263. In a fully networked topology, if there are five nodes, how many direct paths does it result in?

a. 2

b. 3

c. 5

d. 10

263. d. The equation for the number of direct paths in a fully connected network is n (n–1)/2, where “n” is the number of nodes. Applying the equation results in 10 (i.e., 5(5–1)/2). The answer 2 is obtained by using the equation as (n–1)/2. The answer 3 is obtained by using the equation as (n+1)/2.

264. Which of the following networks is used to distribute music, games, movies, and news using client caching, server replication, client’s request redirection, and a proxy server?

a. Asynchronous transfer mode (ATM) network

b. Content delivery network (CDN)

c. Voice over Internet Protocol (VoIP) network

d. Integrated services digital network (ISDN)

264. b. Content delivery networks are used to deliver the contents of music, games, movies, and news from content owner’s website to end users quickly with the use of tools and techniques such as client caching, server replication, client’s request redirection, and a proxy content server to enhance the Web performance in terms of optimizing the disk space and preload time.

ATMs are good for voice traffic only. VoIP is the transmission of voice over packet-switched IP networks and it takes a wide variety of forms, including traditional telephone handsets, conferencing units, and mobile units. ISDN is an international communications standard for sending voice, video, and data over digital or standard telephone wires. The ISDN security must begin with the user (i.e., may be a person, an organizational entity, or a computer process).

265. Firewalls are the perfect complement to which of the following?

a. Bridges

b. Routers

c. Brouters

d. Gateways

265. b. Given that all routers support some type of access control functionality, routers are the perfect complement to firewalls. The generally accepted design philosophy is that boundary routers should protect firewall devices before the firewall devices ever have to protect themselves. This principle ensures that the boundary router can compensate for any operating system or platform-specific vulnerabilities that might be present on the firewall platform. Brouters combine the functionality of bridges and routers.

266. Which of the following is the best backup strategy for firewalls?

a. Incremental backup

b. Centralized backup

c. Day Zero backup

d. Differential backup

266. c. The conduct and maintenance of backups are key points to any firewall administration policy. It is critical that all firewalls are subject to a Day Zero backup (full backup), i.e., all firewalls should be backed up immediately prior to production release. As a general principle, all firewall backups should be full backups, and there is no need for incremental, centralized, or differential backups because the latter are less than full backups.

267. Which of the following needs to be protected for a failsafe performance?

a. Virus scanners

b. Firewalls

c. Blocking filters

d. Network ports

267. b. Network firewalls are devices or systems that control the flow of network traffic between networks employing differing security postures. A failsafe is the automatic termination and protection of programs when a hardware or software failure is detected. Because firewalls provide a critical access control security service, multiple firewalls should be employed for failsafe performance. Depending on a person’s viewpoint, firewalls provide either the first line of defense or the last line of defense in accessing a network.

Virus scanners look for common viruses and macro viruses. Blocking filters can block Active-X and Java applets. Network ports provide access points to a network. These are not that important when compared to the firewall to have a failsafe performance.

268. Which of the following does not require network address translation services?

a. Internet Protocol (IP) version 2

b. Internet Protocol (IP) version 3

c. Internet Protocol (IP) version 4

d. Internet Protocol (IP) version 6

Перейти на страницу:

Поиск

Похожие книги