Search Header Logo
Net+5.3-5.5 Lesson

Net+5.3-5.5 Lesson

Assessment

Presentation

Computers

11th Grade

Practice Problem

Easy

Created by

Sean Carchidi

Used 1+ times

FREE Resource

4 Slides • 37 Questions

1

Multiple Choice

What does NAT stand for in networking?

1
Network Access Technology
2
Network Allocation Table
3
Network Application Transfer
4
Network Address Translation

2

Multiple Choice

NAT can be easily described as

1
a technique for securing private IP addresses from external threats.
2
a method for connecting multiple public IP addresses to a single private IP address.
3
a protocol for assigning unique IP addresses to every device on a network.
4
a method for mapping multiple private IP addresses to a single public IP address.

3

Multiple Choice

Why do we need or use NAT?

1
We use NAT to conserve IP addresses and improve security.
2
NAT allows direct access to all devices on a network.
3
NAT is used to increase the number of available IP addresses.
4
NAT is primarily for improving internet speed.

4

Multiple Choice

What is dynamic NAT?

1
Dynamic NAT only allows one device to access the internet at a time.
2
Dynamic NAT allows multiple devices on a private network to share a limited number of public IP addresses.
3
Dynamic NAT assigns a unique public IP address to each device permanently.
4
Dynamic NAT is used to connect multiple private networks without any public IP addresses.

5

Multiple Choice

What is static NAT?

1
Static NAT dynamically assigns public IP addresses to private IP addresses.
2
Static NAT connects multiple private IP addresses to a single public IP address.
3
Static NAT maps a single private IP address to a single public IP address.
4
Static NAT is used for load balancing between multiple servers.

6

Multiple Choice

Edge routers are used because

1
Edge routers are used to provide wireless connectivity to devices.
2
Edge routers are used to increase the speed of a single network.
3
Edge routers are used to store data locally for faster access.
4
Edge routers are used to connect and manage traffic between different networks.

7

media

8

Categorize

Options (8)

Located at the edge of a customer’s network

Connects customer's internal network to provider and acts as a security barrier

Located at edge of ISP

maintain integrity of data from customer as it travels through its internal network

usually connects to a router on one end and user devices on the other end

typically a layer 2 device

connects end users through wireless

often is given profiles from a host controller

Organize these network device features into the right category

Customer Edge
Provider Edge
Switch
AP

9

Multiple Choice

What does PAT mean in networking?

1
Physical Address Translation
2
Packet Address Translation
3
Protocol Address Translation
4
Port Address Translation

10

media

11

Multiple Choice

In networking, PAT is responsible for

1
allowing a single device to use multiple public IP addresses
2
routing traffic between different networks
3
encrypting data for secure transmission
4
enabling multiple devices to share a single public IP address using different port numbers.

12

Multiple Choice

In the diagram, you see this number

10.0.0.101:61101

The numbers are separated by a COLON (:)

Identify the number on the LEFT SIDE of the colon.

1

IP address

2

Port address

3

MAC address

4

Static Address

13

Multiple Choice

In the diagram, you see this number

10.0.0.101:61101

The numbers are separated by a COLON (:)

Identify the number on the RIGHT SIDE of the colon.

1

IP address

2

Port address

3

MAC address

4

Static Address

14

Categorize

Options (7)

standalone appliances

integrated within routers

Next-Generation

OS based

Third-party software based

Firewall as a service

All-in-one security appliance

Organize these options into the right categories

Hardware
Software
Cloud-based
Unified Threat Management

15

Multiple Choice

This type of firewall is specifically designed for network security, often found in corporate environments.

1
packet filtering firewall
2

standalone network firewall

3
host-based firewall
4
application firewall

16

Multiple Choice

This type of firewall provides basic home and small office protection and is found on a router.

1
Software firewall
2
Router firewall
3
Hardware firewall
4
Application firewall

17

Multiple Choice

An example of a OS based firewall is

1
Windows Firewall
2
Application Firewall
3
Linux Firewall
4
Router Firewall

18

Multiple Choice

This type of firewall is an all-in-one security appliances that include firewall capabilities along with anti-virus, anti-spam, and intrusion detection systems.

1
Unified Threat Management (UTM)
2
Proxy Server
3
Virtual Private Network (VPN)
4
Network Address Translation (NAT)

19

Multiple Choice

What is packet filtering?

1
Packet filtering is a method of controlling network traffic by allowing or blocking packets based on defined security rules.
2
Packet filtering is a technique for encrypting data during transmission.
3
Packet filtering is a method for compressing network traffic to save bandwidth.
4
Packet filtering is a way to monitor user activity on a network.

20

Multiple Choice

Stateful inspection is more detailed than packet filtering because

1
Stateful inspection only checks the header of packets.
2
Packet filtering is more secure than stateful inspection.
3
Stateful inspection considers the state of connections, making it more detailed than packet filtering.
4
Stateful inspection does not track connection states.

21

Multiple Choice

Stateful inspection is more commonly found in what type of environment?

1

Network environments

2
Cloud environments
3
Web applications
4

Corporate Network environments

22

Multiple Choice

Unlike packet filtering which examines data at the packet level according to rules, what does stateful inspection review to consider its level of protection?

1

secure TCP handshake session

2

packet level data

3

secure data on the transport level

4

handshakes within the application layer

23

Multiple Choice

Which is better: packet filtering or stateful inspection?

1
Stateful inspection is outdated.
2
Stateful inspection is better.
3
Packet filtering is more secure.
4
Packet filtering is faster than stateful inspection.

24

media

25

Multiple Choice

What does the word hierarchical mean?

1

Organized in a ranked order.

2
Relating to a network of connections
3
A method of sorting data randomly
4
Describing a flat structure without levels

26

Multiple Choice

A network tree topology can be described as

1
A linear connection of devices in a single path.
2
A random arrangement of devices with no specific structure.
3
A circular layout where each device connects to two others.
4
A hierarchical structure connecting multiple devices in a branching manner.

27

Multiple Choice

Select the CON of using a Tree Topology

1

scailability

2

centralized management

3

segmentation

4

relies on a root node

28

Multiple Select

Select 2 PROS of using a Tree Topology.

1

scailability

2

failure causes disruption

3

segmentation

4

relies on a root node

29

Multiple Choice

Using a hybrid topology in networking is ideal because

1
it provides flexibility, scalability, and improved performance.
2
it limits network growth
3
it reduces overall speed
4
it increases complexity

30

Multiple Choice

Implementing redundancy and fault tolerance into a network means

1
It eliminates all potential network failures.
2
It enhances network reliability and availability.
3
It increases the complexity of the network.
4
It reduces network performance.

31

Multiple Choice

An example of a fault tolerant network would be

1
Star network
2
Bus network
3
Point-to-point network
4
Mesh network

32

Multiple Choice

Having multiple ISPs provide internet services to your building would be labeled as

1
multi-homing
2
ISP redundancy
3
dual-linking
4
single-homing

33

REVIEW time...

34

Multiple Choice

What does NAT stand for in networking?

1
Network Access Technology
2
Network Allocation Table
3
Network Application Transfer
4
Network Address Translation

35

Multiple Choice

Edge routers get installed WHERE on a network.

1
In the core of a network
2
At the user endpoint
3
Within the data center
4
At the boundary of a network

36

Multiple Choice

The main difference between a CE and PE router is

1
CE routers are used for routing between different service providers.
2
CE routers connect to customer sites; PE routers connect to service provider networks.
3
PE routers are primarily used in home networks.
4
CE routers manage traffic within the service provider's core network.

37

Multiple Choice

PAT allows one IP address to be used because

1
It eliminates the need for a router.
2
It provides a unique IP address for each device.
3
It allows multiple devices to share one public IP address.
4
It allows devices to connect directly to the internet.

38

Multiple Choice

A standalone firewall does what for a network?

1
It protects the network by filtering traffic and preventing unauthorized access.
2
It speeds up the network by increasing bandwidth.
3
It provides a backup for data storage.
4
It enhances the network's Wi-Fi signal.

39

Multiple Choice

Packet filtering is known as stateful or stateless?

1
Dynamic
2

stateful

3
Protocol-based
4
Stateless

40

Multiple Choice

Combining topologies in a network ensures what

1
Increased network latency and complexity.
2
Reduced data transfer speeds and bottlenecks.
3
Limited connectivity and higher costs.
4
Improved network efficiency and redundancy.

41

Word Cloud

One word that sticks out in this lesson?

What does NAT stand for in networking?

1
Network Access Technology
2
Network Allocation Table
3
Network Application Transfer
4
Network Address Translation

Show answer

Auto Play

Slide 1 / 41

MULTIPLE CHOICE

Discover more resources for Computers