Prewp test 3 Flashcards
Question 7 of 90
You are attempting to connect to an email server using SMTP and IMAP. SMTP connection is successful; however, IMAP connection fails. You can successfully connect to the email server using POP3. Which of the following statements is correct based on this scenario? [Choose three that apply.]
Answers
A. Port 25 is blocked. B. Port 25 is open. C. Port 110 is blocked. D. Port 110 is open. E. Port 143 is blocked. F. Port 143 is open.
B. Port 25 is open. D. Port 110 is open. E. Port 143 is blocked.
When blocking TCP and UDP ports on a device, either the firewall of a workstation or a server or the rules governing the behavior of a firewall appliance, the appropriate port numbers should be configured. Each port number corresponds to a specific service. Port 25, for example, corresponds to SMTP, port 110 to POP3 and 143 to IMAP. Although these are default values, they can be manually changed.
Question 17 of 90 One of your older wireless networks runs with WPA2-PSK. Against which of the attack is this network vulnerable to? Answers A. SQL Injection B. Brute-force C. XSS D. Distributed denial-of-service
B.
Brute-force
A wireless network with WPA-PSK is vulnerable to brute-force attack. It uses a pre-shared key that is prone to a brute-force attack.
Question 30 of 90 Which of the following would you use to implement a network access control mechanism that will authenticate users attempting to connect to a LAN? Answers A. Captive portal B. MAC Filtering C. Access control list D. IEEE 802.1x
D.
IEEE 802.1x
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. It is an exclusively Layer 2 protocol.
Question 36 of 90
Identify the correct characteristics of Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA).
Answers
A.
It requires many additional fields in the Layer 2 header must be employed to successfully implement collision avoidance.
B.
It can detect collisions based on an increase in voltage on the medium.
C.
It requires very little overhead.
D.
It requires a large amount of overhead as compared to CSMA/CD.
A.
It requires many additional fields in the Layer 2 header must be employed to successfully implement collision avoidance.
The mechanism of collision avoidance is much more complicated than that of collision detection found in wired Ethernet networks. This is because collisions cannot be detected in the same manner since all the devices on the network may not actually “hear” each other. Therefore, many additional fields in the Layer 2 header must be employed to successfully implement collision avoidance.
Question 46 of 90 You are asked to design a network for an enterprise that has been given a range of 16 IPv4 public addresses. The estimated number of devices on the enterprise network that will require Internet access is around 250. Which of the following mechanisms should you use to be able to leverage the use of the public-address space for all the necessary devices within the network? Answers A. RFC1918 for private IP addresses B. Port Address Translation (PAT) C. One-to-one Network Address Translation (OTO-NAT) D. Public Address Translation(PAT) E. Multiple Address Translation (MAT) A
B.
Port Address Translation (PAT)
Network Address Translation (NAT) is a method of translating one IP address space into another by modifying the network information in the header of the IP packets. To allow for the translation of many internal private IP addresses to a few external public IP addresses, Port Address Translation (PAT) must be employed. PAT uses the unique IP address-port combination to uniquely identify multiple intenal hosts using a single external IP address.
Question 49 of 90
Which of the following tools can a penetration tester use to perform penetration testing?
Answers
A. Sqlmap B. Caine and Abel C. Acunetix D. Wireshark E. Metasploit
A. Sqlmap C. Acunetix D. Wireshark E. Metasploit
A penetration test is an authorized simulated attack on a computer system, performed to evaluate the security of the system. The test is performed to identify both vulnerabilities and strengths, enabling a full risk assessment to be completed. A penetration test can help determine whether a system is vulnerable to attack if the defenses were sufficient, and which defenses (if any) the test defeated. Some of the well-known penetration testing tools are Acunetix, Wireshark, Metasploit, Sqlmap, and Nessus.
Question 68 of 90
Which of the following is an example of a public cloud? [Choose three that apply.]
Answers
A. Apprenda B. Microsoft Azure C. IBM Bluemix D. Cisco Metapod E. Amazon Web Services
B. Microsoft Azure C. IBM Bluemix E. Amazon Web Services
The three known examples of public cloud are Amazon Web Services, Microsoft Azure, and IBM Bluemix.
Question 71 of 90 Which of the following certificate would you use if you are building an E-commerce Website? Answers A. Personal certificates B. Server certificates C. Developer certificates D. Organization certificates
B.
Server certificates
,In this case, you will need to use the server certificates, which are must for E-commerce Websites.
Question 72 of 90 You manage an E-commerce Website. For Christmas sale, you know there is going to be a sudden burst of high traffic on your website. Which of the following is likely to help you in extending the data center infrastructure on a temporary basis to manage the burst of traffic? Answers A. IaaS B. AaaS C. PaaS D. SaaS
A.
IaaS
Infrastructure as a Service (IaaS) is an online service that provides the virtualization of underlying network infrastructures such as physical computing resources, location, data partitioning, scaling, security, and backups to name a few.
Virtual machines, software-defined networking, and virtual network devices are all considered parts of the IaaS model.
Question 76 of 90 Which of the following OSI layers is involved with the globally unique addressing of network devices as well as packet forwarding and routing through intermediate network devices? Answers A. Session Layer B. Physical layer C. Datalink layer D. Network Layer E. Transport Layer
D.
Network Layer
The Network layer of the OSI model provides the means of transferring data packets from a source to a destination via one or more networks based on the destination layer 3 address of the specific packet. This layer is also responsible for the globally unique addressing scheme as well as for routing of data packets to their destination.