- Objective 3.1: Devices
- Objective 3.2: Media
- Objective 3.3: Security Topologies
- Objective 3.4: Intrusion Detection
- Objective 3.5: Security Baselines
- Quick Answers
- Answers and Explanations
Objective 3.3: Security Topologies
Which of the following are known as the registered ports, according to the IANA?
Ports 1 to 255
Ports 255 to 1024
Ports 1024 to 49151
Ports 1025 to 65535
Objective 3.3.1: Security Zones
Which of the following terms could be considered security zones? (Select all that apply.)
Intranet
Internet
DMZ
Extranet
Objective 3.3.1.1: DMZ
You have decided to create a DMZ to allow public access to your business assets. Which of the following should you place within the DMZ? (Select all that apply.)
Web server
Proxy server
Email server
FTP server
Objective 3.3.1.2: Intranet
Which of the following security zones is considered to be a private company network?
Forward lookup zone
Internal lookup zone
Intranet
Internet
Which of the following characteristics of an intranet are true? (Select all that apply.)
An intranet can be a part of a Local Area Network (LAN)
An intranet is designed to be publicly available
An intranet can work with Wide Area Networks (WAN)
An intranet may be restricted to a community of users
Objective 3.3.1.3: Extranet
Which of the following security zones is designed to allow one company to connect to another company through trust relationships and possible tunneling technology?
Intranet
DMZ
Extranet
Internet
Objective 3.3.2: VLANs
When you think of Virtual Local Area Networks (VLANs), how are workstations connected? (Select all that apply.)
Same functional department
Same LAN geographic location
Same group of users
Same application
Which one of the following is software used to logically connect workgroups, thereby improving network performance for group members in different physical locations?
Virtual Private Network (VPN)
Virtual Local Area Network (VLAN)
Remote Authentication Dial-in User Service (RADIUS)
Network Address Translation (NAT)
You are in charge of a large network and have been using many devices. You finally want to subnet your network and allow users from the sales department in one office to communicate with sales representatives in another city. Which device should you use to improve connectivity?
Router
VLAN
Brouter
Bridge
Objective 3.3.3: NAT
A company desires to use a private addressing scheme for their LAN users. What solution should they implement?
NAT
Honey pot
IDS
Proxy server
Which of the following is relatively more secure than proxy, because it assigns private IP addresses to the clients on your LAN, acting as a firewall?
RADIUS
Internet Control Message Protocol (ICMP)
Network Address Translation (NAT)
ICMP Router Discovery Protocol (IRDP)
What is the primary purpose for Network Address Translation (NAT)?
Multiple users sharing one IP address for Instant Messenger (IM)
Hiding the IP addresses of the internal network from those outside of the network
Showing the IP addresses of the external network to clients on the internal network
Single users gaining access to multiple email accounts
Which of the following are true statements about Network Address Translation (NAT)? (Select all that apply.)
Provides for private addressing ranges for internal network
Hides the true IP addresses of internal computer systems
Ensures that private addresses can be globally routable
Translates private IP addresses into registered Internet IP addresses
Which of the following is an example of a private IP address, which is not to be used on the Internet?
10.13.40.15
131.10.42.5
129.101.22.15
193.10.143.105
Which of the following is an example of a private IP address, which is not to be used on the Internet?
171.15.40.32
172.46.32.2
171.90.22.1
172.16.12.5
Which of the following is an example of a private IP address, which is not to be used on the Internet?
172.111.12.15
192.168.141.15
192.165.142.15
19.176.134.15
Objective 3.3.4: Tunneling
Which of the following applies to the networking concept of tunneling? (Select all that apply.)
Private network data is encapsulated or encrypted
Public network data is encapsulated or encrypted
Private data is transmitted over a public network
Private network data is lost in a black hole
There are several tunneling protocols. Which of the following are types of VPN remote computing tunneling protocols? (Select all that apply.)
LP
L2F
L2TP
PPTP