Exam 231-240 Flashcards

1
Q

attempting to access a popular website. Which of the following will MOST likely correct the error?

A. HTTP uses UDP
B. DNS port 23 needs to be allowed
C. HTTP needs port 443 allowed
D. UDP port 53 needs to be allowed

A

D. UDP port 53 needs to be allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly
configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues.
Which of the following is causing the issue?

A. Incorrect VLAN tagging
B. Missing helper addresses
C. Wrong default gateway
D. Improper routing protocols

A

B. Missing helper addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the
following port numbers to port number 587?

A. 20
B. 21
C. 23
D. 25

A

D. 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following will allow multiple frequencies to be combined?

A. WiMAX
B. MPLS
C. MIMO
D. Channel bonding

A

D. Channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following specifications would Sara, an administrator, implement as a network access control?

A. 802.1q
B. 802.3
C. 802.11n
D. 802.1x

A

D. 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port
numbers needs to be redirected through the proxy server to accomplish this?

A. 20
B. 80
C. 143
D. 443

A

B. 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following default ports would need to be disabled to block TFTP traffic?

A. 20
B. 21
C. 69
D. 123

A

C. 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is a proprietary routing protocol?

A. RIP
B. EIGRP
C. OSPF
D. BGP

A

B. EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to
send targeted emails?

A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing

A

A. Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).

A. Cable modern 
B. Layer 2 switch 
C. Router 
D. NIDS 
E. Layer 3 switch
A

C. Router

E. Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly