14.8.7

pdf

School

Phoenix College *

*We aren’t endorsed by this school

Course

270

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

10

Uploaded by MinisterOstrich3448

Report
11/28/23, 2:57 PM TestOut LabSim 14.8.7 Practice Questions Candidate: Micah Galvan (MIC2315228@maricopa.edu) Date: 11/28/2023 2:57:13 pm * Time Spent: 02:01 Score: 100% Passing Score: 80% ¥ Question 1: v/ Correct Which of the following provides a set of rules that specify which types of network traffic are allowed through a firewall? Circuit-layer gateway Application-level gateway ) ACL Packet filtering Explanation ACLs (access control lists) are sets of rules used by firewalls. They specify which types of network traffic are allowed through the firewall. Any traffic that does not match the rules are blocked. Packet filtering, circuit-layer gateways, and application-level gateways are types of firewalls that use ACLs to filter network traffic. References @ 14.8.1 Firewalls [:R 14.8.2 Configure Windows Firewall —| 14.8.3 Firewall Facts g_net_firew_access_control_list_pp7.question.fex https://labsimapp.testout.com/v6_0_576/exam-engine.html/b1cf1¢c19-b777-457e-abb7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027 ... 1710
11/28/23, 2:57 PM TestOut LabSim ¥ Question 2: v/ Correct For some time now, you have been using an application on your Windows 11 computer at home and while in the office. This application communicates with the internet. Today, your team lead decides to have a special team meeting at a local hotel. During this meeting, you obtain access to the internet using the hotel's network, but when you try to run your application, it cannot communicate with the internet. Which of the following Windows settings is MOST likely causing this behavior? Network & internet Bluetooth & devices Windows permissions = Firewall & security Explanation The Firewall & security settings let you configure which applications have access in and out of your computer by means of the internet. This helps to protect your computer, your data, and even your identity. Since the application had access at home (a private network) and at the office (a domain network), but not in the hotel (a guest or public network), the most likely scenario is that this application is being blocked by the firewall's Public network settings under Firewall & security settings. Network & internet settings let you configure and connect to Ethernet and Wi-Fi networks, VPNs, and proxy servers. Windows permissions includes settings for speech recognition, your personal dictionary, activity history, diagnostics, and feedback. Bluetooth & devices includes settings for connecting to printers, cell phones, cameras, and USB notifications. References @ 14.8.1 Firewalls [:‘R 14.8.2 Configure Windows Firewall IEI 14.8.3 Firewall Facts g_net_firew_app_connect_internet_issue_pp7.question.fex https://labsimapp.testout.com/v6_0_576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027 ... 2/10
11/28/23, 2:57 PM TestOut LabSim ¥ Question 3: v/ Correct Which of the following is a firewall type that scans network traffic based on TCP or UDP transmission? Access control list Application-level gateway = Circuit-layer gateway Packet filtering Explanation A circuit-layer gateway scans network traffic based on TCP or UDP transmission. If the transmission is detected as legitimate, the packet is granted access while the link remains established. Packet filtering is one of the most common types of firewalls. It scans all packets and reads the source and destination IP addresses along with port numbers. Then, based on the ACL, the firewall rejects any packet that does not belong to that network. An application-level gateway monitors packet contents. Each packet has information about what application can use that data. The ACL then dictates whether that data is denied or allowed on the network. An access control list (ACL) is not a type of firewall. It is a set of rules utilized by the firewall to filter network traffic. References |E| 14.8.3 Firewall Facts g_net_firew_circuit_layer_gateway_pp7.question.fex https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027... 3/10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11/28/23, 2:57 PM TestOut LabSim ¥ Question 4: v/ Correct You are trying to connect from outside the company network to a server inside the company network using RDP (Remote Desktop Connection). However, the connection is failing. Which network device does your network administrator MOST likely need to configure to allow this connection? = Firewall Switch Hub Access point Explanation A firewall filters network traffic based on a set of rules (ACL). The network administrator most likely needs to configure the company's network firewall to allow RDP traffic. A switch maintains a table of MAC addresses by port and forwards network frames to only the port that matches the MAC address. An access point grants Wi-Fi access to a network. A hub transmits a data frame to every port except the port that received the data frame. References [E] 14.7.1 Malware IEI 14.7.2 Malware Facts —| 14.8.3 Firewall Facts g_net_firew_correct_rdp_connect_sol_pp7.question.fex https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027... 4/10
11/28/23, 2:57 PM TestOut LabSim ¥ Question 5: v/ Correct = In which of the following situations should you install a firewall? You want to restrict internet users from accessing private data on your network. You want internet users to see a single IP address when accessing your company network. You want to improve internet performance by saving popular websites locally. You want to implement a password system for internet users who access your private website. Explanation Firewalls limit traffic by blocking connections that are initiated from an untrusted network, such as the internet, unless the traffic matches rules you configure in the firewall's access control list (ACL). Setting up a single IP address for internet users when accessing your company network usually involves using and configuring a router and does not involve configuring a firewall. Saving popular websites locally to improve performance usually involves caching website information for your web browser and does not involve configuring a firewall. Implementing a password system for your private website is a function of your web server and does not involve configuring a firewall. References @ 14.7.1 Malware 14.7.2 Malware Facts 14.8.3 Firewall Facts g_net_firew_install_situations_pp7.question.fex https://labsimapp.testout.com/v6_0_576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027 ... 5/10
11/28/23, 2:57 PM TestOut LabSim ¥ Question 6: v/ Correct You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. Which of the following is the BEST solution to your problem? Move your home computer outside of the firewall. Open the firewall port for the Remote Desktop protocol. Configure a VPN connection to your computer. Open the Telnet and SSH ports in your firewall. Explanation You need to open the firewall port for the Remote Desktop program. Firewalls prevent all traffic except authorized traffic. To allow a specific program, open the port that corresponds to the port used by that application. Placing your computer outside of the firewall leaves it open to attack. Opening the Telnet and SSH ports on your firewall will not resolve the issue of allowing Remote Desktop to function. A VPN encrypts communications between two computers through the internet. However, a VPN will not allow a Remote Desktop connection. References ;=] 14.8.3 Firewall Facts g_net_firew_open_firewall_port_for_rdp_pp7.question.fex https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027... 6/10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11/28/23, 2:57 PM TestOut LabSim ¥ Question 7: v/ Correct Which of the following is a type of firewall? Protocol converting Encrypting FTP hosting Packet rearranging - Packet filtering Explanation Firewalls often filter packets by checking each packet against a set of administrator-defined criteria. If the packet is not accepted, it is simply dropped. FTP hosting is a storage space for storing files associated with an FTP server. Encrypting involves converting data from a readable format into an encoded format. Packet rearranging (or reordering) is an issue with packets arriving at a destination in the wrong order. Protocol converting enables the protocol of a sending device to be recognized by a receiving device that might be using a different communication protocol. References —| 14.8.3 Firewall Facts g_net_firew_packet_filter_type_pp7.question.fex https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027... 7/10
11/28/23, 2:57 PM TestOut LabSim ¥ Question 8: v/ Correct Which of the following keeps track of various network devices while ensuring that the software is secure? Firewall = Endpoint management server Syslog server All-in-one security appliance Explanation An endpoint management server is a way to keep track of various devices while ensuring that software is secure. Many companies that need small IT department overhead use this option. An all-in-one security appliance (UTM) combines several security functions into a single hardware device. However, it is not designed to help you keep track of various network devices. A firewall is a hardware device or software that allows you to filter incoming and outgoing network traffic. A syslog server stores event messages, but is not designed to help you keep track of various network devices. References [E] 11.4.6 Internet Appliances .=| 11.4.7 Internet Appliances Facts @ 14.8.5 Network Appliances IEI 14.8.6 Network Appliance Facts g_net_utm_endpoint_mgmt_server_pp7.question.fex https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027... 8/10
11/28/23, 2:57 PM TestOut LabSim ¥ Question 9: v/ Correct A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria and be cost effective: e No one from the internet should be able to access her internal network. e Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. e Employees access to non-work-related websites, especially sites that contain inappropriate content, should be blocked. e A system should be putin place to detect and prevent external attacks on her network. Which of the following would BEST meet your client's criteria? Implement an all-in-one UTM security = . appliance. Implement an intrusion prevention system (IPS). Implement a firewall. Implement an email security appliance. Implement a content filter. Explanation The network criteria specified by your client requires several different network devices to be implemented, including a firewall, an email scanner, a content filter, and an intrusion prevention system. The most cost-effective way to best meet your client's criteria would be an all-in-one UTM security appliance. While you could purchase each device separately, the cost of doing so would probably be quite high. Because you are working with a small business, an all-in-one security appliance that includes all of these functions in a single device would be more cost-effective and easier for you to manage. References @ 11.4.6 Internet Appliances .—| 11.4.7 Internet Appliances Facts @ 14.8.5 Network Appliances https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-a6b7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-4027... 9/10
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
11/28/23, 2:57 PM TestOut LabSim El 14.8.6 Network Appliance Facts g_net_utm_impl_all_in_one_sec_appliance_pp7.question.fex ¥ Question 10: v/ Correct Which of the following all-in-one security appliance (UTM) functions detects intrusions and alerts the network but does not block traffic? Anti-spam VPN Intrusion protection - Intrusion detection Explanation Intrusion detection detects intrusions and alerts the network. However, it does not block traffic. Intrusion protection detects and blocks network traffic that is not recognized by its profile. Anti-spam is designed to detect and block certain types of email. A VPN encrypts traffic over a secure network. However, a VPN does not block traffic. References [E] 11.4.6 Internet Appliances —| 11.4.7 Internet Appliances Facts [E] 14.8.5 Network Appliances EI 14.8.6 Network Appliance Facts g_net_utm_intrusion_detection_pp7.question.fex Copyright © 2023 TestOut Corporation All rights reserved. https://labsimapp.testout.com/v6_0 576/exam-engine.html/b1cf1¢c19-b777-457e-abb7-ecfbcd3c70b1/exam-session/31684901/136e7614-8183-402... 10/10