Exam 181-190 Flashcards

1
Q

Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that
the network only allows 802.11n clients?

A. Name the SSID on the 802.11n network only
B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption

A

C. Disable 802.11b and 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a routed protocol that functions at layer 3 of the OSI model?

A. IP
B. Frame relay
C. PPP
D. ADSL

A

A. IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following protocols are used to connect devices in a secure manner? (Select TWO).

A. TELNET 
B. SSH 
C. RDP 
D. HTTP 
E. DNS 
F. FTP
A

B. SSH

C. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following allows a technician to gather information about the operating system?

A. Domain services
B. Fingerprinting
C. Countermeasures
D. Reconnaissance

A

B. Fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).
A. 21 
B. 22 
C. 23 
D. 53 
E. 67
A

B. 22

C. 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest
control inspection was not on the schedule. Which of the following attacks is in progress?

A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Smurfing

A

B. Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following protocols uses port 3389?

A. IMAP
B. DHCP
C. SSH
D. RDP

A

D. RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privilege creep among long-term employees can be mitigated by which of the following procedures?

A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation

A

A. User permission reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following devices should be installed on a network to monitor the presence of and actively defend against
attacks?

A. An IPS
B. A protocol analyzer
C. A traffic shaper
D. An IDS

A

A. An IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

A. RJ-11
B. BNC
C. LC
D. DB-9

A

D. DB-9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly