IST166Final Flashcards
All of the 802.11 standards for wireless networking support which type of communication path sharing technology?
CSMA/CA
You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?
802.11g
What is the frequency of 802.11a networking?
5.75 GHz
Which of the following are frequency defined by 802.11 committees for wireless networking?
2.4 GHz, 5.75 GHz
How many total channels are available for 802.11g wireless?
11
You are designing an update to your client’s wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run at 54 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users’ workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?
802.11g
Which IEEE wireless standards specify transmission speeds up to 54 Mbps?
802.11g, 802.11a
How many total channels are available for 802.11a wireless networks?
23
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
11 Mbps
Which IEEE standard describes wireless communications?
802.11b
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
802.11a
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless devices?
WEP, WPA Personal, and WPA2 Personal
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
users with the correct WEP key
What encryption method is used by WPA for wireless networks?
TKIP
You need to add security for your wireless network. You would like to use the most secured method. Which method should you implement?
WPA2
On wireless networks, which technology is employed to provide the same type of protection that cables provide on a wired network?
WEP
Which of the following protocols or mechanisms is not used to provide security on a wireless network?
RDP
You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
RADIUS
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
on a RADIUS server
Which of the following specifications identify security that can be added to wireless networks?
802.1x, 802.11i
You have a small home network that uses WEP. The access point is configured as the DHCP server and NAT router that connects to the Internet. You do not have a RADIUS server. Which authentication method should you choose?
open
You need to configure a wireless network. You want to use WPA Enterprise. Which of the following components will be part of your design?
802.1x, TKIP encryption
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point, and to be able to roam between the two access points. How should you configure the access points?
Same SSID, different channel
You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?
Decrease the beacon interval
You have purchased a used wireless access point and want to set up a small wireless network at home. The access point only supports WEP. You want to configure the most secure settings on the access point. Which of the following would you configure?
preshared key, open authentication
You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area but cannot see your network to connect to it.
What should you do?
configure a profile on the wireless client
You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client?
AES, SSID, Preshared key
You have a small wireless network that uses multiple access points. The network currently uses WEP. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?
SSID, Preshared key
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
SSH
Which protocol is used for securely browsing a Web site?
HTTPS
Which of the following are improvements to SNMP that are included within SNMPv3?
Authentication for agents and managers
Encryption of SNMP messages
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What do you do?
Implement version 3 of SNMP
Which protocol does HTTPS use to offer greater security in Web transactions?
SSL
Which of the following protocols are often added to other protocols to provide secure transmission of data?
TLS, SSL
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
Ticket
Which of the following applications typically use 802.1x authentication?
Controlling access through a wireless access point
controlling access through a switch
Which of the following authentication methods uses tickets to provide single sign-on?
Kerberos
Which of the following authentication protocols uses a 3 way handshake to authenticate uses to the network?
CHAP, MS-CHAP
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?
EAP
You want to increase the security of your network by allowing only authorized users to be able to access network devices through a switch. Which of the following should you implement?
802.1x
Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?
mutual authentication
Which of the following are used when implementing Kerberos for authentication and authorization?
Ticket granting server, Time server
You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
obtain a certificate from a public PKI
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
EAP
Which of the following is a mechanism for granting and validating certificates?
PKI
Which protocol and port number is used by BOOTP/DHCP?
UDP 67
Which port number is used by SNMP?
161
You are configuring a network firewall to allow SMTP outbound e-mail traffic, and POP3 inbound e-mail traffic. Which of the following TCP/IP ports should you open on the firewall?
25, 110
Which of the following are characteristics of a packet-filtering firewall?
Stateless, Filters IP address and port
After blocking a number of ports to secure your server, you are unable to send e-mail. To allow e-mail service which of the following needs to be done?
Open port 25 to allow SMTP service.
Which of the following is a firewall function?
packet filtering
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 110, 25, 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
Web server, e-mail server
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?
Host based firewall
Which of the following are characteristics of a circuit-level gateway?
Filters based on sessions, Stateful
You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers?
Put the Web server inside the DMZ.
Put the database server on the private network
Which of the following functions are performed by proxies?
Block employees from accessing certain Web sites
Cache Web pages
Haley configures a Web site using Windows 2000 default values. What are the HTTP port and SSL port settings?
80 for HTTP; 443 for SSL
Which of the following is a good reason to install a firewall?
To prevent hackers from accessing your network
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you use?
Application level
You have just installed a packet-filtering firewall on your network. What options will you be able to set on your firewall?
Port number
Destination address of a packet
Source address of a packet
You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?
IP address
You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
53
To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
443
You have a company network that is connected to the Internet. You want all users to have access to the Internet, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
Network based firewall
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?
Install a proxy server
Which protocol and port number is used by TFTP?
UDP 69
You administer a Web server on your Network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows:
IP address: 192.168.23.8
HTTP Port: 1030
SSL Port: 443
Users complain that they can’t connect to the Web site when they type www.westsim.com. What is the most likely source of the problem?
The HTTP port should be changed to 80
How does a proxy server differ from a packet filtering firewall?
A proxy server operates at the Application layer, while a packet filtering firewall operates at the network layer
Which of the following does a router acting as firewall use to control which packets are forwarded or dropped?
ACL
Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing?
Downloading a file
Which of the following network services or protocols uses TCP/IP port 22?
SSH
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
circuit-level
You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of e-mails for all users. You want to scan the e-mails and prevent any e-mails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?
network based firewall
You are the administrator for a secure network that uses firewall filtering. Several network users have requested to access Internet Usenet groups but are unable. What needs to be done to allow users to access the newsgroups?
Open port 119 to allow NNTP service
Which of the following is not a primary characteristic of a worm?
it infects the MBR of a hard drive
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
rogue access point
Which of the following describes a man-in-the-middle attack?
A false server intercepts communications from a client by impersonating the intended server.