which layer of the OSI model?
To verify that your PPTP implementation is working as you intended, you sniff the network after
the implementation has been completed. You are looking for specific values in the captures that
will indicate to you the type of packets received. You analyze the packets, including headers and
payload. PPTP works at which layer of the OSI model?
Which port, from the following list, will you have to allow through the firewall?
You are the firewall administrator for your company and you have just learned that the Server
administrators are gearing up support an L2TP based VPN solution. You are told to be sure that
your firewall rule sets will not hinder the performance of the VPN. Which port, from the following
list, will you have to allow through the firewall?
Which of the following provides confidentiality and authentication when implementing IPSec?
After you implemented your IPSec solution, you wish to run some tests to verify functionality.
Which of the following provides confidentiality and authentication when implementing IPSec?
which the two hosts communicate?
Your network is going to implement a new IPSec solution. Which of the following IPSec
components is used to define the security environment in which the two hosts communicate?
you need to allow through the firewall to allow these VPN sessions into your network?
You are the firewall administrator at your company and the network administrators have decided to
implement a PPTP VPN solution, which of these ports would you need to allow through the firewall
to allow these VPN sessions into your network?
Which of the following authentication protocols are used in VPNs?
In your network, at the last meeting, it was decided to modify the current client access to allow for
VPNs.
Which of the following authentication protocols are used in VPNs?
Which of the following is the description of the Client (Respond Only) default IPSec Policy?
Your network is going to implement a new network security solution, and as part of this you are
configuring IPSec on a Windows Server 2003 machine. Which of the following is the description of
the Client (Respond Only) default IPSec Policy?
what is the function of the Session Layer?
In order to properly manage the network traffic in your organization, you need a complete
understanding
of protocols and networking models. In regards to the 7-layer OSI model, what is the function of
the Session Layer?
Which port will you block at the Firewall?
Your network is a mixed environment of Windows, Linux, and UNIX, computers. The routers are
primarily
Cisco and the network uses a T-1 to connect to the Internet. You are experimenting with setting up
a mail server in a production environment for internal use only. You do not want this mail server to
receive any requests from anywhere but the internal network. Therefore you have decided to block
incoming SMTP traffic at the Firewall. Which port will you block at the Firewall?
What is the decimal equivalent of the following binary IP address: 11001111.10001010.01101101.01110001
You are training some network administrators to analyze log files. Some of the logs present IP
addresses in binary. You explain the usefulness of reading addresses in multiple formats. You
demonstrate several conversions between decimal and binary. What is the decimal equivalent of
the following binary IP address:
11001111.10001010.01101101.01110001