1/49
Practice Exam Questions: 1-23 & Exam Topic
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the Physical Layer up to the Application Layer.
False
In the OSI model, the Layer 4 TCP protocol data unit is referred to as:
Segment
Which of the answers listed below refers to the Physical Layer of the OSI model?
Layer 1
Layer 7 of the OSI model is also known as:
Application Layer
At which OSI layers is the protocol data unit referred to simply as data?
Application Layer, Presentation Layer, and Session Layer
Which of the following answers refers to Layer 5 of the OSI model?
Session Layer
What is the name of Layer 3 in the OSI model?
Network Layer
Which of the answers listed below refers to Layer 4 of the OSI model?
Transport Layer
Which of the following answers describe the characteristics of a router?
Connects multiple networks together
Operates at Layer 3 of the OSI model
Uses IP addresses to send data packets to their destination
Which of the answers listed below refer to a network switch?
Connects multiple devices within a single network
Uses MAC addresses to forward data frames to the correct port
Operates at Layer 2 of the OSI model
Which of the following answers refers to a hardware security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
Which of the answers listed below illustrates the difference between passive and active network security breach response?
IDS vs. IPS
Which of the following answers can be used to describe the characteristic features of an IDS?
Does not take direct action to block or prevent attacks
Generates alerts and notifies security personnel when suspicious activity is detected
Monitors network traffic without direct involvement in traffic routing or packet modification
Which of the answers listed below refer to an IPS?
Takes proactive measures to block or mitigate intrusion attempts
Operates in an inline mode, actively intercepting and inspecting network traffic
Can drop or reject network packets, terminate connections, or take other actions to stop the attack
A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is called:
Load Balancer
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
A dedicated storage appliance that can be added to a local network is known as:
NAS (Network Attached Storage)
A dedicated local network consisting of devices providing data access is called:
SAN (Storage Area Network)
A WAP is a specific type of AP that allows Wi-Fi capable devices to connect to a wired network.
True
Which network infrastructure device enables centralized management of WAPs?
Wireless LAN Controller (WLC)
One of the key benefits provided by a CDN is the improvement of:
Content load times
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
VPN (Virtual Private Network)
Which of the following answers refers to a solution that allows network administrators to prioritize certain types of network traffic?
QoS (Quality of Service)
A field in an IP packet that specifies how many more hops a packet can travel before being discarded is known as:
TTL (Time to Live)
Which of the answers listed below refers to a solution that enables the replacement of traditional network hardware functionalities with software via virtualization?
NFV (Network Functions Virtualization)
Which of the following terms can be used to describe an isolated network area hosted within a public cloud environment?
VPC (virtual private cloud)
Which of the answers listed below can be used to describe the concept of a Network Security Group (NSG)?
Provides firewall-like capabilities
Applies security rules to specific virtual NICs (more granular control)
Used for controlling inbound and outbound traffic in cloud computing environments
Which of the following answers refer to the characteristics of a Network Security List (NSL)
Provides firewall-like capabilities
Applies security rules at the subnet level (less granular control)
Used for controlling inbound and outbound traffic in cloud computing environments
A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet is called:
Internet Gateway
Which of the statements listed below describe the functions of a cloud gateway using NAT?
Enables instances within a VPC to access external networks
Translates private IP addresses to a public IP address
Restricts inbound connections from external networks
Which network connectivity option enables a secure, encrypted Internet connection between an on-premises network and cloud resources?
VPN (Virtual Private Network)
Which cloud connectivity option provides a dedicated, private connection between an on-premises network and a cloud provider?
Direct Connect
Which of the following answers refers to a cloud deployment model where computing resources (such as servers, storage, and applications) are owned and operated by a third-party cloud service provider and shared across multiple organizations or tenants?
Public Cloud
A type of cloud deployment model where cloud resources are used exclusively by a single organization is referred to as:
Private Cloud
A hybrid cloud is a cloud computing environment that combines elements of both public and private clouds.
True
A cloud computing service model that provides remote access to software applications based on a subscription fee is known as:
SaaS (Software as a Service)
Which of the answers listed below refers to a cloud computing service model where clients, instead of buying hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
IaaS (Infrastructure as a Service)
Which cloud computing service model would provide the best solution for a web developer intending to create a web app?
PaaS (Platform as a Service)
Which of the following terms refers to the ability of a system to handle increased load by gradually adding resources, such as additional servers or storage, in a planned and deliberate manner over time?
Scalability
Which of the terms listed below refers to the automatic and dynamic adjustment of resources based on real-time demand changes?
Rapid elasticity
Which of the following terms refers to a software architecture where multiple users, each with their own isolated environment and resources, are served by a single application instance?
Multitenancy
What is the function of FTP?
File exchange
Which of the answers listed below refers to a network protocol for secure file transfer over SSH?
SFTP (Secure File Transfer Protocol)
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:
SSH (Secure Shell)
What are three key characteristics of Telnet?
Provides username & password authentication
Transmits data in an unencrypted form
Enables remote login and command execution
Which of the following answers refers to a secure replacement for Telnet?
SSH ( Secure Shell)
The SMTP protocol is used for:
Sending email messages between mail servers
Sending email messages from a client device
Which of the answers listed below refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS (Domain Name System)
Which of the following network protocols provides an alternative solution to the manual allocation of IP addresses?
DHCP (Dynamic Host Configuration Protocol)
What are the characteristic features of TFTP?
Provides no security features
A very basic form of file-sharing protocol