Practice (7) Flashcards

1
Q

Which of the following is not an application layer protocol that network attached storage (NAS) devices can use to serve shared files to clients on the network?

RDMA

CIFS

HTTP

A

RDMA

Remote Direct Memory Access (RDMA) provides high-speed network data transfers, but it is not an application layer file sharing protocol. Common Internet File System (CIFS), Network File System (NFS), and Hypertext Transfer Protocol (HTTP) are all file sharing protocols supported by many NAS devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your supervisor wants you to disable all of the ports on the network’s switches that are not in use. You tell her that this is not necessary; she wants to know why you think so. Which of the following are valid reasons not to disable unused switch ports? (Choose all correct answers.)

The unused ports are not patched in to wall jacks.

The datacenter is already secured from unauthorized access.

The switch is configured to use a MAC-based access control list.

Leaving some ports enabled facilitates the on-boarding of new users.

A

The datacenter is already secured from unauthorized access.

The switch is configured to use a MAC-based access control list.

If there is no way for unauthorized people to access the datacenter, then there is no danger of someone plugging a device into a port that is left enabled. If the switch uses an access control list (ACL) that specifies the MAC addresses of systems permitted to connect to it, then there is no need to disable unused ports because any unknown devices plugged into open ports will not be granted access to the network. The other two options are not valid reasons. Ports that are not patched in can still be compromised at the switch location. Enabling ports is not difficult, so accommodating new users is not a valid reason for leaving them enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Despite having imposed password policies on your network that compel users to change their passwords frequently, create passwords of a specific length, and use complex passwords, you have still had several reports of account penetrations. After investigating the incidents, you determine that the victims had all apparently shared a “tip” suggesting that users cycle through the names of their children, nephews, nieces, and other relatives when forced to create new passwords, changing letters to numbers as needed. Which of the following actions can you take to remedy the situation without creating a larger problem?

Modify the password policies to force users to change passwords more frequently.

Change the minimum password age policy to a larger value.

Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.

A

Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.

There are no policies that can prevent users from creating easily guessed passwords. The only action that can help is to educate users that attackers are frequently able to guess passwords by using information such as familiar names and dates. Forcing more frequent password changes would not compel users to alter their method for choosing passwords, nor would increasing the minimum password age value. Assigning random passwords would address the issue, but user complaints and forgotten passwords would likely create greater problems than it would solve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following network devices can employ access control lists to restrict access? (Choose all correct answers.)

Routers

Servers

Switches

Hubs

Wireless access points

A

Routers

Servers

Switches

Wireless access points

ACLs restrict access to network devices by filtering user names, MAC addresses, IP addresses, or other criteria. Routers, servers, switches, and wireless access points all can use ACLs to control access to them. Hubs are purely physical layer devices that relay electrical or optical signals. They have no access control mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following terms is used to describe the threat mitigation technique of deploying individual applications and services on separate virtual servers so that no more than one is endangered at any one time, rather than deploying multiple applications on a single server?

Network segmentation

VLAN hopping

Role separation

A

Role separation

Role separation is the practice of creating a different virtual server for each server role or application. In addition to providing other benefits as well, this forces intruders to mount attacks on multiple servers to disable an entire network. Geofencing is a technique for limiting access to a wireless network. Network segmentation describes the process of creating multiple VLANs or deploying firewalls to isolate part of a network. VLAN hopping is a type of attack in which an intruder sends command messages to a switch to transfer a port from one VLAN to another. None of these last three options refers to virtual machine deployment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements about DHCP snooping are true? (Choose all correct answers.)

DHCP snooping is implemented in network switches.

DHCP snooping prevents DNS cache poisoning.

DHCP snooping detects rogue DHCP servers.

DHCP snooping drops DHCP messages arriving over the incorrect port.

A

DHCP snooping is implemented in network switches.

DHCP snooping detects rogue DHCP servers.

DHCP snooping drops DHCP messages arriving over the incorrect port.

DHCP snooping is a feature found in some network switches that prevents rogue DHCP servers from assigning IP addresses to clients. It can also detect when DHCP release or decline messages arrive over a port other than the one on which the DHCP transaction originated. While DHCP snooping can prevent DHCP clients from being assigned an incorrect IP address, it does not directly prevent the poisoning of DNS server caches with erroneous information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user reports that she can’t connect to a server on her network. You want to identify the scope of the problem, so you try to reproduce the problem on the user’s computer. The problem still remains. No other users are reporting this problem. What is the next logical step that you should perform to identify the affected area?

Verify that the local router is forwarding traffic.

Verify that the switch the client is connected to is functioning.

Try performing the same task on a computer attached to the same segment.

A

Try performing the same task on a computer attached to the same segment.

In this scenario, only one user is reporting a problem. Therefore, the likeliest next step is to perform the same task on another computer attached to the same segment. If you can perform the task successfully, the problem most likely lies within the user’s computer or the connection to the switch. Since no other users are reporting the same problem, the server and switches on the network are probably up and functioning. Checking the router isn’t necessary since the user and server are on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A wide area network (WAN) connection between two sites typically uses the Point-to-Point Protocol (PPP) at the data link layer. Which of the following statements are not true about PPP? (Choose all correct answers.)

PPP supports encrypted authentication only.

PPP supports both clear text and encrypted authentication.

PPP supports multiple network layer protocols.

PPP supports Internet Protocol (IP) traffic only.

A

PPP supports both clear text and encrypted authentication.

PPP supports multiple network layer protocols.

PPP supports both clear text and encrypted password authentication. It also supports the user of multiple network layer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

n the standard troubleshooting methodology, you begin by taking steps to identify the problem. After you have done this, which of the following steps should you perform next?

Verify full system functionality

Establish a theory of probable cause

Establish a plan of action

A

Establish a theory of probable cause

After identifying the problem, the next step is to establish a theory for the probable cause of the problem. After that, you can test your theory, establish a plan of action, implement a solution, verify the functionality of the system, and document the entire process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version (HTTP). Which of the following ports are used by HTTP and HTTPS by default? (Choose all correct answers.)

25

80

110

443

A

80

443

The well-known port for HTTPS is 443. The port for unsecured HTTP is 80. Port 25 is used for the Simple Mail Transfer Protocol (SMTP). Port 110 is used for the Post Office Protocol (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are criteria typically used by load balancers to direct incoming traffic to one server out of a group of servers? (Choose all correct answers.)

Which server has the fastest response time

Which server has the fastest processor

Which server has the lightest load

Which server is next in an even rotation

A

Which server has the fastest response time

Which server has the lightest load

Which server is next in an even rotation

A load balancing router typically works by processing incoming traffic based on rules set by an administrator. The rules can distribute traffic among a group of servers using various criteria, such as each server’s current load or response time or which server is next in a given rotation. Load balancers generally do not use the hardware configuration of the servers to direct traffic, as this is a factor that does not change over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are responsible for a network that has a Domain Name System (DNS) server, a proxy server, and an Internet router. A user is reporting that she can’t connect to hosts on her own local area network (LAN) or other internal LANs, and she also can’t access hosts on the Internet. No one else has reported a problem. What is the likeliest location of the issue preventing the user’s access to the network?

The DNS server

The proxy server

The user’s local configuration

A

The user’s local configuration

Since only one user is reporting difficulty, the problem is most likely to be in the user’s computer and its configuration. A DNS server, proxy server, or router problem would affect more than one user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual LAN (VLAN) hopping is a type of attack directed at network switches. Which of the following best describes how VLAN hopping a potential threat?

VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.

VLAN hopping enables an attacker to scramble a switch’s patch panel connections.

VLAN hopping enables an attacker to change the native VLAN on a switch.

A

VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.

VLAN hopping is a method for sending commands to switches to transfer a port from one VLAN to another. This can enable the attacker to connect his or her device to a potentially sensitive VLAN. VLAN hopping does not modify the switch’s patch panel connections, only its VAN assignments. It is not possible to rename a switch’s default VLAN. VLAN hopping does not enable an attacker to change a switch’s native VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ou are a first-tier support technician working the IT help desk at your company. In your first hour of duty, you receive four trouble calls. Your job is to assign the calls priorities based on their severity. Which of the following should be the problem that receives the lowest priority?

A fatal error that causes a single computer to fail

A problem with a mission-critical backbone router that affects an entire network

A problem with an application server that affects a single LAN

A

A fatal error that causes a single computer to fail

A problem that affects the entire network should be given highest priority. This includes the issue with the mission-critical backbone router. Problems that affect multiple LANs or an entire department are generally given the next highest priority. A problem that affects a shared application server on a LAN should be given the next highest priority. A problem with a single user’s computer should be given the lowest priority, compared to the other problems that have been reported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are attempting to access a Domain Name System (DNS) server located on the other side of a router, but your attempt fails with an error stating that the destination port UDP 53 is unreachable. Your first step in troubleshooting the problem is to try using the Nslookup utility to access that specific DNS server. This attempt also fails. Next, you use the Ping utility with the DNS server’s IP address. The Ping test is successful, indicating that the server is up and running. Which of the following are possible causes of the problem? (Choose all correct answers.)

The TCP/IP host settings on your computer are improperly configured.

The router connecting the networks is not running DNS and will not forward this type of datagram.

There is a firewall blocking the DNS server’s UDP 53 port.

The DNS process on the remote server is not running.

The TCP/IP host settings on the DNS server are improperly configured.

A

There is a firewall blocking the DNS server’s UDP 53 port.

The DNS process on the remote server is not running.

One possible cause of the problem is that the DNS process on the remote server is corrupted or not running. Another possible cause is that there is a firewall blocking access to the DNS server’s UDP port 53. Both of these would render the port unreachable. The TCP/IP client on the server is operating, as verified by the ping utility. This means that the IP host settings on your computer and on the DNS server are both configured properly and functioning. A router does not need to be running DNS to forward datagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following types of switches performs a cyclical redundancy check (CRC) on an entire frame’s contents prior to forwarding it out a port leading to the destination system?

Cut-through switch

Source route switch

Store-and-forward switch

A

Store-and-forward switch

Store-and-forward switches take in the entire frame and verify its contents by performing a CRC calculation before forwarding it. Cut-through switches are faster because they look at only the first 6 bytes (the destination Media Access Control, or MAC, address) when forwarding a frame. They do not perform a CRC on the entire frame. Source route is a bridging technique in which the source host, not the switch, determines the path a frame will take through a network to reach a destination. Packet filtering is a technique used by firewalls. Neither of these is a type of switch

17
Q

Which of the following attack types is not specifically targeted at wireless network clients?

Logic bomb

Deauthentication

Evil twin

A

Logic bomb

A logic bomb is a code insert placed into a legitimate software product that triggers a malicious event when specific conditions are met. It can therefore affect both wired and wireless clients. The other options are all attacks directed at wireless networks. Deauthentication is a type of denial-of-service attack in which the attacker targets a wireless client by sending a deauthentication frame that causes the client to be disconnected from the network. The object of the attack is often to compel the client to connect to a rogue access point called an evil twin. An evil twin is a fraudulent access point on a wireless network that mimics the SSID of a legitimate access point, in the hope of luring in users. War driving is an attack method that consists of driving around a neighborhood with a computer scanning for unprotected wireless networks

18
Q

You are having trouble installing a wireless LAN using IEEE 802.11b/g equipment in a new office complex. The wireless devices have trouble connecting to the access point, and when they do, they achieve only low speeds. When you use a WiFi analyzer to scan the 2.4 GHz frequency band, you see literally dozens of other networks in the area, spread across all of the available channels. Choose the tasks from the following list that you should perform to enable your wireless devices to connect to the network reliably and at their best possible speeds. (Choose all correct answers.)

Configure the access point to suppress SSID broadcasts.

Configure all of the wireless network devices to use the 5 GHz band.

Upgrade all of the network devices to the latest firmware.

Configure all of the network devices to use WPA2 encryption with AES.

Upgrade the access point and all of the wireless client devices to IEEE 802.11n.

A

Configure all of the wireless network devices to use the 5 GHz band.

Upgrade the access point and all of the wireless client devices to IEEE 802.11n.

Upgrading all of the wireless devices to 802.11n will enable them to use the 5 GHz band and evade the interfering traffic generated by the surrounding networks. Configuring the devices to use the 5 GHz band will provide many more channels to choose from and will avoid the interference from the surrounding 2.4 GHz networks. The other options will not resolve the problem. The type of encryption that a wireless network uses has no bearing on the ability of the devices to avoid the interference generated by surrounding networks. Suppressing SSID broadcasts will not help the devices to connect to the network. Upgrading the firmware on the devices is not likely to have any effect on the connection problems when they are the result of interference from other networks

19
Q

You are seeking to upgrade your company’s IEEE 802.11b access point to one that provides faster transmission speeds for your newer workstations. Which of the following wireless networking standards are capable of supporting speeds faster than the 11 Mbps of 802.11b but that are still backward compatible with your existing IEEE 802.11b workstations? (Choose all correct answers.)

IEEE 802.11

Bluetooth

IEEE 802.11g

IEEE 802.11a

IEEE 802.11n

A

IEEE 802.11g

IEEE 802.11n

IEEE 802.11g supports transmission speeds up to 54 Mbps, and it is backward compatible with 802.11b equipment. IEEE 802.11n is also backward compatible with 802.11b, and it can run at speeds up to 600 Mbps. Bluetooth is not compatible with any of the IEEE 802.11 standards

20
Q

You are working on your company’s perimeter network, which has five Linux web servers, a Cisco router, a CSU/DSU providing a leased line connection, and a Windows-based firewall. While trying to troubleshoot a network communications failure, you type the following command on one of the systems: traceroute adatum.com. Which of the following systems might you be working on? (Choose all correct answers.)

The Cisco router

One of the Linux web servers

The CSU/DSU console

The Windows-based firewall

A

The Cisco router

One of the Linux web servers

Both Linux and the Cisco IOS operating systems include the traceroute utility. Windows has its own version of the utility, but it’s called tracert. The CSU/DSU cannot run a traceroute command

21
Q

Which of the following are network topologies used by IEEE 802.11 wireless local area networks (WLANs)? (Choose all correct answers.)

Bus

Mesh

Ad hoc

Star

Infrastructure

A

Ad hoc

Infrastructure

WLANs can use the ad hoc topology, in which devices communicate directly with each other, or the infrastructure topology, in which the wireless devices connect to an access point. The bus, star, and mesh topologies are used by wired networks only

22
Q

You have recently started a new job that enables you to telecommute from home, and you need a wide area network (WAN) connection to the Internet. You will need to access the company network using a virtual private network (VPN) connection to obtain client information, transfer files, and send email through the company servers. Your home is over 30 years old. The existing telephone wiring was not run through a conduit, and it seems to be deteriorating. You have cable television service, and your home is approximately 20,000 feet from the nearest telephone central office. You want to implement the fastest possible remote connection service, but cost is still a factor in the decision. Which WAN technology should you implement?

A standard modem-to-modem connection

A DSL (Digital Subscriber Line) connection

A broadband CATV connection

A

A broadband CATV connection

In this scenario, the best solution is for you to use the existing cable television (CATV) service for the Internet connection. CATV offers faster data rates than standard modem-to-modem service and supports VPN connections. A dedicated fractional T-1 line is expensive and is not typically used for remote user connections. Since your telephone lines are not run through conduit and the distance to the central office is more than 18,000 feet, you probably cannot use DSL technology, because it requires good-quality lines and close proximity to a central office

23
Q

You are working the help desk at a local computer store, and you receive a call from a customer trying to set up a home network using computers running Windows 10 and wired Ethernet equipment. The customer reports that she cannot access the other two computers in the house from her workstation, nor can she access the Internet. You ask her to run the ipconfig /all command and read the results to you. She says that her IP address is 192.168.0.2, her subnet mask is 255.255.255.0, and her default gateway is 192.168.0.1. Which of the following is the most likely cause of the customer’s problem?

The customer’s network address cannot include a zero.

The customer has an incorrect subnet mask.

The customer’s network cable is damaged or unplugged.

A

The customer’s network cable is damaged or unplugged.

The customer’s IP address, subnet mask, and default gateway values are appropriate for her home network. There is nothing wrong with having a zero in the network address. Therefore, of the options presented, the only logical choice is that the workstation’s network cable is damaged or unplugged