Deck 24: Network
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/16
العب
ملء الشاشة (f)
Deck 24: Network
1
Which of the following devices is capable of providing infrastructure security and is used for packet filtering purposes?
A)Router
B)Hub
C)Switch
D)NIC
A)Router
B)Hub
C)Switch
D)NIC
Router
2
Jack wants to implement a remote access solution that will enable mobile users to access the corporate network. Which of the solutions should you use to enable laptop users to connect to the corporate network and access all resources and e-mail?
A)ISDN
B)VLAN
C)VPN
D)SSL
A)ISDN
B)VLAN
C)VPN
D)SSL
VPN
3
Which of the following NAT models provides the maximum security benefits in hiding the internal network's addressing structure from the external network?
A)Secure NAT
B)Dynamic NAT
C)Static NAT
D)Overloading NAT
A)Secure NAT
B)Dynamic NAT
C)Static NAT
D)Overloading NAT
Overloading NAT
4
Which type of NAT models performs a one-to-one mapping of an internal IP address to an external IP address?
A)Dynamic NAT
B)Overloading NAT
C)One-to-one NAT
D)Static NAT
A)Dynamic NAT
B)Overloading NAT
C)One-to-one NAT
D)Static NAT
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is an area on the network that allows a technician to place a public-facing system on it without compromising the entire infrastructure?
A)VLAN
B)VPN
C)NAT
D)DMZ
A)VLAN
B)VPN
C)NAT
D)DMZ
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following NIDS configurations is based solely on specific network traffic?
A)Anomaly based
B)Behavior based
C)Signature based
D)Passive IDS
A)Anomaly based
B)Behavior based
C)Signature based
D)Passive IDS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following best describes the purpose of an SSID in a wireless network?
A)Identifying the network
B)Better signal strength
C)Better connectivity
D)Encryption
A)Identifying the network
B)Better signal strength
C)Better connectivity
D)Encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following device/application monitors network traffic passively?
A)Web browser
B)IDS
C)Firewall
D)Sniffer
A)Web browser
B)IDS
C)Firewall
D)Sniffer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following statements best suits the working of DSSS?
A)Communicates by adding data that is to be transmitted to a low speed transmission.
B)Communicates by breaking the data into sub signals and transmitting them.
C)Communicates by hopping the transmission over a range of predefined frequencies.
D)Communicates by adding data that is to be transmitted to a higher speed transmission.
A)Communicates by adding data that is to be transmitted to a low speed transmission.
B)Communicates by breaking the data into sub signals and transmitting them.
C)Communicates by hopping the transmission over a range of predefined frequencies.
D)Communicates by adding data that is to be transmitted to a higher speed transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which type of firewall functions at the network layer of the OSI Model?
A)Application-Level Gateway
B)Circuit-Level Firewall
C)Packet Filtering Firewall
D)Network Bridge
A)Application-Level Gateway
B)Circuit-Level Firewall
C)Packet Filtering Firewall
D)Network Bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?
A)802.11g
B)802.11a
C)802.11b
D)802.11-1997
A)802.11g
B)802.11a
C)802.11b
D)802.11-1997
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
12
John wants to implement a proxy server with a functionality that controls the websites accessed by the employees of the organization. Which of these proxies would serve his purpose?
A)Blocking proxy
B)Caching proxy
C)Web proxy
D)Content-filtering proxy
A)Blocking proxy
B)Caching proxy
C)Web proxy
D)Content-filtering proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
13
David wants to install a proxy server that can reduce the organization's upstream bandwidth usage, reduce cost, and improve the network performance. Which of these could serve his purpose?
A)Hostile proxy
B)Content-filtering proxy
C)Web proxy
D)Caching proxy
A)Hostile proxy
B)Content-filtering proxy
C)Web proxy
D)Caching proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
14
What IEEE standard describes port switching which is also known as port-based Network Access Control (PNAC)?
A)802.1x
B)NAT
C)VPN
D)802.11g
A)802.1x
B)NAT
C)VPN
D)802.11g
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
15
Using one externally facing address to communicate between an internal network and external networks would best describe what?
A)Virtualization
B)DMZ
C)NAT
D)Subnetting
A)Virtualization
B)DMZ
C)NAT
D)Subnetting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is a sniffer used for?
A)Detecting environmental variables in MDFs.
B)Collecting data from network traffic flow.
C)Examining files as they are scanned into a computer.
D)Encrypting data traveling from a computer to a server.
A)Detecting environmental variables in MDFs.
B)Collecting data from network traffic flow.
C)Examining files as they are scanned into a computer.
D)Encrypting data traveling from a computer to a server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 16 في هذه المجموعة.
فتح الحزمة
k this deck