Search Header Logo

Networks and Security: Quiz 10

Authored by John Coder

Computers

Professional Development

Networks and Security: Quiz 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

s________ z________ are a segment of a network that protects the internal network from the internet. They control who can access different segments of a network. They act as a bar___________ to internal networks, maintain privacy within corporate groups, and prevent issues from spreading to the whole network. One example of network segmentation is a hotel that offers free public Wi-Fi. The unsecured guest network is kept separate from another encrypted network used by the hotel staff.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They are a part of a security technique called network seg_____________ that divides the network into parts Each network part has its own access permissions and security rules.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An organization's network is classified into two types of security zones. First, there's the uncontrolled zone, which is any network outside of the organization's control, like the internet. Then, there's the controlled zone, which is a sub_____ that protects the internal network from the uncontrolled zone.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

There are several types of networks within the controlled zone. On the outer layer is the demilitarized zone, or ???, which contains public-facing services that can access the internet. This includes web servers, proxy servers that host websites for the public, and DNS servers that provide IP addresses for internet users. It also includes email and file servers that handle external communications. The ??? acts as a network perimeter to the internal network. The internal network contains private servers and data that the organization needs to protect. Inside the internal network is another zone called the re_________ zone. The re_________zone protects highly confidential information that is only accessible to employees with certain privileges.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

The subdivision of a network into logical groups called sub_____. It works like a network inside a network. Subnetting divides up a network add________ range into smaller sub_____ within the network. These smaller sub_____ form based on the IP add________ and network mask of the devices on the network. sub_____ing creates a network of devices to function as their own network. This makes the network more efficient and can also be used to create security zones. If devices on the same sub_____ communicate with each other, the switch changes the transmissions to stay on the same subnet, improving speed and efficiency of the communications.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Classless Inter-Domain Routing (CIDR) is a method of assigning subnet ma________ to IP addresses to create a subnet. Classless addressing replaces classful addressing. Classful addressing was used in the 1980s as a system of grouping IP addresses into classes (Class A to Class E). Each class included a limited number of IP addresses, which were depleted as the number of devices connecting to the internet outgrew the classful range in the 1990s. Classless CIDR addressing expanded the number of available IPv4 addresses. 

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

CIDR allows cybersecurity professionals to segment classful networks into smaller chunks. CIDR IP addresses are formatted like IPv4 addresses, but they include a slash (“/’”) followed by a number at the end of the address, This extra number is called the IP network pre____. For example, a regular IPv4 address uses the 198.51.100.0 format, whereas a CIDR IP address would include the IP network prefix at the end of the address, 198.51.100.0/24. This CIDR address encompasses all IP addresses between 198.51.100.0 and 198.51.100.255. The system of CIDR addressing reduces the number of entries in routing tables and provides more available IP addresses within networks. You can try converting CIDR to IPv4 addresses and vice versa through an online conversion tool, like

IPAddressGuide.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?