Infrastructure and Connectivity Flashcards
Which of the following devices is the most capable of providing infrastructure security?
A. Hub
B. Switch
C. Router
D. Modem
C. Routers can be configured in many instances to act as packet-filtering firewalls. When
configured properly, they can prevent unauthorized ports from being opened.
Upper management has decreed that a firewall must be put in place immediately, before
your site suffers an attack similar to one that struck a sister company. Responding to this
order, your boss instructs you to implement a packet filter by the end of the week. A packet
filter performs which function?
A. Prevents unauthorized packets from entering the network
B. Allows all packets to leave the network
C. Allows all packets to enter the network
D. Eliminates collisions in the network
A. Packet filters prevent unauthorized packets from entering or leaving a network. Packet
filters are a type of firewall that blocks specified port traffic.
Which device stores information about destinations in a network?
A. Hub
B. Modem
C. Firewall
D. Router
D. Routers store information about network destinations in routing tables. Routing tables
contain information about known hosts on both sides of the router.
As more and more clients have been added to your network, the efficiency of the network
has decreased significantly. You’re preparing a budget for next year, and you specifically
want to address this problem. Which of the following devices acts primarily as a tool to
improve network efficiency?
A. Hub
B. Switch
C. Router
D. PBX
B. Switches create virtual circuits between systems in a network. These virtual circuits are
somewhat private and reduce network traffic when used.
Which device is used to connect voice, data, pagers, networks, and almost any other conceivable
application into a single telecommunications system?
A. Router
B. PBX
C. Hub
D. Server
B. Many modern PBX (private branch exchange) systems integrate voice and data onto a
single data connection to your phone service provider. In some cases, this allows an overall
reduction in cost of operations. These connections are made using existing network connections
such as a T1 or T3 network
Most of the sales force have been told that they should no longer report to the office on a
daily basis. From now on, they’re to spend the majority of their time on the road calling on
customers. Each member of the sales force has been issued a laptop computer and told to
connect to the network nightly through a dial-up connection. Which of the following protocols
is widely used today as a transport protocol for Internet dial-up connections?
A. SMTP
B. PPP
C. PPTP
D. L2TP
B. PPP can pass multiple protocols and is widely used today as a transport protocol for
dial-up connections
Which protocol is unsuitable for WAN VPN connections?
A. PPP
B. PPTP
C. L2TP
D. IPSec
A. PPP provides no security, and all activities are unsecure. PPP is primarily intended for
dial-up connections and should never be used for VPN connections.
You’ve been given notice that you’ll soon be transferred to another site. Before you leave, you’re
to audit the network and document everything in use and the reason why it’s in use. The next
administrator will use this documentation to keep the network running. Which of the following
protocols isn’t a tunneling protocol but is probably used at your site by tunneling protocols
for network security?
A. IPSec
B. PPTP
C. L2TP
D. L2F
A. IPSec provides network security for tunneling protocols. IPSec can be used with many
different protocols besides TCP/IP, and it has two modes of security
A socket is a combination of which components?
A. TCP and port number
B. UDP and port number
C. IP and session number
D. IP and port number
D. A socket is a combination of IP address and port number. The socket identifies which
application will respond to the network request.
You’re explaining protocols to a junior administrator shortly before you leave for vacation.
The topic of Internet mail applications comes up, and you explain how communications are
done now as well as how you expect them to be done in the future. Which of the following
protocols is becoming the newest standard for Internet mail applications?
A. SMTP
B. POP
C. IMAP
D. IGMP
C. IMAP is becoming the most popular standard for email clients and is replacing POP
protocols for mail systems. IMAP allows mail to be forwarded and stored in information
areas called stores.
Which protocol is primarily used for network maintenance and destination information?
A. ICMP
B. SMTP
C. IGMP
D. Router
A. ICMP is used for destination and error reporting functions in TCP/IP. ICMP is routable
and is used by programs such as Ping and Traceroute.
You’re the administrator for Mercury Technical. A check of protocols in use on your server
brings up one that you weren’t aware was in use; you suspect that someone in HR is using it
to send messages to multiple recipients. Which of the following protocols is used for group
messages or multicast messaging?
A. SMTP
B. SNMP
C. IGMP
D. L2TP
C. IGMP is used for group messaging and multicasting. IGMP maintains a list of systems
that belong to a message group. When a message is sent to a particular group, each system
receives an individual copy
IPv6, in addition to having more bits allocated for each host address, also has mandatory
requirements built in for which security protocol?
A. TFTP
B. IPSec
C. SFTP
D. L2TP
B. The implementation of IPSec is mandatory with IPv6. While it is widely implemented
with IPv4, it is not a requirement
Which ports are, by default, reserved for use by FTP? (Choose all that apply.)
A. 20 and 21 TCP
B. 20 and 21 UDP
C. 22 and 23 TCP
D. 22 and 23 UDP
A. FTP uses TCP ports 20 and 21. FTP does not use UDP ports
Which of the following services use only TCP ports and not UDP? (Choose all that apply.)
A. IMAP
B. LDAP
C. FTPS
D. SFTP
D. SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports