True/False
Indicate whether the sentence or statement is true
or false.
|
|
1.
|
VLANs, which are deployed using network switches, cannot be used anywhere in the
network.
|
|
2.
|
Security policies that determine what is allowed to enter or leave the network are
enforced primarily by switches deployed on the network edge.
|
|
3.
|
Each
network can contain multiple perimeter networks.
|
|
4.
|
Security measures usually increase convenience and decrease administrative
overhead.
|
|
5.
|
Every
security system has vulnerabilities.
|
Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
6.
|
Networks that allow access to some database materials and e-mail are
called: a. | untrusted
networks | c. | semi-trusted
networks | b. | trusted networks | d. | campus networks | | | | |
|
|
7.
|
The
networks inside your network security perimeter are called: a. | untrusted
networks | c. | semi-trusted
networks | b. | trusted networks | d. | campus networks | | | | |
|
|
8.
|
A
network controlled by an organization intended for private use behind the organization's firewall is
called: a. | untrusted
network | c. | semi-trusted
network | b. | trusted network | d. | campus network | | | | |
|
|
9.
|
What
enables one network to send its data via another network's connections? a. | pruning | c. | extranet | b. | tunneling | d. | None of the above | | | | |
|
|
10.
|
What
is configuring a trunk link to prevent certain VLANs from crossing the trunk? a. | trunking | c. | pruning | b. | tunneling | d. | None of the above | | | | |
|
|
11.
|
A
physical and logical connection between two switches is called: a. | trunk | c. | DMZ | b. | extranet | d. | ISL | | | | |
|
|
12.
|
What
is an Internet standard that enables a LAN to use one set of IP address for Internet traffic and a
second set of addresses for external traffic?
|
|
13.
|
A set
of switch ports, located on one or several switches, grouped together logically so that they
communicate as if they were on a single isolated network switch are called:
|
|
14.
|
What
provides various levels of accessibility to outsiders based on their username and
password? a. | DMZ | c. | extranet | b. | VLAN | d. | None of the above | | | | |
|
|
15.
|
What
is the Cisco proprietary trunking protocol named?
|
|
16.
|
What
is the standards-based specification for implementing VLANs in Layer 2 LAN? a. | IEEE
802.2e | c. | IEEE
802.1b | b. | IEEE 802.1q | d. | None of the above | | | | |
|
|
17.
|
Each
network can contain how many perimeter networks? a. | one | c. | multiple | b. | two | d. | none | | | | |
|
|
18.
|
Knowing your enemy refers to knowing: a. | attackers | c. | competition | b. | intruders | d. | Both A and B | | | | |
|
|
19.
|
Security measures usually reduce: a. | convenience | c. | staffing | b. | expenses | d. | None of the
above | | | | |
|
|
20.
|
Every
security system has underlying assumptions that you must: a. | examine | c. | justify | b. | coordinate | d. | Both A and C | | | | |
|
|
21.
|
DMZ
stands for: a. | decentralized
machine zone | c. | demilitarized
zone | b. | damaged magnetic
zone | d. | None of the
above | | | | |
|
|
22.
|
NAT
stands for: a. | network activity
terminal | c. | new address
translation | b. | network address translation | d. | None of the above | | | | |
|
|
23.
|
VLAN
stands for: a. | visual local
area network | c. | virtual local
area network | b. | viable local area network | d. | None of the above | | | | |
|
|
24.
|
What
is the address class for the IP range 172.16.0.0 - 172.31.255.255?
|
|
25.
|
What
is the address class for the IP range 192.168.0.0 - 192.168.255.255?
|
Matching
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | campus
network | e. | untrusted
network | b. | extranet | f. | DMZ | c. | trusted network | g. | semi-trusted network | d. | trunk | h. | ISL | | | | |
|
|
26.
|
Network that allows access to some database materials and e-mail.
|
|
27.
|
Network that is known to be outside your security perimeter.
|
|
28.
|
Network that is controlled by an organization intended for private use.
|
|
29.
|
Network that is inside your security perimeter.
|
|
30.
|
A
physical and logical connection between two switches.
|
|
|
Please match the best term from the list below to the most appropriate
concept. a. | Inter-Switch
Link | e. | extranet | b. | trunk | f. | tunneling | c. | IEEE
802.1q | g. | DMZ | d. | pruning | h. | NAT | | | | |
|
|
31.
|
Technology that enables one network to send its data via another network's
connections.
|
|
32.
|
Process of configuring a trunk link to prevent certain VLANs from crossing the
trunk.
|
|
33.
|
Cisco
proprietary trunking protocol.
|
|
34.
|
Area
to host your own Internet services.
|
|
35.
|
Provides various levels of accessibility to outsiders.
|