Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings

Homework answers / question archive / Practice Questions 6

Practice Questions 6

Computer Science

Practice Questions 6.5.8

1)Which of the following is a privately controlled portion of a network that is accessible to some specific external entities? 


2. You are the office manager of a small financial credit business. Your company handles personal, financial information for clients seeking small loans over the internet. You are aware of your obligation to secure clients records, but budget is an issue. Which item would provide the best security for this situation?   


3. You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet form the library's computers. The students will use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose? 




Practice Questions 6.6.5

4. Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?


5. You have a company network that is connected to the Internet. You want all users to have Internet access, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?



6. You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer and order information. How should you place devices on the network to best protect the servers?


7. Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted Internet? 


8. Which of the following is likely to be located in a DMZ?  


9. Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches have been installed. Which solution should you use?


10. In which of the following situations would you most likely implement a demilitarized zone(DMZ)?


11. Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks? 




Practice Questions 6.7.5


12. Which of the following is a firewall function?


13. Which of the following are characteristics of a circuit-level gateway?


14. Which of the following are characteristics of a packet filtering firewall?


15. You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?   


16. You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?  


17. Which of the following is the best device to deploy to protect your private network from a public untrusted network?  


18. You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-bases attacks. What solution should you use? 


19. You connect your computer to a wireless network available at the local library. You find that you can access all web sites you want on the Internet except two. What might be causing the problem?


20. Which of the following functions are performed by proxies?

21. Which of the following are true of a circuit proxy filter firewall?


22. Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped? 


23.You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?  


24. You have just installed a packet-filtering firewall on your network. What options will you be able to set on your firewall?


25. When designing a firewall, what is the recommended approach for opening and closing ports?


26.Which of the following firewall types can be a proxy between servers and clients?





Practice Questions 6.8.4


27. You have a small network at home that is connected to the internet. On your home network you have a server with the IP address of You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow Internet hosts to contact the server to browse a persona Web site. What should you use to allow access?


28. You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these 5 servers?  


29. YOU want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement?


30.Which of the following in NOT one of the ranges of IP addresses define in RFC 1918 that are commonly used behind a NAT server?  


31. Which of the following network devices or services prevent the use of IPsec in most cases?


32. Which of the following is NOT a benefit of NAT? 





Practice Questions 6.9.7


33. You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?  


34.A VPN is used primarily for what purpose? 


35. Which VPN protocol typically employs IPsec as its data encryption mechanism? 


36. Which statement best describes IPsec when used in tunnel mode?


37. Which IPsec subprotocol provides data encryptions?


38.Which of the following is NOT a VPN tunnel protocol? 


39. Which is the best countermeasure for someone attempting to view your network traffic? 


40. PPTP is quickly becoming obsolete because of what VPN protocol?  


41.What is the primary use of tunneling? 


42. In addition to Authentication Header (AH), IPsec is comprised of what other service?






Practice Questions 6.10.5


43. Which of the following is a valid security measure to protect e-mail from viruses?


44. Which of the following prevents access based on website ratings and classifications?






Practice Questions 6.11.4


45. You have a company network with a single switch. All devices connect to the network through the switch. You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download. Which of the following components will be part of your solution? (Select two.)


46. Which step is required to configure a NAP on a Remote Desktop (RD) Gateway server?


47. In a NAP system, what is the function of the System Health Validator?


48. How does the IPsec NAP enforcement differ from other NAP enforcement methods?




Practice Questions 6.12.8


49. Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? 


50. Which of the following offers the WEAKEST form of encryption for an 802.11 wireless network? 


51. Which of the following features are supplied by WPA2 on a wireless network?


52. You need to secure your wireless network. Which security protocol would be the best choice? 


53. You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two)   


54. Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)


55.You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implement within each buildin. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two)  


56.How does WPA2 Differ from WPA?  


57.You need to configure the wireless network card to connect to your network at work. The connection should use a user name and password for authentication with AES encryption. What should you do?


58.You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?  


59.Which of the following is used on a wireless network to identify the network name?  


60.Which of the following are true about Wi-Fi protected access 2 (WPA2)? (Select two)


61.WIMAX is an implementation of which IEEE committee?


62. You want to connect a laptop computer running windows 7 to a wireless network. What should you do?






Option 1

Low Cost Option
Download this past answer in few clicks

4.83 USD


Already member?

Option 2

Custom new solution created by our subject matter experts


rated 5 stars

Purchased 8 times

Completion Status 100%

Sitejabber (5.0)

BBC (5.0)

Trustpilot (4.8)

Google (5.0)