Network Security Quiz: VPNs, Firewalls, and Attacks
29 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which service model would be used to replace on-premises servers with a cloud solution?

  • IaaS (correct)
  • SaaS
  • PaaS
  • Disaster Recovery as a Service (DRaaS)
  • When evaluating a firewall to protect a datacenter's east-west traffic, what factor should be considered?

  • Traffic between VMs running on different hosts
  • VPN traffic from remote offices to the datacenter's VMs
  • Concurrent connections generated by Internet DDoS attacks
  • Replication traffic between an on-premises server and a remote backup facility (correct)
  • In network security, which requirement should be verified to ensure the protection of data?

  • Ensuring maximum download speed for users
  • Ensuring unlimited access to all users
  • Ensuring compatibility with legacy systems
  • Ensuring data confidentiality during transmission (correct)
  • What is a critical aspect to consider when implementing disaster recovery as a service (DRaaS)?

    <p>The frequency of data backups performed</p> Signup and view all the answers

    Which traffic type is typically protected by VPNs in a network environment?

    <p>Traffic between remote offices and the datacenter's servers</p> Signup and view all the answers

    What is the MOST likely cause of the desktop not connecting, as described in the text?

    <p>Port security</p> Signup and view all the answers

    Which Ethernet standard should a technician use to connect a network switch to existing fiber optic cable in an IDF?

    <p>10GBaseT</p> Signup and view all the answers

    At which layer of the OSI model does an ARP request ('Who is 192.168.1.200? Tell 192.168.1.55') operate?

    <p>Data link</p> Signup and view all the answers

    Which technology allows traffic to be sent through two different ISPs to increase performance?

    <p>Load balancing</p> Signup and view all the answers

    When a new device is added to the network and transmits data, how does an unmanaged switch typically process this information?

    <p>It floods the data to all connected ports</p> Signup and view all the answers

    If the LED status light on a switchport is not lit while other devices are connecting successfully, what is the LEAST likely cause of the desktop not connecting?

    <p>VLAN mismatch</p> Signup and view all the answers

    What task should the network administrator perform next based on the provided information?

    <p>Check the firewall ACL to verify all required IP addresses are included.</p> Signup and view all the answers

    To harden the security of a network and enable encryption for AP security through a web browser, what would be the BEST choice?

    <p>WPA2</p> Signup and view all the answers

    Which of the following ports are associated with IMAP?

    <p>110</p> Signup and view all the answers

    If users externally are not facing any mail connection issues, what could be a possible reason for the internal users facing connectivity problems?

    <p>Misconfigured firewall settings blocking internal access</p> Signup and view all the answers

    What action would help ensure that all required IP addresses are allowed for internal users' connectivity to the cloud solution?

    <p>Reviewing firewall logs for blocked connections</p> Signup and view all the answers

    In the context of internal DNS server issues, which task would be most appropriate to troubleshoot DNS resolution problems?

    <p>Confirming PTR records in DNS</p> Signup and view all the answers

    What action should be taken to ensure a device gets the same IP address each time it connects to the network?

    <p>Reservation</p> Signup and view all the answers

    What is the primary function of the core layer in a three-tiered network model?

    <p>Switching</p> Signup and view all the answers

    To address concerns about an unauthorized IP address accessing a secure part of the network, what solution should be implemented?

    <p>Implementing an ACL</p> Signup and view all the answers

    What could be done to add an additional WAN to a network and avoid single points of failure?

    <p>Deploying additional WAN routers with a second MPLS vendor</p> Signup and view all the answers

    Which setting should be adjusted on a syslog server to mitigate issues related to unauthorized access?

    <p>Adjust timeout settings</p> Signup and view all the answers

    What strategy could be used to ensure a critical server's protection against unwanted traffic?

    <p>Configuring port security</p> Signup and view all the answers

    What type of VPN is used for remote access on the employee's laptop?

    <p>SSL VPN</p> Signup and view all the answers

    When directing HTTP traffic to an internal server on a non-standard socket, which type of rule is being implemented?

    <p>STP</p> Signup and view all the answers

    Based on the given output, what type of attack is most likely being shown?

    <p>VLAN hopping</p> Signup and view all the answers

    Which protocol should an organization use for centrally managing logins to network services?

    <p>RSTP</p> Signup and view all the answers

    What equipment would be suitable for ensuring seamless wireless connectivity while moving around a building?

    <p>VPN concentrator</p> Signup and view all the answers

    Which of the following is NOT a type of VPN mentioned in the text?

    <p>SSL VPN</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser