21. A firewall administrator sets up a firewall that operates based on predefined rules. It is not used to keep track of information from data packets. What class of firewall does this scenario describe?
- Cloud-based
- Next-generation firewall (NGFW)
- Stateful
- Stateless
22. A security professional sets up a security measure to allow employees to work from home securely while having access to internal network resources. What does this scenario describe?
- Firewall
- Address resolution protocol (ARP)
- Virtual private network (VPN)
- Cloud service provider (CSP)
23. Fill in the blank: VPN services perform _____ to protect sensitive data by wrapping it in other data packets.
- network segmentation
- transmission control
- encapsulation
- packet sniffing
24. What network is part of the uncontrolled zone?
- Internet
- Subnets
- Web servers
- Internal networks
25. Which of the following statements accurately describe forward and reverse proxy servers? Select three answers.
- Forward proxy servers receive outgoing traffic from an employee, approve it, then forward it to its destination on the internet.
- Reverse proxy servers accept traffic from external parties, approve it, then forward it to internal servers.
- Reverse proxy servers work by hiding a user’s IP address and approving all outgoing requests.
- Forward proxy servers regulate and restrict a person’s access to the internet.
26. What network protocol helps data get to the right place by determining the MAC address of the next router or device on its path?
- Hypertext Transfer Protocol Secure (HTTPS)
- Address Resolution Protocol (ARP)
- Secure Sockets Layer/Transport Layer Security (SSL/TLS)
- Transmission Control Protocol (TCP)
27. What network zone includes web and proxy servers that host websites for the public, as well as email and file servers to handle external communications?
- Uncontrolled zone
- Demilitarized zone
- Restricted zone
- Virtual private network
28. A security analyst implements a proxy server to secure internal networks. What are some of the proxy server’s primary functions? Select all that apply.
- Determine whether requests to connect to a website are allowed
- Use public IP addresses that are different from the rest on the private network
- Temporarily stores data that is frequently requested by external servers
- Divide the network into segments to maintain privacy within corporate groups
29. Fill in the blank: A ____ accepts traffic from external parties, approves it, then forwards it to internal servers.
- Reverse proxy
- Forward proxy
- Virtual private network (VPN)
- Next generation firewall (NGFW)