In: Computer Science
29.
Question 29
For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?
1 point
You must install 2 firewalls in series, so all packets pass through the stateless firewall first and then the stateless firewall.
Install a single firewall that is capable of conducting both stateless and stateful inspections.
Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.
You must install the stateful and stateless firewalls in parallel with an intelligent switch in front of them to direct the packets to one or the other as appropriate.
30.
Question 30
Which statement best describes configuring a NAT router to use overload mapping?
1 point
The NAT router uses each computer's IP address for both internal and external communication.
Unregistered IP addresses are mapped to registered IP addresses as they are needed.
The organization will need as many registered IP addresses as it has computers that need Internet access.
Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.
31.
Question 31
Which address type does a computer use to get a new IP address when it boots up?
1 point
The network's DHCP server address.
The network's DNS server address.
The computer's IP address.
The computer's domain name.
The network's default gateway address.
The computer's MAC address.
32.
Question 32
In IPv4, how many of the 4 octets are used to define the network portion of the address in a Class B network?
1 point
1
2
3
4
33.
Question 33
Which three (3) of these statements comparing UDP and TCP are True? (Select 3)
1 point
UDP is more reliable than TCP.
TCP is connectionless.
UDP is faster than TCP.
UDP is connectionless.
TCP is more reliable than UDP.
TCP is faster than UDP.
34.
Question 34
Which type of firewall understands which session a packet belongs to and analyzes it accordingly?
1 point
An Advanced Firewall (AFW).
A Connection Firewall (CFW).
A Next Generation Firewall (NGFW).
A Session Firewall (SFW).
35.
Question 35
You are concerned that your organization is really not very experienced with securing data sources. Which hosting model would require you to secure the fewest data sources?
1 point
On premise
PaaS
SaaS
IaaS
Question 29
For added security you decide to protect your network by conducting both a stateless and stateful inspection of incoming packets. How can this be done?
Answer:Install a stateful firewall only. These advanced devices inspect everything a stateless firewall inspects in addition to state related factors.
Explanation:Statefull firewall are advanced than ststeless firewall Hence,these are extension of stateless firewall.
Question 30
Which statement best describes configuring a NAT router to use overload mapping?
Answer:Many unregistered IP addresses are mapped to a single registered IP address using different port numbers.
Explanation:Converting into single IP address because it allows all bussiness over the worls to access of internet through single IP address.
Question 31
Which address type does a computer use to get a new IP address when it boots up?
Answer:The network's DHCP server address.
Explanation:Dynamic Host Configuration Protocol , based on IP address configures the devices.
Question 32
In IPv4, how many of the 4 octets are used to define the network portion of the address in a Class B network?
Answer:2 octets
Explanation:Class A - 1 octet , Class B - 2 Octet , Class C - First 3 octets.
Question 33
Which three (3) of these statements comparing UDP and TCP are True? (Select 3)
Answer:UDP is faster than TCP , UDP is connectionless.TCP is more reliable than UDP.
Explanation:TCP is reliable UDP is notreliable,So option 1 is FALSE.
UDP is connectionless while TCP is connection-oriented Protocol,So option 2 is FALSE.
UDP is faster than TCP,So option 6 is FALSE.
Question 34
Which type of firewall understands which session a packet belongs to and analyzes it accordingly?
Answer:A Session Firewall(SFW).
Question 35
You are concerned that your organization is really not very experienced with securing data sources. Which hosting model would require you to secure the fewest data sources?
Answer:Software as a Service(Saas).
Explanation:Software as a service has more built in security than Platform as a service and Infrastructure as a service.