Sail E0 Webinar

Computer Aptitude > Networking

NETWORKING MIXED MCQs

Total Questions : 66 | Page 1 of 7 pages
Question 1.

Your company has a large internal network that you would like to subnet into smaller parts. Which of the following devices can you use to separate your LAN and still protect critical resources? (Select all that apply)

  1.    An internal firewall
  2.    A router between subnets
  3.    A switch between departments
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option D. -> All of the above
Question 2.

Which of the following are considered to be possible components of an ethernet LAN? (Select all that apply)

  1.    Coax 
  2.    Fibre
  3.    STP
  4.    All of these
  5.    None of these
 Discuss Question
Answer: Option D. -> All of these
Question 3.

Which of the following devices is specially designed to forward packets to specific ports based on the packet’s address?

  1.    Specialty hub
  2.    Switching hub
  3.    Port hub
  4.    Filtering hub
  5.    None of these
 Discuss Question
Answer: Option B. -> Switching hub
Question 4.

Your company receives Internet access through a network or gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server?

  1.    DSL modem
  2.    A multi-homed firewall
  3.    VLAN
  4.    A router that acts both as a bridge and router
  5.    None of the above
 Discuss Question
Answer: Option D. -> A router that acts both as a bridge and router
Question 5.

What are some of the benefits of using a firewall for your LAN? (Select all that apply)

  1.    Increased access to instant messaging
  2.    Stricter access control to critical resources
  3.    Greater security to your LAN
  4.    ‘2’ and ‘3’
  5.    None of the above
 Discuss Question
Answer: Option D. -> ‘2’ and ‘3’
Question 6.

Which of the following are true about firewall? (Select that apply)

  1.    Filters network traffic
  2.    Can be either a hardware or software device
  3.    Follows a set of rules
  4.    All of the above
  5.    None of the above
 Discuss Question
Answer: Option D. -> All of the above
Question 7.

Which of the following are true about firewall protection when using static packet filtering on the router? (Select all that apply)

  1.    Static packet filtering is less secure than stateful filtering
  2.    Static packet filtering is less secure than proxy filtering
  3.    Static packet filtering is more secure than dynamic packet filtering
  4.    1’ and ‘2’
  5.     None of the above
 Discuss Question
Answer: Option D. -> 1’ and ‘2’
Question 8.

A packet filtering firewall operates at which of the following OSI layers? (Select all that apply)

  1.    At the application layer
  2.    At the transport layer
  3.    At the network
  4.     `2’ and `3’
  5.    None of these
 Discuss Question
Answer: Option D. ->  `2’ and `3’
Packet filtering is a type of firewall technology used to control the incoming and outgoing traffic of a computer or network. It uses a set of rules to evaluate the header of a packet and decide whether it should be allowed to pass through the firewall or not. Packet filtering firewalls operate at the Network Layer (Layer 3) and the Data Link Layer (Layer 2) of the OSI model.

The OSI model (Open System Interconnection Model) is a seven-layer model that defines how data is transmitted between two computers over a network. It defines the protocols and standards that must be adhered to for successful communication. The seven layers are as follows:

1. Physical Layer: This layer deals with physical aspects of communication such as media, cabling, and signal encoding.

2. Data Link Layer: This layer deals with physical addressing, error control, and data flow control.

3. Network Layer: This layer deals with logical addressing, routing, and the delivery of packets.

4. Transport Layer: This layer deals with the reliable delivery of data between two hosts.

5. Session Layer: This layer establishes, maintains, and terminates connections between two hosts.

6. Presentation Layer: This layer deals with data representation and data conversion.

7. Application Layer: This layer deals with application-specific data and provides an interface for users to access the network.

Packet filtering firewalls are used to control the flow of traffic across a network. They are configured with a set of rules that evaluate the header of each packet and decide whether it should be allowed to pass through the firewall or not. Packet filtering firewalls operate at the Network Layer (Layer 3) and the Data Link Layer (Layer 2) of the OSI model.

Packet filtering firewalls are typically used to control access to a network. They can be used to block unwanted traffic, such as malicious or unwanted applications, or to allow only specific types of traffic to pass through the firewall. Packet filtering firewalls are a cost-effective way to secure a network, as they are relatively easy to configure and maintain.

In conclusion, packet filtering firewalls operate at the Network Layer (Layer 3) and the Data Link Layer (Layer 2) of the OSI model. They are used to control the flow of traffic across a network and can be used to block unwanted traffic or to allow only specific types of traffic to pass through the firewall.
Question 9.

Firewalls are designed to perform all the following except

  1.    Limiting security exposures
  2.    logging Internet activity
  3.    Enforcing the organization’s security policy
  4.    protecting against viruses
  5.    None of the above
 Discuss Question
Answer: Option D. -> protecting against viruses
Firewalls are designed to protect the networks of an organization from unauthorized access, malicious software, and other security threats. Firewalls help to limit security exposures by enforcing the organizations security policies. They can also be used to log Internet activity and detect any suspicious activity.

However, firewalls are not designed to protect against viruses. Viruses are small pieces of malicious code that are designed to spread from one computer to another. They can cause serious damage to a system, such as deleting files, corrupting data, or causing the system to crash.

In order to protect against viruses, organizations need to use antivirus software which is specifically designed to detect and remove malicious code. Antivirus software works by scanning the system for any suspicious files and then removing them. It can also be configured to regularly scan the system for new viruses and block any malicious code from entering the system.

In summary, firewalls are designed to limit security exposures, log Internet activity, and enforce the organizations security policy. However, they are not designed to protect against viruses. To protect against viruses, organizations need to use antivirus software.

Relevant Definitions and Formulas:

Firewall: Firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a set of rules and other criteria.

Virus: A virus is a malicious program or piece of code that is designed to replicate itself on multiple computers and networks. It can cause damage to a system, corrupt data, or delete files.

Antivirus Software: Antivirus software is a type of software program that is designed to detect and remove viruses and other malicious code from a computer or network. It works by scanning the system for any suspicious files and then removing them.
Question 10.

Which of the following are true statements about modems? (Select all that apply)

  1.    Modems use the telephone lines
  2.    Modem stands for modulator and demodulator
  3.    Modems are no longer used in secure network
  4.    ‘1’ and `2’
  5.    None of the above
 Discuss Question
Answer: Option D. -> ‘1’ and `2’

Latest Videos

Latest Test Papers