Network Security & Database Vulnerabilities All Quiz Answer  Basics of IP Addressing and the OSI Model  Week 2

Nuts of IP Addressing ( Practice Quiz )

Q1) The binary (base of operations 2) number "0101" is how much in decimal (base 10) ?

  • v

Q2) The IP address range goes from 0.0.0.0 to 255.255.255.255 and is known every bit the "iv octets". Why are these four numbers chosen octets ?

  • The number 255 in decimal takes up 8 digits in binary.

Q3) How many octets are used to ascertain the network portion of the IP address in a Form C network ?

  • 3

Q4) True or False: A routable protocol is a protocol whose packets may leave your network, pass through your router, and be delivered to a remote network.

  • True

Q5) True or False: The destination address is defined in the package header simply the source address is in the packet footer.

  • Imitation

Q6) Which network mask belongs to a Form A network ?

  • 255.0.0.0

Q7) IPv6 changes the IP accost from a 32 bit accost used in IPv4 to a 128 flake address. This results in which of the post-obit ?

  • Many billions of times equally many possible IP addresses.

Q8) Which IPv4 addressing schema would you employ to send a message to select group systems on the network ?

  • Multicast

TCP/IP Layer iv, Transport Layer Overview ( Practice Quiz )

Q1)  True or False: Utilities such as TFTP, DNS and SNMP utilize the UDP transport protocol.

True

Q2) True or Simulated: The UDP ship protocol is faster than the TCP send protocol.

True

Q3) Which four (4) of these are characteristic of the UDP ship protocol ?

  • Unreliable
  • Unordered data; duplicates possible
  • Connectionless
  • No menstruum control

TCP/IP Layer 5, Application Layer Overview ( Practise Quiz )

Q1) What is the primary function of DNS ?

  • To translate domain names to IP addresses and vice versa.

Q2) How does a new endpoint know the address of the DHCP server ?

  • The endpoint sends a DHCP Discover broadcast asking to all endpoints on the local network.

Q3) Which Syslog layer contains the bodily bulletin contents ?

  • Syslog Content

Q4) True or Simulated: Setting the right Syslog Severity Level on systems helps keep the Syslog server from being flooded by the millions of messages that could be generated by these systems.

  • True

Q5) True or Imitation: The Syslog bulletin typically includes the severity level, facility lawmaking, originator process ID, a time stamp, and the hostname or IP address of the originator device.

  • True

Q6) Why is port mirroring used ?

  • To provide a stream of all data entering or leaving a specific port for debugging or analysis work.

Firewalls, Intrusion Detection and Intrusion Prevention Systems ( Practice Quiz )

Q1) What is the main difference between a Adjacent Generation Firewall (NGFW) and a traditional firewall ?

  • NGFW use sessions.

Q2) Truthful or False: Unlike traditional stateful firewalls, next-generation firewalls drill into traffic to identify the applications traversing the network.

  • True

Q3) What are the two (ii) principal methods used by Intrusion Prevention Systems (IPS) to observe an exploit ?

  • Statistical anomaly-based detection.
  • Signature-based detection.

Q4) If your nontechnical director told you lot that y'all must configure your traditional second-generation firewalls to cake all users on your network from posting messages on Facebook from their office computers, how would you carry out this request ?

  • You would take to cake whatsoever IP addresses used by Facebook.

Clustering and High Availability Systems ( Do Quiz )

Q1) Which condition should utilize in order to achieve constructive clustering and failover amidst your firewalls ?

  • All of the above.

Basics of IP Addressing and the OSI Model ( Chief Quiz )

Q1) How would y'all express 15 in binary (base two) ?

  • 01111

Q2) How many octets are used to define the network portion of the IP address in a Course A network ?

  • i

Q3) The device used to separate the network portion of an IP address from the host portion is chosen what ?

  • The subnet mask.

Q4) The IP header contains a fourth dimension-to-live (TTL) value. How is this value expressed ?

  • The number of Layer 3 devices (hubs, routers, etc.) the parcel is allowed to pass through before it is dropped.

Q5) Which is the host portion of this IP address 192.168.52.3/24 ?

  • 3

Q6) Which network mask belongs to a Class C network ?

  • 255.255.255.0

Q7) Which IPv4 addressing schema would yous use to send a bulletin to all systems on the network ?

  • Broadcast

Q8) Which three (3) of the following are legitimate IPv6 addressing schemas ?

  • Multicast
  • Unicast
  • Anycast

Q9) True or False: Utilities such as TFTP, DNS and SNMP employ the TCP send protocol.

  • False

Q10) Which 2 (2) of these fields are included in a UDP header ?

  • Source Port
  • Destination Port

Q11) Which four (4) of these are characteristic of the TCP ship protocol ?

  • Connection-oriented
  • Ordered data; duplicate detection
  • Reliable
  • Flow control

Q12) How does an endpoint know the address of the DNS server ?

  • Information technology is manually configured in the network settings by the ambassador or obtained from the DHCP server.

Q13) What is the primary role of DHCP ?

  • To automatically assign IP addresses to systems.

Q14) Which Syslog layer would handles the routing and storage of a Syslog message ?

  • Syslog Application

Q15) Which of the following flow data are gathered past utilities such equally NetFlow ?

  • All of the above.

Q16) When a network interface carte du jour in operating in promiscuous manner, what action does it take ?

  • The NIC sends all packets to the CPU for processing instead of only those packets indicated for its MAC address.

Q17) If a packet is allowed to pass through a NGFW based upon the established firewall rules and a new session is established, how does the NGFW treat the next bundle it encounters from the same session ?

  • Subsequent packets of the same session are automatically allowed.

Q18) If your nontechnical manager told you that you must configure your next generation firewalls (NGFW) to block all users on your network from posting letters on Facebook from their office computers, what would be the effect of conveying out his order ?

  • No serious upshot, application-level inspection and blocking can be configured.

Q19) Monitoring network traffic and comparing information technology against an established baseline for normal utilise is an case of which form of intrusion detection ?

  • Statistical anomaly-based detection

Q20) Which are three (iii) characteristics of a highly available organization ?

  • Failover
  • Monitoring
  • Redundancy