MOD4 Exam Flashcards
You must configure computers to use a Reverse Proxy Server?
True
False
False
A Reverse Proxy Server provides a layer of protection for a Web Server and can increase its performance.
However, clients don’t need to be configured to use a Reverse Proxy Server.
Clients do need to be configured to use a Proxy Server.
When an organization wants to restrict which web pages employees can access on the Internet when using a company computer they can implement a _______?
Proxy Server
NAT
Reverse Proxy Server
Firewall
Proxy Server
What service translates private IP addresses to public IP addresses and translates public IP addresses back to private?
Network Address Translation Protocol (NAT)
A Microsoft computer is connected to a Network in a coffee shop. How should the Network location be configured to protect the computer?
Public Network
Private Network
Home or Work Network
Domain Network
Public Network
The Network Location should be set to PUBLIC, this disables Network Discovery in the Windows Firewall and prevents other computers from locating it.
Which Network Security zone represents the Least Risk?
Intranet
Internet
Extranet
Perimeter Network
Intranet
You are considering adding a Network-Based Firewall to a Windows Network. What Microsoft product could you consider?
Microsoft’s Forefront Threat Management Gateway (TMG)
Formally known as Microsoft Internet Security and Acceleration Server. (ISA Server)
It’s a Network Router, Firewall, Antivirus Program, VPN Server, and a Web Cache that runs Windows Server and works by inspecting all passing Network Traffic.
You want to reduce the amount of Internet Bandwidth used by Internal Clients when they access Internet Resources. What can you do?
Implement a Proxy Server
Implement a Firewall
Implement NAT
Implement a Reverse Proxy Server
Implement a Proxy Server
A Proxy Server caches Web Pages.
When other users want to access the same Web page, the Proxy Server retrieves the page from its own internal memory cache instead of using additional Internet Bandwidth to retrieve the same page.
A DMZ provides a layer of Security for Internet-Facing Servers?
True
False
True
Of the following, what is the strongest wireless security method?
WPA2
WEP2
WPA
WAP2
WPA2
What is the max speed of an IEEE 802.11g Network?
54 Mbps
11 Mbps
300 Mbps
2 Mbps
54 Mbps
Microsoft recommends disabling SSID broadcast for Security?
True
False
False
Which of the following access methods does the IEEE 802.11 family use?
CSMA/CA
CSMA/CD
Tokens
Wireless
CSMA/CA (Collision Avoidance is with Wireless Networks)
For Wired Networks it’s CSMA/CD - Collision Detection.
Tokens are used by IBM Token Ring Networks (IEEE 802.5)
What frequency does an 802.11g Network use?
2.4 GHz
2.4 MHz
5 GHz
5 MHz
2.4 GHz
Of the following choices, which of the below correctly describes differences between WAP and a Wireless Router? (Choose All That Apply)
A Wireless Router always includes a WAP
A Wireless Router usually includes DHCP but WAPs do not include DHCP
A WAP always includes a Wireless Router
A WAP usually includes DHCP but Wireless Routers never include DHCP.
A Wireless Router always includes a WAP
A Wireless Router usually includes DHCP but WAPs do not include DHCP
IEEE 802.11n is backward compatible to 802.11a, 802.11b, and 802.11g Networks?
True
False
True