Q1. Describe two (2) firewall configurations and their application to securing a network.
Q2. Summarize the purpose of the following internet protocol (IP) related configuration parameters:
Q3. Give two examples of hardware that would be found in a network infrastructure.
Q4. What is an application load balancer? Explain its use.
Q5. Identify two (2) examples of security measures that can be taken to improve network security.
Q6. Explain three (3) features of server operating systems. Provide two (2) examples of commonly used server operating systems.
Q7. Define the purpose of domain name system (DNS) in a network.
- What is role of (i) AAAA records
- MX records in DNS
Q8. Define the purpose of dynamic host configuration protocol (DHCP) in a network.
What is meant by: –
- a DHCP scope –
- a DHCP exclusion
Q9. Define the purpose of file transfer protocol (FTP) in a network.
What are the FTP commands to: –
Q10. Define the purpose of network time protocol (NTP) in a network.
Q11. Define Server Message Block (SMB) and proxy server?
Q12. Identify three (3) types of services that mainly represented by SMB protocol.
Q13. Define the roles of the following protocols in email systems
Q14. Define the purpose of the following types of HTTP Requests to a web server:
Q15. Define network service management in context to the (i) quality of service and (ii) availability measures in a network.
Q16. Identify and explain at least three (3) network troubleshooting tools and techniques we use to diagnose the network.
Q17. Describe the purpose of user authentication and directory services in a network.
Q18. Describe the purpose of voice over internet protocol (VoIP), and give an example of how it could be used in a network to lower telephone costs.
Q19. Describe virtual private network (VPN) and explain two (2) types of VPNs.
Q20. Scenario: You are attempting to integrate two sites (Melbourne and Perth) by implementing a site-to-site VPN between the two locations. The protocol you implement between the two sites is IPSec which requires a shared secret to be configured at each VPN endpoint, and you configure the shared secret “vpnpa55” at the Melbourne VPN endpoint only. When you try to connect the VPN from Melbourne to Perth, the connection fails, with the Perth VPN endpoint reporting is unable to decrypt the data. Based on the above scenario, you are required to answer the following questions:
Support your answers by providing examples.
Prior to completing this question, you need to complete the VPN LAB (Week 5 Lab activity) and your answer to this question will be based on your learning outcome under this activity.
Q21. List and explain at least three (3) network tools.
Q22. In an event when using network tools, what types of processes and techniques can be used?
Q23. List three (3) attacks that can affect network security and explain their features.
Q24. What are the key problems and challenges that relate to network security?