100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Testout Network Pro Ch 1-8 Exams and Labs Questions & Answers 100% Solved!!

Rating
-
Sold
-
Pages
55
Grade
A
Uploaded on
20-12-2024
Written in
2024/2025

You want to maintain security on your internal network - ANSWERS53 Using the Netstat command, you notice that a remote system - ANSWERSDownloading a file You want to allow your users to download files from a server running the TCP - ANSWERSFTP After blocking a number of ports to secure your server - ANSWERSOpen port 25 to allow SMTP service Users complain that they can't connect to the website when they type - ANSWERSThe HTTP port should be changed to 80 Which of the following does a router acting as a firewall use to control packets - ANSWERSACL You have a company network that is connected to the Internet. You want all users - ANSWERSUse firewalls to create a DMZ. Web Inside / Private Behind You have just installed a packet-filtering firewall - ANSWERSPort number/source address of a packet/destination address of a packet Which of the following describes how access lists - ANSWERSAn access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers. You have used firewalls to create a demilitarized zone - ANSWERSPut the Database on

Show more Read less
Institution
Testout Network Pro Ch 1-8
Course
Testout Network Pro Ch 1-8











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Testout Network Pro Ch 1-8
Course
Testout Network Pro Ch 1-8

Document information

Uploaded on
December 20, 2024
Number of pages
55
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Testout Network Pro Ch 1-8 Exams and
Labs Questions & Answers 100%
Solved!!
You want to maintain security on your internal network - ANSWERS53

Using the Netstat command, you notice that a remote system - ANSWERSDownloading
a file

You want to allow your users to download files from a server running the TCP -
ANSWERSFTP

After blocking a number of ports to secure your server - ANSWERSOpen port 25 to
allow SMTP service

Users complain that they can't connect to the website when they type - ANSWERSThe
HTTP port should be changed to 80

Which of the following does a router acting as a firewall use to control packets -
ANSWERSACL

You have a company network that is connected to the Internet. You want all users -
ANSWERSUse firewalls to create a DMZ. Web Inside / Private Behind

You have just installed a packet-filtering firewall - ANSWERSPort number/source
address of a packet/destination address of a packet

Which of the following describes how access lists - ANSWERSAn access list filters
traffic based on the IP header information such as source or destination IP address,
protocol, or socket numbers.

You have used firewalls to create a demilitarized zone - ANSWERSPut the Database on
the private network/Put the Web server inside the DMZ

when designing a firewall, what is the recommended approach - ANSWERSClose all
ports, open only ports required

Match the firewall type - ANSWERSLayer 2- V
Layer 3- R
Counts-R
Does-V
Different-R

,Same-V

Your Cisco router has three - ANSWERSAdd a permit

Which firewall implementation creates a buffer - ANSWERSDMZ

Which of the following are true about routed firewalls - ANSWERSSupports
Counts

An All-in-one security appliance is best - ANSWERSa Remote

Which of the following features are common functions - ANSWERSBandwith shaping
Spam Filtering

You recently installed a new all-in-one security appliance in a remote office -
ANSWERSChange the default
Configure the device's authentication

Which of the following prevents access based on website ratings - ANSWERSContent
filter

You manage a server that runs your company website - ANSWERSProxy Server

Based on the diagram, which type of proxy is handling the client's request -
ANSWERSReverse

Which of the following network services or protocols uses TCP/IP port 22 -
ANSWERSSSH

Which port number is used by SNMP - ANSWERS161

Which protocol and port number is used by BOOTP - ANSWERSUDP 67

To increase security on your company's internal network - ANSWERS443

You are monitoring network traffic on your network and you see a large amount of traffic
between a Windows - ANSWERSThe workstation is using NetBIOS to access shared
resources on the server

You are monitoring network traffic on your network, and you see traffic between two
network hosts on port 2427 - ANSWERSSomeone is using Voice over IP VOIP

You have been given a laptop to use for work - ANSWERSHost-based

You have just installed a packet-filtering firewall on your network -
ANSWERSDestination address

,Port number
Source address

You provide Internet access for a local school - ANSWERSApplication Level

A small startup company has hired - ANSWERSThe UTM represents a single point of
failure

Match the firewall type on the right - ANSWERSPacket Filtering Firewall- 3
Circuit Level Proxy - 5
Application Level Gateway - 7
Routed Firewall - 3
Transparent Firewall - 2

Which of the following prevents access based on website rating and classifications? -
ANSWERSContent filter

You manage a server that runs your company Web site. The Web server has reached
its capacity, and the number of client requests is greater than the server can handle.

You would like to find a solution so that static Web content can be offloaded to a
different server, while the Web server continues to process dynamic content.

Which solution should you implement? - ANSWERSProxy server

Based on the diagram, which type of proxy server is handling the client's request? -
ANSWERSReverse Proxy Server

Which of the following network services or protocols uses TCP/IP port 22? -
ANSWERSSSH

Which port number is used by SNMP? - ANSWERS161

Which protocol and port number is used by BOOTP/DHCP? - ANSWERSUDP 67

To increase security on your company's internal network, the administrator has disabled
as many ports as possible. Now, however, though you can browse the Internet, you are
unable to perform secure credit card transactions. Which port needs to be enabled to
allow secure transactions? - ANSWERS443

You are monitoring network traffic on your network and you see a large amount of traffic
between a Windows workstation and a Window server on the following ports:
*137
*138
*139

, Which is the source of this network traffic? - ANSWERSThe workstation is using
NetBIOS to access shared resources on the server.

You are monitoring network traffic on your network, and you see the traffic between two
network hosts on port 2427. What is the source of this network traffic? -
ANSWERSSomeone is using Voice over IP (VoIP) to make a telephone call.

You have been given a laptop to use for work. You connect the laptop to your company
network, use it from home, and use it while traveling. You want to protect the laptop
from Internet-based attacks.
What solution should you use? - ANSWERSHost-based firewall

You have just installed a packet-filtering firewall on your network. Which options will you
be able to set on your firewall? - ANSWERSSource address of a packet
Destination address of a packet
Port Number

You provide Internet access for a local school. You want to control Internet access
based on user, and prevent access to specific URLs. Which type of firewall should you
install? - ANSWERSApplication-level

A small startup company has hired you to harden their new network. Because funds are
limited, you have decided to implement a unified threat management (UTM) device that
provides multiple security features in a single network appliance:
• Firewall
• VPN
• Anti-spam
• Antivirus
You join the UTM device to the company's Active Directory domain. The company's
traveling sales force will use the VPN functionality provided by the UTM device to
connect to the internal company network from hotel and airport public WiFi networks.
What weaknesses exist in this implementation? - ANSWERSThe UTM represents a
single point of failure.

Match the firewall type on the right with the OSI layers at which it operates.
Note: Each OSI Layer can be used once, more than once, or not at all. -
ANSWERSPacket Filtering Firewall
OSI Layer 3
Circuit-level Proxy
OSI Layer 5
Application-level Gateway
OSI Layer 7
Routed Firewall
OSI Layer 3
Transparent Firewall
OSI Layer 2

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
papersmaster01 Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
280
Member since
2 year
Number of followers
106
Documents
14075
Last sold
21 hours ago
PAPERSMASTER01

On this page you will find documents , package deals, flashcards offered by seller PAPERSMASTER01.With our documents on your side you"ll be well equipped to tackle you exams and achieve the grades you need.

3.9

71 reviews

5
22
4
33
3
9
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions