00 p.m.
A)1:00 p.m.
B)11:00 a.m.
C)11:00p.m.
D)9:00 p.m.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following specifies an advantage of using a Plenum grade cable?
A)It releases a less toxic material from the jacket of the cable if the cable catches fire.
B)It is economical and easily available.
C)It doubles the data throughput.
D)It withstands high levels of stress and resists wear and tear.
A)It releases a less toxic material from the jacket of the cable if the cable catches fire.
B)It is economical and easily available.
C)It doubles the data throughput.
D)It withstands high levels of stress and resists wear and tear.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
11
In a typical scenario where DSL provider XYZ Ltd. is providing a DSL connection to Sam over a telephone line provided by ABC communications, who owns the demarc or the NID?
A)ABC communications
B)Sam
C)XYZ Ltd.
D)50-50 split between XYZ Ltd. and ABC communications
A)ABC communications
B)Sam
C)XYZ Ltd.
D)50-50 split between XYZ Ltd. and ABC communications
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
12
Jane is a new network consultant and is designing a new network for a small business. She sees that the business will have fewer than 200 hosts that will need IP addresses. Jane knows that a Class C address should support this perfectly. She also knows that the private address range starts at 192, so she decides to make the address range 192.0.0.1 through 192.0.0.254. What, if anything, is wrong with Jane's choice of addresses?
A)Nothing is wrong, her choice is perfect
B)192.0.0.x is private, but reserved for military use
C)192.0.0.x is private, but most routers will not support that range
D)192.0.0.x is a public address range
A)Nothing is wrong, her choice is perfect
B)192.0.0.x is private, but reserved for military use
C)192.0.0.x is private, but most routers will not support that range
D)192.0.0.x is a public address range
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
13
You want to separate each host on your network, such that each has its own collision domain. Which of these network devices would you use?
A)Hub
B)Repeater
C)NIC
D)Switch
A)Hub
B)Repeater
C)NIC
D)Switch
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following statements is true about DSL?
A)DSL does not allow the user to use the Internet and make calls simultaneously.
B)A DSL subscriber must be beyond 10 km of the Central office to be able to connect to DSL.
C)The splitter sends voice signals below 3.4 KHz to the telephone and data signals above 3.4 KHz to the modem.
D)The splitter sends data signals above 3.4 KHz to the modem and voice signals below 3.4 KHz to the telephone.
A)DSL does not allow the user to use the Internet and make calls simultaneously.
B)A DSL subscriber must be beyond 10 km of the Central office to be able to connect to DSL.
C)The splitter sends voice signals below 3.4 KHz to the telephone and data signals above 3.4 KHz to the modem.
D)The splitter sends data signals above 3.4 KHz to the modem and voice signals below 3.4 KHz to the telephone.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
15
Jack needs a high-speed Internet connection at a reasonable price. A friend tells him that the DSL central office is at least 7 km from his place. Under the circumstances, which of the following Internet connectivity modes could prove to be most effective?
A)Dial-up
B)DSL
C)Satellite
D)Cable
A)Dial-up
B)DSL
C)Satellite
D)Cable
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
16
What is the name of the switching method that breaks data into packets before it is transported?
A)Packet switching
B)Message switching
C)Network switching
D)Circuit switching
A)Packet switching
B)Message switching
C)Network switching
D)Circuit switching
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
17
Jack has been asked to design a network's WAN connection. The network has two locations that are not currently connected to each other. The locations will be sharing e-mail and data applications across the WAN intermittently and on a small scale. Which WAN specification should John choose?
A)ISDN
B)Frame relay
C)X)25
D)ATM
A)ISDN
B)Frame relay
C)X)25
D)ATM
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
18
Which of these connectors does a V.90 modem use to connect to a telephone network?
A)BNC
B)RJ-11
C)SC
D)RJ-45
A)BNC
B)RJ-11
C)SC
D)RJ-45
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following highlights the difference between a smart jack and a simple NID?
A)A smart jack is solely used to diagnose line faults in telephone lines that carry DSL signals
B)A smart jack acts as a lightning arrestor in addition to its capabilities as a NID
C)A smart jack can automatically fix any issues within the telephone wiring
D)A smart jack is a type of NID that has diagnostic capabilities
A)A smart jack is solely used to diagnose line faults in telephone lines that carry DSL signals
B)A smart jack acts as a lightning arrestor in addition to its capabilities as a NID
C)A smart jack can automatically fix any issues within the telephone wiring
D)A smart jack is a type of NID that has diagnostic capabilities
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following 802.11/wireless operating modes can operate without an access point?
A)Infrastructure point
B)There is no such mode where an access point is not required.
C)Access less mode
D)Ad-hoc mode
A)Infrastructure point
B)There is no such mode where an access point is not required.
C)Access less mode
D)Ad-hoc mode
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following topologies is used by nodes on a 10BASE-T Ethernet network to connect to a central hub or repeater?
A)Star
B)Mesh
C)Bus
D)Ring
A)Star
B)Mesh
C)Bus
D)Ring
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following topologies is the most difficult to manage, and is the least easily scalable?
A)Mesh
B)Ring
C)Tree
D)Bus
A)Mesh
B)Ring
C)Tree
D)Bus
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
23
Tara, a LAN administrator, is tasked with designing a communications datacenter on a very tight budget. What will allow Tara to implement 10 Gigabit speeds, while still maintaining the lowest cost for cabling?
A)Installing 10GbaseSR.
B)Installing Cat5e.
C)Installing 10GbaseF.
D)Installing 10GbaseT.
A)Installing 10GbaseSR.
B)Installing Cat5e.
C)Installing 10GbaseF.
D)Installing 10GbaseT.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
24
In which network topology does a node communicate only with its upstream and downstream neighbors?
A)Mesh
B)Ring
C)Tree
D)Bus
A)Mesh
B)Ring
C)Tree
D)Bus
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
25
Without the use of a repeater or other similar device, what is the maximum distance a technician can run a 1000BaseT cable segment and still maintain the rated speeds?
A)100 Meters (328 Feet)
B)100 Feet (30.5 Meters)
C)1000 Meters (3281 Feet)
D)1000 Feet (305 Meters)
E)1 Kilometer ( 1000 Meters)
A)100 Meters (328 Feet)
B)100 Feet (30.5 Meters)
C)1000 Meters (3281 Feet)
D)1000 Feet (305 Meters)
E)1 Kilometer ( 1000 Meters)
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
26
If Tony, a network technician, has a cable with one end of the cable wired with the following pin configuration:
Orange-White/Orange/Green-White/Blue/Blue-White/Green/Brown-White/Brown
And the other end of the cable wired with the following configuration:
Green-White/Green/Orange-White/Blue/Blue-White/Orange /Brown-White/Brown
What kind of cable does Tim the technician have?
A)Rollover
B)DB-9
C)Crossover
D)Cat5e patch cable
Orange-White/Orange/Green-White/Blue/Blue-White/Green/Brown-White/Brown
And the other end of the cable wired with the following configuration:
Green-White/Green/Orange-White/Blue/Blue-White/Orange /Brown-White/Brown
What kind of cable does Tim the technician have?
A)Rollover
B)DB-9
C)Crossover
D)Cat5e patch cable
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
27
The IEEE has specified which of the following standards for wired Ethernet and further defines the LAN access method as CSMA/CD?
A)802.15
B)802.3
C)802.11
D)802.13
A)802.15
B)802.3
C)802.11
D)802.13
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
28
What kinds of devices can determine the size of a broadcast domain?
A)Switches
B)Servers
C)Routers
D)Firewalls
A)Switches
B)Servers
C)Routers
D)Firewalls
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
29
Via what media access method are devices assigned a time slot where they will have exclusive access to transmit data?
A)Time Allocated Transmitting
B)Time Division Multiplexing
C)Frequency Determined Multiplexing
D)Frequency Division Multiplexing
A)Time Allocated Transmitting
B)Time Division Multiplexing
C)Frequency Determined Multiplexing
D)Frequency Division Multiplexing
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
30
Of the following Ethernet technology types, which will allow for the longest distance between transmitting devices?
A)1000BaseCX
B)100BaseTX
C)10BaseF
D)10GBaseSR
A)1000BaseCX
B)100BaseTX
C)10BaseF
D)10GBaseSR
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
31
Alex the network administrator would like to increase throughput on the data link layer in the easiest manner possible. Which of the following will allow Alex to do this with the least amount of configuration?
A)NIC bonding
B)Port Mirroring
C)Enabling STP
D)Static IP address assignment
A)NIC bonding
B)Port Mirroring
C)Enabling STP
D)Static IP address assignment
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
32
Jack has accidentally messed up his wireless configuration. He has increased the value of the beacon interval from 10 ms to 20 ms. How could this affect the chances of unknown users connecting to his wireless network?
A)Beacon interval value can sometimes affect the visibility of the network.
B)Beacon interval value does not affect the visibility of the network.
C)The chance of unknown users connecting is reduced.
D)The chance of unknown users connecting is increased.
A)Beacon interval value can sometimes affect the visibility of the network.
B)Beacon interval value does not affect the visibility of the network.
C)The chance of unknown users connecting is reduced.
D)The chance of unknown users connecting is increased.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
33
Bob, a new network consultant, is helping a business with their website updates. The firewall is in default deny mode, so he opens up port 21 to allow for FTP access to the webserver from the Internet. However, FTP still does not work. He notices that clients can connect, but cannot transfer any data. Why does FTP still not work?
A)FTP operates on port 23
B)FTP operates on port 25
C)FTP also uses port 20
D)FTP uses UDP which is connectionless
A)FTP operates on port 23
B)FTP operates on port 25
C)FTP also uses port 20
D)FTP uses UDP which is connectionless
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
34
Bruce is a new network consultant and is designing a new network for a small business. Bruce sees that the business will have a mail server behind a firewall. What port needs to be open on the firewall for the server to send and receive email outside the local network?
A)Port 25
B)Port 110
C)None, mail servers do not use ports
D)Port 3389
A)Port 25
B)Port 110
C)None, mail servers do not use ports
D)Port 3389
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
35
Jack is hosting a web site on his server. He has enabled a paid service on his web site and wants to use his server to make financial transactions. Which feature should he enable?
A)HTTP
B)FTP
C)HTTPS
D)SFTP
A)HTTP
B)FTP
C)HTTPS
D)SFTP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
36
The remote support team at an organization is having problems connecting to their client's computers using a remote desktop connection. All other network services are working fine. Which of the following could be a possible reason for this?
A)The DHCP server is down.
B)The NIC is faulty.
C)The DNS server is down.
D)The firewall has blocked port 3389.
A)The DHCP server is down.
B)The NIC is faulty.
C)The DNS server is down.
D)The firewall has blocked port 3389.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
37
Jack has not logged in to his e-mail account for a couple of weeks. Now, after entering his name and password, he receives an error message indicating that the username or password is invalid. What can he infer from this error message?
A)The physical layer is working.
B)Username and password are correct.
C)The network is suffering from traffic congestion.
D)The central router is down.
A)The physical layer is working.
B)Username and password are correct.
C)The network is suffering from traffic congestion.
D)The central router is down.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
38
John is trying to install an application on his office desktop. He was able to install the software on his home PC (not connected to the Internet), which is identical to his office PC, but the application will not install on his office desktop. What could be stopping him from installing the application?
A)The RJ-45 cable is damaged.
B)A software restriction policy setup by the IT team.
C)The corporate network is down.
D)The application can be installed only on Home PCs.
A)The RJ-45 cable is damaged.
B)A software restriction policy setup by the IT team.
C)The corporate network is down.
D)The application can be installed only on Home PCs.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
39
John is a security advisor at his organization. He is asked to make sure that no visitors in the organization are able to connect their laptop computers to the network. Which of these features of a switch can he implement?
A)Port authentication
B)Port mirroring
C)Trunking
D)Caching
A)Port authentication
B)Port mirroring
C)Trunking
D)Caching
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
40
Jack is fooled by a person who introduces himself as new IT staff in his organization. On the person's request, Jack reveals the web server login details. Later he comes to know that the person was a fraud and confidential data has been stolen from the web server. What kind of attack has Jack encountered?
A)Man in the middle
B)Eavesdropping
C)Smurf
D)Social Engineering
A)Man in the middle
B)Eavesdropping
C)Smurf
D)Social Engineering
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
41
Jack has been monitoring his network using a specialized application. In spite of using a secure SSID password, unauthentic users are gaining access to his WiFi network without his consent. John wants specific users to be able to connect to his wireless network. What should he do?
A)Enable MAC filtering
B)Disable SSID broadcast
C)Set beacon interval values to as low as possible
D)Set beacon interval values to as high as possible
A)Enable MAC filtering
B)Disable SSID broadcast
C)Set beacon interval values to as low as possible
D)Set beacon interval values to as high as possible
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
42
Jack walks back to his desk and tries to logon to his computer. He receives a message that states he needs to contact his administrator because his account is locked. What could have been the probable cause?
A)An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
B)The entire network is down.
C)He has left some application open on his computer, which has locked the system.
D)He needs to continue to try logging on. Eventually the system will allow him to log in.
A)An intruder has tried logging on to his system. On successive failed attempts, the account lockout policy has locked his PC.
B)The entire network is down.
C)He has left some application open on his computer, which has locked the system.
D)He needs to continue to try logging on. Eventually the system will allow him to log in.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
43
What encryption standard should be used to protect 802.11g traffic?
A)SSID
B)WEP
C)WPA2
D)TLS
A)SSID
B)WEP
C)WPA2
D)TLS
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
44
When communicating with a switch or router over a network and using the command line, which would be the best protocol to use?
A)FTP
B)SSH
C)Telnet
D)ICMP
A)FTP
B)SSH
C)Telnet
D)ICMP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
45
When you block traffic by default and allow only what you've specifically granted, it is called:
A)Implicit Deny
B)Access Control
C)Deny All
D)Allow All
A)Implicit Deny
B)Access Control
C)Deny All
D)Allow All
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
46
What is the Predecessor to Transport Layer Security used to encrypt communication over the internet?
A)SSL
B)VPN
C)FTPS
D)TCP/IP
A)SSL
B)VPN
C)FTPS
D)TCP/IP
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
47
What is the type of cryptography used in TLS called?
A)Symmetric
B)Equal
C)Unequal
D)Asymmetric
A)Symmetric
B)Equal
C)Unequal
D)Asymmetric
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following can be categorized as multifactor authentication? (CHOOSE ALL THAT APPLY)
A)Username and Password
B)ATM Card and Pin
C)Thumb and Forefinger print reader
D)Code word and voice recognition software
E)Retina scanning and Fingerprint reader
A)Username and Password
B)ATM Card and Pin
C)Thumb and Forefinger print reader
D)Code word and voice recognition software
E)Retina scanning and Fingerprint reader
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
49
Alex, a technician, wishes to be notified if a denial of service attack is being attempted, without any action being taken to keep the attack from happening. What should Alex implement on his network to allow this?
A)Host Based IPS
B)Network Based IPS
C)Host Based IDS
D)Software Firewall with all ports closed
A)Host Based IPS
B)Network Based IPS
C)Host Based IDS
D)Software Firewall with all ports closed
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
50
Jeremy, a neighborhood IT was asked to install a home router for his friend Timothy. Timothy has requested that Jeremy make his home network as secure as possible. What level of encryption will best suit Timothy for his brand new router?
A)WEP
B)WEP2
C)WPA2/Enterprise
D)WPA2/PSK
A)WEP
B)WEP2
C)WPA2/Enterprise
D)WPA2/PSK
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
51
Which authentication protocol relies on a Ticket Granting Ticket system for identity verification to network resources?
A)TACACS
B)Kerberos
C)Diameter
D)RADIUS
A)TACACS
B)Kerberos
C)Diameter
D)RADIUS
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
52
Spanning Tree Protocol is enabled on what kinds of network devices?
A)Routers
B)Firewalls
C)Switches
D)Gateways
A)Routers
B)Firewalls
C)Switches
D)Gateways
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
53
MAC address and packet filtering services can be provided for the network through the use of which devices?
A)Network based IPS
B)Network based IDS
C)Network based firewall
D)Network based proxy server
A)Network based IPS
B)Network based IDS
C)Network based firewall
D)Network based proxy server
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
54
Where is the best location for Tanya, an avid computer gamer, to install a game server in her home network?
A)Just inside the back-end firewall.
B)In the DMZ
C)On the outside of the front-end firewall
D)On an Intranet segment.
A)Just inside the back-end firewall.
B)In the DMZ
C)On the outside of the front-end firewall
D)On an Intranet segment.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
55
Using the ACL on the firewall to block already known websites is describing what type of filtering?
A)MAC Filtering
B)IP Filtering
C)Port Filtering
D)Packet Filtering
A)MAC Filtering
B)IP Filtering
C)Port Filtering
D)Packet Filtering
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
56
Nathan has just finished installing a brand new firewall blocking FTP traffic. Almost immediately after the installation, Nathan is receiving calls that everyone in the office is no longer able to access the internet. Which of the following BEST explains the reason for the outage?
A)Implicit deny is blocking all traffic, not just FTP.
B)The firewall had a built in IPS that isn't allowing traffic to go through.
C)The firewall is defective and needs to be replaced.
D)The firewall's IP address settings were improperly configured.
A)Implicit deny is blocking all traffic, not just FTP.
B)The firewall had a built in IPS that isn't allowing traffic to go through.
C)The firewall is defective and needs to be replaced.
D)The firewall's IP address settings were improperly configured.
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck
57
What process prevents the private IP address of network nodes from being readily viewable from the public, while also allowing multiple devices with private IP addresses to access the internet through a single public IP address?
A)NAT
B)Traffic shaping
C)Port forwarding
D)IP filtering
A)NAT
B)Traffic shaping
C)Port forwarding
D)IP filtering
Unlock Deck
Unlock for access to all 57 flashcards in this deck.
Unlock Deck
k this deck