Network Technologies And Tools Quiz!

14 Questions | Total Attempts: 215

SettingsSettingsSettings
Network Technologies And Tools Quiz! - Quiz

.


Questions and Answers
  • 1. 
    Your organization’s security policy requires that PII data-in-transit must be encrypted. Which of the following protocols would BEST meet this requirement?
    • A. 

      FTP

    • B. 

      SSH

    • C. 

      SMTP

    • D. 

      HTTP

  • 2. 
    Marge needs to collect network device configuration information and network statistics from devices on the network. She wants to protect the confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need?
    • A. 

      SSH

    • B. 

      FTPS

    • C. 

      SNMPv3

    • D. 

      TLS

  • 3. 
    Lisa is enabling NTP on some servers within the DMZ. Which of the following use cases is she MOST likely supporting this action?
    • A. 

      Support voice and video transmissions

    • B. 

      Provide time synchronization

    • C. 

      Enable email usage

    • D. 

      Encrypt data-in-transit

  • 4. 
    Your organization wants to increase security for VoIP and video teleconferencing applications used within the network. Which of the following protocols will BEST support this goal?
    • A. 

      SMTP

    • B. 

      TLS

    • C. 

      SFTP

    • D. 

      SRTP

  • 5. 
    Management within your organization wants to ensure that switches are not susceptible to switching loop problems. Which of the following protocols is the BEST choice to meet this need?
    • A. 

      Flood guard

    • B. 

      SNMPv3

    • C. 

      SRTP

    • D. 

      RSTP

  • 6. 
    A network technician incorrectly wired the switch connections in your organization’s network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. Which of the following should be done to prevent this situation in the future?
    • A. 

      Install an IDS.

    • B. 

      Only use Layer 2 switches.

    • C. 

      Install SNMPv3 on the switches.

    • D. 

      Implement STP or RSTP.

  • 7. 
    Developers recently configured a new service on ServerA. ServerA is in a DMZ and accessed by internal users and via the Internet. Network administrators modified firewall rules to access the service. Testing shows the service works when accessed from internal systems. However, it does not work when accessed from the Internet. Which of the following is MOST likely configured incorrectly?
    • A. 

      The new service

    • B. 

      An ACL

    • C. 

      ServerA

    • D. 

      The VLAN

  • 8. 
    You manage a Linux computer used for security within your network. You plan to use it to inspect and handle network-based traffic using iptables. Which of the following network devices can this replace?
    • A. 

      Wireless access point

    • B. 

      Firewall

    • C. 

      Layer 2 switch

    • D. 

      Bridge

  • 9. 
    You need to implement antispoofing on a border router. Which one of the following choices will BEST meet this goal?
    • A. 

      Create rules to block all outgoing traffic from a private IP address.

    • B. 

      Implement a flood guard on switches.

    • C. 

      Add a web application firewall.

    • D. 

      Create rules to block all incoming traffic from a private IP address.

  • 10. 
    An organization has recently had several attacks against servers within a DMZ. Security administrators discovered that many of these attacks are using TCP, but they did not start with a three-way handshake. Which of the following devices provides the BEST solution?
    • A. 

      Stateless firewall

    • B. 

      Stateful firewall

    • C. 

      Network firewall

    • D. 

      Application-based firewall

  • 11. 
    Your organization hosts a web server and wants to increase its security. You need to separate all web-facing traffic from internal network traffic. Which of the following provides the BEST solution?
    • A. 

      DMZ

    • B. 

      VLAN

    • C. 

      Firewall

    • D. 

      WAF

  • 12. 
    Management at your organization wants to prevent employees from accessing social media sites using company-owned computers. Which of the following devices would you implement?
    • A. 

      Transparent proxy

    • B. 

      Reverse proxy

    • C. 

      Nontransparent proxy

    • D. 

      Caching proxy

  • 13. 
    You need to configure a UTM security appliance to restrict traffic going to social media sites. Which of the following are you MOST likely to configure?
    • A. 

      Content inspection

    • B. 

      Malware inspection

    • C. 

      URL filter

    • D. 

      DDoS mitigator

  • 14. 
    Your organization recently purchased a sophisticated security appliance that includes a DDoS mitigator. Where should you place this device?
    • A. 

      Within the DMZ

    • B. 

      At the border of the network, between the intranet and the DMZ

    • C. 

      At the border of the network, between the private network and the Internet

    • D. 

      In the internal network

Back to Top Back to top