14.8.7
pdf
keyboard_arrow_up
School
Phoenix College *
*We aren’t endorsed by this school
Course
270
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
10
Uploaded by MinisterOstrich3448
11/28/23,
2:57
PM
TestOut
LabSim
14.8.7
Practice
Questions
Candidate:
Micah
Galvan
(MIC2315228@maricopa.edu)
Date:
11/28/2023
2:57:13
pm
*
Time
Spent:
02:01
Score:
100%
Passing
Score:
80%
—
¥
Question
1:
v/
Correct
Which
of
the
following
provides
a
set
of
rules
that
specify
which
types
of
network
traffic
are
allowed
through
a
firewall?
Circuit-layer
gateway
Application-level
gateway
)
ACL
Packet
filtering
Explanation
ACLs
(access
control
lists)
are
sets
of
rules
used
by
firewalls.
They
specify
which
types
of
network
traffic
are
allowed
through
the
firewall.
Any
traffic
that
does
not
match
the rules
are
blocked.
Packet
filtering,
circuit-layer
gateways,
and
application-level
gateways
are
types
of
firewalls
that
use
ACLs
to
filter
network
traffic.
References
@
14.8.1
Firewalls
[:R
14.8.2
Configure
Windows
Firewall
—|
14.8.3
Firewall
Facts
g_net_firew_access_control_list_pp7.question.fex
https://labsimapp.testout.com/v6_0_576/exam-engine.html/b1cf1¢c19-b777-457e-abb7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027
...
1710
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
2:
v/
Correct
For
some
time
now,
you
have
been
using
an
application
on
your
Windows
11
computer
at
home
and
while
in
the
office.
This
application
communicates
with
the
internet.
Today,
your
team
lead
decides
to
have
a
special
team
meeting
at
a
local
hotel.
During
this
meeting,
you
obtain
access
to
the
internet
using
the hotel's
network,
but
when
you
try
to
run
your
application,
it
cannot
communicate
with
the
internet.
Which
of
the
following
Windows
settings
is
MOST
likely
causing
this
behavior?
Network
&
internet
Bluetooth
&
devices
Windows
permissions
=
Firewall
&
security
Explanation
The
Firewall
&
security
settings
let
you
configure
which
applications
have
access
in
and
out
of
your
computer
by
means
of
the
internet.
This
helps
to
protect
your
computer,
your
data,
and
even
your
identity.
Since
the
application
had
access
at
home
(a
private
network)
and
at
the
office
(a
domain
network),
but not
in
the hotel
(a
guest
or
public
network),
the
most
likely
scenario
is
that
this
application
is
being
blocked
by
the
firewall's
Public
network
settings
under
Firewall
&
security
settings.
Network
&
internet
settings
let
you
configure
and
connect
to
Ethernet
and
Wi-Fi
networks,
VPNs,
and
proxy
servers.
Windows
permissions
includes
settings
for
speech
recognition,
your
personal
dictionary,
activity
history,
diagnostics,
and
feedback.
Bluetooth
&
devices
includes
settings
for
connecting
to
printers,
cell
phones,
cameras,
and
USB
notifications.
References
@
14.8.1
Firewalls
[:‘R
14.8.2
Configure
Windows
Firewall
IEI
14.8.3
Firewall
Facts
g_net_firew_app_connect_internet_issue_pp7.question.fex
https://labsimapp.testout.com/v6_0_576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027
...
2/10
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
3:
v/
Correct
Which
of
the
following
is
a
firewall
type
that
scans
network
traffic
based
on
TCP
or
UDP
transmission?
Access
control
list
Application-level
gateway
=
Circuit-layer
gateway
Packet
filtering
Explanation
A
circuit-layer
gateway
scans
network
traffic
based
on
TCP
or
UDP
transmission.
If
the
transmission
is
detected
as
legitimate,
the
packet
is
granted
access
while
the
link
remains
established.
Packet
filtering
is
one
of
the
most
common
types
of
firewalls.
It
scans
all
packets
and reads
the
source
and
destination
IP
addresses
along
with
port
numbers.
Then,
based
on
the
ACL,
the
firewall
rejects
any
packet
that
does
not
belong
to
that
network.
An
application-level
gateway
monitors
packet
contents.
Each
packet
has
information
about
what
application
can
use
that data.
The
ACL
then
dictates
whether
that
data
is
denied
or
allowed
on
the
network.
An
access
control
list
(ACL)
is
not
a
type
of
firewall.
It
is
a
set
of
rules
utilized
by
the
firewall
to
filter
network
traffic.
References
|E|
14.8.3
Firewall
Facts
g_net_firew_circuit_layer_gateway_pp7.question.fex
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027...
3/10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
4:
v/
Correct
You
are
trying
to
connect
from
outside
the
company
network
to
a
server
inside
the
company
network
using
RDP
(Remote
Desktop
Connection).
However,
the
connection
is
failing.
Which
network
device
does
your
network
administrator
MOST
likely
need
to
configure
to
allow
this
connection?
=
Firewall
Switch
Hub
Access
point
Explanation
A
firewall
filters
network
traffic
based
on
a
set
of
rules
(ACL).
The
network
administrator
most
likely
needs
to
configure
the
company's
network
firewall
to
allow
RDP
traffic.
A
switch
maintains
a
table
of
MAC
addresses
by
port
and
forwards
network
frames
to
only
the
port
that
matches
the
MAC
address.
An
access
point
grants
Wi-Fi
access
to
a
network.
A
hub
transmits
a
data
frame
to
every
port
except
the
port
that
received
the
data
frame.
References
[E]
14.7.1
Malware
IEI
14.7.2
Malware
Facts
—|
14.8.3
Firewall
Facts
g_net_firew_correct_rdp_connect_sol_pp7.question.fex
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027...
4/10
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
5:
v/
Correct
=
In
which
of
the
following
situations
should
you
install
a
firewall?
You
want
to
restrict
internet
users
from
accessing
private
data
on
your
network.
You
want
internet users
to
see
a
single
IP
address
when
accessing
your
company
network.
You
want
to
improve
internet
performance
by
saving
popular
websites
locally.
You
want
to
implement
a
password
system
for
internet
users
who
access
your
private
website.
Explanation
Firewalls
limit
traffic
by
blocking
connections
that
are
initiated
from
an
untrusted
network,
such
as
the
internet,
unless
the
traffic
matches
rules
you
configure
in
the
firewall's
access
control
list
(ACL).
Setting
up
a
single
IP
address
for
internet
users
when
accessing
your
company
network
usually
involves
using
and
configuring
a
router
and
does
not
involve
configuring
a
firewall.
Saving
popular
websites
locally
to
improve
performance
usually
involves
caching
website
information
for
your
web
browser
and
does
not
involve
configuring
a
firewall.
Implementing
a
password
system
for
your
private
website
is
a
function
of
your
web
server
and
does
not
involve
configuring
a
firewall.
References
@
14.7.1
Malware
14.7.2
Malware
Facts
14.8.3
Firewall
Facts
g_net_firew_install_situations_pp7.question.fex
https://labsimapp.testout.com/v6_0_576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027
...
5/10
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
6:
v/
Correct
You
want
to
be
able
to
access
your
home
computer
using
Remote
Desktop
while
traveling.
You
enable
Remote
Desktop,
but
you
find
that
you
cannot
access
your
computer
outside
of
your
home
network.
Which
of
the
following
is
the
BEST
solution
to
your
problem?
Move
your
home
computer
outside
of
the
firewall.
Open
the
firewall
port
for
the
Remote
Desktop
protocol.
Configure
a
VPN
connection
to
your
computer.
Open
the
Telnet
and
SSH
ports
in
your
firewall.
Explanation
You
need
to
open
the
firewall
port
for
the
Remote
Desktop
program.
Firewalls
prevent
all
traffic
except
authorized
traffic.
To
allow
a
specific
program,
open
the
port
that
corresponds
to
the
port
used
by
that
application.
Placing
your
computer
outside
of
the
firewall
leaves
it
open
to
attack.
Opening
the
Telnet
and
SSH
ports
on
your
firewall
will
not
resolve
the
issue
of
allowing
Remote
Desktop
to
function.
A
VPN
encrypts
communications
between
two
computers
through
the
internet.
However,
a
VPN
will
not
allow
a
Remote
Desktop
connection.
References
;=]
14.8.3
Firewall
Facts
g_net_firew_open_firewall_port_for_rdp_pp7.question.fex
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027...
6/10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
7:
v/
Correct
Which
of
the
following
is
a
type
of
firewall?
Protocol
converting
Encrypting
FTP
hosting
Packet
rearranging
-
Packet
filtering
Explanation
Firewalls
often
filter
packets
by
checking
each
packet
against
a
set
of
administrator-defined
criteria.
If
the
packet
is
not
accepted,
it
is
simply
dropped.
FTP
hosting
is
a
storage
space
for
storing
files
associated
with
an
FTP
server.
Encrypting
involves
converting
data
from
a
readable
format
into
an
encoded
format.
Packet
rearranging
(or
reordering)
is
an
issue
with
packets
arriving
at
a
destination
in
the
wrong
order.
Protocol
converting
enables
the
protocol
of
a
sending
device
to
be
recognized
by
a
receiving
device
that
might
be
using
a
different
communication
protocol.
References
—|
14.8.3
Firewall
Facts
g_net_firew_packet_filter_type_pp7.question.fex
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027...
7/10
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
8:
v/
Correct
Which
of
the
following
keeps
track
of
various
network
devices
while
ensuring
that
the
software
is
secure?
Firewall
=
Endpoint
management
server
Syslog
server
All-in-one
security
appliance
Explanation
An
endpoint
management
server
is
a
way
to
keep
track
of
various
devices
while
ensuring
that
software
is
secure.
Many
companies
that
need
small
IT
department
overhead
use
this
option.
An
all-in-one
security
appliance
(UTM)
combines
several security
functions
into
a
single
hardware
device.
However,
it
is
not
designed
to
help
you
keep
track
of
various
network
devices.
A
firewall
is
a
hardware
device
or
software
that
allows
you
to
filter
incoming
and
outgoing
network
traffic.
A
syslog
server
stores
event
messages,
but
is
not
designed
to
help
you
keep
track
of
various
network
devices.
References
[E]
11.4.6
Internet
Appliances
.=|
11.4.7
Internet
Appliances
Facts
@
14.8.5
Network
Appliances
IEI
14.8.6
Network
Appliance
Facts
g_net_utm_endpoint_mgmt_server_pp7.question.fex
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027...
8/10
11/28/23,
2:57
PM
TestOut
LabSim
¥
Question
9:
v/
Correct
A
local
dentist
has
contracted
with
you
to
implement
a
network
in
her
new
office.
Because
of
security
concerns
related
to
patient
privacy
laws,
she
has
asked
that
the
new
network
meet
the
following
criteria
and
be
cost
effective:
e
No
one
from
the
internet
should
be
able
to
access
her
internal
network.
e
Email
messages
should
be
scanned
for
spam,
phishing
attacks,
and
malware
before
they
reach
users'
workstations.
e
Employees
access
to
non-work-related
websites,
especially
sites
that
contain
inappropriate
content,
should
be
blocked.
e
A
system
should
be
putin
place
to
detect
and
prevent
external
attacks
on
her
network.
Which
of
the
following
would
BEST
meet
your
client's
criteria?
Implement
an
all-in-one
UTM
security
=
.
appliance.
Implement
an
intrusion
prevention
system
(IPS).
Implement
a
firewall.
Implement
an
email
security
appliance.
Implement
a
content
filter.
Explanation
The
network
criteria
specified
by
your
client
requires
several
different
network
devices
to
be
implemented,
including
a
firewall,
an
email
scanner,
a
content
filter,
and
an
intrusion
prevention
system.
The
most
cost-effective
way
to
best
meet
your
client's
criteria
would
be
an
all-in-one
UTM
security
appliance.
While
you
could
purchase
each
device
separately,
the
cost
of
doing
so
would
probably
be
quite
high.
Because
you
are
working
with
a
small
business,
an
all-in-one
security
appliance
that
includes
all
of
these
functions
in
a
single
device
would
be
more
cost-effective
and
easier
for
you
to
manage.
References
@
11.4.6
Internet
Appliances
.—|
11.4.7
Internet
Appliances
Facts
@
14.8.5
Network
Appliances
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027...
9/10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
11/28/23,
2:57
PM
TestOut
LabSim
El
14.8.6
Network
Appliance
Facts
g_net_utm_impl_all_in_one_sec_appliance_pp7.question.fex
¥
Question
10:
v/
Correct
Which
of
the
following
all-in-one
security
appliance
(UTM)
functions
detects
intrusions
and
alerts
the
network
but
does
not
block
traffic?
Anti-spam
VPN
Intrusion
protection
-
Intrusion
detection
Explanation
Intrusion
detection
detects
intrusions
and
alerts
the
network.
However,
it
does
not
block
traffic.
Intrusion
protection
detects
and
blocks
network
traffic
that
is
not
recognized
by
its
profile.
Anti-spam
is
designed
to
detect
and
block
certain
types
of
email.
A
VPN
encrypts
traffic
over
a
secure
network.
However,
a
VPN
does
not
block
traffic.
References
[E]
11.4.6
Internet
Appliances
—|
11.4.7
Internet
Appliances
Facts
[E]
14.8.5
Network
Appliances
EI
14.8.6
Network
Appliance
Facts
g_net_utm_intrusion_detection_pp7.question.fex
Copyright
©
2023
TestOut
Corporation
All
rights
reserved.
https://labsimapp.testout.com/v6_0
576/exam-engine.html/b1cf1¢c19-b777-457e-abb7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-402...
10/10