Practice test 2 Flashcards
You are configuring a network to utilize SNMPv3 to send information from your network devices back to a SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?
authPriv
authNoPriv
authProtect
authEncrypt
authPriv
In SNMPv3, the authPriv option ensures that the communications are sent with authentication and privacy. This uses MD5 and SHA for authentication and DES and AES for privacy and encryption.
You are working as a wireless networking technician and running a wireless controller to aid in the administration of the network. You supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users?
Layer 3 switch
Proxy server
RADIUS server
VPN concentrator
A Remote Authentication Dial-In User Service (RADIUS) server will enable the wireless clients to communicate with a central server to authenticate users and authorize their access to the requested system or service. None of the other options presented are designed to support centralized authentication services by themselves, but instead use a protocol like RADIUS to perform those functions.
A new network administrator is hired to replace a consultant that has been running the network for several months and whose contract was just cancelled. After a month of working on the network, the new network administrator realized there are some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem?
TACACS+RADIUS misconfiguration is causing logs to be erased
ICMP ping of death is resetting DHCP and DNS on the server
A backdoor has been installed to access the network
The last ACL on the router is set to Deny All
A hacker or the previous administrator (consultant) left a piece of software or an SSH protocol to be able to allow themselves access to the network in order to change the server settings. The consultant may be disgruntled that their contract was cancelled and that the new network administrator was hired to replace them.
Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router is capable of recognizing drives up to 4TB in size, but she cannot get her 3TB drive to show up on the network. What should Lynne do to fix this problem?
Load the latest hardware drivers for her USB drive
Install the latest OS on her computers
Download the latest playback software for her music files
Flash the latest firmware for her router
Flash the latest firmware for her router
Routers can be updated by conducting a firmware flash. This is similar to upgrading or patching your computer’s operating system, or even updating a device driver. By flashing the firmware, it can provide the ability to communicate with newer devices.
Which device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?
Honeypot
IPS
Firewall
IDS
IPS
Intrusion Protection Systems (IPS) can reconfigure themselves based on the threats experienced. Firewalls maintain a static configuration.
Which of the following ports are used to provide secure remote connection sessions over the Internet?
22
25
80
23
Port 22 is used by Secure Shell (SSH) to securely create communication sessions over the Internet for remote access to a server or system. Telnet used to be used over port 23, but it is insecure and doesn’t provide an encrypted tunnel like SSH does. Port 25 is for SMTP, and Port 80 is for HTTP, neither of which provide an encrypted tunnel, either.
Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is unable to get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router’s configuration to ensure it is setup to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?
The admin has enabled DHCP snooping on the network
The admin is blocking DHCP requests that originate from the access points
The admin is blocking the wireless routers MSC address using MAC filtering
The admin has implemented a feature that only allows whitelist MAC addresses to connect to the network
The admin has implemented a feature that only allows whitelist MAC addresses to connect to the network
Whitelisting specific MAC addresses is a security measure implemented by the administrator in order to grant access to a specific user only. It avoids a person with malicious intention to access the corporate network. Since the router has a different MAC address, it is being blocked from connecting to the wired network.
A network technician needs to monitor the network to find a user that is browsing websites that are against the company policy. What should the technician use to view the website and find the user browsing it?
SNMP GET
Top listener tool
Intrusion detection system
Packet sniffer
Packet Sniffers can capture and analyze network user traffic. This information can be queried to view website addresses, contents, and sometimes even the password information. This differs from an intrusion detection system in that IDS’ wait to receive implicitly-malicious data in a network prior to logging the event.
You are trying to increase the security of your network by implementing a system of two-factor authentication (2FA). Which of the following authentication factors should you choose to meet this requirement?
Smartcard and PIN
Facial scan and fingerprint
Key fob and smartcard
Username and password
Two-factor authentication (also known as 2FA) is a method of confirming a user’s claimed identity by using a combination of two different factors: (1) something you know, (2) something you have, or (3) something you are. Out of the options provided, only a smartcard (something you have) and a PIN (something you know) meet the requirements of 2FA. If you have two factors from the same type/category, like something you know (username and password), this is only considered a single factor of authentication.
A new piece of malware is attempting to exfiltrate user data through hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?
Intrusion detection system
Application aware firewall
Stateful packet inspection
Stateless packet inspection
A Web Application Firewall (WAF) or Application Aware Firewall would be able to detect both the accessing of random ports and TLS encryption, and could identify it as suspicious, whereas Stateless would inspect port number being used by the traffic leaving. IDS only analyzes incoming traffic, therefore would not be able to see this activity as suspicious.
A network administrator needs to install a centrally-located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. Which type of firewall should the administrator install?
A host based firewall
A stateful network-based firewall
A host based stateful firewall
A stateless network-based firewall
A stateful firewall enhances security through the use of packet filtering and these types of firewalls also keep track of outbound requests and open the port for the returning traffic to enter the network.
A client has combined the voice-data circuit from a provider and is getting a maximum download and upload speeds of 2.0Mbps. Which type of service is MOST likely being used by the client?
ADSL
T1
E1
VDSL
E1 service provides symmetric 2.0 Mbps of data service. It can handle voice and digital services (with a mix-n-match service). E1 is the European signal of DS1. E1 has higher bandwidth than T1 because T1 reserves bits for overhead. VDSL and ADSL provide different upload and download rates, but this question shows that a symmetric upload and download rate was used.
What allows a telecommunication company to remotely test circuits of customers?
VLAN configuration
Toner Probe
RDP
Smart Jack
Smart jacks have built-in remote diagnostics.
You have been asked to add an entry to your DNS records to allow SMTP traffic to be sent out using your domain name. Which type of record should you add to your DNS record?
CNAME
A
MX
AAA
A MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic. An A record associates your domain name with an IPv4 address. An AAAA record associates your domain name with an IPv6 address. A CNAME record is canonical name or alias name, which associates one domain name as an alias of another (like beta.diontraining.com and www.diontraining.com could both refer to the same website using a CNAME).
Your company has just installed a new web server that will allow inbound connections over port 80 from the internet while not being able to accept any connections from the internal network. You have been asked where to place the web server in the network architecture and how to configure the ACL rule to support the requirements. The current network architecture is segmented using a firewall to create the following three zones: ZONE INTERFACE IP address PUBLIC eth0 66.13.24.16/30 DMZ eth1 172.16.1.1/24 PRIVATE eth2 192.168.1.1/24 Based on the requirements and current network architecture above, what is the BEST recommendation?
Put the server in the DMZ with an inbound rule from eth1 to eth0 that allows port 80 traffic to the server’s IP
Put the server in the PUBLIC zone with an inbound rule from the eth0 to eth1 that allows port 80 traffic to the server’s IP
Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the servers IP
Put the server in the PRIVATE zone with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server’s IP
Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the servers IP
Since the new web server needs to not allow traffic from the internal network (PRIVATE), you should place it in the DMZ. Then, you should add an ACL entry to the firewall that allows traffic from eth0 (PUBLIC, the internet) to the server’s IP within the DMZ (eth1). Most firewalls utilize an implicit deny policy, so all other ports from the eth0 will be blocked, as well as all ports from eth2.
You have been asked to connect three 802.11a devices to an 802.11g access point that is configured with WEP. The devices are within 20 feet of the access point, but they are still unable to associate with the access point. Which of the following is the MOST likely cause of the devices being unable to associate with the WAP?
Interference
Frequency mismatch
Signal loss
Mismatched encryption
Frequency mismatch
802.11a operates in the 5 GHz band while 802.11g operates in the 2.4 GHz band. Therefore, 802.11a devices will be unable to communicate with 802.11b or 802.11g access point.
One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not even though they are the exact same model and were purchased at the same time. What should you do to enable the HTTPS access for this router?
Perform a factory reset
Update the firmware
Enable HTTP instead
Reboot the router
Update the firmware
Since the new router was pulled from your spare inventory closet, it is likely using an older and out of date version of the firmware. You should update the firmware for this router and then check if the HTTPS can be enabled again.
A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is:
ARP cache poisoning
Amplified DNS attacks
Session hijacking
Creating an evil twin
Evil Twin access points are the most common way to perform a man-in-the-middle attack on a wireless network.
A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?
Firmware updates
Changing to IPv6
Cloning
Vulnerability patching
To add new features to existing hardware devices, updating the firmware is always a must to mitigate any vulnerabilities.
Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up a man-in-the-middle attack against Mary’s computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful to only affect the traffic associated with Mary’s computer and not the entire network. Which type of man-in-the-middle attack is Rick conducting against Mary?
IP spoofing
MAC spoofing
ARP cache poisoning
Evil Twin
ARP cache poisoning
Based on the scenario, we can eliminate evil twin (which is focused on wireless access points) and IP spoofing (since this affects layer 3 traffic). While MAC spoofing the address of the gateway might work, it would also affect every computer on this subnet. By conducting an ARP cache poisoning attack, Rick can poison the cache and replace Mary’s computer’s MAC association with his own, allowing him to become the man-in-the-middle between Mary and the default gateway.
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause?
An eveil twin has been implemented
A successful WPS attack has occurred
The user is experiencing ARP poisoning
The user is connected to a botnet
A successful WPS attack has occurred
Successful WPS attacks happen when the default username/password etc. has not been changed or reconfigured on the router. If your default username/password hasn’t been changed, anybody can get into the settings and open the network. This is why additional unknown devices are on the network.
A network administrator needs to allow employees to upload files to a remote server securely. What port should be allowed through the firewall?
21
22
25
161
22
Normally, port 21 is used for the FTP (File Transfer Protocol) to transfer files between computers and a remote server, but it does so over an unencrypted connection (and is therefore not secure). Therefore, it is a better idea to use port 22 which will allow a user to use SFTP (Secure FTP) or SCP (Secure Copy) to transfer a file from a computer to a remote server over an encrypted SSL/TLS tunnel.
Which of the following is designed to keep system’s uptime running in the event of a disaster?
High availability
Load balancing
Quality of service
Caching engines
High availability
If a network switch or router stops operating correctly (meaning that a network fault occurs), communication through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore, network availability, called uptime, is a major design consideration.
(This is a simulated Performance-Based Question.) What is the correct color scheme for Pin 1 to Pin 8 for a T-568B connector?
blue, white/blue, orange, white/brown, brown, white/green, green, orange/white
white/green, green, orange/white, blue, white/blue, orange, white/brown, brown
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
white/green, green, white/orange, orange, blue, white/blue, white/brown, brown
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
You need to have the T-568-A and T-568-B standards memorized before test day, because you may be asked to perform a drag and drop exercise of placing the right colored wires into the right pin numbers based on a T-568A or T-568B connector. Remember, a straight through cable will have T-568B one both ends. If you are asked to make a cross-over cable, you need a T-568A on one side and a T-568B on the other side.
(This is a simulated Performance-Based Question.) What ports do FTP and SFTP utilize?
20,21
21,22
22,23
21,23
FTP (File Transfer Protocol) uses port 20 and 21. SFTP (Secure File Transfer Protocol) uses port 22. If this was a question on the real exam, you would see a list of ports on one side and a list of protocols on the other, and you would drag and drop each one to match them up. (It might also have 4-6 different pairs to match up.)
Which type of network geography is used to connect various circuits between remote locations?
WAN
PAN
WLAN
LAN
WAN because to connect various circuits between remote locations, a Wide Area is required. Local can only be within a limited small area. A PAN is used for very small areas. A WLAN is a wireless LAN.
A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following should be implemented within the network?
SNMP
SMTO
NIDS
SMS
The keyword is MONITORING. SNMP stands for Simple Network Management Protocol. SMTP is simple mail TRANSPORT protocol. NIDS is network intrusion detection system and SMS is short message service. So, knowing what all of them stand for helps you to understand if the goal is simply to manage the server and send alerts from client to server. Based on these information, SNMP is the best choice.
Which of the following wireless technologies use MIMO on non-overlapping channels to increase the bandwidth of the wireless network?
- 11a
- 11b
- 11g
- 11n
802.11n introduced support for MIMO on non-overlapping channels as a method to increase the bandwidth available for the wireless network. This is also supported in 802.11ac (MU-MIMO), which was the next version released after 802.11n. The other wireless networking technologies (a/b/g) do not support MIMO.