MOD4 Exam Flashcards

1
Q

You must configure computers to use a Reverse Proxy Server?

True
False

A

False

A Reverse Proxy Server provides a layer of protection for a Web Server and can increase its performance.
However, clients don’t need to be configured to use a Reverse Proxy Server.
Clients do need to be configured to use a Proxy Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When an organization wants to restrict which web pages employees can access on the Internet when using a company computer they can implement a _______?

Proxy Server
NAT
Reverse Proxy Server
Firewall

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What service translates private IP addresses to public IP addresses and translates public IP addresses back to private?

A

Network Address Translation Protocol (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Microsoft computer is connected to a Network in a coffee shop. How should the Network location be configured to protect the computer?

Public Network
Private Network
Home or Work Network
Domain Network

A

Public Network

The Network Location should be set to PUBLIC, this disables Network Discovery in the Windows Firewall and prevents other computers from locating it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Network Security zone represents the Least Risk?

Intranet
Internet
Extranet
Perimeter Network

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are considering adding a Network-Based Firewall to a Windows Network. What Microsoft product could you consider?

A

Microsoft’s Forefront Threat Management Gateway (TMG)

Formally known as Microsoft Internet Security and Acceleration Server. (ISA Server)
It’s a Network Router, Firewall, Antivirus Program, VPN Server, and a Web Cache that runs Windows Server and works by inspecting all passing Network Traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You want to reduce the amount of Internet Bandwidth used by Internal Clients when they access Internet Resources. What can you do?

Implement a Proxy Server
Implement a Firewall
Implement NAT
Implement a Reverse Proxy Server

A

Implement a Proxy Server

A Proxy Server caches Web Pages.
When other users want to access the same Web page, the Proxy Server retrieves the page from its own internal memory cache instead of using additional Internet Bandwidth to retrieve the same page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DMZ provides a layer of Security for Internet-Facing Servers?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Of the following, what is the strongest wireless security method?

WPA2
WEP2
WPA
WAP2

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the max speed of an IEEE 802.11g Network?

54 Mbps
11 Mbps
300 Mbps
2 Mbps

A

54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Microsoft recommends disabling SSID broadcast for Security?

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following access methods does the IEEE 802.11 family use?

CSMA/CA
CSMA/CD
Tokens
Wireless

A

CSMA/CA (Collision Avoidance is with Wireless Networks)

For Wired Networks it’s CSMA/CD - Collision Detection.
Tokens are used by IBM Token Ring Networks (IEEE 802.5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What frequency does an 802.11g Network use?

2.4 GHz
2.4 MHz
5 GHz
5 MHz

A

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Of the following choices, which of the below correctly describes differences between WAP and a Wireless Router? (Choose All That Apply)

A Wireless Router always includes a WAP
A Wireless Router usually includes DHCP but WAPs do not include DHCP
A WAP always includes a Wireless Router
A WAP usually includes DHCP but Wireless Routers never include DHCP.

A

A Wireless Router always includes a WAP

A Wireless Router usually includes DHCP but WAPs do not include DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IEEE 802.11n is backward compatible to 802.11a, 802.11b, and 802.11g Networks?

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your company includes a WAP used by roaming users. Some users complain that they lose access when they move to a conference room at the end of the building. What can resolve this problem?

Create an ESS
Create an ISS
Create an BSS
Create an P2P Network

A

Create an ESS

ESS is one ore more WAPs used as Wireless Repeaters.
BSS includes a single WAP.
IBSS does not include a WAP
A Point to Point connects 2 Buildings

17
Q

What additional component is needed for WPA2 Enterprise Mode?

A

You will need an 802.1x Server for Authentication.

Can configure a Windows Server 2008, 2012, 2016 with Network Policy and Access (NPAS) as an 802.1x Server.

18
Q

How many Digital signal channels are used for a T3?

28 DS1s
23 DS0s
24 DS0s
2B+1D

A

28 DS1s

For a total speed of 44.736 Mbps.
Each DS1 is made up of 24 DSOs.

19
Q

Dial-Up is not used for Internet Access Today?

True
False

A

False

20
Q

How many B Channels does an ISDN PRI use?

23
4
2
1

A

23

23 64 Kbps B Channels and 1 D Channel

21
Q

T1 and T3 lines are used in Europe?

True
False

A

False

T1 and T3 = United States
E1 and E3 = Europe

22
Q

What is speed of T1 Link?

  1. 544 Mbps
  2. 048 Mbps
  3. 368 Mbps
  4. 736 Mbps
A

1.544 Mbps

T1 = 1.544 Mbps
E1 = 2.048 Mbps
E3 = 34.368 Mbps
T3 = 44.736 Mbps
23
Q

What is the Speed of a T3 link?

  1. 736 Mbps
  2. 048 Mbps
  3. 368 Mbps
  4. 544 Mbps
A

44.736 Mbps

24
Q

What dedicated service, running on a server, is used to handle users who are not directly connected to a LAN but who need to access file and print service on the LAN from a remote location?

Routing and Remote Access Service
Wide Area Network Services
Dial-Up Remote Services
Virtual Private Network Services

A

Routing and Remote Access Service

25
Q

You can use a VPN as a WAN link?

True
False

A

True

A Gateway to Gateway VPN is used as a WAN Link.

26
Q

What protocol does SSTP use for Encryption?

A

SSL

SSTP is a Tunneling Protocol, and it uses SSL Port 443 by default.

27
Q

You can use the ______ command to vieiw TCP/IP statistics on a Windows Server 2008 Server?

A

netstat -s

Shows statistics for a System. Includes packets received, packets sent, and errors.

28
Q

Your computer has a Gateway address of 192.168.32.1 and an IP address of 192.168.32.123 - What command is the exact command that you would type at the command line to determine if your gateway is available?

A

ping 192.168.32.1

29
Q

What command can you use to identify if any Routers between your computer and a distant computer are experiencing packet loss?

A

pathping

Will identify all the Routers in the path similar to tracert.
It then sends each Router 100 packets and counts the received packets to measure packet loss.

30
Q

What switch can you use to view help for a command?

/?
/help
/?help
man

A

/?

31
Q

What command can you use to determine the IP address of a DNS server used by a computer?

ipconfig /all
ipconfig
netstat
telnet

A

ipconfig /all

ipconfig provides only abbreviated info, you need the /all to see the DNS address.

32
Q

What command can you use to identify the process ID that is associated with an open port?

netstat -o
netstat -p
netstat -r
nbtstat

A

netstat -o

33
Q

If ping fails, you know that the remote computer is not operational?

True
False

A

False

Ping could fail if the remote computer is blocking ICMP Traffic.

34
Q

You can successfully ping a computer in a Microsoft Network using the IP Address, but when you try to ping it with the name, it fails. What’s likely the problem?

DNS
DHCP
TCP/IP
Telnet

A

DNS

If you can ping the IP Address but not the name, the name resolution is not working.
A primary method of name resolution is DNS.