MOD4 Exam Flashcards
You must configure computers to use a Reverse Proxy Server?
True
False
False
A Reverse Proxy Server provides a layer of protection for a Web Server and can increase its performance.
However, clients don’t need to be configured to use a Reverse Proxy Server.
Clients do need to be configured to use a Proxy Server.
When an organization wants to restrict which web pages employees can access on the Internet when using a company computer they can implement a _______?
Proxy Server
NAT
Reverse Proxy Server
Firewall
Proxy Server
What service translates private IP addresses to public IP addresses and translates public IP addresses back to private?
Network Address Translation Protocol (NAT)
A Microsoft computer is connected to a Network in a coffee shop. How should the Network location be configured to protect the computer?
Public Network
Private Network
Home or Work Network
Domain Network
Public Network
The Network Location should be set to PUBLIC, this disables Network Discovery in the Windows Firewall and prevents other computers from locating it.
Which Network Security zone represents the Least Risk?
Intranet
Internet
Extranet
Perimeter Network
Intranet
You are considering adding a Network-Based Firewall to a Windows Network. What Microsoft product could you consider?
Microsoft’s Forefront Threat Management Gateway (TMG)
Formally known as Microsoft Internet Security and Acceleration Server. (ISA Server)
It’s a Network Router, Firewall, Antivirus Program, VPN Server, and a Web Cache that runs Windows Server and works by inspecting all passing Network Traffic.
You want to reduce the amount of Internet Bandwidth used by Internal Clients when they access Internet Resources. What can you do?
Implement a Proxy Server
Implement a Firewall
Implement NAT
Implement a Reverse Proxy Server
Implement a Proxy Server
A Proxy Server caches Web Pages.
When other users want to access the same Web page, the Proxy Server retrieves the page from its own internal memory cache instead of using additional Internet Bandwidth to retrieve the same page.
A DMZ provides a layer of Security for Internet-Facing Servers?
True
False
True
Of the following, what is the strongest wireless security method?
WPA2
WEP2
WPA
WAP2
WPA2
What is the max speed of an IEEE 802.11g Network?
54 Mbps
11 Mbps
300 Mbps
2 Mbps
54 Mbps
Microsoft recommends disabling SSID broadcast for Security?
True
False
False
Which of the following access methods does the IEEE 802.11 family use?
CSMA/CA
CSMA/CD
Tokens
Wireless
CSMA/CA (Collision Avoidance is with Wireless Networks)
For Wired Networks it’s CSMA/CD - Collision Detection.
Tokens are used by IBM Token Ring Networks (IEEE 802.5)
What frequency does an 802.11g Network use?
2.4 GHz
2.4 MHz
5 GHz
5 MHz
2.4 GHz
Of the following choices, which of the below correctly describes differences between WAP and a Wireless Router? (Choose All That Apply)
A Wireless Router always includes a WAP
A Wireless Router usually includes DHCP but WAPs do not include DHCP
A WAP always includes a Wireless Router
A WAP usually includes DHCP but Wireless Routers never include DHCP.
A Wireless Router always includes a WAP
A Wireless Router usually includes DHCP but WAPs do not include DHCP
IEEE 802.11n is backward compatible to 802.11a, 802.11b, and 802.11g Networks?
True
False
True
Your company includes a WAP used by roaming users. Some users complain that they lose access when they move to a conference room at the end of the building. What can resolve this problem?
Create an ESS
Create an ISS
Create an BSS
Create an P2P Network
Create an ESS
ESS is one ore more WAPs used as Wireless Repeaters.
BSS includes a single WAP.
IBSS does not include a WAP
A Point to Point connects 2 Buildings
What additional component is needed for WPA2 Enterprise Mode?
You will need an 802.1x Server for Authentication.
Can configure a Windows Server 2008, 2012, 2016 with Network Policy and Access (NPAS) as an 802.1x Server.
How many Digital signal channels are used for a T3?
28 DS1s
23 DS0s
24 DS0s
2B+1D
28 DS1s
For a total speed of 44.736 Mbps.
Each DS1 is made up of 24 DSOs.
Dial-Up is not used for Internet Access Today?
True
False
False
How many B Channels does an ISDN PRI use?
23
4
2
1
23
23 64 Kbps B Channels and 1 D Channel
T1 and T3 lines are used in Europe?
True
False
False
T1 and T3 = United States
E1 and E3 = Europe
What is speed of T1 Link?
- 544 Mbps
- 048 Mbps
- 368 Mbps
- 736 Mbps
1.544 Mbps
T1 = 1.544 Mbps E1 = 2.048 Mbps E3 = 34.368 Mbps T3 = 44.736 Mbps
What is the Speed of a T3 link?
- 736 Mbps
- 048 Mbps
- 368 Mbps
- 544 Mbps
44.736 Mbps
What dedicated service, running on a server, is used to handle users who are not directly connected to a LAN but who need to access file and print service on the LAN from a remote location?
Routing and Remote Access Service
Wide Area Network Services
Dial-Up Remote Services
Virtual Private Network Services
Routing and Remote Access Service