Review 5 Flashcards
Which type of route is created to route packets to unspecified subnet destinations?
Static
Virtual
Default
Dynamic
Default
Which of the following statements about “host-based firewalls” is NOT true?
Question options:
Can be used in conjunction with a network-based firewall to provide multiple layers of protection.
They are considered hardware firewalls even though they use a combination of hardware and software to protect the host from internet attacks.
It is installed on a single computer in a network.
It is less expensive and easier to use than network-based firewalls.
They are considered hardware firewalls even though they use a combination of hardware and software to protect the host from internet attacks.
Which information would you NOT see in a firewall rule/ACL?
Question options:
Whether the traffic is inbound or outbound.
Packet information (source IP address, destination IP address, port number).
The MAC address of the sending and receiving devices.
The interface the rule applies to.
The MAC address of the sending and receiving devices.
Which type of routing is done within an autonomous system?
Question options:
Exterior Routing
Autonomous Routing
Interior Routing
Default Routing
Interior Routing
Which type of firewall examines the entirety of the transferred content (not just individual packets)?
Question options:
Packet-filtering firewall
Circuit-level gateway
Unified threat management (UTM) device
Application-layer firewall
Application-layer firewall
Which of the following routing protocols is a “distance vector” protocol?
Question options:
OSPF
RIP
IS-IS
EIGRP
Routing Ingormation Protocol (RIP)
Which VLAN is isolated from user data traffic?
Question options:
Voice VLAN
Default VLAN
Native VLAN
Management VLAN
Management VLAN
Which of the following describes a Circuit Level Gateway firewall?
Question options:
Filters based on IP addresses, protocol, and port numbers
Inspects packets and tracks the state of active connections
Suitable for smaller networks or less complex security requirements
Filters based on IP addresses, protocol, and port numbers
Acts at the network layer
Suitable for smaller networks or less complex security requirements
Inspects packets and tracks the state of active connections
Acts at the session layer
Ideal for corporate networks where it is critical to protect sensitive data
Suitable for smaller networks or less complex security requirements
Acts at the network layer
Inspects packets and tracks the state of active connections
Inspects packets and tracks the state of active connections
Acts at the session layer
Ideal for corporate networks where it is critical to protect sensitive data
Which VLAN as a VLAN ID of 1 by default?
Question options:
Voice VLAN
Native VLAN
Management VLAN
Default VLAND
Default VLAN
Which of the following statement regarding NAT is NOT true?
Question options:
A NAT router can forward DNS requests to the internet.
NAT provides some security for the private network because it translates or hides private addresses.
A NAT router can act as a limited-function DHCP server, assigning addresses to private hosts.
NAT supports a limit of 50,000 concurrent connections.
NAT supports a limit of 50,000 concurrent connections.
What is the primary purpose of Network Address Translation (NAT) in a computer network?
To convert private IP addresses to public addresses and vice versa
What term describes a virtual interface created by subdividing a physical interface on a router?
Subinterface
What is the name of the Linux firewall utility that almost always come pre-installed on a Linux distribution?
iptables
Which of the following is NOT true regarding Virtual IPs?
Question options:
They provide load balancing.
They provide fault tolerance.
They provide limited mobility.
Used for one-to-many network address translation (NAT).
They provide limited mobility.
What term describes a private network that is under one administrative authority who controls the network through common routing policies?
Question options:
Autonomous System
Local Network
Administrative System
Private System
Autonomous System (AS)
Which of the following routing protocols is a “link state” protocol?
Question options:
EIGRP
IGRP
IS-IS
RIP
IS-IS
By default, every port on a __________ belongs to the same broadcast domain
Question options:
Router
Layer 2 switch
Firewall
Layer 3 switch
Layer 2 switch
Which type of firewall tracks the state of traffic based on layers 2 through 7?
Question options:
Circuit-level gateway
Next-generation firewall (NGFW)
Application-layer firewall
Unified threat management (UTM) device
Next-generation firewall (NGFW)
If a layer 2 switch has 5 VLANs configured, how many MAC address tables will it maintain?
Question options:
5
10
1
2
5
Which one of the following protocols is an Exterior Gateway Protocol?
Question options:
Border Gateway Protocol
Open Shortest Path First (OSPF)
Intermediate System to Intermediate System (IS-IS)
Routing Information Protocol (RIP) and RIPv2
Border Gateway Protocol