Exam 131-140 Flashcards

1
Q

In which of the following ways does a DDoS attack differ from a spoofing attack?

A. DDoS attacks target multiple networks
B. Spoofing attacks originate from a single host
C. DDoS attacks are launched from multiple hosts
D. Spoofing attacks require physical presence

A

C. DDoS attacks are launched from multiple hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The security manager reports that individual systems involved in policy or security violations or incidents cannot be
located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of
the following would BEST assist the security manager identifying systems involved in security incidents?

A. Enforce port security to require system authentication
B. Implement a standardized UNC
C. Label existing systems with current hostnames
D. Forward the DHCP logs to the security manager every day

A

B. Implement a standardized UNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-
post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to
remediate?

A. Air flow and cooling
B. UPS capability
C. Circuit labeling
D. Power redundancy

A

A. Air flow and cooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative
console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of
the following is causing the problem?

A. The WAP antenna is damaged
B. The WAP transmitter light is dim
C. The terminal emulation software is misconfigured
D. The LWAPP image is installed on the WAP

A

C. The terminal emulation software is misconfigured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technician is trying to determine the IP address of a customer’s router. The customer hasan IP address of
192.168.1.55/24. Which of the following is the address of the customer’s router?

A. 192.168.0.55 
B. 192.168.1.0 
C. 192.168.1.1 
D. 192.168.5.5 
E. 255.255.255.0
A

C. 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow,
however, and the network technician suspects the performance issues are network related. Which of the following should
the technician do to improve performance?

A. Utilize UDP to eliminate packet overhead
B. Turn off MDIX settings on the NAS and server switchports
C. Enable jumbo frames on the NAS and server
D. Encapsulate the storage traffic in a GRE tunnel

A

C. Enable jumbo frames on the NAS and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted
email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the
cloud-hosted email. Which of the following cloud models should the technician identify in the proposal?

A. IaaS
B. PaaS
C. SaaS
D. MaaS

A

C. SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge
router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network
administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate
network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the
following steps would MOST likely correct this issue?
A. Move the UTM onto the LAN side of the network
B. Enable TLS inspection on the UTM
C. Enable stateful inspection on the UTM
D. Configure the UTM to deny encrypted files from being transferred

A

C. Enable stateful inspection on the UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports,
which of the following cables should be used?

A. Straight-through
B. Console
C. Rollover
D. Crossover

A

D. Crossover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following security mechanisms dynamically assigns a layer 2 address and restricts traffic only that layer 2
address?

A. Sticky Mac
B. 802 1x
C. ACL
D. NAC

A

A. Sticky Mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly