Review 5 Flashcards

1
Q

Which type of route is created to route packets to unspecified subnet destinations?

Static

Virtual

Default

Dynamic

A

Default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements about “host-based firewalls” is NOT true?

Question options:

Can be used in conjunction with a network-based firewall to provide multiple layers of protection.

They are considered hardware firewalls even though they use a combination of hardware and software to protect the host from internet attacks.

It is installed on a single computer in a network.

It is less expensive and easier to use than network-based firewalls.

A

They are considered hardware firewalls even though they use a combination of hardware and software to protect the host from internet attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which information would you NOT see in a firewall rule/ACL?

Question options:

Whether the traffic is inbound or outbound.

Packet information (source IP address, destination IP address, port number).

The MAC address of the sending and receiving devices.

The interface the rule applies to.

A

The MAC address of the sending and receiving devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of routing is done within an autonomous system?

Question options:

Exterior Routing

Autonomous Routing

Interior Routing

Default Routing

A

Interior Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of firewall examines the entirety of the transferred content (not just individual packets)?

Question options:

Packet-filtering firewall

Circuit-level gateway

Unified threat management (UTM) device

Application-layer firewall

A

Application-layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following routing protocols is a “distance vector” protocol?

Question options:

OSPF

RIP

IS-IS

EIGRP

A

Routing Ingormation Protocol (RIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which VLAN is isolated from user data traffic?

Question options:

Voice VLAN

Default VLAN

Native VLAN

Management VLAN

A

Management VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following describes a Circuit Level Gateway firewall?

Question options:

Filters based on IP addresses, protocol, and port numbers
Inspects packets and tracks the state of active connections
Suitable for smaller networks or less complex security requirements

Filters based on IP addresses, protocol, and port numbers
Acts at the network layer
Suitable for smaller networks or less complex security requirements

Inspects packets and tracks the state of active connections
Acts at the session layer
Ideal for corporate networks where it is critical to protect sensitive data

Suitable for smaller networks or less complex security requirements
Acts at the network layer
Inspects packets and tracks the state of active connections

A

Inspects packets and tracks the state of active connections
Acts at the session layer
Ideal for corporate networks where it is critical to protect sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which VLAN as a VLAN ID of 1 by default?

Question options:

Voice VLAN

Native VLAN

Management VLAN

Default VLAND

A

Default VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statement regarding NAT is NOT true?

Question options:

A NAT router can forward DNS requests to the internet.

NAT provides some security for the private network because it translates or hides private addresses.

A NAT router can act as a limited-function DHCP server, assigning addresses to private hosts.

NAT supports a limit of 50,000 concurrent connections.

A

NAT supports a limit of 50,000 concurrent connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary purpose of Network Address Translation (NAT) in a computer network?

A

To convert private IP addresses to public addresses and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term describes a virtual interface created by subdividing a physical interface on a router?

A

Subinterface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the Linux firewall utility that almost always come pre-installed on a Linux distribution?

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is NOT true regarding Virtual IPs?

Question options:

They provide load balancing.

They provide fault tolerance.

They provide limited mobility.

Used for one-to-many network address translation (NAT).

A

They provide limited mobility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term describes a private network that is under one administrative authority who controls the network through common routing policies?

Question options:

Autonomous System

Local Network

Administrative System

Private System

A

Autonomous System (AS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following routing protocols is a “link state” protocol?

Question options:

EIGRP

IGRP

IS-IS

RIP

17
Q

By default, every port on a __________ belongs to the same broadcast domain

Question options:

Router

Layer 2 switch

Firewall

Layer 3 switch

A

Layer 2 switch

18
Q

Which type of firewall tracks the state of traffic based on layers 2 through 7?

Question options:

Circuit-level gateway

Next-generation firewall (NGFW)

Application-layer firewall

Unified threat management (UTM) device

A

Next-generation firewall (NGFW)

19
Q

If a layer 2 switch has 5 VLANs configured, how many MAC address tables will it maintain?

Question options:

5

10

1

2

20
Q

Which one of the following protocols is an Exterior Gateway Protocol?

Question options:

Border Gateway Protocol

Open Shortest Path First (OSPF)

Intermediate System to Intermediate System (IS-IS)

Routing Information Protocol (RIP) and RIPv2

A

Border Gateway Protocol