Network Security Quiz: VPNs, Firewalls, and Attacks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which service model would be used to replace on-premises servers with a cloud solution?

  • IaaS (correct)
  • SaaS
  • PaaS
  • Disaster Recovery as a Service (DRaaS)

When evaluating a firewall to protect a datacenter's east-west traffic, what factor should be considered?

  • Traffic between VMs running on different hosts
  • VPN traffic from remote offices to the datacenter's VMs
  • Concurrent connections generated by Internet DDoS attacks
  • Replication traffic between an on-premises server and a remote backup facility (correct)

In network security, which requirement should be verified to ensure the protection of data?

  • Ensuring maximum download speed for users
  • Ensuring unlimited access to all users
  • Ensuring compatibility with legacy systems
  • Ensuring data confidentiality during transmission (correct)

What is a critical aspect to consider when implementing disaster recovery as a service (DRaaS)?

<p>The frequency of data backups performed (C)</p> Signup and view all the answers

Which traffic type is typically protected by VPNs in a network environment?

<p>Traffic between remote offices and the datacenter's servers (D)</p> Signup and view all the answers

What is the MOST likely cause of the desktop not connecting, as described in the text?

<p>Port security (A)</p> Signup and view all the answers

Which Ethernet standard should a technician use to connect a network switch to existing fiber optic cable in an IDF?

<p>10GBaseT (D)</p> Signup and view all the answers

At which layer of the OSI model does an ARP request ('Who is 192.168.1.200? Tell 192.168.1.55') operate?

<p>Data link (A)</p> Signup and view all the answers

Which technology allows traffic to be sent through two different ISPs to increase performance?

<p>Load balancing (D)</p> Signup and view all the answers

When a new device is added to the network and transmits data, how does an unmanaged switch typically process this information?

<p>It floods the data to all connected ports (D)</p> Signup and view all the answers

If the LED status light on a switchport is not lit while other devices are connecting successfully, what is the LEAST likely cause of the desktop not connecting?

<p>VLAN mismatch (D)</p> Signup and view all the answers

What task should the network administrator perform next based on the provided information?

<p>Check the firewall ACL to verify all required IP addresses are included. (B)</p> Signup and view all the answers

To harden the security of a network and enable encryption for AP security through a web browser, what would be the BEST choice?

<p>WPA2 (D)</p> Signup and view all the answers

Which of the following ports are associated with IMAP?

<p>110 (D)</p> Signup and view all the answers

If users externally are not facing any mail connection issues, what could be a possible reason for the internal users facing connectivity problems?

<p>Misconfigured firewall settings blocking internal access (A)</p> Signup and view all the answers

What action would help ensure that all required IP addresses are allowed for internal users' connectivity to the cloud solution?

<p>Reviewing firewall logs for blocked connections (B)</p> Signup and view all the answers

In the context of internal DNS server issues, which task would be most appropriate to troubleshoot DNS resolution problems?

<p>Confirming PTR records in DNS (D)</p> Signup and view all the answers

What action should be taken to ensure a device gets the same IP address each time it connects to the network?

<p>Reservation (D)</p> Signup and view all the answers

What is the primary function of the core layer in a three-tiered network model?

<p>Switching (B)</p> Signup and view all the answers

To address concerns about an unauthorized IP address accessing a secure part of the network, what solution should be implemented?

<p>Implementing an ACL (D)</p> Signup and view all the answers

What could be done to add an additional WAN to a network and avoid single points of failure?

<p>Deploying additional WAN routers with a second MPLS vendor (A)</p> Signup and view all the answers

Which setting should be adjusted on a syslog server to mitigate issues related to unauthorized access?

<p>Adjust timeout settings (D)</p> Signup and view all the answers

What strategy could be used to ensure a critical server's protection against unwanted traffic?

<p>Configuring port security (B)</p> Signup and view all the answers

What type of VPN is used for remote access on the employee's laptop?

<p>SSL VPN (B)</p> Signup and view all the answers

When directing HTTP traffic to an internal server on a non-standard socket, which type of rule is being implemented?

<p>STP (D)</p> Signup and view all the answers

Based on the given output, what type of attack is most likely being shown?

<p>VLAN hopping (D)</p> Signup and view all the answers

Which protocol should an organization use for centrally managing logins to network services?

<p>RSTP (B)</p> Signup and view all the answers

What equipment would be suitable for ensuring seamless wireless connectivity while moving around a building?

<p>VPN concentrator (D)</p> Signup and view all the answers

Which of the following is NOT a type of VPN mentioned in the text?

<p>SSL VPN (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser