logo image

6.1 Networking Review

Which of the following best describes the purpose of using subnets?
Subnets divide an IP network into multiple network addresses.
Which of the following network services or protocols uses TCP/IP port 22?
SSH
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall?(Select 2)
25 AND 110
To increase security on your company’s internal network…Which port needs to be enabled to allow secure transactions? (#12)
443
Which of the following correctly describes the most common format for expressing IPv6 addresses?(Select 2)
Hexadecimal numbers AND 32 numbers, grouped using colons
You want to maintain tight security on your internal network so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
53
You are an application developer creating applications for a wide variety of customers. In which two of the following situations would you select a connectionless protocol?(Select 2)
A gaming company wants to create…AND A company connects two networks through an expensive WAN link…
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
Implement version 3 of SNMP
Routers operate at what level of the Open System Interconnect model?
Network Layer
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. What protocol should you implement?
DNS
Your company’s network provides HTTP, HTTPS, and SSH access to remote employees. Which ports must be opened on the firewall to allow this traffic to pass?
80, 443, 22
Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2008 system using TCp/IP port 21. Which of the following actions is the remote system most likely to be performing?
Downloading a file
Which of the following are valid IPv6 addresses?
141:0:0:0:15:0:0:1 AND 6384:1319:7700:7631:446A:5511:8940:2552
Which of the following lists accurately describes TCP and UDP?
TCP: connection-oriented, reliable, sequenced, high overhead
UDP: connectionless, unreliable, unsequenced, low overhead
Your network recently experienced a series of attacks at the Telnet and FTP services. You have rewritten the security policy to abolish the unsecured services, and now you must secure the network using your firewall and routers. Which ports must be closed to prevent traffic directed to these two services?
23, 21

Need essay sample on "6.1 Networking Review"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy