- Cloud
- Protocol
- Network
- Hub
Explanation: A collection of computers, servers, mainframes, network devices, peripherals, or other devices that are linked to one another to facilitate the sharing of data and resources is referred to as a network. It is possible to classify networks according to their size (for example, a Local Area Network (LAN) or a Wide Area Network (WAN), their purpose, or their design.
Q: A _____ broadcasts information to every device on the network.
- router
- modem
- switch
- hub
Q: Which of the following statements accurately describe switches? Select
all that apply.
- When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
- Switches are less secure than hubs.
- Some benefits to switches are effective control of traffic flow and improved network performance.
- A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.
Q: What are some of the benefits cloud service providers (CSPs) offer
security professionals? Select all that apply.
- CSPs provide business analytics to monitor web traffic and sales.
- CSP servers, applications, and network services are hosted on local physical devices.
- CSPs can save an organization money by offering processing power that is only paid for as needed.
- CSPs offer online services and web applications that can be accessed from any location.
Explanation: CSPs often give companies tools and services that provide insights on web traffic and revenues, therefore assisting businesses in making more informed choices.CSPs often adopt a pay-as-you-go approach, which enables firms to scale resources up or down depending on demand. This allows organizations to save money not just on idle processing power but also on those charges. With the ability to access their services and apps from any location with an internet connection, cloud service providers make it possible for employees to work remotely and collaborate with one another.
Q: What is the purpose of the footer of a data packet?
- To contain the source IP address
- To show the MAC address of the destination device
- To signal to the receiving device that the packet is finished
- To identify the message to be transmitted to the receiving device
Q: What are the three main categories of services that CSPs provide? Select
all that apply.
- Software as a service (SaaS)
- Infrastructure as a service (IaaS)
- Platform as a service (PaaS)
- Desktop as a service (DaaS)
Q: Which port is used for secure internet communication?
- 25
- 20
- 443
- 40
Q: Which layer in the TCP/IP model is used to inspect the flow of traffic
across a network?
- Layer 1, network access
- Layer 2, internet
- Layer 3, transport
- Layer 4, application
Explanation: The transport layer, which is Layer 3 in the TCP/IP paradigm, is crucial for managing the flow of data and ensuring that it is correctly handled. As a result, it is necessary to check the flow of traffic over the network.
Q: A security analyst runs a command to discover a local IP address. The
analyst receives the following result: 169.254.255.249. What type of address is
this?
- IPv6
- IPv4
- Ethernet
- MAC
Q: Which network device connects multiple networks together?
- A switch
- A hub
- A modem
- A router
Q: What are two benefits of cloud computing and software defined networks
(SDNs)? Select two answers.
- Increased attack surface
- Decreased cost
- Decreased reliability
- Increased scalability
Q: Fill in the blank: A computer sends information to the router and the
router then transfers information through a ____ to the internet.
- modem
- LAN
- switch
- hub
Q: What port number is used for large file transfers?
- 443
- 25
- 20
- 37
Q: Fill in the blank: fe80::ab12:cd34:ef56:0023:2345 is an example of an
accurate ___ address.
- IPv4
- Ethernet
- MAC
- IPv6