SlideShare a Scribd company logo
1 of 3
Download to read offline
1. inside source IP address and port number 172.16.1.20:20
translated outside IP address 68.68.68.1:80
1. VPN address translation
2. Network address port translation
3. DMZ address translation
4. Network address translation
2. How many ports are used by computers for TCP/IP network traffic?
1. 65500
2. 1024
3. 65535
4. 6553
3. Which command prompt utility allows administrators to determine the actual path from one
computer to another?
1. tracert
2. NAT
3. dns flush
4. ping
4. Which UNIX tool is used to do a scan on itself?
1. traceroute
2. DHCP
3. netstat
4. ping localhost
5. Which type of VPN would be used to allow an organization to leverage the Internet backbone
to build a secure WAN between office branches?
1. remote user vpn
2. HTTP VPN
3. DMZ vpn
4. remote office vpn
6. What type of firewall uses routers with rules to grant or deny access based only on source
address, destination address, and port number?
1. packet-filtering gateway
2. application gateway
3. layer 3 gateway
4. hybrid gateway
7. A _______ attack will automatically attempt thousands or millions of passwords to gain
access to a system.
1. worm
2. virus
3. dictionary
4. logic bomb
8. What protocol is are layers 6 and 7 of the OSI model based on?
1. TCP/IP
2. IPsec
3. FTP
4. PPTP
9. Which network services provides the mapping and translation of domain names to IP
addresses?
1. HTTP
2. DHCP
3. DNS
4. FTP
10. With a proxy server enabled on a firewall, the firewall stores web pages where?
1. Local usb drive
2. RAM
3. Local hard drive
4. FTP server
11 The ________ provides definitions for seen layers, which each layer provides services that
depend on higher level layers depend on.
2. TCP
3. FTP
4. OSI
5. DNS
12. Which of the ways listed below can firewall security be completely bypassed? (Multiple
answers)
1. HTTP sites are never secure
2. E-mail is never secure
3. A computer not owned by the enterprise should never be connected to the enterprise
4. Files from home computers and files from office computers should never commingle.
Solution
Q1
4. Network address translation
Q2
3. 65535
Q3
1. tracert
Q6
1. packet-filtering gateway
Q7
2. virus

More Related Content

Similar to 1. inside source IP address and port number 172.16.1.2020translat.pdf

Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network AssociateSumit K Das
 
Computer awarness question bank
Computer awarness question bankComputer awarness question bank
Computer awarness question bankRajasirvishnu
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4Anne Starr
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Đồng Quốc Vương
 
1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docxdorishigh
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpOlli-Pekka Niemi
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramFRSecure
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewSam Bowne
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07Truong NGUYEN
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answersccna4discovery
 
EMSC1515104 Shehansuhail
EMSC1515104 ShehansuhailEMSC1515104 Shehansuhail
EMSC1515104 ShehansuhailMohomed Shehan
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 

Similar to 1. inside source IP address and port number 172.16.1.2020translat.pdf (20)

3.Network
3.Network3.Network
3.Network
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Cisco Certified Network Associate
Cisco Certified Network AssociateCisco Certified Network Associate
Cisco Certified Network Associate
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Computer awarness question bank
Computer awarness question bankComputer awarness question bank
Computer awarness question bank
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
 
1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor ProgramSlide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
 
Securityic2
Securityic2Securityic2
Securityic2
 
Topic22
Topic22Topic22
Topic22
 
EMSC1515104 Shehansuhail
EMSC1515104 ShehansuhailEMSC1515104 Shehansuhail
EMSC1515104 Shehansuhail
 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 

More from meejuhaszjasmynspe52

Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdfHomework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdfmeejuhaszjasmynspe52
 
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdfHand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdfmeejuhaszjasmynspe52
 
Find the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdfFind the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdfmeejuhaszjasmynspe52
 
Disorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdfDisorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdfmeejuhaszjasmynspe52
 
Differentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdfDifferentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdfmeejuhaszjasmynspe52
 
Could someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdfCould someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdfmeejuhaszjasmynspe52
 
Consider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdfConsider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdfmeejuhaszjasmynspe52
 
a) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdfa) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdfmeejuhaszjasmynspe52
 
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdfA.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdfmeejuhaszjasmynspe52
 
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdfmeejuhaszjasmynspe52
 
6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdf6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdfmeejuhaszjasmynspe52
 
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdfmeejuhaszjasmynspe52
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdfmeejuhaszjasmynspe52
 
1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdfmeejuhaszjasmynspe52
 
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdfmeejuhaszjasmynspe52
 
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdfCan a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdfmeejuhaszjasmynspe52
 
Write a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdfWrite a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdfmeejuhaszjasmynspe52
 
Why are culture media sterilized before they are used Do you think .pdf
Why are culture media sterilized before they are used  Do you think .pdfWhy are culture media sterilized before they are used  Do you think .pdf
Why are culture media sterilized before they are used Do you think .pdfmeejuhaszjasmynspe52
 
What recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdfWhat recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdfmeejuhaszjasmynspe52
 
What are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdfWhat are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdfmeejuhaszjasmynspe52
 

More from meejuhaszjasmynspe52 (20)

Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdfHomework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
 
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdfHand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
 
Find the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdfFind the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdf
 
Disorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdfDisorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdf
 
Differentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdfDifferentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdf
 
Could someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdfCould someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdf
 
Consider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdfConsider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdf
 
a) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdfa) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdf
 
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdfA.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
 
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
 
6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdf6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdf
 
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
 
1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf1- An information security manager routinely monitored Web Surfing a.pdf
1- An information security manager routinely monitored Web Surfing a.pdf
 
1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf
 
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
 
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdfCan a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
 
Write a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdfWrite a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdf
 
Why are culture media sterilized before they are used Do you think .pdf
Why are culture media sterilized before they are used  Do you think .pdfWhy are culture media sterilized before they are used  Do you think .pdf
Why are culture media sterilized before they are used Do you think .pdf
 
What recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdfWhat recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdf
 
What are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdfWhat are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdf
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

1. inside source IP address and port number 172.16.1.2020translat.pdf

  • 1. 1. inside source IP address and port number 172.16.1.20:20 translated outside IP address 68.68.68.1:80 1. VPN address translation 2. Network address port translation 3. DMZ address translation 4. Network address translation 2. How many ports are used by computers for TCP/IP network traffic? 1. 65500 2. 1024 3. 65535 4. 6553 3. Which command prompt utility allows administrators to determine the actual path from one computer to another? 1. tracert 2. NAT 3. dns flush 4. ping 4. Which UNIX tool is used to do a scan on itself? 1. traceroute 2. DHCP 3. netstat 4. ping localhost 5. Which type of VPN would be used to allow an organization to leverage the Internet backbone to build a secure WAN between office branches? 1. remote user vpn 2. HTTP VPN 3. DMZ vpn 4. remote office vpn
  • 2. 6. What type of firewall uses routers with rules to grant or deny access based only on source address, destination address, and port number? 1. packet-filtering gateway 2. application gateway 3. layer 3 gateway 4. hybrid gateway 7. A _______ attack will automatically attempt thousands or millions of passwords to gain access to a system. 1. worm 2. virus 3. dictionary 4. logic bomb 8. What protocol is are layers 6 and 7 of the OSI model based on? 1. TCP/IP 2. IPsec 3. FTP 4. PPTP 9. Which network services provides the mapping and translation of domain names to IP addresses? 1. HTTP 2. DHCP 3. DNS 4. FTP 10. With a proxy server enabled on a firewall, the firewall stores web pages where? 1. Local usb drive 2. RAM 3. Local hard drive 4. FTP server 11 The ________ provides definitions for seen layers, which each layer provides services that
  • 3. depend on higher level layers depend on. 2. TCP 3. FTP 4. OSI 5. DNS 12. Which of the ways listed below can firewall security be completely bypassed? (Multiple answers) 1. HTTP sites are never secure 2. E-mail is never secure 3. A computer not owned by the enterprise should never be connected to the enterprise 4. Files from home computers and files from office computers should never commingle. Solution Q1 4. Network address translation Q2 3. 65535 Q3 1. tracert Q6 1. packet-filtering gateway Q7 2. virus