Chapter 7 Flashcards

1
Q

What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?

Question options:

Network

Data Link

Session

Presentation

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.
A) Network
B) Data Link
C) Session
D) Presentation
A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?

Question options:

switch

router

firewall

hub

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of networking device forwards packets across different computer networks by reading destination addresses?

Question options:

switch

router

bridge

firewall

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?

Question options:

Stateful packet filtering

Load balancing

DNS caching

DNS poisoning

A

Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

Question options:

Stateful frame filtering

Stateless frame filtering

Stateful packet filtering

Stateless packet filtering

A

Stateful packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
A) proxy server
B) DNS server
C) VPN server
D) telnet server
A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:

Question options:

forward proxy

application proxy

system proxy

reverse proxy

A

reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?

Question options:

IKE tunnel

VPN

endpoint

router

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Select below the technology that can be used to examine content through application-level filtering:

Question options:

Application gateway

Security proxy

Web security gateway

Firewall

A

Web security gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

Question options:

Application

Protocol

Packet

Signature

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What is the name for an instruction that interrupts a program being executed and requests a service from the operating system?
A) system call
B) unit call
C) hardware instruction
D) system exception
A

system call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
A) PAT
B) PNAT
C) NAPT
D) NAT
A

PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which network address below is not a private IP address network?

Question options:

  1. 4.5.0
  2. 63.255.0
  3. 168.255.0
  4. 17.16.0
A

172.63.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?

Question options:

Install a bastion, configure host

Set up a choke in front of the web server

Create a DMZ, add necessary hosts.

Configure a reduction point on a firewall

A

Create a DMZ, add necessary hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The IPv4 protocol uses IP addresses which are how many bytes in length?
A) 4
B) 8
C) 16
D) 32
A

4

17
Q

What vendor neutral protocol implements support for VLAN tagging?

Question options:

ISL

VTP

802.1Q

VSTP

A

802.1Q

18
Q

The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?

Question options:

Create a subnet for each network switch involved.

Create additional broadcast domains for the users.

Add all users to a single DMZ segment

Create a VLAN and add the users’ computers / ports to the VLAN.

A

Create a VLAN and add the users’ computers / ports to the VLAN.

19
Q

​Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?

Question options:

​Source address

​Destination port

​Direction

​Intent

A

​Intent

20
Q

A load balancer that works with the File Transfer Protocol is operating at what layer of the OSI model?

Question options:

​Layer 1

​Layer 2

​Layer 4

​Layer 7

A

​Layer 4