Name:     ID: 
 
    Email: 

CNG 131 Chapter 11

True/False
Indicate whether the sentence or statement is true or false.
 

 1. 

VLANs, which are deployed using network switches, cannot be used anywhere in the network.
 

 2. 

Security policies that determine what is allowed to enter or leave the network are enforced primarily by switches deployed on the network edge.
 

 3. 

Each network can contain multiple perimeter networks.
 

 4. 

Security measures usually increase convenience and decrease administrative overhead.
 

 5. 

Every security system has vulnerabilities.
 

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 6. 

Networks that allow access to some database materials and e-mail are called:
a.
untrusted networks
c.
semi-trusted networks
b.
trusted networks
d.
campus networks
 

 7. 

The networks inside your network security perimeter are called:
a.
untrusted networks
c.
semi-trusted networks
b.
trusted networks
d.
campus networks
 

 8. 

A network controlled by an organization intended for private use behind the organization's firewall is called:
a.
untrusted network
c.
semi-trusted network
b.
trusted network
d.
campus network
 

 9. 

What enables one network to send its data via another network's connections?
a.
pruning
c.
extranet
b.
tunneling
d.
None of the above
 

 10. 

What is configuring a trunk link to prevent certain VLANs from crossing the trunk?
a.
trunking
c.
pruning
b.
tunneling
d.
None of the above
 

 11. 

A physical and logical connection between two switches is called:
a.
trunk
c.
DMZ
b.
extranet
d.
ISL
 

 12. 

What is an Internet standard that enables a LAN to use one set of IP address for Internet traffic and a second set of addresses for external traffic?
a.
DMZ
c.
ISL
b.
VLAN
d.
NAT
 

 13. 

A set of switch ports, located on one or several switches, grouped together logically so that they communicate as if they were on a single isolated network switch are called:
a.
DMZ
c.
ISL
b.
VLAN
d.
NAT
 

 14. 

What provides various levels of accessibility to outsiders based on their username and password?
a.
DMZ
c.
extranet
b.
VLAN
d.
None of the above
 

 15. 

What is the Cisco proprietary trunking protocol named?
a.
DMZ
c.
NAT
b.
VLAN
d.
ISL
 

 16. 

What is the standards-based specification for implementing VLANs in Layer 2 LAN?
a.
IEEE 802.2e
c.
IEEE 802.1b
b.
IEEE 802.1q
d.
None of the above
 

 17. 

Each network can contain how many perimeter networks?
a.
one
c.
multiple
b.
two
d.
none
 

 18. 

Knowing your enemy refers to knowing:
a.
attackers
c.
competition
b.
intruders
d.
Both A and B
 

 19. 

Security measures usually reduce:
a.
convenience
c.
staffing
b.
expenses
d.
None of the above
 

 20. 

Every security system has underlying assumptions that you must:
a.
examine
c.
justify
b.
coordinate
d.
Both A and C
 

 21. 

DMZ stands for:
a.
decentralized machine zone
c.
demilitarized zone
b.
damaged magnetic zone
d.
None of the above
 

 22. 

NAT stands for:
a.
network activity terminal
c.
new address translation
b.
network address translation
d.
None of the above
 

 23. 

VLAN stands for:
a.
visual local area network
c.
virtual local area network
b.
viable local area network
d.
None of the above
 

 24. 

What is the address class for the IP range 172.16.0.0 - 172.31.255.255?
a.
A
c.
C
b.
B
d.
D
 

 25. 

What is the address class for the IP range 192.168.0.0 - 192.168.255.255?
a.
A
c.
C
b.
B
d.
D
 

Matching
 
 
Please match the best term from the list below to the most appropriate concept.
a.
campus network
e.
untrusted network
b.
extranet
f.
DMZ
c.
trusted network
g.
semi-trusted network
d.
trunk
h.
ISL
 

 26. 

Network that allows access to some database materials and e-mail.
 

 27. 

Network that is known to be outside your security perimeter.
 

 28. 

Network that is controlled by an organization intended for private use.
 

 29. 

Network that is inside your security perimeter.
 

 30. 

A physical and logical connection between two switches.
 
 
Please match the best term from the list below to the most appropriate concept.
a.
Inter-Switch Link
e.
extranet
b.
trunk
f.
tunneling
c.
IEEE 802.1q
g.
DMZ
d.
pruning
h.
NAT
 

 31. 

Technology that enables one network to send its data via another network's connections.
 

 32. 

Process of configuring a trunk link to prevent certain VLANs from crossing the trunk.
 

 33. 

Cisco proprietary trunking protocol.
 

 34. 

Area to host your own Internet services.
 

 35. 

Provides various levels of accessibility to outsiders.
 



 
Submit          Reset Help