Chapter 3
What function does URL filtering perform within a unified threat management (UTM) security appliance?
Which of the following best describes a DoS and a DDoS attack?
What is the role of a PTR record in the Domain Name System (DNS)?
What is the key difference between a transparent proxy and a non-transparent proxy?
Based on the information in RFC 7123 about the security implications of using IPv6 on an internal network, which of the following statements is true?
What is the purpose of the DHCP Offer in the DHCP communication process?
Which protocol provides connection-oriented traffic with guaranteed delivery?
What is the primary function of a router in a network?
What is the function of the AAAA-record in a Domain Name System (DNS)?
Which protocol is commonly blocked at firewalls and routers, disabling a ping response, preventing attackers from discovering devices in a network?
What is the purpose of LDAPS (LDAP Secure) in directory services?
What is the main purpose of Domain Name System Security Extensions (DNSSEC)?
What is the function of an MX record in a DNS server?
What protocol is the most commonly used for time synchronization?
What is the purpose of caching content in a proxy server for performance enhancement?
What is the major difference between a stateful and a stateless firewall?
What does MAC filtering in port security do?
Which protocol is commonly used for transporting voice and video over a network and provides encryption, message authentication, and integrity for RTP?
What is the purpose of the ’route add’ command in a system’s routing table?
In the context of Stateless Firewall Rules, what does the term ’implicit deny strategy’ refer to?
What does the ’route print’ command display on a computer system?
What happens if a network has too many computers on a single segment?
Which of the following statements about File Transfer Protocol (FTP) are correct?
What is an intranet in terms of networking?
What is the primary purpose of a network appliance?
What is the purpose of the ’id_rsa’ file in an OpenSSH system?
What is the main difference between an Intranet and an Extranet?
What function does a firewall serve in a network?
What is the use of the jump server in a network environment?
What is one of the key features that distinguishes a next-generation firewall (NGFW) from first and second generation firewalls?
What is the primary function of a Zero Trust Network?
Which protocol is an implementation of FTP that uses SSH to transmit files in an encrypted format?
What are the methods for achieving logical separation and segmentation in networking?
What does the term ’East-West traffic’ refer to within a network?
What is the purpose of the malware inspection component in a UTM appliance?
What is the function of the Address Resolution Protocol (ARP)?
Which of the following protocols is used to transfer smaller amounts of data, such as when communicating with network devices, and uses UDP port 69?
In computing, which TCP port does IMAP4 use for unencrypted connections, and which port for encrypted connections?
What functionalities does Spanning Tree Protocol (STP) or Rapid STP (RSTP) provide on a network?
Which of the following statements about nslookup and dig command-line tools is correct?
Which of the following is not true about network-based firewalls?
What is the correct form of a private IP address according to RFC 1918 in the IPv4 protocol?
What is the function of the DDoS mitigator in a unified threat management (UTM) appliance?
What is the primary purpose of physical isolation and air gaps in a network security context?
Which of the following best defines a unified threat management (UTM)?
What does the Real-time Transport Protocol (RTP) particularly deliver over IP networks?
What is the protocol number for ICMP?
What is the primary purpose of an A-record in the Domain Name System (DNS)?
What is true about network address allocation using Dynamic Host Configuration Protocol (DHCP)?
What does a DHCP client do to start getting a lease from a DHCP server?
What does the term ’Extranet’ refer to in network security?
What does a ’Content inspection’ feature in a Unified Threat Management (UTM) system involve?
What determines which protocols are enabled in a network?
How can Access Control Lists (ACLs) be utilized within a router for security?
Which statement correctly describes the User Datagram Protocol (UDP)?
What does DHCP snooping prevent on a network?
What is the primary purpose of the Domain Name System (DNS)?
Which TCP port does the Post Office Protocol v3 (POP3) use for encrypted connections?
Which command should Maggie use to create a public/private key pair for passwordless SSH login?
What is the purpose of the ’ssh-keygen -t rsa’ command in OpenSSH?
What is the role of the Data Link layer in the Open Systems Interconnection (OSI) model?
What is the role of a Web Application Firewall (WAF)?
What does a firewall’s implicit deny strategy do?
What is one of the primary functions of the Rapid Spanning Tree Protocol (RSTP)?
What are the only three IPv4 address ranges that should be allocated within a private network?
Secure Shell (SSH) is used for which of the following?
Which protocol is the designated replacement for SSL and should be used instead of SSL for browsers using HTTPS?
What is a key difference between SNMPv1/v2 and SNMPv3?
Which protocol and port number are used by SSH for encrypting traffic in transit?
What does the STARTTLS command allow in relation to SMTP?
What is the fundamental difference between a physical and a logical port in network devices?
How does the Spanning Tree Protocol (STP) or the Rapid STP (RSTP) protect a network?
What distinguishes FTPS from SFTP according to the provided information?
What command would Maggie use to initiate an SSH connection to the gcga server using the root account of the remote system?
Which of the following commands should Maggie use to create a public and private key pair?
What is one major benefit of Network Address Translation (NAT)?
What does the ’Permission’ element in ACLs for firewalls typically indicate?
What are some common protocols used for Subscription Services Use Cases?
Which of the following best describes how IPv6 addresses are expressed?
What does the Quality of Service refer to in relation to network management?
What does the ’implicit deny’ rule accomplish in an ACL?
What does a switch do when it turns on with no prior knowledge?
Which encryption protocol is designated as the replacement for SSL and should be used instead of SSL for browsers using HTTPS?
What is the primary purpose of a screened subnet or DMZ?
Why is physical isolation such as an air gap important in a supervisory control and data acquisition (SCADA) system?
What can help to prevent switching loop problems and broadcast storms in a network?
What is the function of proxy servers?
What is the primary use case of Unicast in an IPv4 network?
What are some elements involved in creating a secure network?
What is the main role of a ’reverse proxy’ in a network?
What is the purpose of an ’air gap’ in relation to network security?
Why do organizations replace hubs with switches, according to the given passage?
What is the main function of a host-based firewall?
What is the purpose of a CNAME record in a DNS server?
What are the TCP ports used by SMTP, POP3, IMAP4, HTTP and HTTPS common protocols?
What are the three primary factors used to filter packets by router ACLs?
What is a common reason users cannot connect to systems using Remote Desktop Protocol (RDP)?
What is layer 2 of the Open Systems Interconnection (OSI) model responsible for?
What is the primary purpose of DHCP snooping?
Based on the passage, how can ACLs on a router be used to filter traffic?
What is a sniffing attack in the context of network security?
Why is TLS recommended over SSL?
What happens when the DHCP sends an ’Acknowledge’ packet?
Which of the following is the primary purpose of HTTPS?
What is the function of the broadcast method in IPv4 addressing of TCP/IP traffic?
What does the ’Protocol’ element in an Access Control List (ACL) rule typically refer to on a firewall?
What is the function of a Bridge Protocol Data Unit (BPDU) Guard feature in a network?
What is the primary advantage of using VLANs in a network?
In the example provided, what command could Maggie use to connect to a server named ’gcga’ in the network while also initiating SSH connection using the root account of the remote system?
Which of the following best describes Dynamic NAT?
What is the purpose of a poisoning attack?
What is the purpose of executing the command ’ssh-copy-id gcga’ in the context of a Linux system using OpenSSH?
What is the key feature of Static NAT?
How is the ’Source’ defined within rules implemented in ACLs by stateless firewalls?
What is the main difference between Network Time Protocol (NTP) and Simple NTP (SNTP) in terms of time synchronization?
What is one of the benefits of using Network Address Translation (NAT)?
What is the primary function of the Session Initiation Protocol (SIP) in relation to voice, video, and messaging sessions?
Which of these common protocols do Google Mail uses for storing email on an email server?
Which protocol provides both broadcast storm prevention and loop prevention for switches?
What is the purpose of the ’Destination’ in rules within Access Control Lists (ACLs) used by firewalls?
Which of these protocols is used for connectionless sessions without a three-way handshake?
Which of the following use cases is NOT supported by switches?
What are the primary functions of the Secure Real-time Transport Protocol (SRTP)?
What’s one disadvantage of Network Address Translation (NAT)?
Which of the following protocols is used for testing basic connectivity and includes tools such as ping, pathping, and tracert?
Which of the following best describes port security as described in the passage?
Which protocol can be used to transfer encrypted files over a network and uses TCP port 22?
Which of the following protocols is NOT recommended for use when remotely administering systems, due to its lack of security?
What is the primary function of the ’route’ command in both Windows and Linux systems?
What is the purpose of the SOA (start of authority) record in DNS?
What does the ’-J’ switch in the ’ssh -J maggie@jump maggie@ca1’ command represent?
Last updated