100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Network Pro Chapters 8-10 Exam with Complete Solutions CA$19.58   Add to cart

Exam (elaborations)

Network Pro Chapters 8-10 Exam with Complete Solutions

 7 views  0 purchase
  • Course
  • Network Pro
  • Institution
  • Network Pro

Network Pro Chapters 8-10 Exam with Complete Solutions Which of the following is likely to be located in a DMZ? - Answer-FTP server In which of the following situations would you most likely implement a demilitarized zone (DMZ)? - Answer-You want to protect a public web server from attack ...

[Show more]

Preview 3 out of 25  pages

  • August 10, 2024
  • 25
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Network Pro
  • Network Pro
avatar-seller
Network Pro Chapters 8-10
Exam with Complete
Solutions
Which of the following is likely to be located in a DMZ? - Answer-FTP server

In which of the following situations would you most likely implement a demilitarized zone
(DMZ)? - Answer-You want to protect a public web server from attack

Match the firewall type on the left with its associated characteristics on the right. Each
firewall type may be used once, more than once, or not at all.
Operates at Layer 2 - Answer-Virtual firewall

Match the firewall type on the left with its associated characteristics on the right. Each
firewall type may be used once, more than once, or not at all.
Operates at Layer 3 - Answer-Routed firewall

Which of the following enterprise wireless deployment models uses access points with
enough intelligence to allow the creation of guest WLANs for keeping public wireless
traffic separate from private traffic? - Answer-Distributed wireless mesh infrastructure

Match each wireless device on the left with its corresponding characteristics on the
right. Each device may be used once, more than once, or not at all.
Manages all of the APs that are connected to it - Answer-Wireless controller

Match each wireless device on the left with its corresponding characteristics on the
right. Each device may be used once, more than once, or not at all.
Supports 30 to 50 wireless clients per access point - Answer-Wireless controller

Match each wireless device on the left with its corresponding characteristics on the
right. Each device may be used once, more than once, or not at all.
Provides NAT routing and an Ethernet switch in one device - Answer-Consumer-grade
(SOHO) wireless router

Match each wireless device on the left with its corresponding characteristics on the
right. Each device may be used once, more than once, or not at all.
Supports a maxiumum of 5-10 wireless clients - Answer-Consumer-grade (SOHO)
wireless router

,Match each wireless device on the left with its corresponding characteristics on the
right. Each device may be used once, more than once, or not at all.
Pushes wireless configuration settings to connected access points - Answer-Wireless
controller

Match the wireless networking term or concept on the left with its appropriate
description on the right. Each term may be used once, more than once, or not at all.
Moving an wireless device between access points within the same wireless network -
Answer-Roaming


Match the firewall type on the left with its associated characteristics on the right. Each
firewall type may be used once, more than once, or not at all.
Counts as a hop in the path between hosts - Answer-Routed firewall

Match the firewall type on the left with its associated characteristics on the right. Each
firewall type may be used once, more than once, or not at all.
Does not count as a hop in the path between hosts - Answer-Virtual firewall

Match the firewall type on the left with its associated characteristics on the right. Each
firewall type may be used once, more than once, or not at all.
Each interface connects to a different network - Answer-Routed firewall

Match the firewall type on the left with its associated characteristics on the right. Each
firewall type may be used once, more than once, or not at all.
Each interface connects to the same network segment - Answer-Virtual firewall

When designing a firewall, what is the recommended approach for opening and closing
ports? - Answer-Close all ports; open only ports required by applications inside the DMZ

After blocking a number of ports to secure your server, you are unable to send email. To
allow email service, which of the following needs to be done? - Answer-Open port 25 to
allow SMTP service

You administer a web server on your network. The computer has multiple IP addresses.
They are 192.168.23.8 to 192.168.23.17. The name of the computer is
www.westsim.com. You configured the website as follows:
IP address: 192.168.23.8
HTTP Port: 1030
SSL Port: 443
Users complain that they can't connect to the website when they type
www.westsim.com. What is the most likely source of the problem? - Answer-The HTTP
port should be changed to 80

, You want to maintain tight security on your internal network, so you restrict access to
the network through certain port numbers. If you want to allow users to continue to use
DNS, which port should you enable? - Answer-53

In the output of the netstat command, you notice that a remote system has made a
connection to your Windows Server 2016 system using TCP/IP port 21.
Which of the following actions is the remote system most likely performing? - Answer-
Downloading a file

You want to allow users to download files from a server running the TCP/IP protocol.
You want to require user authentication to gain access to specific directories on the
server.
Which TCP/IP protocol should you implement to provide this capability? - Answer-FTP

Which of the following is a firewall function? - Answer-Packet filtering

You would like to control internet access based on users, time of day, and websites
visited. How can you do this? - Answer-Install a proxy server. Allow internet access only
through the proxy server

An all-in-one security appliance is best suited for which type of implementation? -
Answer-A remote office with no on-site technician.

Which of the following features are common functions of an all-in-one security
appliance? (Select two.) - Answer-Spam filtering
Bandwidth shaping

You recently installed a new all-in-one security appliance in a remote office. You are in
the process of configuring the device. You need to:
Increase the security of the device.
Enable remote management from the main office.
Allow users to be managed through Active Directory.
You want to configure the device so you can access it from the main office. You also
want to make sure the device is as secure as possible.
Which of the following tasks should you carry out? (Select two.) - Answer-Change the
default username and password
Configure the device's authentication type to use Active Directory

Match the firewall type on the right with the OSI layer at which it operates. Each OSI
Layer may be used once, more than once, or not at all.
Packet filtering firewall - Answer-OSI Layer 3

Match the firewall type on the right with the OSI layer at which it operates. Each OSI
Layer may be used once, more than once, or not at all.
Circuit-level proxy - Answer-OSI Layer 5

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$19.58. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$19.58
  • (0)
  Add to cart