21. Which layer in the TCP/IP model is used to inspect the flow of traffic across a network?
- Layer 1, network access
- Layer 2, internet
- Layer 3, transport
- Layer 4, application
22. A security analyst runs a command to discover a local IP address. The analyst receives the following result: 169.254.255.249. What type of address is this?
- MAC
- IPv4
- IPv6
- Ethernet
23. A security analyst runs a command to discover a local IP address. The analyst receives the following result: fd45:3efd:3201:ff22:0000:0000:12ff:0000. What type of address is this?
- MAC
- Ethernet
- IPv4
- IPv6
25. Which network device makes connections between specific devices on a network by sending and receiving data between them?
- A switch
- A router
- A hub
- A modem
26. Which of the following are benefits for businesses that are considering using a cloud service provider (CSP)? Select all that apply.
- CSP data and devices are more secure because they are stored locally.
- CSP remote servers allow online services to be accessed from any location.
- CSPs provide business analytics to monitor web traffic and sales.
- CSPs offer on-demand storage.
27. Fill in the blank: _____ refers to the practice of using remote servers, applications, and network services that are hosted on the internet, instead of in a physical location owned by a company.
- Cloud computing
- Software defined networks (SDNs)
- Hybrid cloud environment
- Local area network (LAN)
Shuffle Q/A 3
29. Fill in the blank: The ___ layer is used to determine how data packets will interact with receiving devices, including file transfers and email services.
- Layer 1, network access
- Layer 2, internet
- Layer 3, transport
- Layer 4, application
30. Which of the following addresses is an accurate IPv4 address?
- 129.168.10.256
- 1001.2345.3234.5678
- 192.168.0.2
- 100.234.56.1.3