Security + Network Infrastructure

41 Questions | Total Attempts: 187

SettingsSettingsSettings
Security Plus Quizzes & Trivia

In this day and age, it’s important to know about the ins and outs of security and network infrastructure when it comes to computers, due to the dangers involved with using them. Do you know as much as you should?


Questions and Answers
  • 1. 
    Which of the following is a private internal network implemented and maintained by an individual company or organization?
    • A. 

      Intranet

    • B. 

      Extranet

    • C. 

      DMZ

    • D. 

      Internet

  • 2. 
    Which of the following is a Class A private address?
    • A. 

      10.16.3.7

    • B. 

      127.0.86.1

    • C. 

      172.30.67.90

    • D. 

      192.168.5.8

  • 3. 
    Which of the following protocols operate at the TCP/IP application layer?
    • A. 

      TCP

    • B. 

      SMTP

    • C. 

      IP

    • D. 

      UDP

  • 4. 
    Which of the following protocols does not operate at the application layer of the TCP/IP architecture?
    • A. 

      ARP

    • B. 

      FTP

    • C. 

      POP

    • D. 

      DNS

  • 5. 
    Which of the following is a private network that also includes outside partners?
    • A. 

      Intranet

    • B. 

      Extranet

    • C. 

      DMZ

    • D. 

      Internet

  • 6. 
    Which of the following protocols does not operate at the Internet layer of the TCP/IP architecture?
    • A. 

      ICMP

    • B. 

      IGMP

    • C. 

      RIP

    • D. 

      ARP

  • 7. 
    Which well-known UDP port is used for an SNMP trap?
    • A. 

      137

    • B. 

      138

    • C. 

      161

    • D. 

      162

  • 8. 
    What application interface does a Windows-based operating system use to communicate with TCP/IP?
    • A. 

      NWLink

    • B. 

      WinSock

    • C. 

      IP Link

    • D. 

      NDS

  • 9. 
    Which of the following is a device that captures and displays network traffic?
    • A. 

      Scanner

    • B. 

      Freezer

    • C. 

      Sniffer

    • D. 

      Watchdog

  • 10. 
    Which of the following is a protocol/service used to resolve host names to IP addresses?
    • A. 

      FTP

    • B. 

      ICMP

    • C. 

      Telnet

    • D. 

      DNS

  • 11. 
    In a three-way handshake, what is the first message sent?
    • A. 

      ACK

    • B. 

      SYN

    • C. 

      SYN/ACK

    • D. 

      RDRAM

  • 12. 
    Which of the following is an area where public server access is made available to people you might not trust?
    • A. 

      Intranet

    • B. 

      Extranet

    • C. 

      DMZ

    • D. 

      Internet

  • 13. 
    Which of the following is a Class B private address?
    • A. 

      10.16.3.7

    • B. 

      127.0.86.1

    • C. 

      172.30.67.90

    • D. 

      192.168.5.8

  • 14. 
    Which of the following commands can be used to tell you whether port 25 is available on the host edulaney?
    • A. 

      Bounce www.edulaney.com/25

    • B. 

      Traceroute www.edulaney.com (25)

    • C. 

      Ping www.edulaney.com:25

    • D. 

      Telnet www.edulaney.com 25

  • 15. 
    What type of broadcast is used in a smurf attack?
    • A. 

      RIP

    • B. 

      IGRP

    • C. 

      ICMP

    • D. 

      DNS

  • 16. 
    Which well-known UDP port is used by the NetBIOS datagram service?
    • A. 

      137

    • B. 

      138

    • C. 

      161

    • D. 

      162

  • 17. 
    Which of the following is a protocol/service used to verify that remote hosts are reachable?
    • A. 

      FTP

    • B. 

      ICMP

    • C. 

      Telnet

    • D. 

      DNS

  • 18. 
    Which of the following is a Class C private address?
    • A. 

      10.16.3.7

    • B. 

      127.0.86.1

    • C. 

      172.30.67.90

    • D. 

      192.168.5.8

  • 19. 
    Which well-known UDP port is used by the NetBIOS name service?
    • A. 

      137

    • B. 

      138

    • C. 

      161

    • D. 

      162

  • 20. 
    In a three-way handshake, what is the third message sent?
    • A. 

      ACK

    • B. 

      SYN

    • C. 

      SYN/ACK

    • D. 

      RDRAM

  • 21. 
    Which of the following is a protocol/service used to transfer files from one host to another?
    • A. 

      FTP

    • B. 

      ICMP

    • C. 

      Telnet

    • D. 

      DNS

  • 22. 
    Which of the following protocols operate at the TCP/IP Internet layer?
    • A. 

      TCP

    • B. 

      SMTP

    • C. 

      IP

    • D. 

      UDP

  • 23. 
    Which well-known UDP port is used for standard SNMP traffic?
    • A. 

      137

    • B. 

      138

    • C. 

      161

    • D. 

      162

  • 24. 
    In a three-way handshake, what is the second message sent?
    • A. 

      ACK

    • B. 

      SYN

    • C. 

      SYN/ACK

    • D. 

      RDRAM

  • 25. 
    Which of the following protocols operate at the TCP/IP host-to-host layer? (Choose all that apply.)
    • A. 

      TCP

    • B. 

      SMTP

    • C. 

      IP

    • D. 

      UDP

Back to Top Back to top