11. Which of the following is an example of an IPv4 address?
- 25, 443, 20
- 172.16.254.1
- 2001:0db8:85a3:0000:0000:8a2e:0370:7336
- 00-B1-D0-63-C2-26
12. What is the term for an address assigned by an internet service provider that is shared by all devices on a local area network?
- Private IP address
- MAC address
- WAN address
- Public IP address
13. Fill in the blank: A switch uses a MAC _____ to direct data packets to the correct device.
- address table
- geographic location
- home network
- public address
Weekly challenge 1
16. Which of the following statements accurately describe switches? Select all that apply.
- When a switch receives a data packet, it reads the MAC address of the destination device and maps it to a port.
- Some benefits to switches are effective control of traffic flow and improved network performance.
- Switches are less secure than hubs.
- A switch is a device that makes connections between specific devices on a network by sending and receiving data between them.
17. A security professional is investigating the benefits and drawbacks of using a cloud service provider (CSP). What are some reasons why the security professional might choose to use a CSP in their work? Select all that apply.
- A CSP provides business analytics to monitor web traffic and sales.
- CSP services may be accessed even when a business is not connected to the internet.
- CSP remote servers allow web applications to be accessed from any location.
- A CSP offers processing power that is only paid for as needed.
18. What is the purpose of the protocol number of a data packet?
- To identify the message to be transmitted to the receiving device
- To signal to the receiving device that the packet is finished
- To contain the IP and MAC addresses
- To tell the receiving device what to do with the information in the packet
Shuffle Q/A 2
19. What are the three main categories of services that CSPs provide? Select all that apply.
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Desktop as a service (DaaS)
- Infrastructure as a service (IaaS)
20. A security analyst is accessing a webpage that uses HTTPS. The analyst scans the network to see what ports are active. Which port number is used for HTTPS webpages?
- 443
- 40
- 20
- 25