Exam 201-210 Flashcards

1
Q

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default
port? (Select TWO).

A. 22 
B. 23 
C. 143 
D. 161 
E. 162 
F. 8080
A

D. 161

E. 162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When querying a DNS server for an AAAA record, which of the following is an appropriate response?

A. 192.168.2.1
B. 00:f3:82:99:a2:b8
C. 61.23.168.192.in-addr.arpa
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

A

D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the
technician MOST likely check to verify that the cable was crimped correctly?
A. Punch down tool
B. Cable certifier
C. Loopback plug
D. Toner probe

A

B. Cable certifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following functions would be used to securely monitor and actively manage external connections?

A. VPN concentrator
B. HIDS
C. Load balancer
D. Packet shaper

A

A. VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a
single public IP?

A. NAT
B. RIP
C. PAT
D. ACL

A

C. PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router

A

B. Segments broadcast traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings
were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?

A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing

A

C. Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Something you have, something you are, and something you know are the three tenets of:

A. Social engineering
B. Change management
C. Remote access
D. Access control

A

D. Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? 
A. 20 
B. 21 
C. 22 
D. 23
A

C. 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following default ports would need to be open on a firewall to allow remote desktop access?

A. 143
B. 443
C. 3389
D. 8080

A

C. 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly