Testout Networking Chapter 8

You want to maintain security on your internal network

53

Using the Netstat command, you notice that a remote system

Downloading a file

You want to allow your users to download files from a server running the TCP

FTP

After blocking a number of ports to secure your server

Open port 25 to allow SMTP service

Users complain that they can't connect to the website when they type

The HTTP port should be changed to 80

Which of the following does a router acting as a firewall use to control packets

ACL

You have a company network that is connected to the Internet. You want all users

Use firewalls to create a DMZ. Web Inside / Private Behind

You have just installed a packet-filtering firewall

Port number/source address of a packet/destination address of a packet

Which of the following describes how access lists

An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.

You have used firewalls to create a demilitarized zone

Put the Database on the private network/Put the Web server inside the DMZ

when designing a firewall, what is the recommended approach

Close all ports, open only ports required

Match the firewall type

Layer 2- V Layer 3- R Counts-R Does-V Different-R Same-V

Your Cisco router has three

Add a permit

Which firewall implementation creates a buffer

DMZ

Which of the following are true about routed firewalls

Supports Counts

An All-in-one security appliance is best

a Remote

Which of the following features are common functions

Bandwith shaping Spam Filtering

You recently installed a new all-in-one security appliance in a remote office

Change the default Configure the device's authentication

Which of the following prevents access based on website ratings

Content filter

You manage a server that runs your company website

Proxy Server

Based on the diagram, which type of proxy is handling the client's request

Reverse

Which of the following network services or protocols uses TCP/IP port 22

SSH

Which port number is used by SNMP

161

Which protocol and port number is used by BOOTP

UDP 67

To increase security on your company's internal network

443

You are monitoring network traffic on your network and you see a large amount of traffic between a Windows

The workstation is using NetBIOS to access shared resources on the server

You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427

Someone is using Voice over IP VOIP

You have been given a laptop to use for work

Host-based

You have just installed a packet-filtering firewall on your network

Destination address Port number Source address

You provide Internet access for a local school

Application Level

A small startup company has hired

The UTM represents a single point of failure

Match the firewall type on the right

Packet Filtering Firewall- 3 Circuit Level Proxy - 5 Application Level Gateway - 7 Routed Firewall - 3 Transparent Firewall - 2

Testout Networking Chapter 8 - Subjecto.com

Testout Networking Chapter 8

Your page rank:

Total word count: 487
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

You want to maintain security on your internal network

53

Using the Netstat command, you notice that a remote system

Downloading a file

You want to allow your users to download files from a server running the TCP

FTP

After blocking a number of ports to secure your server

Open port 25 to allow SMTP service

Users complain that they can’t connect to the website when they type

The HTTP port should be changed to 80

Which of the following does a router acting as a firewall use to control packets

ACL

You have a company network that is connected to the Internet. You want all users

Use firewalls to create a DMZ. Web Inside / Private Behind

You have just installed a packet-filtering firewall

Port number/source address of a packet/destination address of a packet

Which of the following describes how access lists

An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.

You have used firewalls to create a demilitarized zone

Put the Database on the private network/Put the Web server inside the DMZ

when designing a firewall, what is the recommended approach

Close all ports, open only ports required

Match the firewall type

Layer 2- V Layer 3- R Counts-R Does-V Different-R Same-V

Your Cisco router has three

Add a permit

Which firewall implementation creates a buffer

DMZ

Which of the following are true about routed firewalls

Supports Counts

An All-in-one security appliance is best

a Remote

Which of the following features are common functions

Bandwith shaping Spam Filtering

You recently installed a new all-in-one security appliance in a remote office

Change the default Configure the device’s authentication

Which of the following prevents access based on website ratings

Content filter

You manage a server that runs your company website

Proxy Server

Based on the diagram, which type of proxy is handling the client’s request

Reverse

Which of the following network services or protocols uses TCP/IP port 22

SSH

Which port number is used by SNMP

161

Which protocol and port number is used by BOOTP

UDP 67

To increase security on your company’s internal network

443

You are monitoring network traffic on your network and you see a large amount of traffic between a Windows

The workstation is using NetBIOS to access shared resources on the server

You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427

Someone is using Voice over IP VOIP

You have been given a laptop to use for work

Host-based

You have just installed a packet-filtering firewall on your network

Destination address Port number Source address

You provide Internet access for a local school

Application Level

A small startup company has hired

The UTM represents a single point of failure

Match the firewall type on the right

Packet Filtering Firewall- 3 Circuit Level Proxy – 5 Application Level Gateway – 7 Routed Firewall – 3 Transparent Firewall – 2

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending