Lesson 8: Designing Network Infrastructure And Network Security

20 Questions | Total Attempts: 149

SettingsSettingsSettings
Please wait...
Network Security Quizzes & Trivia

.


Questions and Answers
  • 1. 
    What type of network can you set up that is another company’s internal network?
    • A. 

      Intranet

    • B. 

      Extranet

    • C. 

      Internet

    • D. 

      DMZ

  • 2. 
    What technology can you use temporarily to connect networks from two different companies?
    • A. 

      VPN

    • B. 

      HTTP

    • C. 

      DHCP

    • D. 

      Passive router

  • 3. 
    Which VPN technology is the most common and the easiest to set up?
    • A. 

      PPTP

    • B. 

      L2TP with IPSec

    • C. 

      SSTP

    • D. 

      CHAP

  • 4. 
    What port does L2TP use?
    • A. 

      501

    • B. 

      1723

    • C. 

      1701

    • D. 

      443

  • 5. 
    Which type of firewall blocks packets based on rules that are based on IP addresses or ports?
    • A. 

      Packet filtering

    • B. 

      Stateful packet inspection

    • C. 

      NAT filtering

    • D. 

      Application-level gateway

  • 6. 
    What technology used in firewalls keeps tracks of conversations so that it knows what to allow back into a network?
    • A. 

      Stateless packet inspection

    • B. 

      Stateful packet inspection

    • C. 

      NAT filtering

    • D. 

      Application-level gateway

  • 7. 
    What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?
    • A. 

      NAT server

    • B. 

      Stateful packet inspector

    • C. 

      Proxy server

    • D. 

      NIDS

  • 8. 
    What type of device is used to detect malicious network activities and reports only those issues to the administrator?
    • A. 

      NIDS

    • B. 

      NIPS

    • C. 

      Internet content filter

    • D. 

      NAT server

  • 9. 
    What type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity?
    • A. 

      NIDS

    • B. 

      NIPS

    • C. 

      Internet content filter

    • D. 

      NAT server

  • 10. 
    Which DMZ configuration uses one firewall with three interfaces?
    • A. 

      Back-to-back configuration

    • B. 

      Three-leg perimeter configuration

    • C. 

      Basic configuration

    • D. 

      Perimeter configuration

  • 11. 
    What stage is the World Wide Web in?
    • A. 

      1.0

    • B. 

      1.1

    • C. 

      2.0

    • D. 

      3.0

  • 12. 
    What protocol is used with L2TP to provide encryption?
    • A. 

      IPSec

    • B. 

      MPPE

    • C. 

      HTTPS

    • D. 

      MSC-CHAP

  • 13. 
    What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts without further checking?
    • A. 

      Proxy server

    • B. 

      Application firewall

    • C. 

      NAT filtering

    • D. 

      Circuit-level gateway

  • 14. 
    What type of firewall do you use to block access to certain websites or instant messengers?
    • A. 

      Internet content filter

    • B. 

      NIDS

    • C. 

      Circuit-level gateway

    • D. 

      NAT filtering

  • 15. 
    When trying to protect your network, you should create your secure network based on _______.
    • A. 

      Multiple content filters

    • B. 

      A master firewall that all traffic flows through

    • C. 

      A NAT firewall and a proxy server

    • D. 

      Layers

  • 16. 
    The [Blank] is the largest WAN in the world.
  • 17. 
    An [Blank] is the internal network for an organization.
  • 18. 
    What port does PPTP use?
  • 19. 
    What device is used to protect one network from another by using filtering packets?
  • 20. 
    What type of configuration creates a DMZ between two firewalls?