21. A firewall administrator sets up a firewall that operates based on predefined rules. It is not used to keep track of information from data packets. What class of firewall does this scenario describe?

  • Cloud-based
  • Next-generation firewall (NGFW)
  • Stateful
  • Stateless

22. A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?

  • Firewall
  • Address resolution protocol (ARP)
  • Virtual private network (VPN)
  • Cloud service provider (CSP)

23. Fill in the blank: VPN services perform _____ to protect sensitive data by wrapping it in other data packets.

  • network segmentation
  • transmission control
  • encapsulation
  • packet sniffing

24. What network is part of the uncontrolled zone?

  • Internet
  • Subnets
  • Web servers
  • Internal networks

25. Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.

  • Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
  • Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
  • Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
  • Forward proxy servers regulate and restrict a person’s access to the internet.

26. What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?

  • Hypertext Transfer Protocol Secure (HTTPS)
  • Address Resolution Protocol (ARP)
  • Secure Sockets Layer/Transport Layer Security (SSL/TLS)
  • Transmission Control Protocol (TCP)

27. What network zone includes web and proxy servers that host websites for the public, as well as email and file servers to handle external communications?

  • Uncontrolled zone
  • Demilitarized zone
  • Restricted zone
  • Virtual private network

28. A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select all that apply.

  • Determine whether requests to connect to a website are allowed
  • Use public IP addresses that are different from the rest on the private network
  • Temporarily stores data that is frequently requested by external servers
  • Divide the network into segments to maintain privacy within corporate groups

29. Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.

  • Reverse proxy
  • Forward proxy
  • Virtual private network (VPN)
  • Next generation firewall (NGFW)

Leave a Reply