by 0x4b4d


keywords:
Bookmark and Share



Front Back
1. 
 Which of the following devices is the most capable of providing infrastructure security?
A Hub
B Switch
C Router
D Modem
 
 
1.
 C. Routers can be configured in many instances to act as packet-filtering firewalls. When configured properly, they can prevent unauthorized ports from being opened.
 
2. 
 Upper management has decreed that a firewall must be put in place immediately, before your site suffers an attack similar to one that struck a sister company. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs which function?
A Prevents unauthorized packets from entering the network
B Allows all packets to leave the network
C Allows all packets to enter the network
D Eliminates collisions in the network
 
 
2.
 A. Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a type of firewall that blocks specified port traffic.
 
3. 
 Which device stores information about destinations in a network?
A Hub
B Modem
C Firewall
D Router
 
 
3.
 D. Routers store information about network destinations in routing tables. Routing tables contain information about known hosts on both sides of the router.
 
4. 
 As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You're preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency?
A Hub
B Switch
C Router
D PBX
 
 
4.
 B. Switches create virtual circuits between systems in a network. These virtual circuits are somewhat private and reduce network traffic when used.
 
5. 
 Which device is used to connect voice, data, pagers, networks, and almost any other conceivable application into a single telecommunications system?
A Router
B PBX
C Hub
D Server
 
 
5.
 B. Many modern PBX (private branch exchange) systems integrate voice and data onto a single data connection to your phone service provider. In some cases, this allows an overall reduction in cost of operations. These connections are made using existing network connections such as a T1 or T3 network.
 
6. 
 Most of the sales force have been told that they should no longer report to the office on a daily basis. From now on, they're to spend the majority of their time on the road calling on customers. Each member of the sales force has been issued a laptop computer and told to connect to the network nightly through a dial-up connection. Which of the following protocols is widely used today as a transport protocol for Internet dial-up connections?
A SMTP
B PPP
C PPTP
D L2TP
 
 
6.
 B. PPP can pass multiple protocols and is widely used today as a transport protocol for dial-up connections.
 
7. 
 Which protocol is unsuitable for WAN VPN connections?
A PPP
B PPTP
C L2TP
D IPSec
 
 
7.
 A. PPP provides no security, and all activities are unsecure. PPP is primarily intended for dial-up connections and should never be used for VPN connections.
 
8. 
 You've been given notice that you'll soon be transferred to another site. Before you leave, you're to audit the network and document everything in use and the reason why it's in use. The next administrator will use this documentation to keep the network running. Which of the following protocols isn't a tunneling protocol but is probably used at your site by tunneling protocols for network security?
A IPSec
B PPTP
C L2TP
D L2F
 
 
8.
 D. IPSec provides network security for tunneling protocols. IPSec can be used with many different protocols besides TCP/IP, and it has two modes of security.
 
9. 
 A socket is a combination of which components?
A TCP and port number
B UDP and port number
C IP and session number
D IP and port number
 
 
9.
 D. A socket is a combination of IP address and port number. The socket identifies which application will respond to the network request.
 
10. 
 You're explaining protocols to a junior administrator shortly before you leave for vacation. The topic of Internet mail applications comes up, and you explain how communications are done now as well as how you expect them to be done in the future. Which of the following protocols is becoming the newest standard for Internet mail applications?
A SMTP
B POP
C IMAP
D IGMP
 
 
10.
 C. IMAP is becoming the most popular standard for email clients and is replacing POP protocols for mail systems. IMAP allows mail to be forwarded and stored in information areas called stores.
 
11. 
 Which protocol is primarily used for network maintenance and destination information?
A ICMP
B SMTP
C IGMP
D Router
 
 
11.
 A. ICMP is used for destination and error reporting functions in TCP/IP. ICMP is routable and is used by programs such as Ping and Traceroute.
 
12. 
 You're the administrator for Mercury Technical. A check of protocols in use on your server brings up one that you weren't aware was in use; you suspect that someone in HR is using it to send messages to multiple recipients. Which of the following protocols is used for group messages or multicast messaging?
A SMTP
B SNMP
C IGMP
D L2TP
 
 
12.
 C. IGMP is used for group messaging and multicasting. IGMP maintains a list of systems that belong to a message group. When a message is sent to a particular group, each system receives an individual copy.
 
13. 
 IPv6, in addition to having more bits allocated for each host address, also has mandatory requirements built in for which security protocol?
A TFTP
B IPSec
C SFTP
D L2TP
 
 
13.
 B. The implementation of IPSec is mandatory with IPv6. While it is widely implemented with IPv4, it is not a requirement.
 
14. 
 Which ports are, by default, reserved for use by FTP? (Choose all that apply.)
A 20 and 21 TCP
B 20 and 21 UDP
C 22 and 23 TCP
D 22 and 23 UDP
 
 
14.
 A. FTP uses TCP ports 20 and 21. FTP does not use UDP ports.
 
15. 
 Which of the following services use only TCP ports and not UDP? (Choose all that apply.)
A IMAP
B LDAP
C FTPS
D SFTP
 
 
15.
 D. SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports.
 
16. 
 Which of the following can be implemented as a software or hardware solution and is usually associated with a device—a router, a firewall, NAT, and so on—and used to shift a load from one device to another?
A Proxy
B Hub
C Load balancer
D Switch
16.
 C. A load balancer can be implemented as a software or hardware solution, and is usually associated with a device—a router, a firewall, NAT, and so on. As the name implies, it is used to shift a load from one device to another.
17. 
 Which of the following are multiport devices that improve network efficiency?
A Switches
B Modems
C Gateways
D Concentrators
 
 
17.
 A. Switches are multiport devices that improve network efficiency. A switch typically has a small amount of information about systems in a network.
 
18. 
 Which service(s), by default, use TCP and UDP port 22? (Choose all that apply.)
A SMTP
B SSH
C SCP
D IMAP
 
 
18.
 B. C. Port 22 is used by both SSH and SCP with TCP and UDP.
 
19. 
 What protocol, running on top of TCP/IP, is often used for name registration and resolution with Windows-based clients?
A Telnet
B SSL
C NetBIOS
D TLS
 
 
19.
 C. NetBIOS is used for name resolution and registration in Windows-based environments. It runs on top of TCP/IP.
 
20.
How many bits are used for addressing with IPv4 and IPv6, respectively?
A 32, 128
B 16, 64
C 8, 32
D 4, 16
20.
A. IPv4 uses 32 bits for the host address, while IPv6 uses 128 bits for this.
Application Layer
The seventh layer of the Open Systems Interconnection (OSI) model. This layer deals with how applications access the network and describes application functionality, such as file transfer, messaging, and so on.
Hypertext Transfer Protocol (HTTP)
The protocol used for communication between a web server and a web browser
Hypertext Markup Language (HTML)
A set of codes used to format text and graphics that will be displayed in a browser. The codes define how data will be displayed.
File Transfer Protocol (FTP)
TCP/IP and software that permit transferring files between computer systems and utilize clear-text passwords. Because FTP has been implemented on numerous types of computer systems, files can be transferred between disparate computer systems (for example, a personal computer and a minicomputer). See also Transmission Control Protocol/Internet Protocol (TCP/IP).
Trivial File Transfer Protocol (TFTP)
A UDP-based protocol similar to FTP that doesn't provide the security or error-checking features of FTP. See also File Transfer Protocol (FTP).
Simple Mail Transfer Protocol (SMTP)
A protocol for sending email between SMTP servers.
Telnet
A protocol that functions at the Application layer of the OSI model, providing terminal emulation capabilities. See also Open Systems Interconnection (OSI) model.
Routing Information Protocol (RIP)
A distance-vector route discovery protocol used by Internetwork Packet Exchange (IPX) and Internet Protocol (IP). IPX uses hops and ticks to determine the cost for a particular route. See also Internetwork Packet Exchange (IPX).
Simple Network Management Protocol (SNMP)
The management protocol created for sending information about the health of the network-to-network management consoles.
Post Office Protocol (POP)
An email access program that can be used to retrieve email from an email server.
Transport Layer
The fourth layer of the OSI model. It's responsible for checking that the data packet created in the Session layer was received. If necessary, it also changes the length of messages for transport up or down the remaining layers. See also Open Systems Interconnection (OSI) model.
Transmission Control Protocol (TCP)
The protocol found at the Host-to-Host layer of the Department of Defense (DoD) model. This protocol breaks data packets into segments, numbers them, and sends them in order. The receiving computer reassembles the data so that the information is readable for the user. In the process, the sender and the receiver confirm that all data has been received; if not, it's resent. TCP is a connection-oriented protocol. See also connection-oriented.
User Datagram Protocol (UDP)
The protocol at the Host-to-Host layer of the TCP/IP Department of Defense (DoD) model, which corresponds to the Transport layer of the OSI model. Packets are divided into datagrams, given numbers, sent, and put back together at the receiving end. UDP is a connectionless protocol. See also connectionless, Open Systems Interconnection (OSI) model.
Internet Layer
The network layer responsible for routing, IP addressing, and packaging.
Internet Protocol
The protocol in the TCP/IP suite responsible for network addressing. See also Transmission Control Protocol/Internet Protocol (TCP/IP).
Address Resolution Protocol (ARP)
Protocol used to map known IP addresses to unknown physical addresses.
Media Access Control (MAC)
A sublayer of the Data Link layer of the Open Systems Interconnection (OSI) model that controls the way multiple devices use the same media channel. It controls which devices can transmit and when they can transmit.
Internet Control Message Protocol (ICMP)
A message and management protocol for TCP/IP. The Ping utility uses ICMP. See also Ping, Transmission Control Protocol/Internet Protocol (TCP/IP).
Internet Group Management Protocol (IGMP)
A protocol used for multicasting operations across the Internet.
Network Address Translation (NAT)
AKA IP Proxy. A server that acts as a go-between for clients accessing the Internet. All communications look as if they originated from a proxy server because the IP address of the user making a request is hidden
Port
Some kind of opening that allows network data to pass through.
Internet Assigned Numbers Authority (IANA)
The organization responsible for governing IP addresses.
Windows Sockets (Winsock)
A Microsoft API used to interact with TCP/IP.
FTP Ports
TCP 20 & 21
SSH & SCP Ports
TCP & UDP 22
Telnet Ports
TCP 23
TACACS Ports
TCP & UDP 49
HTTP Ports
TCP & UDP 80
TFTP Ports
UDP 69
POP3 Ports
TCP 110
x of y cards Next >|