- Address Resolution Protocol (ARP)
- Transmission Control Protocol (TCP)
- Hypertext Transfer Protocol Secure (HTTPS)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Explanation: A basic protocol in the TCP/IP suite, Transmission Control Protocol (TCP) ensures the transfer of data between devices across an IP network in a manner that is dependable, ordered, and error-checked. It does this by establishing a connection-oriented communication between the devices, which guarantees that the data packets are sent in the correct order and that any packets that are lost are sent again. Because of this, delivery Control Protocol (TCP) is an excellent choice for applications that need dependable data delivery, such as web surfing, file transfers, and streaming video.
Q: What set of standards is known as Wi-Fi?
- WEP
- 802.11
- IEEE 802.11
- WPA
Explanation: Through the use of radio waves, wireless networking technology known as Wi-Fi enables electronic devices to establish a connection to a local area network (LAN) wirelessly. The standards for wireless local area networks (LANs) are defined by the IEEE 802.11 standard. These specifications include protocols for media access, data transfer, security (including WEP and WPA methods), and interoperability.
Q: Fill in the blank: A ____ firewall can connect to cloud-based threat
intelligence services and quickly update against emerging cyber threats
- stateful
- next generation firewall (NGFW)
- documented
- stateless
Q: Fill in the blank: VPN services perform _____ to protect sensitive data
by wrapping it in other data packets.
- encapsulation
- transmission control
- packet sniffing
- network segmentation
Q: Fill in the blank. A controlled zone protects a company’s internal
network from a(n)___ security zone.
- uncontrolled
- demilitarized
- restricted
- internal network
Q: Which of the following statements accurately describe forward and
reverse proxy servers? Select three answers.
- Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
- Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
- Forward proxy servers regulate and restrict a person’s access to the internet.
- Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
Explanation: To increase privacy and regulate access to external resources, forward proxy servers work on behalf of customers, who are employees, to route requests to servers located outside the organization. The role of reverse proxy servers is to act as middlemen for clients who access internal servers from the internet. This helps to improve security by concealing the specifics of the internal server and controlling incoming requests.
Q: What network protocol helps data get to the right place by determining
the MAC address of the next router or device on its path?
- Transmission Control Protocol (TCP)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Address Resolution Protocol (ARP)
- Hypertext Transfer Protocol Secure (HTTPS)
Q: Fill in the blank: The _______ maintains Wi-Fi standards.
- IEEE 802.11
- Transmission control protocol (TCP)
- Domain name system (DNS)
- WiFi protected access (WPA)
Q: A firewall administrator installs a firewall function to either block or
allow certain port numbers to limit unwanted communication. What function does
this scenario describe?
- Location masking
- Using cloud-based firewalls
- Organizing data packets
- Port filtering
Explanation: In the situation described, a firewall administrator installs a function to either block or allow particular port numbers to restrict undesired traffic. This is an example of port filtering. Controlling access to certain network ports based on predetermined criteria is the purpose of port filtering, which is a function of a firewall. By doing so, administrators can control which ports can transmit and receive data, limiting or allowing certain kinds of network traffic depending on the rules that govern network security.
Q: A security professional sets up a security measure to allow employees to
work from home securely while having access to internal network resources. What
does this scenario describe?
- Cloud service provider (CSP)
- Virtual private network (VPN)
- Address resolution protocol (ARP)
- Firewall
Explanation: The term "Virtual Private Network" (VPN) refers to a situation in which a security expert establishes a security solution to enable workers to operate from home securely while still having access to local network resources. Through the usage of a virtual private network (VPN), distant users can establish a secure connection to a private network (like a business network) while using a public network (like the Internet). It does this by establishing a safe and encrypted tunnel between the device used by the distant user and the internal network. This secure tunnel guarantees the confidentiality and integrity of the data that is transferred across the connection.
Q: Which of the following does encapsulation protect?
- cryptographic keys
- data in transit
- proxy servers
- public IP addresses
Q: What is the function of the demilitarized zone (DMZ)?
- Organize data by forwarding it to other servers
- Isolate servers exposed to the internet from the rest of a network
- Encrypt data as it travels across the internet
- Protect highly confidential information accessible only to employees with certain privileges
Q: Fill in the blank: A _____ fulfills the requests of its clients by
forwarding them to other servers
- firewall
- virtual private network (VPN)
- proxy server
- router
Q: How do forward proxy servers secure internal networks? Select two
answers.
- They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
- Both forward and reverse proxy servers add a layer of protection from the internet.
- They are useful for protecting internal web servers that contain confidential data.
- They hide a user’s IP address and approve all outgoing requests.
Q: What network protocol translates the domain name of a website’s server
into an IP address?
- Transmission control protocol (TCP)
- Hypertext transfer protocol secure (HTTPS)
- File transfer protocol (FTP)
- Domain name system (DNS)
Q: Which of the following statements accurately describe wireless
protocols? Select three answers.
- Wi-Fi protocols provide significantly lower security levels than wired connections.
- WPA is a wireless security protocol pertaining to connecting to the internet.
- The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.
- The set of standards IEEE 802.11 is also referred to as Wi-Fi.
Q: Fill in the blank: A ____ firewall operates based on predefined rules.
It is not used to keep track of information from data packets.
- stateful
- stateless
- next-generation firewall (NGFW)
- cloud-based
Q: How do VPNs preserve confidentiality?
- Monitor traffic to and from a network
- Use temporary memory to store data requested by external servers
- Encrypt data in transit
- Translate internet domain names to IP addresses
Q: What does a VPN service use to transfer encrypted data between a device
and the VPN server?
- packet sniffing
- network segmentation
- encapsulation
- transmission control
Q: A security analyst implements a proxy server to secure internal
networks. What are some of the proxy server’s primary functions? Select three
answers.
- Use public IP addresses that are different from the rest on the private network
- Temporarily stores data that is frequently requested by external servers
- Divide the network into segments to maintain privacy within corporate groups
- Determine whether requests to connect to a website are allowed