Questions & Answers Graded A+ Latest
update
Which of the following is NOT a valid System boot option:
-Uploaded Firmware
-New Firmware
-Current Firmware
-Current Firmware with Factory Defaults - Answer--New Firmware
What are the benefits provided by a VPN (select all that apply)?
-Securely connects distributed networks together
-Prevents denial-of-service attacks on remote connections
-Enables a remote connection to the LAN via the Internet
-Assures remote clients have up-to-date anti-virus software
-Provides data confidentiality and sender authentication - Answer--Securely connects
distributed networks together
-Enables a remote connection to the LAN via the Internet
-Provides data confidentiality and sender authentication
What benefits are provided by a VPN (select all that apply)?
-Reporting
-Increased capacity
-Scalability
-Encryption
-Security - Answer--Scalability
-Encryption
-Security
Which of the following is the most basic firewall technology?
-Packet filtering
-Single firewall
-Deep packet inspection
-Application proxies - Answer--Packet filtering
The default firewall access rule allows all communication from the LAN to the Internet.
-True
-False - Answer--True
, What are two advantages of a multiple firewall?
-Protects restricted special resources
-Offers protection from external attacks while each network segment has free access to
other segments
-Helps protect entire departments - Answer-What are two advantages of a multiple
firewall?
-Protects restricted special resources
What is the purpose of a security policy?
-To authenticate the process by which users and devices are identified and granted
access to the network
-To monitor the network security and make sure the firewall is configured properly to
prevent inappropriate usage
-To make it more difficult for hackers to locate a security hole in a network's gateway
-To describe how a company wants to approach security, including rules of conduct and
the determination of acceptable risk - Answer--To describe how a company wants to
approach security, including rules of conduct and the determination of acceptable risk
What question would you ask to get specific information on user restrictions?
-What kinds of network traffic will you allow?
-Will the computers be locked away from the public, or will they have access to the
hardware?
-Will users be allowed to login at any time, from any location, to any machine?
-Who should be allowed to access your services? - Answer--Will users be allowed to
login at any time, from any location, to any machine?
Content Filtering Services applies to which of the following traffic protocols? (Select all
that apply.)
-HTTPS
-FTP
-HTTP
-Email attachments - Answer--HTTP
-HTTPS