Firewall Network Security System Quiz Questions

160 Questions | Attempts: 399
Share

SettingsSettingsSettings
Firewall Network Security System Quiz Questions - Quiz

Advanced technology using computers have made everything simple and quick but it has also increased insecurity. Firewall network security system is where owners prevent entry on unknown users to a network. Find out more below.


Questions and Answers
  • 1. 

    What statement best describes the difference between an Adaptation and an adaptation module?

    • A.

      An adaptation module can be used only once. An Adaptation can be used many times.

    • B.

      An adaptation module is a container extension. An Adaptation is a database record within the Adaptations collection.

    • C.

      An adaptation module references an Adaptation. An Adaptation does not reference an adaptation module.

    • D.

      An adaptation module is configured by the administration. An Adaptation is pre-built and is loaded as a container extension.

    Correct Answer
    B. An adaptation module is a container extension. An Adaptation is a database record within the Adaptations collection.
  • 2. 

    Which statement best describes how a Routing Policy could be configured to be active on Saturday morning and Sunday afternoon?

    • A.

      Create a Time Range. Select Saturday and set the start and end time for morning. Select Sunday and set start and end time for afternoon. Add Time Range to Routing Policy

    • B.

      Create a Time Range. Select Saturday and select morning. Select Sunday and select afternoon. Add Time Range to Routing Policy

    • C.

      Create a Time Range. Create a Routing Policy for Saturday Morning. Create a second Routing Policy for Sunday afternoon. Add both Routing Policies to the Time Range.

    • D.

      Create a Time Range. Select Saturday and set start and end time for morning. Create another Time Range. Select Sunday and set start and end time for afternoon. Add both Time Ranges to Routing Policy.

    Correct Answer
    D. Create a Time Range. Select Saturday and set start and end time for morning. Create another Time Range. Select Sunday and set start and end time for afternoon. Add both Time Ranges to Routing Policy.
  • 3. 

    Administrative interactions between System Manager and Session Manager are carried over _______.

    • A.

      HTTP

    • B.

      HTTPS

    • C.

      SIP

    • D.

      Secure JMX

    Correct Answer
    D. Secure JMX
  • 4. 

    What happens to a request that contains a Request URI which includes a domain name that is not a recognized SIP Domain?

    • A.

      Nothing

    • B.

      The request is rejected

    • C.

      The request is processed as normal, including NRP routing

    • D.

      The un-known domain is resolved and the request is proxied downstream

    • E.

      Session Manger crashes

    Correct Answer
    D. The un-known domain is resolved and the request is proxied downstream
  • 5. 

    How does Session Manager invoke a feature on an IMS type Feature Server

    • A.

      It adds a route header to the request, addressed to the feature server

    • B.

      It changes the request URI of the request, and sends it to the feature server

    • C.

      It never addresses a feature server

    • D.

      It changes the to header of the request, and send it to the feature server SM100

    Correct Answer
    A. It adds a route header to the request, addressed to the feature server
  • 6. 

    Which statements about Session Manager redundancy are true? (Check all that apply.)

    • A.

      Primary Session Manager and Secondary Session Managers are installed using the same installer

    • B.

      Primary Session Managers and Branch Session Managers are installed using the same installer

    • C.

      After installation Session Manager instances are configured to be either Primary Session Managers or Secondary Session Managers

    Correct Answer
    A. Primary Session Manager and Secondary Session Managers are installed using the same installer
  • 7. 

    In which Session Manager context do we use the terms 'ingress' and 'egress'?

    • A.

      Authentication

    • B.

      Name resolutions

    • C.

      Adaptations

    • D.

      Firewall

    Correct Answer
    C. Adaptations
  • 8. 

    Which statement about adaptation modules is NOT true?

    • A.

      An adaptation module is a pluggable component that is deployed in the Service Host container as a container extension

    • B.

      Adaptation modules are typically designed to cater for the needs of equipment from particular vendors.

    • C.

      Using pluggable adaptations help make Session Manager future proof

    • D.

      Adaptation modules are deployed through the SM 100 configuration pages

    Correct Answer
    D. Adaptation modules are deployed through the SM 100 configuration pages
  • 9. 

    What statement best describes PPM?

    • A.

      PPM stands for Personal Profile Manager policy

    • B.

      PPM is the process through which CM synchronized phone settings with Session Manager

    • C.

      PPM is the repository of phone settings from which SIP stations retrieve their settings when a user logs in

    • D.

      PPM is the process through which behaviors and settings are dynamically downloaded to the phone dependent on the specific user logging in

    Correct Answer
    D. PPM is the process through which behaviors and settings are dynamically downloaded to the phone dependent on the specific user logging in
  • 10. 

    It is possible for SIP Entity record to represent a set of redundant network devices. How is the notion of a set of redundant devices detailed on a single SIP Entity record?

    • A.

      The 'Redundant devices' check box in the SIP Entity record is checked

    • B.

      The IP address of each redundant device is entered in the SIP entity record

    • C.

      The address of the combined Entity is entered as a FQDN in the SIP Entity record

    • D.

      It is not possible for SIP Entities to be redundant

    Correct Answer
    C. The address of the combined Entity is entered as a FQDN in the SIP Entity record
  • 11. 

    What is the minimum number of physical servers required for a Session Manager Instance

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    A. 1
  • 12. 

    Which item of data is NOT included in a Location record?

    • A.

      Location name

    • B.

      IP address pattern

    • C.

      Bandwidth allocation

    • D.

      Time zone

    Correct Answer
    D. Time zone
  • 13. 

    What is the purpose of the P-Avaya-Transport header?

    • A.

      It is used to carry a Free-Pass token used to authenticate the caller

    • B.

      It is used to carry a Free-Pass token that signifies this call should not be billed

    • C.

      It tells Avaya's Session Manager which transport protocol is to be used as the request is routed toward the destination

    • D.

      There is no such header. The P-Avaya-Transport header does not exist

    Correct Answer
    A. It is used to carry a Free-Pass token used to authenticate the caller
  • 14. 

    Session Manager uses two physical network adaptors. Which statement best describes the reason for the two adaptors?

    • A.

      They both actively receive network traffic, providing an active / active model of server redundancy

    • B.

      One is for signaling traffic and the other is for management traffic

    • C.

      One belongs to the SM 100 and the other to the server box

    • D.

      The primary adapter receives all network traffic, whilst the secondary is on 'hot stand bye', ready to take over if anything goes wrong with the first

    Correct Answer
    B. One is for signaling traffic and the other is for management traffic
  • 15. 

    Branch Session Managers have exact local copies of core Session Manager data, meaning BSM's apply the same processing and routing as would their core cousins.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 16. 

    One of three possible actions can be applied to packets that do not pass firewall checks. Which item from the list below is NOT one such action

    • A.

      Drop packet

    • B.

      Rate Limit

    • C.

      Rate Block

    • D.

      Quarantine

    Correct Answer
    D. Quarantine
  • 17. 

    What statement best describes the Entity Link?

    • A.

      An Entity Link is the network connection between Session Manger and one of its SIP Entities

    • B.

      An Entity Link is the relationship between Session Manager and one of its SIP Entities

    • C.

      An Entity Link is another word for a SIP Trunk or a VPN tunnel

    • D.

      An Entity Link is another word for a SIP Entity

    Correct Answer
    B. An Entity Link is the relationship between Session Manager and one of its SIP Entities
  • 18. 

    Which statement best describes the Rate Limit firewall action?

    • A.

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop all packets from that source

    • B.

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop some packets from that source

    • C.

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop any packets from that source that exceed the threshold

    • D.

      If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then add the source address to the Black list

    Correct Answer
    C. If the number of packets sent over a given period from a source exceeds a defined acceptable limit, then drop any packets from that source that exceed the threshold
  • 19. 

    What is the purpose of the White List firewall check?

    • A.

      If the White list is activated, no packets are allowed through the firewall unless the source is listed on the white list

    • B.

      If the source is listed on the White List, allow all packets through without further checks, regardless of other conditions

    • C.

      If the source is listed on the White List, block all packets without further checks

    • D.

      If the source is listed on the White List, mark the packet as having priority and send it to the front of the queue for processing

    Correct Answer
    B. If the source is listed on the White List, allow all packets through without further checks, regardless of other conditions
  • 20. 

    Session Manager provisions the required network bandwidth to each of its locations.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 21. 

    Session Manager makes significant use of collections of data stored on a database. Which statement below is NOT true?

    • A.

      Session Manager combines data from the collections to determine routing of signaling requests

    • B.

      Session Manager queries data from the collections to validate a SIP Entity

    • C.

      Session Manager queries data from the collection to determine how much bandwidth is allocated to a location

    • D.

      Session Manager queries adaptation patterns from a collection to determine how a SIP message should be adapted

    Correct Answer
    D. Session Manager queries adaptation patterns from a collection to determine how a SIP message should be adapted
  • 22. 

    Which statement about Roting Policies is true?

    • A.

      A Routing Policy references one or more SIP Entities and one or more Time Ranges

    • B.

      A Routing Policy references one Time Range and one or more Dial Patterns

    • C.

      A Routing Policy references one Dial Pattern and one SIP Entity

    • D.

      A Routing Policy references one SIP Entity and one or more Time Ranges

    Correct Answer
    D. A Routing Policy references one SIP Entity and one or more Time Ranges
  • 23. 

    What statement most accurately describes the process of authenticating a user during registration?

    • A.

      ASM checks the received Register request for a valid password. Only if it exists is the registration data written to the registry and the User Profile updated.

    • B.

      After checking that a User Profile exists, ASM returns an error response to the initial Register request, prompting the user for log on credentials. Only when received and validated against details in the User Profile is the user authenticated.

    • C.

      Users ensure that all requred log on credentials are included in the Register request. ASM compares the users details with those recorded in the Registry. If they match, the user is authenticated and the registration completes.

    • D.

      A Register request must contain the user's identifier (handle or extension ID) and the actual location of the SIP phone on which he would like to make his calls. If correct, the user is authenticated and the data is written to the registry.

    Correct Answer
    B. After checking that a User Profile exists, ASM returns an error response to the initial Register request, prompting the user for log on credentials. Only when received and validated against details in the User Profile is the user authenticated.
  • 24. 

    How many network cables are typically plugged in to a Session Manager box?

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    Correct Answer
    B. 2
  • 25. 

    What item of data is NOT found on a SIP Entity record

    • A.

      A reference to an Entity Link

    • B.

      A time zone

    • C.

      An IP Address or FQDN

    • D.

      Timer B

    • E.

      A reference to an Adaptation

    Correct Answer
    A. A reference to an Entity Link
  • 26. 

    On receipt of each IP packet, the software SM100 component performs a number of checks. In which order are the checks made?

    • A.

      Black/White list, Network layer, SIP layer

    • B.

      SIP Layer, Network layer, Black/White list

    • C.

      Nework layer, SIP layer, Black/White list

    • D.

      Black/White list, SIP layer, Network layer

    Correct Answer
    A. Black/White list, Network layer, SIP layer
  • 27. 

    Session Manger makes significant use of collections of data stored on a database. Which database is not supported?

    • A.

      Postgres

    • B.

      Oracle

    • C.

      SQL Server

    Correct Answer
    C. SQL Server
  • 28. 

    A SIP phone may have knowledge of multiple Session Mangers. Which statement best describes which Session Manager a SIP phone will send its ougoing SIP invite requests to?

    • A.

      SIP phones send outgoing SIP invites to all the Session Mangers identified to them through PPM

    • B.

      SIP phones send outgoing SIP invites to all Session Managers to which they have registered

    • C.

      SIP Phones send outgoing SIP invites to the Session Manager to which they have subscribed

    • D.

      SIP phones send outgoing SIP invites to the first Session Managers to which they have registered

    Correct Answer
    C. SIP Phones send outgoing SIP invites to the Session Manager to which they have subscribed
  • 29. 

    The heart of the Session Manger application is a collection of ________ packaged in a SAR file.

    • A.

      JMX extensions

    • B.

      HTTP servlets

    • C.

      SIP extensions

    • D.

      SIP servlets

    Correct Answer
    D. SIP servlets
  • 30. 

    What is NOT a function of Call Admissions Control?

    • A.

      Checking of Free-Pass token found in the P-Avaya-Transport header

    • B.

      Re-routing of requests over the PSTN when the network bandwidth to a location is fully utilized

    • C.

      One Session Manager instance requesting a portion of another Session Manager's bandwidth allocation for a location

    Correct Answer
    A. Checking of Free-Pass token found in the P-Avaya-Transport header
  • 31. 

    What statement best describes the purpose for Timer B?

    • A.

      Timer B was named after Henning Schulzrinne's youngest son

    • B.

      Timer B determines the minimum duration for a SIP transaction, which is by default 32 seconds

    • C.

      Timer B is typically set to 4 or 5 seconds

    • D.

      Timer B is the time after which a request will be cancelled if a response has not yet been received

    Correct Answer
    D. Timer B is the time after which a request will be cancelled if a response has not yet been received
  • 32. 

    What statement best describes the process and purpose of SIP Monitoring?

    • A.

      The SM100 firewall monitors the rate of incoming SIP messages in order to prevent DOS attacks

    • B.

      At regular intervals, Session Manager sends OPTIONS requests to SIP Entities to check they are still able to receive and process SIP requests

    • C.

      At regular, configurable intervals, System Manager checks the SIP Registry to make sure it is not nearing capacity

    • D.

      Session Manager monitors the types of SIP requests it receives, in order to apply relevant processing

    Correct Answer
    B. At regular intervals, Session Manager sends OPTIONS requests to SIP Entities to check they are still able to receive and process SIP requests
  • 33. 

    What manual task must be administered to establish a working relationship between primary and secondary Session Managers?

    • A.

      Create an Entity Link between the two Session Managers

    • B.

      Synchronize the data repositories

    • C.

      Ensure the DNS is updated to reflect the domain names and IP addresses of the Session Managers

    • D.

      Copy the Routing Policies from Primary to Secondary

    Correct Answer
    A. Create an Entity Link between the two Session Managers
  • 34. 

    Before data can be replicated from the System Manager to the Session Manager, the Session Manager must first

    • A.

      Be rebooted

    • B.

      Register with the System Manager

    • C.

      Be defined as a Session Manager Instance

    Correct Answer
    B. Register with the System Manager
  • 35. 

    When is data replicated from the System Manager database to the Session Manager database?

    • A.

      By default, every 60 seconds

    • B.

      After a Session Manager instance is defined

    • C.

      During the installation process (initDRS)

    • D.

      Both A and C

    Correct Answer
    D. Both A and C
  • 36. 

    InitDRS cannot be run manually after installation.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 37. 

    The Trust Management Password is created by navigating to

    • A.

      InitTM

    • B.

      System Manager >> Security >> Certificates >> Enrollment Password

    • C.

      System Manager >> Change Password

    • D.

      System Manager >> Session Manager >> System State Administration

    Correct Answer
    B. System Manager >> Security >> Certificates >> Enrollment Password
  • 38. 

    Which of the following statements are true about Trust Management?

    • A.

      Enables Session Manager to accept requests from endpoints

    • B.

      Establishes Trust relationships between elements and applications

    • C.

      Trust Management provides credentials to enable mutually authenticated TLS sessions between elements

    • D.

      Allows endpoints to register with System Manager

    Correct Answer(s)
    B. Establishes Trust relationships between elements and applications
    C. Trust Management provides credentials to enable mutually authenticated TLS sessions between elements
  • 39. 

    You must run the Session Manager installer as user 'sroot'.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 40. 

    SMnetSetup is run as user 'craft'.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 41. 

    The SMnetSetup configures (select all that apply)

    • A.

      Eth0

    • B.

      Eth2

    • C.

      Date/Time

    • D.

      DNS settings

    Correct Answer(s)
    A. Eth0
    C. Date/Time
    D. DNS settings
  • 42. 

    Making sure the Session Manager and System Manager either have updated DNS records or updated 'hosts' files is important because

    • A.

      No Reason

    • B.

      The System Manager must know the FQDN of all Session Managers, and Session Managers must know the FQDN of the System Manager in order to begin accepting calls

    • C.

      The System Manager must know the FQDN of all Session Managers, and Session Managers must know the FQDN of the System Manager in order for Node Registration to work

    • D.

      None of the Above

    Correct Answer
    C. The System Manager must know the FQDN of all Session Managers, and Session Managers must know the FQDN of the System Manager in order for Node Registration to work
  • 43. 

    The Trust Management Password must be created before the Session Manager installer is executed.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 44. 

    Trust Management is initialized during the installation.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 45. 

    What will ./install.sh do if a Session Manager installation already exists?

    • A.

      Upgrade the existing installation

    • B.

      Uninstall and clean the existing installation and install a new installation

    • C.

      It will do nothing

    • D.

      Prompt you to upgrade or install fresh

    Correct Answer
    B. Uninstall and clean the existing installation and install a new installation
  • 46. 

    InitDRS can be run before a Session Manager successfully registers to the System Manager.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 47. 

    Restarting Watchdsv will not reboot which of the following services?

    • A.

      Sipas-mg

    • B.

      Sm-mgmt

    • C.

      Postgresql

    • D.

      Secmod

    Correct Answer
    C. Postgresql
  • 48. 

    The Session Manager installation is located under

    • A.

      /home/root

    • B.

      /home/craft

    • C.

      /opt

    • D.

      /opt/Avaya

    Correct Answer
    D. /opt/Avaya
  • 49. 

    During the initDRS process (Select all that apply.)

    • A.

      Data is copied from the System Manager database to the Session Manager database

    • B.

      Foreign key constraints are removed before data is copied

    • C.

      The Session Manager reboots

    • D.

      Foreign key constraints are replaced after data is copied

    Correct Answer(s)
    A. Data is copied from the System Manager database to the Session Manager database
    B. Foreign key constraints are removed before data is copied
    D. Foreign key constraints are replaced after data is copied
  • 50. 

    Session Manager logs can be found under

    • A.

      /home/root

    • B.

      /home/craft

    • C.

      /var/log/Avaya

    • D.

      /opt/Avaya

    Correct Answer
    C. /var/log/Avaya

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 22, 2011
    Quiz Created by
    Swalmsley11

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.