SlideShare a Scribd company logo
1. inside source IP address and port number 172.16.1.20:20
translated outside IP address 68.68.68.1:80
1. VPN address translation
2. Network address port translation
3. DMZ address translation
4. Network address translation
2. How many ports are used by computers for TCP/IP network traffic?
1. 65500
2. 1024
3. 65535
4. 6553
3. Which command prompt utility allows administrators to determine the actual path from one
computer to another?
1. tracert
2. NAT
3. dns flush
4. ping
4. Which UNIX tool is used to do a scan on itself?
1. traceroute
2. DHCP
3. netstat
4. ping localhost
5. Which type of VPN would be used to allow an organization to leverage the Internet backbone
to build a secure WAN between office branches?
1. remote user vpn
2. HTTP VPN
3. DMZ vpn
4. remote office vpn
6. What type of firewall uses routers with rules to grant or deny access based only on source
address, destination address, and port number?
1. packet-filtering gateway
2. application gateway
3. layer 3 gateway
4. hybrid gateway
7. A _______ attack will automatically attempt thousands or millions of passwords to gain
access to a system.
1. worm
2. virus
3. dictionary
4. logic bomb
8. What protocol is are layers 6 and 7 of the OSI model based on?
1. TCP/IP
2. IPsec
3. FTP
4. PPTP
9. Which network services provides the mapping and translation of domain names to IP
addresses?
1. HTTP
2. DHCP
3. DNS
4. FTP
10. With a proxy server enabled on a firewall, the firewall stores web pages where?
1. Local usb drive
2. RAM
3. Local hard drive
4. FTP server
11 The ________ provides definitions for seen layers, which each layer provides services that
depend on higher level layers depend on.
2. TCP
3. FTP
4. OSI
5. DNS
12. Which of the ways listed below can firewall security be completely bypassed? (Multiple
answers)
1. HTTP sites are never secure
2. E-mail is never secure
3. A computer not owned by the enterprise should never be connected to the enterprise
4. Files from home computers and files from office computers should never commingle.
Solution
Q1
4. Network address translation
Q2
3. 65535
Q3
1. tracert
Q6
1. packet-filtering gateway
Q7
2. virus

More Related Content

PDF
8. What protocol is are layers 6 and 7 of the OSI model based on.pdf
DOC
Ibps specialist officer
PPTX
Chapter 12 Computer Networks II class 12.pptx
DOCX
CEH v9 cheat sheet notes Certified Ethical Hacker
PPTX
gkkSecurity essentials domain 2
PPTX
gkk_2021123rg5hSecurity essentials domain 2
PPTX
gkk20211e4djwew4dSecurity essentials domain 2
PDF
Chap 1 Network Theory & Java Overview
8. What protocol is are layers 6 and 7 of the OSI model based on.pdf
Ibps specialist officer
Chapter 12 Computer Networks II class 12.pptx
CEH v9 cheat sheet notes Certified Ethical Hacker
gkkSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials domain 2
Chap 1 Network Theory & Java Overview

Similar to 1. inside source IP address and port number 172.16.1.2020translat.pdf (20)

PDF
Tcpip Intro
PPT
3.Network
PPT
Chapter_Five[1].ppt
PPTX
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
PPT
Cisco Certified Network Associate
PPTX
Internetworking
PDF
Computer awarness question bank
PPTX
topicCybersecurity_4
PDF
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
DOCX
1) What is the difference between CSMACD and CSMACA2) Which .docx
PDF
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
PDF
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
PDF
Ch 2: TCP/IP Concepts Review
PDF
Dotnet network prog_chap07
PDF
Ccna 2 Chapter 8 V4.1 Answers
PPTX
Securityic2
PPTX
Topic22
PDF
EMSC1515104 Shehansuhail
PDF
TOR... ALL THE THINGS
PDF
CCNA 200-120 Exam Quick Notes
Tcpip Intro
3.Network
Chapter_Five[1].ppt
Know the advantages and disadvantages of peer-to-peer network and a server-ba...
Cisco Certified Network Associate
Internetworking
Computer awarness question bank
topicCybersecurity_4
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
1) What is the difference between CSMACD and CSMACA2) Which .docx
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Ch 2: TCP/IP Concepts Review
Dotnet network prog_chap07
Ccna 2 Chapter 8 V4.1 Answers
Securityic2
Topic22
EMSC1515104 Shehansuhail
TOR... ALL THE THINGS
CCNA 200-120 Exam Quick Notes
Ad

More from meejuhaszjasmynspe52 (20)

PDF
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
PDF
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
PDF
Find the general solution of the given differential equation. Sol.pdf
PDF
Disorders characterized by abnormal replication of cells that leads .pdf
PDF
Differentiate between functions and formulas. Provide two examples o.pdf
PDF
Could someone please solve this assignment using matlabSolution.pdf
PDF
Consider the many protein functions. Identify the protein function by.pdf
PDF
a) Briefly describe three key differences between the genomes of pro.pdf
PDF
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
PDF
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
PDF
6. Which of the following epithelia andor cell surface modifications.pdf
PDF
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
PDF
1- An information security manager routinely monitored Web Surfing a.pdf
PDF
1.    Europeans view Americans as people similar in ideas and cultur.pdf
PDF
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
PDF
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
PDF
Write a recursive function in java named fib that will accept one in.pdf
PDF
Why are culture media sterilized before they are used Do you think .pdf
PDF
What recent and past actions have Canada and the US taken to counter.pdf
PDF
What are the protocols in data transfer between CAD systems Which o.pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
Find the general solution of the given differential equation. Sol.pdf
Disorders characterized by abnormal replication of cells that leads .pdf
Differentiate between functions and formulas. Provide two examples o.pdf
Could someone please solve this assignment using matlabSolution.pdf
Consider the many protein functions. Identify the protein function by.pdf
a) Briefly describe three key differences between the genomes of pro.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
6. Which of the following epithelia andor cell surface modifications.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
Write a recursive function in java named fib that will accept one in.pdf
Why are culture media sterilized before they are used Do you think .pdf
What recent and past actions have Canada and the US taken to counter.pdf
What are the protocols in data transfer between CAD systems Which o.pdf
Ad

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Trump Administration's workforce development strategy
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Classroom Observation Tools for Teachers
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Weekly quiz Compilation Jan -July 25.pdf
Microbial diseases, their pathogenesis and prophylaxis
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
History, Philosophy and sociology of education (1).pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Complications of Minimal Access Surgery at WLH
Chinmaya Tiranga quiz Grand Finale.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Trump Administration's workforce development strategy
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
What if we spent less time fighting change, and more time building what’s rig...
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Classroom Observation Tools for Teachers
STATICS OF THE RIGID BODIES Hibbelers.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT

1. inside source IP address and port number 172.16.1.2020translat.pdf

  • 1. 1. inside source IP address and port number 172.16.1.20:20 translated outside IP address 68.68.68.1:80 1. VPN address translation 2. Network address port translation 3. DMZ address translation 4. Network address translation 2. How many ports are used by computers for TCP/IP network traffic? 1. 65500 2. 1024 3. 65535 4. 6553 3. Which command prompt utility allows administrators to determine the actual path from one computer to another? 1. tracert 2. NAT 3. dns flush 4. ping 4. Which UNIX tool is used to do a scan on itself? 1. traceroute 2. DHCP 3. netstat 4. ping localhost 5. Which type of VPN would be used to allow an organization to leverage the Internet backbone to build a secure WAN between office branches? 1. remote user vpn 2. HTTP VPN 3. DMZ vpn 4. remote office vpn
  • 2. 6. What type of firewall uses routers with rules to grant or deny access based only on source address, destination address, and port number? 1. packet-filtering gateway 2. application gateway 3. layer 3 gateway 4. hybrid gateway 7. A _______ attack will automatically attempt thousands or millions of passwords to gain access to a system. 1. worm 2. virus 3. dictionary 4. logic bomb 8. What protocol is are layers 6 and 7 of the OSI model based on? 1. TCP/IP 2. IPsec 3. FTP 4. PPTP 9. Which network services provides the mapping and translation of domain names to IP addresses? 1. HTTP 2. DHCP 3. DNS 4. FTP 10. With a proxy server enabled on a firewall, the firewall stores web pages where? 1. Local usb drive 2. RAM 3. Local hard drive 4. FTP server 11 The ________ provides definitions for seen layers, which each layer provides services that
  • 3. depend on higher level layers depend on. 2. TCP 3. FTP 4. OSI 5. DNS 12. Which of the ways listed below can firewall security be completely bypassed? (Multiple answers) 1. HTTP sites are never secure 2. E-mail is never secure 3. A computer not owned by the enterprise should never be connected to the enterprise 4. Files from home computers and files from office computers should never commingle. Solution Q1 4. Network address translation Q2 3. 65535 Q3 1. tracert Q6 1. packet-filtering gateway Q7 2. virus