questions with correct answers
You want to maintain security on your internal network - CORRECT ANSWERS
✔✔53
Using the Netstat command, you notice that a remote system - CORRECT ANSWERS
✔✔Downloading a file
You want to allow your users to download files from a server running the TCP -
CORRECT ANSWERS ✔✔FTP
After blocking a number of ports to secure your server - CORRECT ANSWERS
✔✔Open port 25 to allow SMTP service
Users complain that they can't connect to the website when they type - CORRECT
ANSWERS ✔✔The HTTP port should be changed to 80
Which of the following does a router acting as a firewall use to control packets -
CORRECT ANSWERS ✔✔ACL
You have a company network that is connected to the Internet. You want all users -
CORRECT ANSWERS ✔✔Use firewalls to create a DMZ. Web Inside / Private
Behind
,You have just installed a packet-filtering firewall - CORRECT ANSWERS ✔✔Port
number/source address of a packet/destination address of a packet
Which of the following describes how access lists - CORRECT ANSWERS ✔✔An
access list filters traffic based on the IP header information such as source or
destination IP address, protocol, or socket numbers.
You have used firewalls to create a demilitarized zone - CORRECT ANSWERS
✔✔Put the Database on the private network/Put the Web server inside the DMZ
when designing a firewall, what is the recommended approach - CORRECT
ANSWERS ✔✔Close all ports, open only ports required
Match the firewall type - CORRECT ANSWERS ✔✔Layer 2- V
Layer 3- R
Counts-R
Does-V
Different-R
Same-V
Your Cisco router has three - CORRECT ANSWERS ✔✔Add a permit
Which firewall implementation creates a buffer - CORRECT ANSWERS ✔✔DMZ
Which of the following are true about routed firewalls - CORRECT ANSWERS
✔✔Supports
,Counts
An All-in-one security appliance is best - CORRECT ANSWERS ✔✔a Remote
Which of the following features are common functions - CORRECT ANSWERS
✔✔Bandwith shaping
Spam Filtering
You recently installed a new all-in-one security appliance in a remote office -
CORRECT ANSWERS ✔✔Change the default
Configure the device's authentication
Which of the following prevents access based on website ratings - CORRECT
ANSWERS ✔✔Content filter
You manage a server that runs your company website - CORRECT ANSWERS
✔✔Proxy Server
Based on the diagram, which type of proxy is handling the client's request -
CORRECT ANSWERS ✔✔Reverse
Which of the following network services or protocols uses TCP/IP port 22 -
CORRECT ANSWERS ✔✔SSH
Which port number is used by SNMP - CORRECT ANSWERS ✔✔161
, Which protocol and port number is used by BOOTP - CORRECT ANSWERS
✔✔UDP 67
To increase security on your company's internal network - CORRECT ANSWERS
✔✔443
You are monitoring network traffic on your network and you see a large amount of
traffic between a Windows - CORRECT ANSWERS ✔✔The workstation is using
NetBIOS to access shared resources on the server
You are monitoring network traffic on your network, and you see traffic between two
network hosts on port 2427 - CORRECT ANSWERS ✔✔Someone is using Voice over
IP VOIP
You have been given a laptop to use for work - CORRECT ANSWERS ✔✔Host-based
You have just installed a packet-filtering firewall on your network - CORRECT
ANSWERS ✔✔Destination address
Port number
Source address
You provide Internet access for a local school - CORRECT ANSWERS
✔✔Application Level
A small startup company has hired - CORRECT ANSWERS ✔✔The UTM represents
a single point of failure