Assessment test questions (2) Flashcards
You need to break up broadcast domains in a Layer 2 switched network. What strategy will you use?
Implement a loop-avoidance scheme.
Create a flatter network structure using switches.
Create a VLAN.
Create a VLAN.
Virtual LANs break up broadcast domains in Layer 2 switched internetworks
Why do most switches run the Spanning Tree Protocol by default?
It monitors how the network is functioning.
It stops data from forwarding until all devices are updated.
It prevents switching loops.
It prevents switching loops.
The Spanning Tree Protocol (STP) was designed to stop Layer 2 loops. All enterprise model switches have STP by default
Which of the following describes MIMO correctly?
A protocol that requires acknowledgment of each and every frame
A data-transmission technique in which several frames are sent by several antennas over several paths and are then recombined by another set of antennas
A modulation technique that allows more than one data rate
A data-transmission technique in which several frames are sent by several antennas over several paths and are then recombined by another set of antennas
Part of the 802.11n wireless standard, MIMO sends multiple frames by several antennas over several paths; they are then recombined by another set of antennas to optimize throughput and multipath resistance. This is called spatial multiplexing
Which two practices help secure your wireless access points from unauthorized access? (Choose all that apply.)
Assigning a private IP address to the AP
Changing the default SSID value
Configuring a new administrator password
Changing the mixed-mode setting to single mode
Changing the default SSID value
Configuring a new administrator password
At a minimum, you need to change the default SSID value on each AP and configure new usernames and passwords on the AP
IPSec is defined at what layer of the OSI model?
Network
Physical
Layer 4
Network
IPSec works at the Network layer of the OSI model (Layer 3) and secures all applications that operate above it (Layer 4 and above). Additionally, because it was designed by the IETF and designed to work with IPv4 and IPv6, it has broad industry support and is quickly becoming the standard for VPNs on the Internet
You want your users to log in and authenticate before they can get onto your network. Which of the following services would you use?
RADIUS
DNS
Virtual Network Computing
RADIUS
RADIUS combines user authentication and authorization into one profile
Someone calls you and asks for your bank account number because the bank is having problems with your account. You give them this information and later find out that you were scammed. What type of attack is this?
Phishing
Calling scam
Analog scam
Phishing
Social engineering, or phishing, refers to the act of attempting to illegally obtain sensitive information by pretending to be a credible source. Phishing usually takes one of two forms: an email or a phone call
Which of the following are types of denial-of-service attacks? (Choose all that apply.)
Ping of Death
Stacheldraht
SYN flood
Virus FloodSyn
Ping of Death
Stacheldraht
SYN flood
A denial-of-service (DoS) attack prevents users from accessing the system. All of the options are possible denial-of-service attacks except Virus FloodSyn
You want to stop a hacker in their tracks. Which of the following devices are proactive in providing this service?
Access control list (ACL)
Content filtering
Intrusion prevention system (IPS)
Intrusion prevention system (IPS)
Changing network configurations, terminating sessions, and deceiving the attacker are all actions that can be taken by an intrusion prevention system (IPS) device. These are all proactive approaches to security
You connected your company to the Internet, and security is a concern. What should you install?
Higher-quality cables
Firewall
DNS
Firewall
Firewalls help provide perimeter network security by allowing or denying connections and types of traffic in or out of the network
Which of the following are WAN protocols or technologies? (Choose all that apply.)
ATM
ISDN
MPLS
RIP
ATM
ISDN
MPLS
Routing Information Protocol (RIP) is not a WAN protocol but a routing protocol used in local area connections
The rate at which the Frame Relay switch agrees to transfer data is referred to as _______.
BE
FECN
CIR
CIR
The committed information rate (CIR) is the rate, in bits per second, at which the Frame Relay switch agrees to transfer data
hich two arp utility switches perform the same function?
–g
–Z
–d
–a
–g
–a
The arp utility’s –a and –g switches perform the same function. They both show the current ARP cache
You need to purge and reload the remote NetBIOS name table cache. Which nbtstat utility switch will you use?
–r
–R
/r
–R
To purge and reload the remote NetBIOS name cache, you must use nbtstat –R. Remember that the R must be uppercase, and it will not work correctly without the hyphen before it
Which tool is used to attach ends to network cables?
Punch-down tool
Crimper
VLAN tool
Crimper
A wire crimper or crimper is used to attach ends onto different types of network cables