Inbound Access To A Windows Terminal Server

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mekaelejigu
M
Mekaelejigu
Community Contributor
Quizzes Created: 12 | Total Attempts: 12,449
Questions: 10 | Attempts: 205

SettingsSettingsSettings
Windows Server Quizzes & Trivia

Questions and Answers
  • 1. 

      Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?

    • A.

      80

    • B.

      143

    • C.

      443

    • D.

      3389

    Correct Answer
    C. 443
    Explanation
    Port 443 is used for encrypted web traffic, specifically for HTTPS communication. HTTPS is the secure version of HTTP, and it encrypts the data being transmitted between a web server and a client, ensuring the privacy and integrity of the information. By allowing traffic on port 443, Henry can ensure that encrypted web traffic can reach the web server while still maintaining security.

    Rate this question:

  • 2. 

    Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow?

    • A.

      143

    • B.

      443

    • C.

      989

    • D.

      3389

    Correct Answer
    D. 3389
    Explanation
    The correct answer is 3389. This port is used for Remote Desktop Protocol (RDP) which is the protocol used by Windows Terminal Server to allow remote access to the server. By allowing inbound access on this port, Henry will be able to establish a connection to the Windows Terminal Server.

    Rate this question:

  • 3. 

    Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?

    • A.

      Teardrop

    • B.

      Land

    • C.

      Smurf

    • D.

      Cross-site scripting (XSS)

    Correct Answer
    C. Smurf
    Explanation
    The likely attack taking place is a Smurf attack. In a Smurf attack, the attacker sends a large number of ICMP echo requests (pings) to a network's broadcast address, with the source address spoofed as the victim's IP address. The broadcast address causes all devices on the network to respond with ICMP echo replies, overwhelming the victim's network with excessive traffic. This results in the situation where the ICMP echo replies coming into the network exceed the ICMP echo requests leaving the network.

    Rate this question:

  • 4. 

    What type of firewall security feature limits the volume of traffic from individual hosts?

    • A.

      Loop protection

    • B.

      Network separation

    • C.

      Stateful inspection

    • D.

      Flood guard

    Correct Answer
    D. Flood guard
    Explanation
    Flood guard is a type of firewall security feature that limits the volume of traffic from individual hosts. It helps prevent network congestion and protects against denial-of-service (DoS) attacks by monitoring and controlling the amount of traffic that can be sent from a single source. By setting thresholds and rate limits, flood guard ensures that excessive traffic from a particular host is blocked or limited, thereby maintaining the overall network performance and security.

    Rate this question:

  • 5. 

    Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

    • A.

      Packet filtering

    • B.

      Application proxying

    • C.

      Stateful inspection

    • D.

      Network address translation

    Correct Answer
    B. Application proxying
    Explanation
    The correct answer is Application proxying. This technology involves opening separate connections between the devices on both sides of the firewall. It acts as an intermediary between the client and the server, allowing the firewall to inspect and filter the traffic at the application layer. This provides an additional layer of security by analyzing the content and behavior of the application traffic.

    Rate this question:

  • 6. 

    What firewall approach is shown in the figure?

    • A.

      Border firewall

    • B.

      Bastion host

    • C.

      Screened subnet

    • D.

      Multilayered firewall 

    Correct Answer
    C. Screened subnet
    Explanation
    The correct answer is "Screened subnet". In the figure, there is a firewall separating an internal network from an external network. This configuration is known as a screened subnet, where the firewall acts as a buffer zone between the internal network and the external network. The screened subnet approach provides an additional layer of security by adding an extra network segment between the internal and external networks, making it more difficult for attackers to gain unauthorized access to the internal network.

    Rate this question:

  • 7. 

    What is NOT a service commonly offered by unified threat management (UTM) devices?

    • A.

      URL filtering

    • B.

      Wireless network access

    • C.

      Malware inspection

    • D.

      Content inspection

    Correct Answer
    B. Wireless network access
    Explanation
    Unified threat management (UTM) devices commonly offer services such as URL filtering, malware inspection, and content inspection. However, wireless network access is not typically offered by UTM devices. UTM devices are primarily designed to provide security functions such as firewall, intrusion prevention, and virtual private network (VPN) capabilities, rather than wireless network access. Therefore, wireless network access is not a service commonly offered by UTM devices.

    Rate this question:

  • 8. 

    Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?

    • A.

      Firewall

    • B.

      Unified threat management (UTM)

    • C.

      Router

    • D.

      VPN concentrator

    Correct Answer
    D. VPN concentrator
    Explanation
    Bob should use a VPN concentrator because it is specifically designed to handle high-volume VPN traffic. A VPN concentrator is a device that is optimized for processing VPN connections and can handle a large number of simultaneous connections. It provides secure and efficient VPN connectivity for multiple users or devices. A firewall, UTM, or router may not have the necessary processing power or capabilities to handle the high volume of VPN traffic that Bob requires.

    Rate this question:

  • 9. 

    What wireless security technology contains significant flaws and should never be used?

    • A.

      Wired Equivalent Privacy (WEP)

    • B.

      Wi-Fi Protected Access (WPA)

    • C.

      WPA2

    • D.

      Remote Authentication Dial-In User Service (RADIUS)

    Correct Answer
    A. Wired Equivalent Privacy (WEP)
    Explanation
    Wired Equivalent Privacy (WEP) is the correct answer because it is an outdated wireless security technology that contains significant flaws. WEP encryption is easily cracked, making it vulnerable to unauthorized access and data breaches. It is no longer recommended for use and has been replaced by more secure options such as WPA and WPA2.

    Rate this question:

  • 10. 

    Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

    • A.

      Radius

    • B.

      LEAP

    • C.

      Captive portal

    • D.

      PEAP

    Correct Answer
    C. Captive portal
    Explanation
    Karen should deploy a captive portal technology. A captive portal is a web page that is displayed to users when they connect to a network. It requires users to authenticate or agree to terms and conditions before gaining access to the network. This technology is commonly used in hotels and other public Wi-Fi networks to provide a secure and controlled access to the internet.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 16, 2018
    Quiz Created by
    Mekaelejigu
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.