Upgrade to remove ads
MTA Networking - Chapter 8 Review Questions
Terms in this set (20)
You have been tasked to set up an authentication server on a DMZ that will allow only users from a partner company. What kind of network are you configuring?
d. World Wide Web
You are in charge of setting up a VPN that allows connections on inbound port 1723. What tunneling protocol are you going to use?
Proseware, Inc., wants you to set up a VPN server. What service in Windows Server 2008 should you use?
The IT director has asked you to install a firewall. Which of the following is not a type of firewall?
a. NAT filtering
d. Stateful packet inspection
You suspect an issue with one of the ports on the firewall. You decide to scan the ports. Which of the following is the appropriate tool to use?
b. Protocol analyzer
Your client wants a server that can cache web pages in order to increase the speed of commonly accessed Web sites. What type of server does the client require?
The customer you are working for wants a device that can detect network anomalies and report them to an administrator. What type of device is the customer looking for?
a. Internet content filter
b. Proxy server
c. WINS server
Your boss asks you to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will serve requests to users who are connecting
to your intranet. What type of zone does your boss want you to set up?
You have been asked by a client to install a VPN server that can offer unencrypted tunnels by default, or encrypted tunnels by using IPSec. Which of the following services
should you choose in order to accomplish this?
You have set up a default VPN in Windows Server 2008. However, your boss is not happy with the level of security. She would rather have L2TP combined with IPsec. What tunneling protocol is running currently on the server?
b. L2TP without IPsec
____________ allows users to interact with each other and contribute to Web sites.
The ____________ defines DNS
Internet Engineering Task Force (IETF)
The ____________ is an enormous system of interlinked hypertext documents.
world wide web
You have set up a network zone that allows remote access for employees of your company. This is known as a ____________.
You install a VPN server that uses inbound port 1701. The server is utilizing the ____________ protocol.
You installed a VPN server and configured a VPN adapter on a client computer. However, the connection cannot be completed from the client to the server. This is
because you skipped the ____________ step.
The VPN server has been configured and is running properly. However, it has not been configured to hand out IP addresses to clients. When a VPN server is configured this way, the clients obtain their IP addresses from a ____________ server.
A firewall normally has a private and a ____________ IP address.
You have installed a firewall that accepts or rejects packets based on a set of rules. This firewall keeps track of the state of the network connection. It is running a type of packet
filtering known as ____________.
stateful packet filtering
You have configured a firewall so that all ports are closed. Now you are attempting to scan the firewall's ports to verify that there are no open ones. You should use the ____________ option within the Nmap port scanning program.
-P0 (-Pn in 5.4 and later, circa 2009)
THIS SET IS OFTEN IN FOLDERS WITH...
MTA Networking - Chapter 6 Review Questions
MTA Networking - Chapter 7 Review Questions
MTA 98-366 Networking Fundamentals Lesson 3 Practi…
MTA 98-366 Networking Fundamentals Lesson 5 Practi…
YOU MIGHT ALSO LIKE...
(6/20) MTA 98-366 Networking Fundamentals
Lesson 8: Defining Network Infrastructures And Net…
MTA Chapters 1-8 STUDY GUIDE
OTHER SETS BY THIS CREATOR
Unit 1: Lesson 3 - Sending Binary Messages with th…
Windows Command Line Tools
802 Standards Knowledge Tester
Port Knowledge Tester