1.
A(n) ____ is a fancy term for a computer that has two network interfaces.
Correct Answer
B. Duel-homed host
Explanation
A duel-homed host is a computer that has two network interfaces. This means that it is connected to two different networks simultaneously. The term "duel-homed" refers to the fact that the host has a connection to two separate networks, allowing it to act as a bridge or gateway between the two. This type of setup is often used for network security purposes, as it allows for the segregation of different types of network traffic and can help prevent unauthorized access.
2.
A(n) ____ host is sometimes called a dual-homed gateway or bastion host.
Correct Answer
C. Screened
Explanation
A screened host is sometimes called a dual-homed gateway or bastion host. This type of host acts as a secure intermediary between an internal network and an external network, such as the internet. It filters and monitors incoming and outgoing network traffic, allowing only authorized communication to pass through. By doing so, it enhances the security of the internal network by preventing unauthorized access and protecting sensitive information.
3.
The ____ server in the DMZ needs only list a limited number of public IP addresses.
Correct Answer
A. DNS
Explanation
The DNS server in the DMZ needs only to list a limited number of public IP addresses because its main function is to translate domain names into IP addresses. It does not require extensive IP address management or routing capabilities like NAT, proxy, or firewall servers. The DNS server simply needs to have a record of the public IP addresses associated with the domain names it is responsible for resolving.
4.
A(n) ____ server is a server that creates a secure tunnel connection.
Correct Answer
B. VPN
Explanation
A VPN (Virtual Private Network) server is a server that creates a secure tunnel connection. This connection allows users to access the internet securely, as it encrypts their data and hides their IP address. VPNs are commonly used by individuals and organizations to protect their online privacy and security, as well as to bypass geo-restrictions and access restricted content. Therefore, a VPN server is the correct answer as it specifically refers to a server that creates a secure tunnel connection.
5.
What is one advantage of setting up a DMZ with two firewalls?
Correct Answer
A. You can control where traffic goes in the three networks
Explanation
Setting up a DMZ with two firewalls allows for the control of traffic flow between the three networks. By configuring the firewalls, traffic can be directed to specific destinations, ensuring that it reaches the intended network while blocking unauthorized access. This provides a higher level of security and control over network communication.
6.
A system that monitors traffic into and out of a network and automatically alerts personnel when suspicious traffic patterns occur, indicating a possible unauthorized intrusion attempt is called a(n) __________________.
Correct Answer
A. IDS
Explanation
An IDS (Intrusion Detection System) is a system that monitors network traffic and alerts personnel when suspicious patterns occur, suggesting a possible unauthorized intrusion attempt. Unlike a firewall or router, which primarily focus on controlling network traffic, an IDS specifically looks for signs of malicious activity. While antivirus software is designed to detect and remove malware on individual devices, it is not specifically tailored to monitor network traffic for intrusion attempts. Therefore, an IDS is the most appropriate answer for a system that performs this specific function.
7.
In an IP packet header, the ____ is the address of the computer or device that is to receive the packet.
Correct Answer
C. Destination address
Explanation
The destination address in an IP packet header refers to the address of the computer or device that is intended to receive the packet. This address helps in routing the packet to the correct destination on the network.
8.
In an IP packet header, the ____ describes the header's length in 32-bit words and is a 4-bit value.
Correct Answer
A. Internet header length
Explanation
The Internet header length field in an IP packet header is a 4-bit value that specifies the length of the header in 32-bit words. This field is important for correctly parsing and processing the IP packet, as it allows the receiving device to determine the size of the header and locate the start of the data payload.
9.
What tells a firewall how to reassemble a data stream that has been divided into packets?
Correct Answer
D. The header checksum field in the packet header
Explanation
The header checksum field in the packet header is used by a firewall to reassemble a data stream that has been divided into packets. This field contains a value that is calculated based on the contents of the packet header, including the source and destination IP addresses, protocol information, and other fields. By verifying the checksum, the firewall can ensure that the packets are received in the correct order and without any errors.
10.
What is the most effective security approach for a stateless packet filter?
Correct Answer
A. Deny all except specified hosts
Explanation
The most effective security approach for a stateless packet filter is to deny all except specified hosts. This means that all incoming traffic is blocked by default, except for the specified hosts that are explicitly allowed. This approach ensures that only trusted hosts are granted access, minimizing the risk of unauthorized access or malicious attacks. By denying all other traffic, it provides a strong layer of protection for the network and its resources.
11.
What TCP port is used by Telnet?
Correct Answer
C. 23
Explanation
Telnet is a protocol used to establish a remote connection to a device over a network. It uses TCP port 23 for communication. The other options, 80, 110, and 72, are not associated with Telnet. Port 80 is used for HTTP, port 110 is used for POP3, and port 72 is not commonly used for any specific protocol. Therefore, the correct answer is 23.
12.
What TCP port is used to filter out Web traffic?
Correct Answer
D. 80
Explanation
Port 80 is used for filtering out web traffic. This is because port 80 is the default port for HTTP (Hypertext Transfer Protocol) which is the protocol used for transmitting web pages and other web content over the internet. By filtering traffic on port 80, network administrators can control and manage web access, allowing or blocking certain websites or content based on their organization's policies.
13.
Some _ ____ firewalls can examine the contents of packets and the headers for signs that they are legitimate.
Correct Answer
B. Stateful
Explanation
Stateful firewalls are able to examine the contents of packets and the headers for signs that they are legitimate. Unlike stateless firewalls, which only look at individual packets without considering the context, stateful firewalls keep track of the state of connections and can make more informed decisions about allowing or blocking traffic based on the entire communication session. This allows stateful firewalls to provide better security by detecting and preventing certain types of attacks that may be missed by stateless firewalls.
14.
What is the most common command to use ICMP?
Correct Answer
A. Ping
Explanation
Ping is the most common command to use ICMP. ICMP (Internet Control Message Protocol) is a network protocol used for diagnostic and error reporting purposes. The Ping command sends an ICMP Echo Request message to a specific IP address or domain name and waits for an ICMP Echo Reply message. This is commonly used to test network connectivity and measure the round-trip time for packets to reach their destination and return.
15.
What port does secure HTTP use?
Correct Answer
D. 443
Explanation
Secure HTTP, also known as HTTPS, uses port 443. This port is specifically designated for secure communication using the SSL/TLS protocol. When a client connects to a server using HTTPS, the communication is encrypted to ensure the confidentiality and integrity of the data being transmitted. Port 443 is commonly used by web browsers to establish secure connections with websites, allowing for secure transmission of sensitive information such as login credentials, credit card details, and personal data.
16.
What port does DNS use for connection attempts?
Correct Answer
C. 53
Explanation
DNS (Domain Name System) uses port 53 for connection attempts. DNS is responsible for translating domain names into IP addresses, allowing users to access websites by typing in the domain name instead of the IP address. When a device wants to connect to a DNS server to resolve a domain name, it sends a request to the DNS server using port 53. The DNS server then responds with the corresponding IP address, enabling the device to establish a connection with the desired website or service.
17.
FTP uses port ____ for the control port.
Correct Answer
B. 21
Explanation
FTP (File Transfer Protocol) uses port 21 for the control port. The control port is responsible for establishing and managing the FTP session between the client and the server. It is used for sending commands and receiving responses related to file transfers. Port 20 is used for the data port, which is responsible for transferring the actual files. Port 22 is used for SSH (Secure Shell) connections, while port 23 is used for Telnet connections.
18.
A datagram is called ______ at the physcial layer of OSI.
Correct Answer
D. Packets
Explanation
At the physical layer of the OSI model, a datagram is referred to as "packets". In networking, a packet is a unit of data that is transmitted over a network. It contains the necessary information for routing and delivery, including the source and destination addresses. The physical layer is responsible for transmitting these packets as a series of bits, which are then received and processed by the receiving device. Therefore, the correct answer is "packets".
19.
A datagram is called ______ at the network layer of OSI.
Correct Answer
D. Packets
Explanation
At the network layer of the OSI model, a datagram is referred to as packets. A datagram is a self-contained unit of data that includes the source and destination IP addresses, as well as the actual data being transmitted. These packets are used to transport data across different networks, and they are independent entities that can be routed individually.
20.
A ________-level proxy provides protection at the session layer of OSI.
Correct Answer
B. Circuit
Explanation
A circuit-level proxy provides protection at the session layer of OSI. This type of proxy establishes a connection between the client and the server, and then relays the data between them. It operates at the session layer by managing the session and maintaining state information. Circuit-level proxies can provide security features such as authentication and encryption, making them an effective tool for protecting network communications at the session layer.
21.
Ports up to _______ are called well-known ports.
Correct Answer
C. 1023
Explanation
Well-known ports are the ports that are commonly used by specific protocols or services. These ports range from 0 to 1023 and are assigned by the Internet Assigned Numbers Authority (IANA). Therefore, the correct answer is 1023.
22.
A stateful firewall maintains a ___________, which is a list of active connections.
Correct Answer
C. State table
Explanation
A stateful firewall maintains a state table, which is a list of active connections. This table keeps track of the state of each connection, such as whether it is established, closed, or in the process of being established. By maintaining this state table, the firewall can make more informed decisions about allowing or blocking traffic based on the current state of the connection.
23.
_______________ is an error-checking procedure performed in the trailer section of an IP packet.
Correct Answer
A. CRC
Explanation
CRC (Cyclic Redundancy Check) is an error-checking procedure performed in the trailer section of an IP packet. It is used to detect errors in the transmitted data by generating a checksum value based on the data and appending it to the packet. Upon receiving the packet, the receiver performs the same calculation and compares the checksum value. If it matches, the packet is assumed to be error-free. If not, it indicates that errors have occurred during transmission. Therefore, CRC is used to ensure the integrity of data during transmission.
24.
This 8-bit value identifies the maximum time the packet can remain in the system before it is dropped.
Correct Answer
B. Time to live
Explanation
The time to live (TTL) is an 8-bit value that identifies the maximum time a packet can remain in the system before it is dropped. This value is decremented by routers as the packet travels through the network, and if it reaches zero, the packet is discarded. The TTL prevents packets from circulating indefinitely in the network, ensuring efficient routing and preventing congestion.
25.
Zone Alarm is an example of a ________ firewall.
Correct Answer
A. Personal
Explanation
Zone Alarm is an example of a personal firewall because it is designed to protect individual users and their personal devices from unauthorized access and threats while connected to the internet. It provides a level of security that is suitable for personal use, such as protecting personal computers and home networks, rather than being designed for large-scale corporate networks or specialized intrusion detection systems (IDS).
26.
___________ is another term for a packet of digital information.
Correct Answer
D. Datagram
Explanation
A datagram is another term for a packet of digital information. A datagram is a self-contained unit of data that is transmitted over a network. It includes both the data being transmitted and the necessary addressing and control information. This term is commonly used in network protocols such as IP (Internet Protocol), where data is divided into smaller units called datagrams for efficient transmission and routing. Therefore, the correct answer is datagram.
27.
The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called _____________.
Correct Answer
A. Least privilege
Explanation
The practice of designing operational aspects of a system to work with a minimal amount of system privilege is called "least privilege". This means that users are only given the necessary permissions and privileges to perform their specific tasks, reducing the risk of unauthorized access or misuse of system resources. It helps to limit the potential damage that can be caused by a compromised account or application by restricting access to sensitive information and critical system functions.
28.
A firewall needs to be ____ so that it can grow with the network it protects.
Correct Answer
D. Scalable
Explanation
A firewall needs to be scalable so that it can adapt and expand along with the network it is protecting. As the network grows in size and complexity, the firewall should have the capability to handle the increased traffic and demands without compromising its effectiveness. Being scalable ensures that the firewall can accommodate future growth and maintain its ability to provide adequate protection for the network.