Deck 24: Network

Full screen (f)
exit full mode
Question
Which of the following devices is capable of providing infrastructure security and is used for packet filtering purposes?

A)Router
B)Hub
C)Switch
D)NIC
Use Space or
up arrow
down arrow
to flip the card.
Question
Jack wants to implement a remote access solution that will enable mobile users to access the corporate network. Which of the solutions should you use to enable laptop users to connect to the corporate network and access all resources and e-mail?

A)ISDN
B)VLAN
C)VPN
D)SSL
Question
Which of the following NAT models provides the maximum security benefits in hiding the internal network's addressing structure from the external network?

A)Secure NAT
B)Dynamic NAT
C)Static NAT
D)Overloading NAT
Question
Which type of NAT models performs a one-to-one mapping of an internal IP address to an external IP address?

A)Dynamic NAT
B)Overloading NAT
C)One-to-one NAT
D)Static NAT
Question
Which of the following is an area on the network that allows a technician to place a public-facing system on it without compromising the entire infrastructure?

A)VLAN
B)VPN
C)NAT
D)DMZ
Question
Which of the following NIDS configurations is based solely on specific network traffic?

A)Anomaly based
B)Behavior based
C)Signature based
D)Passive IDS
Question
Which of the following best describes the purpose of an SSID in a wireless network?

A)Identifying the network
B)Better signal strength
C)Better connectivity
D)Encryption
Question
Which of the following device/application monitors network traffic passively?

A)Web browser
B)IDS
C)Firewall
D)Sniffer
Question
Which of the following statements best suits the working of DSSS?

A)Communicates by adding data that is to be transmitted to a low speed transmission.
B)Communicates by breaking the data into sub signals and transmitting them.
C)Communicates by hopping the transmission over a range of predefined frequencies.
D)Communicates by adding data that is to be transmitted to a higher speed transmission.
Question
Which type of firewall functions at the network layer of the OSI Model?

A)Application-Level Gateway
B)Circuit-Level Firewall
C)Packet Filtering Firewall
D)Network Bridge
Question
Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?

A)802.11g
B)802.11a
C)802.11b
D)802.11-1997
Question
John wants to implement a proxy server with a functionality that controls the websites accessed by the employees of the organization. Which of these proxies would serve his purpose?

A)Blocking proxy
B)Caching proxy
C)Web proxy
D)Content-filtering proxy
Question
David wants to install a proxy server that can reduce the organization's upstream bandwidth usage, reduce cost, and improve the network performance. Which of these could serve his purpose?

A)Hostile proxy
B)Content-filtering proxy
C)Web proxy
D)Caching proxy
Question
What IEEE standard describes port switching which is also known as port-based Network Access Control (PNAC)?

A)802.1x
B)NAT
C)VPN
D)802.11g
Question
Using one externally facing address to communicate between an internal network and external networks would best describe what?

A)Virtualization
B)DMZ
C)NAT
D)Subnetting
Question
What is a sniffer used for?

A)Detecting environmental variables in MDFs.
B)Collecting data from network traffic flow.
C)Examining files as they are scanned into a computer.
D)Encrypting data traveling from a computer to a server.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/16
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 24: Network
1
Which of the following devices is capable of providing infrastructure security and is used for packet filtering purposes?

A)Router
B)Hub
C)Switch
D)NIC
Router
2
Jack wants to implement a remote access solution that will enable mobile users to access the corporate network. Which of the solutions should you use to enable laptop users to connect to the corporate network and access all resources and e-mail?

A)ISDN
B)VLAN
C)VPN
D)SSL
VPN
3
Which of the following NAT models provides the maximum security benefits in hiding the internal network's addressing structure from the external network?

A)Secure NAT
B)Dynamic NAT
C)Static NAT
D)Overloading NAT
Overloading NAT
4
Which type of NAT models performs a one-to-one mapping of an internal IP address to an external IP address?

A)Dynamic NAT
B)Overloading NAT
C)One-to-one NAT
D)Static NAT
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is an area on the network that allows a technician to place a public-facing system on it without compromising the entire infrastructure?

A)VLAN
B)VPN
C)NAT
D)DMZ
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following NIDS configurations is based solely on specific network traffic?

A)Anomaly based
B)Behavior based
C)Signature based
D)Passive IDS
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following best describes the purpose of an SSID in a wireless network?

A)Identifying the network
B)Better signal strength
C)Better connectivity
D)Encryption
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following device/application monitors network traffic passively?

A)Web browser
B)IDS
C)Firewall
D)Sniffer
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following statements best suits the working of DSSS?

A)Communicates by adding data that is to be transmitted to a low speed transmission.
B)Communicates by breaking the data into sub signals and transmitting them.
C)Communicates by hopping the transmission over a range of predefined frequencies.
D)Communicates by adding data that is to be transmitted to a higher speed transmission.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
10
Which type of firewall functions at the network layer of the OSI Model?

A)Application-Level Gateway
B)Circuit-Level Firewall
C)Packet Filtering Firewall
D)Network Bridge
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?

A)802.11g
B)802.11a
C)802.11b
D)802.11-1997
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
12
John wants to implement a proxy server with a functionality that controls the websites accessed by the employees of the organization. Which of these proxies would serve his purpose?

A)Blocking proxy
B)Caching proxy
C)Web proxy
D)Content-filtering proxy
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
13
David wants to install a proxy server that can reduce the organization's upstream bandwidth usage, reduce cost, and improve the network performance. Which of these could serve his purpose?

A)Hostile proxy
B)Content-filtering proxy
C)Web proxy
D)Caching proxy
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
14
What IEEE standard describes port switching which is also known as port-based Network Access Control (PNAC)?

A)802.1x
B)NAT
C)VPN
D)802.11g
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
15
Using one externally facing address to communicate between an internal network and external networks would best describe what?

A)Virtualization
B)DMZ
C)NAT
D)Subnetting
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
16
What is a sniffer used for?

A)Detecting environmental variables in MDFs.
B)Collecting data from network traffic flow.
C)Examining files as they are scanned into a computer.
D)Encrypting data traveling from a computer to a server.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 16 flashcards in this deck.