1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the Physical Layer up to the Application Layer.
False
In the OSI model, the Layer 4 TCP protocol data unit is referred to as:
Segment
Which of the answers listed below refers to the Physical Layer of the OSI model?
Layer 1
Layer 7 of the OSI model is also known as:
Application Layer
At which OSI layers is the protocol data unit referred to simply as data?
Application Layer Presentation Layer Session Layer
Which of the following answers refers to Layer 5 of the OSI model?
Session Layer
What is the name of Layer 3 in the OSI model?
Network Layer
Which of the following answers describe the characteristics of a router?
Connects multiple networks together, Operates at Layer 3 of the OSI model, Uses IP addresses to send data packets to their destination
Which of the answers listed below refer to a network switch? (Select 3 answers)
Connects multiple devices within a single network , Uses MAC addresses to forward data frames to the correct port, Operates at Layer 2 of the OSI model
Which of the following answers refers to a hardware security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
Which of the answers listed below illustrates the difference between passive and active network security breach response?
IDS vs. IPS
Which of the following answers can be used to describe the characteristic features of an IDS? (Select 3 answers)
Does not take direct action to block or prevent attacks, Generates alerts and notifies security personnel or administrators when suspicious activity is detected, Monitors network traffic without direct involvement in traffic routing or packet modification
Which of the answers listed below refer to an IPS? (Select 3 answers)
Takes proactive measures to block or mitigate intrusion attempts, Operates in an inline mode, actively intercepting and inspecting network traffic, Can drop or reject network packets, terminate connections, or take other actions to stop the attack
A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is called:
Load balancer
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
A dedicated storage appliance that can be added to a local network is known as:
NAS
A dedicated local network consisting of devices providing data access is called:
SAN
A WAP is a specific type of AP that allows Wi-Fi capable devices to connect to a wired network.
True
Which network infrastructure device enables centralized management of WAPs?
Wireless LAN controller
One of the key benefits provided by a CDN is the improvement of:
Content load times
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
VPN
Which of the following answers refers to a solution that allows network administrators to prioritize certain types of network traffic?
QoS
A field in an IP packet that specifies how many more hops a packet can travel before being discarded is known as:
TTL
Which of the answers listed below refers to a solution that enables the replacement of traditional network hardware functionalities with software via virtualization?
NFV