CHAPTER 9 ASSESSMENT

  1.   1. A ________ is a network that generally spans several city blocks.

  2.   2. A local resource is any resource connected to the local LAN.

    1. True

    2. False

  3.   3. Which of the following network devices connects networks that use different protocols?

    1. Switch

    2. Hub

    3. Gateway

    4. Router

  4.   4. ________ cabling provides very good protection from interference but is difficult to install.

  5.   5. Even the newest wireless protocols are slower than using high-quality physical cable.

    1. True

    2. False

  6.   6. Which LAN device commonly has the ability to filter packets and deny traffic based on the destination address?

    1. Router

    2. Gateway

    3. Hub

    4. Switch

  7.   7. A ________ is an untrusted network that contains Internet-facing servers and is separated from your trusted network by at least one firewall.

  8.   8. Which network device feature provides the ability to hide internal network node addresses?

    1. DMZ

    2. NAT

    3. STP

    4. OSI

  9.   9. Which network layer reference model includes four layers to describe how computers use multiple layers of protocol rules to communicate across a network?

    1. IEEE

    2. IPSec

    3. UDP

    4. TCP/IP

  10.   10. Which of the following actions is not an effective way to secure Windows services that you do not use?

    1. Stop it

    2. Disable it

    3. Block it

    4. Remove it

  11.   11. You should disable the ________ broadcast to make wireless networks harder to discover.

    1. SSID

    2. NAT

    3. MAC

    4. WPA

  12.   12. A successful DoS attack violates which property of the C-I-A triad?

    1. Availability

    2. Integrity

    3. Consistency

    4. Confidentiality

  13.   13. Where must sensitive data appear encrypted to ensure its confidentiality? (Select two.)

    1. While in use in the workstation

    2. During transmission over the network

    3. As it is stored on disk

    4. In memory

  14.   14. Which authentication protocol does Windows Server use as a default?

    1. NTLM

    2. Kerberos

    3. WPA

    4. NAT

  15.   15. What can some firewalls do to attempt to stop a DoS attack in progress?

    1. Alert an attack responder

    2. Log all traffic coming from the source of the attack

    3. Terminate any connections with the source of the attack

    4. Reset all connections

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.202.177