Exam 221-230 Flashcards
A username provides which of the following?
A. Biometrics
B. Identification
C. Authorization
D. Authentication
B. Identification
Which of the following WAP security features offers the STRONGEST encryption?
A. WPA
B. WPA2
C. WEP
D. Hidden SSID
B. WPA2
The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?
A. 1
B. 3
C. 4
D. 5
C. 4
Which of the following is true about tunneling and encryption?
A. SIP encrypts all data going through the tunnel.
B. PPTP creates a secure tunnel.
C. SSL VPN provides a secure tunnel.
D. RAS is a secure way to create a tunnel.
C. SSL VPN provides a secure tunnel.
Which of the following cables is MOST likely to be terminated into a patch panel?
A. Serial
B. RG-6
C. RG-59
D. CAT6
D. CAT6
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP
offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following
utilities was he MOST likely using to view this issue?
A. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer
B. Protocol analyzer
Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs .168.105.20 and .30.
The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration:
interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Jeff is able to ping the router at 192.168.105.1 from the switch. Which of the following is the MOST likely cause of the
problem?
A. The subnet mask is incorrect.
B. A routing loop has occurred.
C. Jeff used a crossover cable to connect the switch to the gateway.
D. The server is missing default-gateway information.
D. The server is missing default-gateway information.
Which of the following is used to assign an IP address to a device?
A. DHCP
B. NTP
C. DNS
D. RADIUS
A. DHCP
Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer
B. Content filter
Which of the following are network topologies? (Select TWO).
A. Ethernet B. Duplex C. Star D. Circular E. Bus
C. Star
E. Bus