|
1 | | Private networks, hybrid networks, and virtual private networks can provide _________ for organizations |
| | A) | efficiency |
| | B) | privacy |
| | C) | a and b |
| | D) | none of the above |
|
|
2 | | Both private and hybrid networks have a major drawback: _________. |
| | A) | lack of privacy |
| | B) | cost |
| | C) | both a and b |
| | D) | none of the above |
|
|
3 | | A _______ network allows an organization to have its own private internet and, at the same time, access the global Internet. |
| | A) | private |
| | B) | public |
| | C) | hybrid |
| | D) | none of the above |
|
|
4 | | When an organization uses a private network, it _______________. |
| | A) | needs to obtain a block of addresses from the Internet authorities |
| | B) | can use a block of addresses without permission from the Internet authorities |
| | C) | needs to register the block of addresses being used. |
| | D) | none of the above |
|
|
5 | | VPN is a network that is _______ but ________. |
| | A) | private; public |
| | B) | private; virtual |
| | C) | public; virtual |
| | D) | none of the above |
|
|
6 | | A VPN is physically ________ but virtually ________. |
| | A) | public; private |
| | B) | private; public |
| | C) | public; hybrid |
| | D) | none of the above |
|
|
7 | | VPN technology uses two simultaneous techniques to guarantee privacy for an organization: ________ and ___________. |
| | A) | SSL; tunneling |
| | B) | IPSec; SSL |
| | C) | IPSec; tunneling |
| | D) | none of the above |
|
|
8 | | ____________ means that each IP datagram destined for private use in the organization must be encapsulated in another datagram. |
| | A) | Multicasting |
| | B) | Broadcasting |
| | C) | Tunneling |
| | D) | none of the above |
|
|
9 | | __________ technology allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with another site. |
| | A) | VPN |
| | B) | NAT |
| | C) | both a and b |
| | D) | none of the above |
|
|
10 | | Using _______, all of the outgoing packets go through the corresponding router, which replaces the source address in the packet with the appropriate global address. |
| | A) | VPN |
| | B) | NAT |
| | C) | both a and b |
| | D) | none of the above |
|
|
11 | | An _______ is a private network with no external access that uses the TCP/IP protocol suite. |
| | A) | extranet |
| | B) | internet |
| | C) | intranet |
| | D) | none of the above |
|
|
12 | | An _______ is a private network with limited external access that uses the TCP/IP protocol suite. |
| | A) | extranet |
| | B) | internet |
| | C) | intranet |
| | D) | none of the above |
|
|
13 | | A _______ network is totally isolated from the global Internet. |
| | A) | private |
| | B) | hybrid |
| | C) | virtual private |
| | D) | none of the above |
|
|
14 | | A _______ network can use a leased line for intraorganization communication and the Internet for interorganization communication. |
| | A) | private |
| | B) | hybrid |
| | C) | virtual private |
| | D) | none of the above |
|
|
15 | | A VPN can use _______ to guarantee privacy. |
| | A) | IPSec |
| | B) | tunneling |
| | C) | both a and b |
| | D) | none of the above |
|
|
16 | | Tunneling is a technique in which the IP datagram is first _______ and then _______. |
| | A) | encapsulated in another datagram; encrypted |
| | B) | encrypted; encapsulated in another datagram |
| | C) | authenticated; encrypted |
| | D) | encrypted; authenticated |
|
|
17 | | _______ is a technology using a set of global Internet addresses and a set of private addresses. |
| | A) | VPN |
| | B) | ISP |
| | C) | NAT |
| | D) | none of the above |
|
|
18 | | On a network that uses NAT, the _______ has a translation table. |
| | A) | bridge |
| | B) | router |
| | C) | server |
| | D) | none of the above |
|
|
19 | | On a network that uses NAT, _______ initiates the communication. |
| | A) | an external host |
| | B) | an internal host |
| | C) | the router |
| | D) | none of the above |
|
|
20 | | On a network that uses NAT, the router can use _______ global address(es). |
| | A) | 1 |
| | B) | 2 |
| | C) | a pool of |
| | D) | none of the above |
|