Exam 191-200 Flashcards

1
Q

Which of the following commands will display the associated IP address of a network adapter in Windows and Linux
environments? (Select TWO).

A. dig 
B. nslookup 
C. nbstat 
D. ifconfig 
E. ipconfig
A

D. ifconfig

E. ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes.
Which of the following ports need to be enabled on the firewall? (Select TWO).

A. 23 
B. 25 
C. 53 
D. 80 
E. 443
A

D. 80

E. 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following ports is the default telnet port?

A. 20
B. 21
C. 22
D. 23

A

D. 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization recently installed a firewall on the network. Employees must be able to send and receive email from a
POP3 server. In which of the following ways should the firewall be configured? (Select TWO).

A. Allow TCP port 23 
B. Allow TCP port 25 
C. Allow TCP port 110 
D. Allow UDP port 25 
E. Allow UDP port 110
A

B. Allow TCP port 25

C. Allow TCP port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following protocols would be used to send email to an email server?

A. NTP
B. FTP
C. SNMP
D. SMTP

A

D. SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is based ENTIRELY on using ICMP packets?

A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack

A

D. Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following access controls enforces permissions based on data labeling at specific levels?

A. Mandatory access control
B. Separation of duties access control
C. Discretionary access control
D. Role based access control

A

A. Mandatory access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following uses certificates as a form of security?

A. Kerberos
B. LDAP
C. PKI
D. CHAP

A

C. PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area,
the technician should change which setting?

A. Channel
B. SSID
C. Firewall rule
D. Encryption

A

A. Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to
troubleshoot the issue?

A. Identify the problem.
B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement preventative measures.

A

A. Identify the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly