Networks and Security: Quiz 10

Networks and Security: Quiz 10

Professional Development

15 Qs

quiz-placeholder

Similar activities

Internet Technologies Quiz 1

Internet Technologies Quiz 1

Professional Development

20 Qs

Network & security Final Quiz

Network & security Final Quiz

Professional Development

16 Qs

Fun Networking

Fun Networking

Professional Development

12 Qs

Part 1.1

Part 1.1

Professional Development

10 Qs

Komputer jaringan dasar

Komputer jaringan dasar

Professional Development

15 Qs

CEH Study Guide - 02 Networking Foundations

CEH Study Guide - 02 Networking Foundations

Professional Development

15 Qs

Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Professional Development

15 Qs

PKL XI TKJ dan XII TKJ

PKL XI TKJ dan XII TKJ

Professional Development

20 Qs

Networks and Security: Quiz 10

Networks and Security: Quiz 10

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

s________ z________ are a segment of a network that protects the internal network from the internet. They control who can access different segments of a network. They act as a bar___________ to internal networks, maintain privacy within corporate groups, and prevent issues from spreading to the whole network. One example of network segmentation is a hotel that offers free public Wi-Fi. The unsecured guest network is kept separate from another encrypted network used by the hotel staff.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

They are a part of a security technique called network seg_____________ that divides the network into parts Each network part has its own access permissions and security rules.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An organization's network is classified into two types of security zones. First, there's the uncontrolled zone, which is any network outside of the organization's control, like the internet. Then, there's the controlled zone, which is a sub_____ that protects the internal network from the uncontrolled zone.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

There are several types of networks within the controlled zone. On the outer layer is the demilitarized zone, or ???, which contains public-facing services that can access the internet. This includes web servers, proxy servers that host websites for the public, and DNS servers that provide IP addresses for internet users. It also includes email and file servers that handle external communications. The ??? acts as a network perimeter to the internal network. The internal network contains private servers and data that the organization needs to protect. Inside the internal network is another zone called the re_________ zone. The re_________zone protects highly confidential information that is only accessible to employees with certain privileges.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

The subdivision of a network into logical groups called sub_____. It works like a network inside a network. Subnetting divides up a network add________ range into smaller sub_____ within the network. These smaller sub_____ form based on the IP add________ and network mask of the devices on the network. sub_____ing creates a network of devices to function as their own network. This makes the network more efficient and can also be used to create security zones. If devices on the same sub_____ communicate with each other, the switch changes the transmissions to stay on the same subnet, improving speed and efficiency of the communications.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Classless Inter-Domain Routing (CIDR) is a method of assigning subnet ma________ to IP addresses to create a subnet. Classless addressing replaces classful addressing. Classful addressing was used in the 1980s as a system of grouping IP addresses into classes (Class A to Class E). Each class included a limited number of IP addresses, which were depleted as the number of devices connecting to the internet outgrew the classful range in the 1990s. Classless CIDR addressing expanded the number of available IPv4 addresses. 

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

CIDR allows cybersecurity professionals to segment classful networks into smaller chunks. CIDR IP addresses are formatted like IPv4 addresses, but they include a slash (“/’”) followed by a number at the end of the address, This extra number is called the IP network pre____. For example, a regular IPv4 address uses the 198.51.100.0 format, whereas a CIDR IP address would include the IP network prefix at the end of the address, 198.51.100.0/24. This CIDR address encompasses all IP addresses between 198.51.100.0 and 198.51.100.255. The system of CIDR addressing reduces the number of entries in routing tables and provides more available IP addresses within networks. You can try converting CIDR to IPv4 addresses and vice versa through an online conversion tool, like

IPAddressGuide.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?