Module 2-03 Challenge Flashcards

1
Q

What network protocol translates the domain name of a website’s server into an IP address?

  • File transfer protocol (FTP)
  • Hypertext transfer protocol secure (HTTPS)
  • Domain name system (DNS)
  • Transmission control protocol (TCP)
A

Domain name system (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements accurately describe wireless protocols? Select three answers.

  • WPA is a wireless security protocol pertaining to connecting to the internet.
  • The set of standards IEEE 802.11 is also referred to as Wi-Fi.
  • Wi-Fi protocols provide significantly lower security levels than wired connections.
  • The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
A
  • WPA is a wireless security protocol pertaining to connecting to the internet.
  • The set of standards IEEE 802.11 is also referred to as Wi-Fi.
  • The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ____ firewall operates based on predefined rules. It is not used to keep track of information from data packets.

  • stateless
  • cloud-based
  • next-generation firewall (NGFW)
  • stateful
A

stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following types of firewalls can perform deep packet inspection and intrusion detection?

  • Next generation firewall (NGFW)
  • Stateful firewall
  • Stateless firewall
  • Documented firewall
A

Next generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do VPNs preserve confidentiality?

  • Encrypt data in transit
  • Monitor traffic to and from a network
  • Use temporary memory to store data requested by external servers
  • Translate internet domain names to IP addresses
A

Encrypt data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following does encapsulation protect?

  • proxy servers
  • data in transit
  • cryptographic keys
  • public IP addresses
A

data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A controlled zone protects a company’s internal network from a(n)___ security zone.

  • uncontrolled
  • restricted
  • demilitarized
  • internal network
A

uncontrolled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What network zone acts as a network perimeter to the internal network by isolating servers that are exposed to the internet?

  • Demilitarized zone
  • Restricted zone
  • Uncontrolled zone
  • Virtual private network
A

Demilitarized zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following tools can service client requests by forwarding them to other servers?

  • Firewall
  • Proxy server
  • Router
  • Virtual private network (VPN)
A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.

  • Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
  • Forward proxy servers regulate and restrict a person’s access to the internet.
  • Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
  • Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
A
  • Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
  • Forward proxy servers regulate and restrict a person’s access to the internet.
  • Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The _______ maintains Wi-Fi standards.

  • IEEE 802.11
  • Transmission control protocol (TCP)
  • Domain name system (DNS)
  • WiFi protected access (WPA)
A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of firewall analyzes network traffic for suspicious characteristics and behavior and stops them from entering the network?

  • Next-generation firewall (NGFW)
  • Stateful
  • Cloud-based
  • Stateless
A

Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What network security service masks a device’s virtual location to keep data private while using a public network?

  • Virtual private network (VPN)
  • Cloud service provider (CSP)
  • Network segmenter
  • Domain name system (DNS)
A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which firewall offers the most security features?

  • Documented firewall
  • Next generation firewall (NGFW)
  • Stateful firewall
  • Stateless firewall
A

Next generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of the demilitarized zone (DMZ)?

  • Encrypt data as it travels across the internet
  • Protect highly confidential information accessible only to employees with certain privileges
  • Isolate servers exposed to the internet from the rest of a network
  • Organize data by forwarding it to other servers
A

Isolate servers exposed to the internet from the rest of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ fulfills the requests of its clients by forwarding them to other servers

  • virtual private network (VPN)
  • router
  • firewall
  • proxy server
A

proxy server

16
Q

A ____ firewall can connect to cloud-based threat intelligence services and quickly update against emerging cyber threats

  • next generation firewall (NGFW)
  • documented
  • stateless
  • stateful
A

next generation firewall (NGFW)

17
Q

A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?

  • Organizing data packets
  • Location masking
  • Using cloud-based firewalls
  • Port filtering
A

Port filtering

18
Q

What does a VPN service use to transfer encrypted data between a device and the VPN server?

  • transmission control
  • network segmentation
  • encapsulation
  • packet sniffing
A

encapsulation

19
Q

What network is part of the uncontrolled zone?

  • Internet
  • Web servers
  • Subnets
  • Internal networks
20
Q

What network zone includes public facing services such as web servers, proxy servers, and DNS servers?

  • Restricted zone
  • Virtual private network
  • Uncontrolled zone
  • Demilitarized zone
A

Demilitarized zone

21
Q

What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?

  • Secure Sockets Layer/Transport Layer Security (SSL/TLS)
  • Hypertext Transfer Protocol Secure (HTTPS)
  • Transmission Control Protocol (TCP)
  • Address Resolution Protocol (ARP)
A

Address Resolution Protocol (ARP)

22
Q

What set of standards is known as Wi-Fi?

  • WEP
  • 802.11
  • WPA
  • IEEE 802.11
23
Q

What network zone contains the internet and other services that are outside of an organization’s control?

  • Uncontrolled
  • Controlled
  • Restricted
  • Demilitarized
A

Uncontrolled

24
Q

A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.

  • next generation firewall (NGFW)
  • reverse proxy server
  • forward proxy server
  • virtual private network (VPN)
A

reverse proxy server