Exam 181-190 Flashcards
Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that
the network only allows 802.11n clients?
A. Name the SSID on the 802.11n network only
B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption
C. Disable 802.11b and 802.11g
Which of the following is a routed protocol that functions at layer 3 of the OSI model?
A. IP
B. Frame relay
C. PPP
D. ADSL
A. IP
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).
A. TELNET B. SSH C. RDP D. HTTP E. DNS F. FTP
B. SSH
C. RDP
Which of the following allows a technician to gather information about the operating system?
A. Domain services
B. Fingerprinting
C. Countermeasures
D. Reconnaissance
B. Fingerprinting
Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO). A. 21 B. 22 C. 23 D. 53 E. 67
B. 22
C. 23
A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest
control inspection was not on the schedule. Which of the following attacks is in progress?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Smurfing
B. Social engineering
Which of the following protocols uses port 3389?
A. IMAP
B. DHCP
C. SSH
D. RDP
D. RDP
Privilege creep among long-term employees can be mitigated by which of the following procedures?
A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation
A. User permission reviews
Which of the following devices should be installed on a network to monitor the presence of and actively defend against
attacks?
A. An IPS
B. A protocol analyzer
C. A traffic shaper
D. An IDS
A. An IPS
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
D. DB-9