TP LINK INTERVIEW PREP EXAM ACTUAL EXAM
QUESTIONS AND CORRECT ANSWERS (PROFESSOR
VERIFIED) | ALREADY GRADED A+
What does a firewall do ? - CORRECT ANSWER -Software or hardware that blocks
unauthorized traffic from entering the network and permits wanted traffic.
When a firewall is managed by a list of rules that allow for traffic to pass through it this is called
? - CORRECT ANSWER -Access Control List
What does Implicit Deny refer to ? - CORRECT ANSWER -A firewall feature that is
automatically configured on cisco based firewalls. You have implicitly tell the firewall what
traffic you.
What are the different Types of Access Control Lists and how they work ? - CORRECT
ANSWER -Standard Access Control Lists : Filters based on source IP
Extended ACL's : Filters traffic based on Source / destination IP, Protocols, and port numbers
Dynamic ACL's : ACLs that dynamically allow access after user authentication, usually via
Telnet or SSH
IPv6 ACL : Similar to IPv4 ACLs but designed for IPv6 traffic
What are the 2 different types of firewalls when it comes to checking the network traffic and how
do they function ? - CORRECT ANSWER -Stateful : checks monitors are connections and data
streams going across a network. Does a thorough job of keeping the network safe and also keeps
a record of everything that goes across the network.
, Stateless : Stateless is the exact opposite as in it only check the header of the packets, doesn't
keep a record, and doesn't do a thorough job.
True of False : When buying a firewall they are always stateful ? - CORRECT ANSWER -False :
While many of the new generation of firewalls are stateful, there are many older firewalls and
virtual firewalls that aren't stateful.
What's the purpose of an access control list ? - CORRECT ANSWER -The purpose of the access
control list is to identify traffic on a network.
What are the two different ACL's and what are they key differences ? - CORRECT ANSWER -
Standard : Matches on the (Source) portion of the IP address. The only bad thing about Standard
is how you can provide complete trust or distrust. For Example : If you want to reach a source
destination outside your new, then you either have to allow full access out the network to any
destination or block the IP ADDRESS completely,
Extended : Filter on 5 fields Srce address, destination IP address, Source Port, Destination port,
and Protocol (HTTPS)
CAT 5 megs : - CORRECT ANSWER -100 Mbps
CAT 5E megs : - CORRECT ANSWER -1000 Mbps
CAT 6 megs : - CORRECT ANSWER -1000 Mbps / 10,000 Mbps cable under 100 meters
CAT 6a megs : - CORRECT ANSWER -10,000 Mbps
What are all the layers of the OSI Model in order ? - CORRECT ANSWER -1. Physical
2. Data Link
3. Network
QUESTIONS AND CORRECT ANSWERS (PROFESSOR
VERIFIED) | ALREADY GRADED A+
What does a firewall do ? - CORRECT ANSWER -Software or hardware that blocks
unauthorized traffic from entering the network and permits wanted traffic.
When a firewall is managed by a list of rules that allow for traffic to pass through it this is called
? - CORRECT ANSWER -Access Control List
What does Implicit Deny refer to ? - CORRECT ANSWER -A firewall feature that is
automatically configured on cisco based firewalls. You have implicitly tell the firewall what
traffic you.
What are the different Types of Access Control Lists and how they work ? - CORRECT
ANSWER -Standard Access Control Lists : Filters based on source IP
Extended ACL's : Filters traffic based on Source / destination IP, Protocols, and port numbers
Dynamic ACL's : ACLs that dynamically allow access after user authentication, usually via
Telnet or SSH
IPv6 ACL : Similar to IPv4 ACLs but designed for IPv6 traffic
What are the 2 different types of firewalls when it comes to checking the network traffic and how
do they function ? - CORRECT ANSWER -Stateful : checks monitors are connections and data
streams going across a network. Does a thorough job of keeping the network safe and also keeps
a record of everything that goes across the network.
, Stateless : Stateless is the exact opposite as in it only check the header of the packets, doesn't
keep a record, and doesn't do a thorough job.
True of False : When buying a firewall they are always stateful ? - CORRECT ANSWER -False :
While many of the new generation of firewalls are stateful, there are many older firewalls and
virtual firewalls that aren't stateful.
What's the purpose of an access control list ? - CORRECT ANSWER -The purpose of the access
control list is to identify traffic on a network.
What are the two different ACL's and what are they key differences ? - CORRECT ANSWER -
Standard : Matches on the (Source) portion of the IP address. The only bad thing about Standard
is how you can provide complete trust or distrust. For Example : If you want to reach a source
destination outside your new, then you either have to allow full access out the network to any
destination or block the IP ADDRESS completely,
Extended : Filter on 5 fields Srce address, destination IP address, Source Port, Destination port,
and Protocol (HTTPS)
CAT 5 megs : - CORRECT ANSWER -100 Mbps
CAT 5E megs : - CORRECT ANSWER -1000 Mbps
CAT 6 megs : - CORRECT ANSWER -1000 Mbps / 10,000 Mbps cable under 100 meters
CAT 6a megs : - CORRECT ANSWER -10,000 Mbps
What are all the layers of the OSI Model in order ? - CORRECT ANSWER -1. Physical
2. Data Link
3. Network