Module 2-03 Challenge Flashcards
What network protocol translates the domain name of a website’s server into an IP address?
- File transfer protocol (FTP)
- Hypertext transfer protocol secure (HTTPS)
- Domain name system (DNS)
- Transmission control protocol (TCP)
Domain name system (DNS)
Which of the following statements accurately describe wireless protocols? Select three answers.
- WPA is a wireless security protocol pertaining to connecting to the internet.
- The set of standards IEEE 802.11 is also referred to as Wi-Fi.
- Wi-Fi protocols provide significantly lower security levels than wired connections.
- The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
- WPA is a wireless security protocol pertaining to connecting to the internet.
- The set of standards IEEE 802.11 is also referred to as Wi-Fi.
- The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
A ____ firewall operates based on predefined rules. It is not used to keep track of information from data packets.
- stateless
- cloud-based
- next-generation firewall (NGFW)
- stateful
stateless
Which of the following types of firewalls can perform deep packet inspection and intrusion detection?
- Next generation firewall (NGFW)
- Stateful firewall
- Stateless firewall
- Documented firewall
Next generation firewall (NGFW)
How do VPNs preserve confidentiality?
- Encrypt data in transit
- Monitor traffic to and from a network
- Use temporary memory to store data requested by external servers
- Translate internet domain names to IP addresses
Encrypt data in transit
Which of the following does encapsulation protect?
- proxy servers
- data in transit
- cryptographic keys
- public IP addresses
data in transit
A controlled zone protects a company’s internal network from a(n)___ security zone.
- uncontrolled
- restricted
- demilitarized
- internal network
uncontrolled
What network zone acts as a network perimeter to the internal network by isolating servers that are exposed to the internet?
- Demilitarized zone
- Restricted zone
- Uncontrolled zone
- Virtual private network
Demilitarized zone
Which of the following tools can service client requests by forwarding them to other servers?
- Firewall
- Proxy server
- Router
- Virtual private network (VPN)
Proxy server
Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.
- Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
- Forward proxy servers regulate and restrict a person’s access to the internet.
- Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
- Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
- Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
- Forward proxy servers regulate and restrict a person’s access to the internet.
- Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
The _______ maintains Wi-Fi standards.
- IEEE 802.11
- Transmission control protocol (TCP)
- Domain name system (DNS)
- WiFi protected access (WPA)
IEEE 802.11
Which type of firewall analyzes network traffic for suspicious characteristics and behavior and stops them from entering the network?
- Next-generation firewall (NGFW)
- Stateful
- Cloud-based
- Stateless
Stateful
What network security service masks a device’s virtual location to keep data private while using a public network?
- Virtual private network (VPN)
- Cloud service provider (CSP)
- Network segmenter
- Domain name system (DNS)
Virtual private network (VPN)
Which firewall offers the most security features?
- Documented firewall
- Next generation firewall (NGFW)
- Stateful firewall
- Stateless firewall
Next generation firewall (NGFW)
What is the function of the demilitarized zone (DMZ)?
- Encrypt data as it travels across the internet
- Protect highly confidential information accessible only to employees with certain privileges
- Isolate servers exposed to the internet from the rest of a network
- Organize data by forwarding it to other servers
Isolate servers exposed to the internet from the rest of a network
A _____ fulfills the requests of its clients by forwarding them to other servers
- virtual private network (VPN)
- router
- firewall
- proxy server
proxy server
A ____ firewall can connect to cloud-based threat intelligence services and quickly update against emerging cyber threats
- next generation firewall (NGFW)
- documented
- stateless
- stateful
next generation firewall (NGFW)
A firewall administrator installs a firewall function to either block or allow certain port numbers to limit unwanted communication. What function does this scenario describe?
- Organizing data packets
- Location masking
- Using cloud-based firewalls
- Port filtering
Port filtering
What does a VPN service use to transfer encrypted data between a device and the VPN server?
- transmission control
- network segmentation
- encapsulation
- packet sniffing
encapsulation
What network is part of the uncontrolled zone?
- Internet
- Web servers
- Subnets
- Internal networks
Internet
What network zone includes public facing services such as web servers, proxy servers, and DNS servers?
- Restricted zone
- Virtual private network
- Uncontrolled zone
- Demilitarized zone
Demilitarized zone
What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Hypertext Transfer Protocol Secure (HTTPS)
- Transmission Control Protocol (TCP)
- Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP)
What set of standards is known as Wi-Fi?
- WEP
- 802.11
- WPA
- IEEE 802.11
What network zone contains the internet and other services that are outside of an organization’s control?
- Uncontrolled
- Controlled
- Restricted
- Demilitarized
Uncontrolled
A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.
- next generation firewall (NGFW)
- reverse proxy server
- forward proxy server
- virtual private network (VPN)
reverse proxy server