1. Right Answer: C
Explanation: A firewall can greatly improve network security and reduce risks to hosts on the subnet by filtering inherently insecure services. As a result, the subnet network environment is exposed to fewer risks, since only selected protocols will be able to pass through the firewall. A firewall also provides the ability to control access to site systems. For example, some hosts can be made reachable from outside networks, whereas others can be effectively sealed off from unwanted access. Privacy is of great concern to certain sites, since what would normally be considered innocuous information might actually contain clues that would be useful to an attacker. Using a firewall, some sites wish to block services such as finger and Domain Name Service. If all access to and from the Internet passes through a firewall, the firewall can log accesses and provide valuable statistics about network usage. A firewall, with appropriate alarms that sound when suspicious activity occurs can also provide details on whether the firewall and network are being probed or attacked.
2. Right Answer: B
Explanation: Human skin is capable of conducting electricity. Capacitive touch screens use this trait to execute the action the user wishes to perform.
3. Right Answer: A
Explanation: The keyboard Num Lock was set to ON by the external keyboard used by the docking station. Hibernation preserved this setting. Although restarting the machine will fix this, it is quicker to simply turn it off.
4. Right Answer: B
Explanation: File Transfer Protocol (FTP) is a type of protocol supported on the Internet that allows you to easily transfer files from your computer to another computer. To use FTP, you need the address of a server that supports FTP and a client software package that supports FTP running on your computer. This protocol runs in the OSI model Application Layer.
5. Right Answer: C
Explanation: Remember, FTP also allows for access in both directions. FTP teams up with Telnet to transparently log you on to the FTP server and then provides for the transfer of files. Accessing a host is only the first step. Users must then be subjected to an authentication login that-s probably secured with passwords and usernames placed there by the systems administrator to restrict access. FTP is part of the TCP/IP stack, and since it is connection oriented, it can verify TCP is functioning.