2 Ch7-

11 September 2022
4.7 (114 reviews)
19 test answers

Unlock all answers in this set

Unlock answers (15)
question
You want to be able to access you home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. What should you do?
answer
Open the firewall port for the remote desktop protocol.
question
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall?
answer
-110 -25
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the Internet; but you are unable to perform secure credit card transactions when making purchases from ecommerce websites. Which ports need to be enabled to allow secure transactions?
answer
443
question
You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You pen ports 80, 25, 110 and 143. What applications are most likely to be hosted on the server?
answer
web server, email server
question
Which is the best device to deploy to protect your private network from a public untrusted network?
answer
Firewall
question
Which is a firewall function?
answer
Packet filtering
question
In which of the following situations should you install a firewall?
answer
You want to restrict Internet users from accessing private date on you network.
question
To access your company's internet network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible? Which port needs to remain open so you can still work from home?
answer
22
question
A local dentist has contracted you to implement a network in her new office. *No one from the Internet should be able to access her internal network. *Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. *Employees should be blocked from accessing non-work related web sites, especially sites that contain inappropriate content. *A system should be put in place to detect and prevent external attacks on her network.
answer
Implement an all-in-one security appliance.
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network.
question
Which of the following networking devices or services prevents the establishment of VPN connections in most situations?
answer
NAT.
question
Your organization employs a group of traveling salespeople who need to access the corporate home network through the Internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which solution should you implement?
answer
VPN concentrator.
question
A salesperson in your organization spends most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration?
answer
Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
answer
PPTP.
question
Which of the following protocols can you portable computer use to connect to your company's network via a virtual tunnel through the Internet?
answer
PPTP. L2TP.
question
Which of the following protocols provides authentication and encryption services for VPN traffic?
answer
IPsec.
question
Which of the following statements about an SSL VPN are true?
answer
Uses port 443. Encrypts the entire communication session.
question
CH 7
answer
defin
question
CH 8
answer
answer