11. Which of the following statements accurately describe wireless protocols? Select three answers.
- Wi-Fi protocols provide security levels about equal to that of wired connections.
- IEEE is the Institute of Electrical and Electronics Engineers, which maintains WiFi standards.
- WPA is a wired security protocol pertaining to local devices on the same network.
- 802.11 is a suite of protocols used in wireless communication.
12. Which type of firewall analyzes network traffic for characteristics and behaviors that appear suspicious and stops them from entering the network?
- Next-generation firewall (NGFW)
- Stateful
- Stateless
- Cloud-based
13. Which of the following types of firewalls can perform deep packet inspection and intrusion detection?
- Next generation firewall (NGFW)
- Documented
- Stateless
- Stateful
14. What network security service masks a device’s virtual location to keep data private while using a public network?
- Network segmenter
- Cloud service provider (CSP)
- Virtual private network (VPN)
- Domain name system (DNS)
15. Fill in the blank: VPN services perform encapsulation to protect sensitive data by _____ it in other data packets.
- wrapping
- archiving
- classifying
- displaying
16. What network zone contains the internet and other services that are outside of an organization’s control?
- Restricted
- Uncontrolled
- Controlled
- Demilitarized
17. What is the function of the demilitarized zone (DMZ)?
- Isolate servers exposed to the internet from the rest of a network
- Organize data by forwarding it to other servers
- Protect highly confidential information accessible only to employees with certain privileges
- Encrypt data as it travels across the internet
18. Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers
- Virtual private network (VPN)
- Firewall
- Proxy server
- Router
Shuffle Q/A 2
19. What is one way forward proxies secure internal networks?
- Both forward and reverse proxy servers add a layer of protection from the internet.
- Forward proxy servers hide a user’s IP address and approve all outgoing requests.
- They are useful for protecting internal web servers that contain confidential data.
- They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
20. Which of the following statements accurately describe wireless protocols? Select three answers.
- WPA is a wireless security protocol pertaining to connecting to the internet.
- The set of standards IEEE 802.11 is also referred to as Wi-Fi.
- Wi-Fi protocols provide significantly lower security levels than wired connections.
- The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.