When designing a firewall, what is the recommended approach for opening and closing ports? -
✔✔Close all ports; open only ports required by applications inside the DMZ
After blocking a number of ports to secure your server, you are unable to send email. To allow
email service, which of the following needs to be done? - ✔✔Open port 25 to allow SMTP
service
You administer a web server on your network. The computer has multiple IP addresses. They
are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You
configured the website as follows:
IP address: 192.168.23.8
HTTP Port: 1030
SSL Port: 443
Users complain that they can't connect to the website when they type www.westsim.com.
What is the most likely source of the problem? - ✔✔The HTTP port should be changed to 80
You want to maintain tight security on your internal network, so you restrict access to the
network through certain port numbers. If you want to allow users to continue to use DNS,
which port should you enable? - ✔✔53
In the output of the netstat command, you notice that a remote system has made a connection
to your Windows Server 2016 system using TCP/IP port 21.
Which of the following actions is the remote system most likely performing? -
✔✔Downloading a file
You want to allow users to download files from a server running the TCP/IP protocol. You want
to require user authentication to gain access to specific directories on the server.
,Which TCP/IP protocol should you implement to provide this capability? - ✔✔FTP
Which of the following is a firewall function? - ✔✔Packet filtering
You would like to control internet access based on users, time of day, and websites visited. How
can you do this? - ✔✔Install a proxy server. Allow internet access only through the proxy
server
Which of the following are true of a circuit proxy filter firewall? (Select two.) - ✔✔Verifies
sequencing of session packets
Operates at the Session layer
Which of the following are true about reverse proxy? (Select two.) - ✔✔Can perform load
balancing, authentication, and caching
Handles requests from the internet to a server in a private network
This question includes an image to help you answer the question. View Image
Based on the diagram, which type of proxy server is handling the client's request? -
✔✔Reverse proxy server
You have a router that is configured as a firewall. The router is a Layer 3 device only.
Which of the following does the router use for identifying allowed or denied packets? -
✔✔IP address
You have been given a laptop to use for work. You connect the laptop to your company
network, use it from home, and use it while traveling.
You want to protect the laptop from internet-based attacks.
Which solution should you use? - ✔✔Host-based firewall
,Which of the following are characteristics of a circuit-level gateway? (Select two.) -
✔✔Filters by session
Stateful
You connect your computer to a wireless network available at the local library. You find that
you can access all the websites you want on the internet except for two.
What might be causing the problem? - ✔✔A proxy server is blocking access to the websites
You have just installed a packet filtering firewall on your network.
Which options will you be able to set on your firewall? (Select all that apply.) - ✔✔Port
number
Source address of a packet
Destination address of a packet
Haley configures a website using Windows Server 2016 default values.
What are the HTTP port and SSL port settings? - ✔✔80 for HTTP; 443 for SSL
You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the
system time, you have loaded an application that synchronizes the hardware clock on the
server with an external time source on the internet. Now, you must configure the firewall on
your network to allow time synchronization traffic through.
Which of the following ports are you most likely to open on the firewall? - ✔✔123
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of
your network. You open TCP/IP ports 80, 25, 110, and 143.
Assuming that no other ports on the firewall need to be configured to provide access, which
applications are most likely to be hosted on the server? - ✔✔Web server and email server
You are monitoring network traffic on your network, and you see traffic between two network
hosts on port 2427.
, Which kind of network traffic uses this port? - ✔✔The MGCP protocol is generating traffic,
which VoIP uses to send voice data over a network
You are monitoring network traffic on your network, and you see traffic between two network
hosts on port 1720.
What is the source of this network traffic? - ✔✔Someone is using voice over IP (VoIP) to
make a telephone call
You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server 2016 system to connect to an iSCSI target defined on a
different server system. You also need to define iSCSI security settings, including CHAP and
IPsec.
Which tool should you use? - ✔✔iSCSI Initiator
Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be
performed to build a redundant FC SAN.
Step 1 - ✔✔Install two Fiber Channel host bus adapters in each server that will access the
shared storage on the SAN
Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be
performed to build a redundant FC SAN.
Step 2 - ✔✔Deploy two FC switches
Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be
performed to build a redundant FC SAN.
Step 3 - ✔✔Using fiber optic cables, connect each server to each FC switch by connecting
one FC HBA to one FC switch and the other FC HBA to the other FC switch
Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be
performed to build a redundant FC SAN.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.