11. Which of the following statements accurately describe wireless protocols? Select three answers.

  • Wi-Fi protocols provide security levels about equal to that of wired connections.
  • IEEE is the Institute of Electrical and Electronics Engineers, which maintains WiFi standards.
  • WPA is a wired security protocol pertaining to local devices on the same network.
  • 802.11 is a suite of protocols used in wireless communication.

12. Which type of firewall analyzes network traffic for characteristics and behaviors that appear suspicious and stops them from entering the network?

  • Next-generation firewall (NGFW)
  • Stateful
  • Stateless
  • Cloud-based

13. Which of the following types of firewalls can perform deep packet inspection and intrusion detection?

  • Next generation firewall (NGFW)
  • Documented
  • Stateless
  • Stateful

14. What network security service masks a device’s virtual location to keep data private while using a public network?

  • Network segmenter
  • Cloud service provider (CSP)
  • Virtual private network (VPN)
  • Domain name system (DNS)

15. Fill in the blank: VPN services perform encapsulation to protect sensitive data by _____ it in other data packets.

  • wrapping
  • archiving
  • classifying
  • displaying

16. What network zone contains the internet and other services that are outside of an organization’s control?

  • Restricted
  • Uncontrolled
  • Controlled
  • Demilitarized

17. What is the function of the demilitarized zone (DMZ)?

  • Isolate servers exposed to the internet from the rest of a network
  • Organize data by forwarding it to other servers
  • Protect highly confidential information accessible only to employees with certain privileges
  • Encrypt data as it travels across the internet

18. Fill in the blank: A _____ fulfills the requests of its clients by forwarding them to other servers

  • Virtual private network (VPN)
  • Firewall
  • Proxy server
  • Router

Shuffle Q/A 2

19. What is one way forward proxies secure internal networks?

  • Both forward and reverse proxy servers add a layer of protection from the internet.
  • Forward proxy servers hide a user’s IP address and approve all outgoing requests.
  • They are useful for protecting internal web servers that contain confidential data.
  • They receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.

20. Which of the following statements accurately describe wireless protocols? Select three answers.

  • WPA is a wireless security protocol pertaining to connecting to the internet.
  • The set of standards IEEE 802.11 is also referred to as Wi-Fi.
  • Wi-Fi protocols provide significantly lower security levels than wired connections.
  • The Institute of Electrical and Electronics Engineers maintains Wi-Fi standards.

Leave a Reply