Infrastructure and Connectivity Flashcards

1
Q

Which of the following devices is the most capable of providing infrastructure security?

A. Hub
B. Switch
C. Router
D. Modem

A

C. Routers can be configured in many instances to act as packet-filtering firewalls. When
configured properly, they can prevent unauthorized ports from being opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Upper management has decreed that a firewall must be put in place immediately, before
your site suffers an attack similar to one that struck a sister company. Responding to this
order, your boss instructs you to implement a packet filter by the end of the week. A packet
filter performs which function?

A. Prevents unauthorized packets from entering the network
B. Allows all packets to leave the network
C. Allows all packets to enter the network
D. Eliminates collisions in the network

A

A. Packet filters prevent unauthorized packets from entering or leaving a network. Packet
filters are a type of firewall that blocks specified port traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device stores information about destinations in a network?

A. Hub
B. Modem
C. Firewall
D. Router

A

D. Routers store information about network destinations in routing tables. Routing tables
contain information about known hosts on both sides of the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As more and more clients have been added to your network, the efficiency of the network
has decreased significantly. You’re preparing a budget for next year, and you specifically
want to address this problem. Which of the following devices acts primarily as a tool to
improve network efficiency?

A. Hub
B. Switch
C. Router
D. PBX

A

B. Switches create virtual circuits between systems in a network. These virtual circuits are
somewhat private and reduce network traffic when used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which device is used to connect voice, data, pagers, networks, and almost any other conceivable
application into a single telecommunications system?

A. Router
B. PBX
C. Hub
D. Server

A

B. Many modern PBX (private branch exchange) systems integrate voice and data onto a
single data connection to your phone service provider. In some cases, this allows an overall
reduction in cost of operations. These connections are made using existing network connections
such as a T1 or T3 network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most of the sales force have been told that they should no longer report to the office on a
daily basis. From now on, they’re to spend the majority of their time on the road calling on
customers. Each member of the sales force has been issued a laptop computer and told to
connect to the network nightly through a dial-up connection. Which of the following protocols
is widely used today as a transport protocol for Internet dial-up connections?

A. SMTP
B. PPP
C. PPTP
D. L2TP

A

B. PPP can pass multiple protocols and is widely used today as a transport protocol for
dial-up connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is unsuitable for WAN VPN connections?

A. PPP
B. PPTP
C. L2TP
D. IPSec

A

A. PPP provides no security, and all activities are unsecure. PPP is primarily intended for
dial-up connections and should never be used for VPN connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You’ve been given notice that you’ll soon be transferred to another site. Before you leave, you’re
to audit the network and document everything in use and the reason why it’s in use. The next
administrator will use this documentation to keep the network running. Which of the following
protocols isn’t a tunneling protocol but is probably used at your site by tunneling protocols
for network security?

A. IPSec
B. PPTP
C. L2TP
D. L2F

A

A. IPSec provides network security for tunneling protocols. IPSec can be used with many
different protocols besides TCP/IP, and it has two modes of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A socket is a combination of which components?

A. TCP and port number
B. UDP and port number
C. IP and session number
D. IP and port number

A

D. A socket is a combination of IP address and port number. The socket identifies which
application will respond to the network request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You’re explaining protocols to a junior administrator shortly before you leave for vacation.
The topic of Internet mail applications comes up, and you explain how communications are
done now as well as how you expect them to be done in the future. Which of the following
protocols is becoming the newest standard for Internet mail applications?

A. SMTP
B. POP
C. IMAP
D. IGMP

A

C. IMAP is becoming the most popular standard for email clients and is replacing POP
protocols for mail systems. IMAP allows mail to be forwarded and stored in information
areas called stores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol is primarily used for network maintenance and destination information?

A. ICMP
B. SMTP
C. IGMP
D. Router

A

A. ICMP is used for destination and error reporting functions in TCP/IP. ICMP is routable
and is used by programs such as Ping and Traceroute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You’re the administrator for Mercury Technical. A check of protocols in use on your server
brings up one that you weren’t aware was in use; you suspect that someone in HR is using it
to send messages to multiple recipients. Which of the following protocols is used for group
messages or multicast messaging?

A. SMTP
B. SNMP
C. IGMP
D. L2TP

A

C. IGMP is used for group messaging and multicasting. IGMP maintains a list of systems
that belong to a message group. When a message is sent to a particular group, each system
receives an individual copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPv6, in addition to having more bits allocated for each host address, also has mandatory
requirements built in for which security protocol?

A. TFTP
B. IPSec
C. SFTP
D. L2TP

A

B. The implementation of IPSec is mandatory with IPv6. While it is widely implemented
with IPv4, it is not a requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which ports are, by default, reserved for use by FTP? (Choose all that apply.)

A. 20 and 21 TCP
B. 20 and 21 UDP
C. 22 and 23 TCP
D. 22 and 23 UDP

A

A. FTP uses TCP ports 20 and 21. FTP does not use UDP ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following services use only TCP ports and not UDP? (Choose all that apply.)

A. IMAP
B. LDAP
C. FTPS
D. SFTP

A

D. SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following can be implemented as a software or hardware solution and is usually
associated with a device—a router, a firewall, NAT, and so on—and used to shift a
load from one device to another?

A. Proxy
B. Hub
C. Load balancer
D. Switch

A

C. A load balancer can be implemented as a software or hardware solution, and is usually
associated with a device—a router, a firewall, NAT, and so on. As the name implies, it is
used to shift a load from one device to another.

17
Q

Which of the following are multiport devices that improve network efficiency?

A. Switches
B. Modems
C. Gateways
D. Concentrators

A

A. Switches are multiport devices that improve network efficiency. A switch typically has a
small amount of information about systems in a network.

18
Q

Which service(s), by default, use TCP and UDP port 22? (Choose all that apply.)

A. SMTP
B. SSH
C. SCP
D. IMAP

A

B, C. Port 22 is used by both SSH and SCP with TCP and UDP.

19
Q

What protocol, running on top of TCP/IP, is often used for name registration and resolution
with Windows-based clients?

A. Telnet
B. SSL
C. NetBIOS
D. TLS

A

C. NetBIOS is used for name resolution and registration in Windows-based environments.
It runs on top of TCP/IP.

20
Q

How many bits are used for addressing with IPv4 and IPv6, respectively?

A. 32, 128
B. 16, 64
C. 8, 32
D. 4, 16

A

A. IPv4 uses 32 bits for the host address, while IPv6 uses 128 bits for this.