1. ________ is an IPv6 transition technology that allows end-to-end communication using ipv6 addresses.
2. What record must be added to a DNS zone file to alias a host to another name?
3. Complete this sentence with an appropriate phrase or follow-on sentence.
4. Name three (3) scenarios for implementing SNMP in a company's network infrastructure.
5. Define the term "DMZ" as it pertains to network security, and name two (2) different, yet common network devices that are typically found there. Describe the benefit of a perimeter network.
6. Identify the true statement(s).
a. Stateless packet filtering considers the TCP connection state.
b. Stateful packet filtering considers the TCP connection state.
c. Neither stateless nor stateful packet filtering monitor the TCP connection state.
d. Both stateless and stateful packet filtering monitor the TCP connection state, and keep a state table containing that information.
7. Based on the following configuration, which of the following would appear as source addresses for packets forwarded by the router, out interface Serial 0?
interface serial 0
ip nat outside
ip address 200.100.50.25 255.255.255.0
interface Ethernet 0
ip nat inside
ip address 192.168.100.1 255.255.255.0
ip nat pool NAT_POOL 201.0.0.17 201.0.0.30 netmask 255.255.255.240
ip nat inside source list 1 pool NAT_POOL
access-list 1 permit 192.168.100.0 0.0.0.255
ip route 0.0.0.0 0.0.0.255
a. 192.168.100.5
b. 200.100.50.25
c. 201.0.0.29
d. 201.0.0.15
e. 192.168.100.65
Now, explain how you determined the answer?
8. You work as a network support specialist for touro.edu. You are planning to deploy a new server in a branch office to improve name resolution times. a. There are no administrators at the branch office. You want to deploy a DNS server that will not require any administration but will help resolve the queries of computers on the Internet. What kind of DNS server should you deploy and why?
9. True or False?
SOCKS can support any client platform, including Windows, Linux, and Macintosh.
10. Describe two (2) scenarios where your corporate firewall will be used as a VPN server (i.e. what type of VPN connections are possible, using a corporate firewall).
11. Which of the following is the first step you should take when considering securing your network?
a. Install a firewall
b. Install an intrusion prevention system
c. Update servers and user PCs with the latest patches
d. Develop a security policy
12. Name two (2) ways that SNMP traffic can be secured.