Firewall Network Security System Quiz Questions

100 Questions | Total Attempts: 365

SettingsSettingsSettings
Please wait...
Firewall Network Security System Quiz Questions

Advanced technology using computers have made everything simple and quick but it has also increased insecurity. Firewall network security system is where owners prevent entry on unknown users to a network. Find out more below.


Questions and Answers
  • 1. 
    What statement best describes the difference between an Adaptation and an adaptation module?
    • A. 

      An adaptation module can be used only once. An Adaptation can be used many times.

    • B. 

      An adaptation module is a container extension. An Adaptation is a database record within the Adaptations collection.

    • C. 

      An adaptation module references an Adaptation. An Adaptation does not reference an adaptation module.

    • D. 

      An adaptation module is configured by the administration. An Adaptation is pre-built and is loaded as a container extension.

  • 2. 
    Which statement best describes how a Routing Policy could be configured to be active on Saturday morning and Sunday afternoon?
    • A. 

      Create a Time Range. Select Saturday and set the start and end time for morning. Select Sunday and set start and end time for afternoon. Add Time Range to Routing Policy

    • B. 

      Create a Time Range. Select Saturday and select morning. Select Sunday and select afternoon. Add Time Range to Routing Policy

    • C. 

      Create a Time Range. Create a Routing Policy for Saturday Morning. Create a second Routing Policy for Sunday afternoon. Add both Routing Policies to the Time Range.

    • D. 

      Create a Time Range. Select Saturday and set start and end time for morning. Create another Time Range. Select Sunday and set start and end time for afternoon. Add both Time Ranges to Routing Policy.

  • 3. 
    Administrative interactions between System Manager and Session Manager are carried over _______.
    • A. 

      HTTP

    • B. 

      HTTPS

    • C. 

      SIP

    • D. 

      Secure JMX

  • 4. 
    What happens to a request that contains a Request URI which includes a domain name that is not a recognized SIP Domain?
    • A. 

      Nothing

    • B. 

      The request is rejected

    • C. 

      The request is processed as normal, including NRP routing

    • D. 

      The un-known domain is resolved and the request is proxied downstream

    • E. 

      Session Manger crashes

  • 5. 
    How does Session Manager invoke a feature on an IMS type Feature Server
    • A. 

      It adds a route header to the request, addressed to the feature server

    • B. 

      It changes the request URI of the request, and sends it to the feature server

    • C. 

      It never addresses a feature server

    • D. 

      It changes the to header of the request, and send it to the feature server SM100

  • 6. 
    Which statements about Session Manager redundancy are true? (Check all that apply.)
    • A. 

      Primary Session Manager and Secondary Session Managers are installed using the same installer

    • B. 

      Primary Session Managers and Branch Session Managers are installed using the same installer

    • C. 

      After installation Session Manager instances are configured to be either Primary Session Managers or Secondary Session Managers

  • 7. 
    In which Session Manager context do we use the terms 'ingress' and 'egress'?
    • A. 

      Authentication

    • B. 

      Name resolutions

    • C. 

      Adaptations

    • D. 

      Firewall

  • 8. 
    Which statement about adaptation modules is NOT true?
    • A. 

      An adaptation module is a pluggable component that is deployed in the Service Host container as a container extension

    • B. 

      Adaptation modules are typically designed to cater for the needs of equipment from particular vendors.

    • C. 

      Using pluggable adaptations help make Session Manager future proof

    • D. 

      Adaptation modules are deployed through the SM 100 configuration pages

  • 9. 
    What statement best describes PPM?
    • A. 

      PPM stands for Personal Profile Manager policy

    • B. 

      PPM is the process through which CM synchronized phone settings with Session Manager

    • C. 

      PPM is the repository of phone settings from which SIP stations retrieve their settings when a user logs in

    • D. 

      PPM is the process through which behaviors and settings are dynamically downloaded to the phone dependent on the specific user logging in

  • 10. 
    It is possible for SIP Entity record to represent a set of redundant network devices. How is the notion of a set of redundant devices detailed on a single SIP Entity record?
    • A. 

      The 'Redundant devices' check box in the SIP Entity record is checked

    • B. 

      The IP address of each redundant device is entered in the SIP entity record

    • C. 

      The address of the combined Entity is entered as a FQDN in the SIP Entity record

    • D. 

      It is not possible for SIP Entities to be redundant

  • 11. 
    What is the minimum number of physical servers required for a Session Manager Instance
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 12. 
    Which item of data is NOT included in a Location record?
    • A. 

      Location name

    • B. 

      IP address pattern

    • C. 

      Bandwidth allocation

    • D. 

      Time zone

  • 13. 
    What is the purpose of the P-Avaya-Transport header?
    • A. 

      It is used to carry a Free-Pass token used to authenticate the caller

    • B. 

      It is used to carry a Free-Pass token that signifies this call should not be billed

    • C. 

      It tells Avaya's Session Manager which transport protocol is to be used as the request is routed toward the destination

    • D. 

      There is no such header. The P-Avaya-Transport header does not exist

  • 14. 
    Session Manager uses two physical network adaptors. Which statement best describes the reason for the two adaptors?
    • A. 

      They both actively receive network traffic, providing an active / active model of server redundancy

    • B. 

      One is for signaling traffic and the other is for management traffic

    • C. 

      One belongs to the SM 100 and the other to the server box

    • D. 

      The primary adapter receives all network traffic, whilst the secondary is on 'hot stand bye', ready to take over if anything goes wrong with the first

  • 15. 
    Branch Session Managers have exact local copies of core Session Manager data, meaning BSM's apply the same processing and routing as would their core cousins.
    • A. 

      True

    • B. 

      False

  • 16. 
    One of three possible actions can be applied to packets that do not pass firewall checks. Which item from the list below is NOT one such action
    • A. 

      Drop packet

    • B. 

      Rate Limit

    • C. 

      Rate Block

    • D. 

      Quarantine

  • 17. 
    What statement best describes the Entity Link?
    • A. 

      An Entity Link is the network connection between Session Manger and one of its SIP Entities

    • B. 

      An Entity Link is the relationship between Session Manager and one of its SIP Entities

    • C. 

      An Entity Link is another word for a SIP Trunk or a VPN tunnel

    • D. 

      An Entity Link is another word for a SIP Entity

  • 18. 
    Which statement best describes the Rate Limit firewall action?
    • A. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop all packets from that source

    • B. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop some packets from that source

    • C. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop any packets from that source that exceed the threshold

    • D. 

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then add the source address to the Black list

  • 19. 
    What is the purpose of the White List firewall check?
    • A. 

      If the White list is activated, no packets are allowed through the firewall unless the source is listed on the white list

    • B. 

      If the source is listed on the White List, allow all packets through without further checks, regardless of other conditions

    • C. 

      If the source is listed on the White List, block all packets without further checks

    • D. 

      If the source is listed on the White List, mark the packet as having priority and send it to the front of the queue for processing

  • 20. 
    Session Manager provisions the required network bandwidth to each of its locations.
    • A. 

      True

    • B. 

      False

  • 21. 
    Session Manager makes significant use of collections of data stored on a database. Which statement below is NOT true?
    • A. 

      Session Manager combines data from the collections to determine routing of signaling requests

    • B. 

      Session Manager queries data from the collections to validate a SIP Entity

    • C. 

      Session Manager queries data from the collection to determine how much bandwidth is allocated to a location

    • D. 

      Session Manager queries adaptation patterns from a collection to determine how a SIP message should be adapted

  • 22. 
    Which statement about Roting Policies is true?
    • A. 

      A Routing Policy references one or more SIP Entities and one or more Time Ranges

    • B. 

      A Routing Policy references one Time Range and one or more Dial Patterns

    • C. 

      A Routing Policy references one Dial Pattern and one SIP Entity

    • D. 

      A Routing Policy references one SIP Entity and one or more Time Ranges

  • 23. 
    What statement most accurately describes the process of authenticating a user during registration?
    • A. 

      ASM checks the received Register request for a valid password. Only if it exists is the registration data written to the registry and the User Profile updated.

    • B. 

      After checking that a User Profile exists, ASM returns an error response to the initial Register request, prompting the user for log on credentials. Only when received and validated against details in the User Profile is the user authenticated.

    • C. 

      Users ensure that all requred log on credentials are included in the Register request. ASM compares the users details with those recorded in the Registry. If they match, the user is authenticated and the registration completes.

    • D. 

      A Register request must contain the user's identifier (handle or extension ID) and the actual location of the SIP phone on which he would like to make his calls. If correct, the user is authenticated and the data is written to the registry.

  • 24. 
    How many network cables are typically plugged in to a Session Manager box?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 25. 
    What item of data is NOT found on a SIP Entity record
    • A. 

      A reference to an Entity Link

    • B. 

      A time zone

    • C. 

      An IP Address or FQDN

    • D. 

      Timer B

    • E. 

      A reference to an Adaptation

Back to Top Back to top