Testout Network Pro Ch 1-8 Exams and Labs 2024
Testout Network Pro Ch 1-8 Exams and Labs 2024 You want to maintain security on your internal network - answer53 Using the Netstat command, you notice that a remote system - answerDownloading a file You want to allow your users to download files from a server running the TCP - answerFTP After blocking a number of ports to secure your server - answerOpen port 25 to allow SMTP service Users complain that they can't connect to the website when they type - answerThe HTTP port should be changed to 80 Which of the following does a router acting as a firewall use to control packets - answerACL You have a company network that is connected to the Internet. You want all users - answerUse firewalls to create a DMZ. Web Inside / Private Behind You have just installed a packet-filtering firewall - answerPort number/source address of a packet/destination address of a packet Which of the following describes how access lists - answerAn access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers. You have used firewalls to create a demilitarized zone - answerPut the Database on the private network/Put the Web server inside the DMZ when designing a firewall, what is the recommended approach - answerClose all ports, open only ports required Match the firewall type - answerLayer 2- V Layer 3- R Counts-R Does-V Different-R Same-V Your Cisco router has three - answerAdd a permit Which firewall implementation creates a buffer - answerDMZ Which of the following are true about routed firewalls - answerSupports Counts An All-in-one security appliance is best - answera Remote Which of the following features are common functions - answerBandwith shaping Spam Filtering You recently installed a new all-in-one security appliance in a remote office - answerChange the default Configure the device's authentication Which of the following prevents access based on website ratings - answerContent filter You manage a server that runs your company website - answerProxy Server Based on the diagram, which type of proxy is handling the client's request - answerReverse Which of the following network services or protocols uses TCP/IP port 22 - answerSSH Which port number is used by SNMP - answer161 Which protocol and port number is used by BOOTP - answerUDP 67 To increase security on your company's internal network - answer443 You are monitoring network traffic on your network and you see a large amount of traffic between a Windows - answerThe workstation is using NetBIOS to access shared resources on the server You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427 - answerSomeone is using Voice over IP VOIP You have been given a laptop to use for work - answerHost-based You have just installed a packet-filtering firewall on your network - answerDestination address Port number Source address You provide Internet access for a local school - answerApplication Level A small startup company has hired - answerThe UTM represents a single point of failure Match the firewall type on the right - answerPacket Filtering Firewall- 3 Circuit Level Proxy - 5 Application Level Gateway - 7 Routed Firewall - 3 Transparent Firewall - 2 Which of the following prevents access based on website rating and classifications? - answerContent filter You manage a server that runs your company Web site. The Web server has reached its capacity, and the number of client requests is greater than the server can handle. You would like to find a solution so that static Web content can be offloaded to a different server, while the Web server continues to process dynamic content. Which solution should you implement? - answerProxy server Based on the diagram, which type of proxy server is handling the client's request? - answerReverse Proxy Server Which of the following network services or protocols uses TCP/IP port 22? - answerSSH Which port number is used by SNMP? - answer161 Which protocol and port number is used by BOOTP/DHCP? - answerUDP 67 To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions? - answer443 You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a Window server on the following ports: *137
Written for
- Institution
- Network Pro
- Course
- Network Pro
Document information
- Uploaded on
- April 9, 2024
- Number of pages
- 65
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
testout network pro ch 1 8 exams and labs 2024
Also available in package deal