Testout Networking Chapter 8, Network Pro 8.1.6, 8.2.5, 8.3.9

Unlock all answers in this set

Unlock answers
question
You want to maintain security on your internal network
answer
53
question
Using the Netstat command, you notice that a remote system
answer
Downloading a file
question
You want to allow your users to download files from a server running the TCP
answer
FTP
question
After blocking a number of ports to secure your server
answer
Open port 25 to allow SMTP service
question
Users complain that they can't connect to the website when they type
answer
The HTTP port should be changed to 80
question
Which of the following does a router acting as a firewall use to control packets
answer
ACL
question
You have a company network that is connected to the Internet. You want all users
answer
Use firewalls to create a DMZ. Web Inside / Private Behind
question
You have just installed a packet-filtering firewall
answer
Port number/source address of a packet/destination address of a packet
question
Which of the following describes how access lists
answer
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
question
You have used firewalls to create a demilitarized zone
answer
Put the Database on the private network/Put the Web server inside the DMZ
question
when designing a firewall, what is the recommended approach
answer
Close all ports, open only ports required
question
Match the firewall type
answer
Layer 2- V Layer 3- R Counts-R Does-V Different-R Same-V
question
Your Cisco router has three
answer
Add a permit
question
Which firewall implementation creates a buffer
answer
DMZ
question
Which of the following are true about routed firewalls
answer
Supports Counts
question
An All-in-one security appliance is best
answer
a Remote
question
Which of the following features are common functions
answer
Bandwith shaping Spam Filtering
question
You recently installed a new all-in-one security appliance in a remote office
answer
Change the default Configure the device's authentication
question
Which of the following prevents access based on website ratings
answer
Content filter
question
You manage a server that runs your company website
answer
Proxy Server
question
Based on the diagram, which type of proxy is handling the client's request
answer
Reverse
question
Which of the following network services or protocols uses TCP/IP port 22
answer
SSH
question
Which port number is used by SNMP
answer
161
question
Which protocol and port number is used by BOOTP
answer
UDP 67
question
To increase security on your company's internal network
answer
443
question
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows
answer
The workstation is using NetBIOS to access shared resources on the server
question
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427
answer
Someone is using Voice over IP VOIP
question
You have been given a laptop to use for work
answer
Host-based
question
You have just installed a packet-filtering firewall on your network
answer
Destination address Port number Source address
question
You provide Internet access for a local school
answer
Application Level
question
A small startup company has hired
answer
The UTM represents a single point of failure
question
Match the firewall type on the right
answer
Packet Filtering Firewall- 3 Circuit Level Proxy - 5 Application Level Gateway - 7 Routed Firewall - 3 Transparent Firewall - 2
question
Which of the following prevents access based on website rating and classifications?
answer
Content filter
question
You manage a server that runs your company Web site. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static Web content can be offloaded to a different server, while the Web server continues to process dynamic content. Which solution should you implement?
answer
Proxy server
question
Based on the diagram, which type of proxy server is handling the client's request?
answer
Reverse Proxy Server
question
Which of the following network services or protocols uses TCP/IP port 22?
answer
SSH
question
Which port number is used by SNMP?
answer
161
question
Which protocol and port number is used by BOOTP/DHCP?
answer
UDP 67
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
answer
443
question
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a Window server on the following ports: *137 *138 *139 Which is the source of this network traffic?
answer
The workstation is using NetBIOS to access shared resources on the server.
question
You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 2427. What is the source of this network traffic?
answer
Someone is using Voice over IP (VoIP) to make a telephone call.
question
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. What solution should you use?
answer
Host-based firewall
question
You have just installed a packet-filtering firewall on your network. Which options will you be able to set on your firewall?
answer
Source address of a packet Destination address of a packet Port Number
question
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
answer
Application-level
question
A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance: • Firewall • VPN • Anti-spam • Antivirus You join the UTM device to the company's Active Directory domain. The company's traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public WiFi networks. What weaknesses exist in this implementation?
answer
The UTM represents a single point of failure.
question
Match the firewall type on the right with the OSI layers at which it operates. Note: Each OSI Layer can be used once, more than once, or not at all.
answer
Packet Filtering Firewall OSI Layer 3 Circuit-level Proxy OSI Layer 5 Application-level Gateway OSI Layer 7 Routed Firewall OSI Layer 3 Transparent Firewall OSI Layer 2
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New