Network Security Quiz: VPNs, Firewalls, and Attacks

BetterThanExpectedPorcupine avatar
BetterThanExpectedPorcupine
·
·
Download

Start Quiz

Study Flashcards

29 Questions

Which service model would be used to replace on-premises servers with a cloud solution?

IaaS

When evaluating a firewall to protect a datacenter's east-west traffic, what factor should be considered?

Replication traffic between an on-premises server and a remote backup facility

In network security, which requirement should be verified to ensure the protection of data?

Ensuring data confidentiality during transmission

What is a critical aspect to consider when implementing disaster recovery as a service (DRaaS)?

The frequency of data backups performed

Which traffic type is typically protected by VPNs in a network environment?

Traffic between remote offices and the datacenter's servers

What is the MOST likely cause of the desktop not connecting, as described in the text?

Port security

Which Ethernet standard should a technician use to connect a network switch to existing fiber optic cable in an IDF?

10GBaseT

At which layer of the OSI model does an ARP request ('Who is 192.168.1.200? Tell 192.168.1.55') operate?

Data link

Which technology allows traffic to be sent through two different ISPs to increase performance?

Load balancing

When a new device is added to the network and transmits data, how does an unmanaged switch typically process this information?

It floods the data to all connected ports

If the LED status light on a switchport is not lit while other devices are connecting successfully, what is the LEAST likely cause of the desktop not connecting?

VLAN mismatch

What task should the network administrator perform next based on the provided information?

Check the firewall ACL to verify all required IP addresses are included.

To harden the security of a network and enable encryption for AP security through a web browser, what would be the BEST choice?

WPA2

Which of the following ports are associated with IMAP?

110

If users externally are not facing any mail connection issues, what could be a possible reason for the internal users facing connectivity problems?

Misconfigured firewall settings blocking internal access

What action would help ensure that all required IP addresses are allowed for internal users' connectivity to the cloud solution?

Reviewing firewall logs for blocked connections

In the context of internal DNS server issues, which task would be most appropriate to troubleshoot DNS resolution problems?

Confirming PTR records in DNS

What action should be taken to ensure a device gets the same IP address each time it connects to the network?

Reservation

What is the primary function of the core layer in a three-tiered network model?

Switching

To address concerns about an unauthorized IP address accessing a secure part of the network, what solution should be implemented?

Implementing an ACL

What could be done to add an additional WAN to a network and avoid single points of failure?

Deploying additional WAN routers with a second MPLS vendor

Which setting should be adjusted on a syslog server to mitigate issues related to unauthorized access?

Adjust timeout settings

What strategy could be used to ensure a critical server's protection against unwanted traffic?

Configuring port security

What type of VPN is used for remote access on the employee's laptop?

SSL VPN

When directing HTTP traffic to an internal server on a non-standard socket, which type of rule is being implemented?

STP

Based on the given output, what type of attack is most likely being shown?

VLAN hopping

Which protocol should an organization use for centrally managing logins to network services?

RSTP

What equipment would be suitable for ensuring seamless wireless connectivity while moving around a building?

VPN concentrator

Which of the following is NOT a type of VPN mentioned in the text?

SSL VPN

Test your knowledge on network security concepts including site-to-site VPNs, firewall rules, and common network attacks. Questions cover topics like implementing VPNs between locations, configuring firewalls for specific traffic, and identifying different types of network attacks.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser