Home > Articles > Certification > Other IT

  • Print
  • + Share This
This chapter is from the book

Objective 3.3: Security Topologies

  1. Which of the following are known as the registered ports, according to the IANA?

    1. Ports 1 to 255

    2. Ports 255 to 1024

    3. Ports 1024 to 49151

    4. Ports 1025 to 65535

Objective 3.3.1: Security Zones

  1. Which of the following terms could be considered security zones? (Select all that apply.)

    1. Intranet

    2. Internet

    3. DMZ

    4. Extranet

Objective 3.3.1.1: DMZ

  1. You have decided to create a DMZ to allow public access to your business assets. Which of the following should you place within the DMZ? (Select all that apply.)

    1. Web server

    2. Proxy server

    3. Email server

    4. FTP server

Objective 3.3.1.2: Intranet

  1. Which of the following security zones is considered to be a private company network?

    1. Forward lookup zone

    2. Internal lookup zone

    3. Intranet

    4. Internet

  2. Which of the following characteristics of an intranet are true? (Select all that apply.)

    1. An intranet can be a part of a Local Area Network (LAN)

    2. An intranet is designed to be publicly available

    3. An intranet can work with Wide Area Networks (WAN)

    4. An intranet may be restricted to a community of users

Objective 3.3.1.3: Extranet

  1. Which of the following security zones is designed to allow one company to connect to another company through trust relationships and possible tunneling technology?

    1. Intranet

    2. DMZ

    3. Extranet

    4. Internet

Objective 3.3.2: VLANs

  1. When you think of Virtual Local Area Networks (VLANs), how are workstations connected? (Select all that apply.)

    1. Same functional department

    2. Same LAN geographic location

    3. Same group of users

    4. Same application

  2. Which one of the following is software used to logically connect workgroups, thereby improving network performance for group members in different physical locations?

    1. Virtual Private Network (VPN)

    2. Virtual Local Area Network (VLAN)

    3. Remote Authentication Dial-in User Service (RADIUS)

    4. Network Address Translation (NAT)

  3. You are in charge of a large network and have been using many devices. You finally want to subnet your network and allow users from the sales department in one office to communicate with sales representatives in another city. Which device should you use to improve connectivity?

    1. Router

    2. VLAN

    3. Brouter

    4. Bridge

Objective 3.3.3: NAT

  1. A company desires to use a private addressing scheme for their LAN users. What solution should they implement?

    1. NAT

    2. Honey pot

    3. IDS

    4. Proxy server

  2. Which of the following is relatively more secure than proxy, because it assigns private IP addresses to the clients on your LAN, acting as a firewall?

    1. RADIUS

    2. Internet Control Message Protocol (ICMP)

    3. Network Address Translation (NAT)

    4. ICMP Router Discovery Protocol (IRDP)

  3. What is the primary purpose for Network Address Translation (NAT)?

    1. Multiple users sharing one IP address for Instant Messenger (IM)

    2. Hiding the IP addresses of the internal network from those outside of the network

    3. Showing the IP addresses of the external network to clients on the internal network

    4. Single users gaining access to multiple email accounts

  4. Which of the following are true statements about Network Address Translation (NAT)? (Select all that apply.)

    1. Provides for private addressing ranges for internal network

    2. Hides the true IP addresses of internal computer systems

    3. Ensures that private addresses can be globally routable

    4. Translates private IP addresses into registered Internet IP addresses

  5. Which of the following is an example of a private IP address, which is not to be used on the Internet?

    1. 10.13.40.15

    2. 131.10.42.5

    3. 129.101.22.15

    4. 193.10.143.105

  6. Which of the following is an example of a private IP address, which is not to be used on the Internet?

    1. 171.15.40.32

    2. 172.46.32.2

    3. 171.90.22.1

    4. 172.16.12.5

  7. Which of the following is an example of a private IP address, which is not to be used on the Internet?

    1. 172.111.12.15

    2. 192.168.141.15

    3. 192.165.142.15

    4. 19.176.134.15

Objective 3.3.4: Tunneling

  1. Which of the following applies to the networking concept of tunneling? (Select all that apply.)

    1. Private network data is encapsulated or encrypted

    2. Public network data is encapsulated or encrypted

    3. Private data is transmitted over a public network

    4. Private network data is lost in a black hole

  2. There are several tunneling protocols. Which of the following are types of VPN remote computing tunneling protocols? (Select all that apply.)

    1. LP

    2. L2F

    3. L2TP

    4. PPTP

  • + Share This
  • 🔖 Save To Your Account