|
|
1. | Which of the following devices is the most capable of providing infrastructure security?
|
|
2. | A packet filter performs which function?
|
|
3. | Which device stores information about destinations in a network?
|
|
4. | Which device acts primarily as a tool to improve network efficiency?
|
|
5. | Which device is often used to integrate voice and data services onto a single WAN?
|
|
6. | Which protocol is widely used today as a transport protocol for Internet dial-up connections?
|
|
7. | Which protocol is unsuitable for WAN VPN connections?
|
|
8. | Which protocol is not a tunneling protocol but is used by tunneling protocols for network security?
|
|
9. | A socket is a combination of which components?
|
|
10. | Which protocol is becoming the newest standard for Internet mail applications?
|
|
11. | Which protocol is primarily used for network maintenance and destination information?
|
|
12. | Which protocol is used for group messages or multicast messaging?
|
|
13. | Which device monitors network traffic in a passive manner?
|
|
14. | Which system performs active network monitoring and analysis and can take proactive steps to protect a network?
|
|
15. | Which media is broken down into seven categories depending on capability?
|
|
16. | Which media is the least susceptible to interception or tapping?
|
|
17. | Which media offers line-of-sight broadband and baseband capabilities?
|
|
18. | Which media is used primarily for backup and archiving purposes?
|
|
19. | Which media is susceptible to viruses?
|
|
20. | Which device is used for access control as well as storage of information?
|
|
Answers
1. | C. Routers can be configured in many instances to act as packet-filtering firewalls. When configured properly, they can prevent unauthorized ports from being opened. |
2. | A. Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a type of firewall that block specified port traffic. |
3. | D. Routers store information about network destinations in routing tables. These tables contain information about known hosts on both sides of the router. |
4. | B. Switches create virtual circuits between systems in a network. These virtual circuits are somewhat private and reduce network traffic when used. |
5. | B. Many modern PBX or Private Branch Exchange systems integrate voice and data onto a single data connection to your phone service provider. In some cases, this allows an overall reduction in costs of operations. These connections are made using existing network connections such as a T1 or T3 network. |
6. | B. SLIP connections have largely been replaced by PPP connections in dial-up Internet connections. SLIP passes only TCP/IP traffic, and PPP can pass multiple protocols. |
7. | A. PPP provides no security and all activities are unsecure. PPP is primarily intended for dial-up connections and should never be used for VPN connections. |
8. | A. IPSec provides network security for tunneling protocols. IPSec can be used with many different protocols besides TCP/IP, and it has two modes of security. |
9. | D. A socket is a combination of IP address and port number. The socket identifies which application will respond to the network request. |
10. | C. IMAP is becoming the most popular standard for e-mail clients and is replacing POP protocols for mail systems. IMAP allows mail to be forwarded and stored in information areas called stores. |
11. | A. ICMP is used for destination and error reporting functions in TCP/IP. ICMP is routable and is used by programs such as Ping and Traceroute. |
12. | C. IGMP is used for group messaging and multicasting. IGMP protocol maintains a list of systems that belong to a message group. When a message is sent to a particular group, each system receives an individual copy. |
13. | A. Sniffers monitor network traffic and display traffic in real time. Sniffers, also called network monitors, were originally designed for network maintenance and troubleshooting. |
14. | A. IDS are used to protect and report network abnormalities to a network administrator or system. An IDS works with audit files and rules-based processing to determine how to act in the event of an unusual situation on the network. |
15. | B. UTP is broken down into seven categories that define bandwidth and performance. The most common category is CAT 5, which allows 100Mbps bandwidth. CAT 5 cabling is most frequently used with 100Base-T networks. |
16. | D. Fiber networks are considered the most secure, although they can be tapped. Fiber networks use a plastic or glass conductor and pass light waves generated by a laser. |
17. | C. Microwave communications systems can offer huge bandwidth and operate in either baseband or broadband capabilities. Baseband communications is a single channel, while broadband is a multi- channel environment. |
18. | A. The most common backup and archiving media in large systems is tape. Tape provides the highest density storage in the smallest package of the choices given. CD-R and removable hard drives may also be used, but they generally do not have the storage capacity of equivalent tape cartridges. |
19. | D. All of these devices can store and pass viruses to uninfected systems. Make sure that all files are scanned for viruses before they are copied to these media. |
20. | B. Smart cards are used for access control, and they can contain a small amount of information. Smart cards are replacing magnetic cards, in many instances, because they can store additional personal information and are harder to copy or counterfeit. |
|
|