Network+ Quiz Flashcards
T/F Networks need to have a unique IP Network address i.e. name?
True
What is the name for the address, the burned in address, that is given to every network interface card?
MAC address
Physical address
Layer 2 address
A layer 2 _____ makes forwarding decisions for network traffic cased on the MAC address of the intended destination.
Switch
T/F A multi-layer switch is capable of making later 2 and layer 3 forwarding decisions.
True
A layer 3 _____ connects separate IP networks by making forwarding decisions based on IP network addresses, layer 3 addresses.
Router
A _____ creates a barrier between your private inside network and the public outside world.
Firewall
In which of the following network areas would you likeley place your public facing web servers? A. DMZ B. LAN C. Outside network D. Public Telephone Network
A. DMZ
T/F Due to high traffic needs, Load Balancers have to be physical servers/appliances and not virtual servers/appliances
False
T/F A Unified Threat Management Firewall is oly used to prevent someone from an outside network getting into our inside network.
False
You have two web servers, Web Server 1 and Web Server 2. Web Server 1 gets all of the traffic. From the list below, which would be the best option to help balance the internet requests between the two?
A. As the person browsing your network to click the Web Server 1 link if their clock reads an odd numbered minute and Web Server 2 if it’s an even numbered minute.
B. Implement a Load Balancer
C. Turn off Web Server 1 until Web Server 2 has served an equal number of requests
D. Install a third web server
B. Implement a Load Balancer
T/F A user with only the minimum permissions to access a web server has the ability to perform malicious acts against the server.
True
An Intrusion Detection System is the only system needed to protect your systems from malicious traffic.
False
Which of the following are valid types of Intrusion Detection and/or Prevention systems? Choose 2.
• Network Intrusion Detection System (IDS)
• Network Threat Treatment System
• Network Intrusion Prevention System (IPS)
• Host based Intrusion Detection/Prevention System (HIDS)
- Network Intrusion Detection System (IDS)
- Network Intrusion Prevention System (IPS)
- Host based Intrusion Detection/Prevention System (HIDS)
Before high speed internet what device was used to connect computers over the Public Switched Telephone Network (PSTN)?
A modem
T/F A hub is an older technology but just like a switch it makes forwarding decisions based on layer 2 addresses.
False
T/F When one device connected to a hub talks, all other connected devices will receive the message.
True
How many devices can talk at the same time when connected to a hub?
1
What tools helps us prioritize certain types of network traffic over others? A. Exchange Server B. Firewall C. T1 Line D. Packet Shaper
D. Packet Shaper
Priority traffic with a packet shaper is often referred to as \_\_\_\_\_. A. Quantity of Service B. SoS C. QoS D. PoS
C. QoS or Quality of Service
QoS stands for
Quality of Service
What is a content filter?
A content filter makes traffic decisions based on company policies that govern the type of web site that a user is allowed to view