Test 4 Flashcards

1
Q

Which of the following companents of IPSec? (Select TWO)

A. AH

B. ESP

C. SSH

D. ICA

E. TLS

A

A. AH

B. ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In IPSec. which of the following is an agreement on how devices wil lsecurely transmit information?

A. SA

B. ESP

C. AH

D. ISAKMP

A

A. SA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization recently installed a firewall on the network. Employees must have access to their work computers from their home computer. In which of the following ways should the firewall be configured?

A. Allow TCP port 3389 outbound

B. Allow UDP port 3389 inbound

C. Allow UDP port 3389 outbound

D. Allow TCP port 3389 inbound

A

D. Allow TCP port 3389 inbound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
An organization recently installed a firewall on the network. Employees must be able toe send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO)
A. Allow TCP port 23
B. Allow TCP port 25
C. Allow TCP port 110
D. Allow UDP port 25
E. Allow UDP port 110
A

B. Allow TCP port 25

C. Allow TCP port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following OSI model layers is responsible for data encryption? 
A. Application
B. Presentation
C. Physical
D. Data link
A

B. Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced, there were no issues with connectivity. Immediately after the cable was replaced, users report that they are unable to access a database application on the server. Which of the following is the MOST likely reason for the inaccessibility?
A. Lisa used a short patch cable
B. Lisa used a cable with an RJ-45 connector
C. Lisa used a crossover cable
D. Lisa used a patch cable that was over 5o meters long

A

C. Lisa used a crossover cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?
A. RIP
B. OSPF
C. BGP
D. RIPv2
A

C. BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is occurring when Jeff, an employee, unintentionally gives information that is used maliciously? 
A. Tailgating
B. DoS attack
C. DDoS attack
D. Social engineering
A

D. Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following OSI model layers is used for logical addressing?
A. Physical
B. Transport
C. Network
D. Data link
A

C. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following attacks creates a buffer overflow to stop access to a system?
A. Blue jacking
B. DoS
C. Netstat
D. Man-in-the-middle
A

B. DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
In which of the following layers of the OSI model dpes TCP operate? 
A. Session
B. Network
C. Data Link
D. Transport
A

D. Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following basic devices blocks ports and can sometimes filter data?
A. Repeater
B. Hub
C. Firewall
D. Switch
A

C. Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
At which of the following layers of the OSI model does an unmanaged switch operate? 
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following devices will monitor for propagating worms?
A. Firewall
B. Proxy server
C. Mail server
D. IDS
A

D. IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices. 
A. PKI
B. TACACS+
C. CHAP
D. SSH
A

B. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following network tools is used to identify running services on host devices?
A. IDS
B. IPS
C. Firewall
D. NMAP
A

D. NMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following security devices is used in providing packet and MAC address filtering services for the network?
A. Host-based proxy server
B. Network-based firewall
C. IDS
D. IPS
A

B. Network-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
Which of the following would Kim, a technician, use in voice over IP communications?
A. SNTP
B. SCP
C. SMTP
D. SIP
A

D. SIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections?
A. BGP
B. SNAT
C. RIP
D. GPG
A

A. BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following protocols allows more than three non-overlapping channels?
A. 802.11a
B. 802.11g
C. 802.1q
D. 802.15
A

A. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which of the following represents the physical address of a network access card?
A. FF01:D2:C4:87::11
B. 00-30-48-83-9B-C8
C. 08-9D-35-22-L2-34-FF-21
D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
A

B. 00-30-48-83-9B-C8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
ADSL, PPP, and ATM all operate at which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 7
A

B. Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which of the following OSI layers BEST describes where an HTTP proxy operates?
A. Transport
B. Application
C. Presentation
D. Session
A

B. Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of service attack is occurring?
A. RAS
B. RDP
C. IDS
D. VPN
A

C. IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
A MAC address is used at which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A

B. Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Multimode fiber should be used in place of copper when:
A. Distances are short
B. EMI is a concern
C. PoE is necessary
D. Th switch has BNC connectors
A

B. EMI is a concern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Zach, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?
A. CAT3
B. STP
C. Coaxial
D. Fiber
A

D. Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network?
A. River multiplexer
B. Repeater
C. Attenuator
D. OTDR
A

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
Which of the following regulates the amount of network traffic a single node receives in a server cluster?
A. Load balancer
B. Proxy server
C. Content filter
D. Quality of Service
A

A. Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 internet access network. Which of the following optimizations should Lisa implement?
A. Load balancing
B. Caching engine
C. Traffic shaping
D. Quality of service
A

C. Traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
Which of the following evaluates packet payload when detecting network threats?
A. IPS
B. Proxy server
C. Caching server
D. Content filter
A

A. IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
A disassociation request is a way to mitigate which of the following threats?
A. ARP poisoning
B. Rogue AP
C. Man-in-the-middle attack
D. Botnet
A

B. Rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
A crossover cable  is MOST commonly associated with which of the following layers of the OSI model?
A. Session
B. Application
C. Network
D. Physical
A

D. Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Which of the following documents will allow Kim, an administrator, to determine a change from the standard default system configuration? 
A. Baseline
B. Physical network diagram
C. Wiring schematic
D. Logical diagram
A

A. Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key words determined by the company? 
A. Stateless traffic monitor
B. Stateful traffic monitor
C. Signature identification
D. Content filter
A

D. Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Jeff, an administrator?
A. DoS attack
B. Man-in-the-middle attack
C. Smurf attack
D. Xmas attack
A

B. Man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
Which of the following cable types would have the LEAST amount of EMI? 
A. CAT3
B. CAT5
C. STP CAT6
D. Plenum CAT6
A

C. STP CAT6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
Which of the following WAN technologies uses four wires for digital and a 66 block?
A. Cable
B. ATM
C. T3
D. POTS
A

D. POTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following has the HIGHEST data rate speed?
A. T1
B. ADSL
C. SDSL
D. OC-3
A

D. OC-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
Which of the following is designed to be used with multitude fiber over a short wavelengths? 
A. 10GBaseLW
B. 10GBaseER
C. 10GBaseSW
D. 10GBaseLR
A

C. 10GBaseSW

41
Q
Kim, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?
A. traceroute
B. ping
C. ipconfig
D. netstat
A

D. netstat

42
Q
Kim, an administrator, finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
A. Butts set
B. Punch down tool
C. Cable tester
D. Cable stripper
A

A. Butts set

43
Q
Which of the following is used to verify configuration updates on a firewall?
A. Signature identification 
B. Access control list
C. Scanning services
D. Content filter
A

A. Signature identification

44
Q
Which of the following sizes is the fixed cell length in ATM?
A. 8 bytes
B. 53 bytes
C. 64 kilobytes
D. 128 kilobytes
A

B. 53 bytes

45
Q
Which of the following devices should Jeff, an admin, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
A. Hub
B. VLAN
C. Router
D. Server
A

A. Hub

46
Q
In the 2.4GHz range, which of the following channel combinations are non-overlapping?
A. 1,6,11
B. 2,7,10
C. 2,8,13
D. 3,6,9
A

A. 1,6,11

47
Q
Which of the following tools would Zach, an admin, use to identify opens and shorts? 
A. Ohmmeter
B. protocol analyzer
C. Cable tester
D. Multimeter
A

C. Cable tester

48
Q
Which of the following technologies relies on a ticket granting server to allow clients to verify their identity?
A. TACACS+
B. Kerberos
C. PKI
D. RADIUS
A

B. Kerberos

49
Q
Which of the following is used to transfer files between computers?
A. FTP
B. DHCP
C. ARP
D. NTP
A

A. FTP

50
Q
Lisa, an admin, determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks? 
A. DDoS
B. Viruses
C. Worms
D. Man-in-the-middle
A

A. DDoS

51
Q
Which of the following authenticates, allows, and controls the execution of router commands? 
A. PKI
B. RADIUS
C. Kerberos
D. TACACS+
A

D. TACACS+

52
Q
Which of the following is true of NIPS?
A. Routes traffic to the proper port
B. Detects malicious host traffic
C. Detects and prevents harmful traffic
D. Prevents traffic on network hosts
A

C. Detects and prevents harmful traffic

53
Q

A user’s new computer is not able to connect to the network at all. Upon further investigation, Kim, an admin, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable in the IDF, which of the following is the MOST likely cause of the problem?
A. Other end of the cable is terminated with a 568B configuration
B. Trunk port on the switch is disabled
C. Other end of the cable is terminated with a 568A configuration
D. Wall jack needs to be replaced with a smart jack

A

C. Other end of the cable is terminated with a 568A configuration

54
Q
Which of the following network access methods is the MOST secure?
A. PPPoE
B. SIP
C. RSH
D. IPSec
A

D. IPSec

55
Q
Lisa, a technician, is reporting wireless transmission speed of 300Mbps. Which of the following wireless standards is being used?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

56
Q
Which of the following handles HTTP requests on behalf of the client?
A. Bandwidth shaper
B. DNS server
C. Proxy server
D. Load balancer
A

C. Proxy server

57
Q
The selection of the correct punch down tool used depends on which of the following?
A. connector type
B. Demarcation point location
C. Block type
D. Switch location
A

C. Block type

58
Q

Which of the following services do TCP connections provide to application layer protocols? (Select TWO)
A. transport services without error recovery
B. Large data size manageability using segmentation
C. Secure Kerberos password encryption on data
D. Delivery through error recovery
E. Proxy server authentication

A

B. Large data size manageability using segmentation

D. Delivery through error recovery

59
Q
Which of the following devices monitors and reroutes malicious traffic being sent to a host?
A. Bandwidth shaper
B. IPS
C. DNS server
D. Load balancer
A

B. IPS

60
Q
Which of the following devices will allow Lisa, a user, to see a cached copy of websites?
A. Content switch
B. DNS server
C. Proxy server
D. Load balancer
A

C. Proxy server

61
Q
Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?
A. Man-in-the-middle
B. Denial of service
C. Ping flooding
D. Smurfing
A

A. Man-in-the-middle

62
Q
Which of the following uses a ring topology?
A. DSL
B. Ethernet
C. DOCSIS
D. SONET
A

D. SONET

63
Q
Which of the following has a DB-9 connector?
A. SC
B. RS-232
C. LC
D. RJ-45
A

B. RS-232

64
Q
Which of the following technologies is used to connect public networks using POTS lines?
A. OC3
B. OC12
C. PSTN
D. Cable
A

C. PSTN

65
Q
Users are unable to access the company's intranet website. Which of the following attacks has the network MOST likely experienced?
A. Man-in-the-middle
B. Smurf
C. Trojan
D. DoS
A

D. DoS

66
Q
Which of the following defines access for a network?
A. ACL
B. RDP
C. RAS
D. ARP
A

A. ACL

67
Q
which of the following is a form of encrypting packets for safe, secure data transmission within a network?
A. RAS
B. PPTP
C. IPSec
D. ICA
A

C. IPSec

68
Q
Which of the following is the BEST to ensure network performance on a VoIP network?
A. Traffic shaping
B. Quality of service
C. Load balancing
D. Caching engines
A

B. Quality of service

69
Q
Which of the following tools would Lisa, an admiin, use to determine if there is a problem with a telephone line?
A. Port scanner
B. Punch down tool
C. Butt set
D. Toner probe
A

C. Butt set

70
Q
Which of the following tools would BEST be used to verify if a network cable is properly terminated?
A. Multimeter
B. Cable certifier
C. Toner probe
D. Cable stripper
A

B. Cable certifier

71
Q
Kim, an admin, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO)
A. Packet sniffer
B. Honeypot
C. Port mirroring
D. IPS
E. Port scanner
F. IDS
A

A. Packet sniffer

C. Port mirroring

72
Q
Which of the following colors represents the oute leads on a connector of a 568B patch cable? (Select TWO)
A. Blue, brown/white
B. Green/white, blue
C. Orange/white, orange
D. Blue, blue/white
E. Brown/white, brown
A

C. Orange/white, orange

E. Brown/white, brown

73
Q
Kim an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?
A. Protocol analyzer
B. Toner probe
C. Cable certifier
D. Cable stripper
A

C. Cable certifier

74
Q
PKI is a method  of user authentication which uses  which of the following?
A. Various router commands
B. Access control lists
C. Certificate Services
D. A RADIUS server
A

C. Certificate Services

75
Q
Kim and Zach, attacker, use which of the following network scanners to see the protocols that are being used? (Select TWO)
A. IDS
B. Packet sniffer
C. Port scanners
D. Malware scanner
E. Ping sweep
A

B. Packet sniffer

C. Port scanners

76
Q
Lisa, an admin, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?
A. Intrusion prevention software
B. Packet sniffer
C. Intrusion detection software
D. Port scanner
A

B. Packet sniffer

77
Q
Lisa, an admin, believes that the network has been attacked and there is no known definition or prevention method to help avoid this attack. Which of the following BEST describes this scenario?
A. Zero day attack
B. DDoS
C. DoS
D. SQL injection
A

A. Zero day attack

78
Q
Kim, and admin, wants to verify which protocols are in use on the network. Which of the following tools should she use?
A. Intrusion detection software
B. PoE
C. Packet sniffer
D. Intrusion prevention software
A

C. Packet sniffer

79
Q
Lisa, an admin, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

D. 802.11n

80
Q
Which of the following is the MAXIMUM distance a single 1000BaseT segment can convert?
A. 100 kilometers (62 miles)
B. 10 Kilometers (6 miles)
C. 1000 meters (3281 feet)
D. 100 meters (328 meters)
A

D. 100 meters (328 meters)

81
Q

Which of the following wireless standardsoperates on the same frequency as 802.11a?
A. Compatible with 802.11b wireless networks
B. Compatible with 802.11g wireless networks
C. Compatible with 802.11i wireless networks
D. Compatible with 802.11n wireless networks

A

D. Compatible with 802.11n wireless networks

82
Q
Which of the following components would a technician plug into a smart jack?
A. 25 pair cable
B. 100 pair cable
C. Patch cable
D. Patch panel
A

C. Patch cable

83
Q
Which of the following is used by RADIUS to encrypt messages between the server and client? 
A. Public sever
B. CSU/DSU
C. Private key
D. Shared host
A

D. Shared host

84
Q
Which of the following security measures is the LEAST intrusive on an end device?
A. NIPS
B. Host-based firewall
C. Antivirus
D. HIDS
A

A. NIPS

85
Q
Which of the following is the MAXIMUM distance of a CAT5e cable on a single run when using Ethernet?
A. 1000 meters (2381 feet)
B. 323 meters (1060 feet)
C. 512 meters (1680)
D. 100 meters (328 feet)
A

D. 100 meters (328 feet)

86
Q
Which of the following physical network topologies  is MOST likely to be used in an FDDI network?
A. Star
B. Mesh
C. Bus
D. Ring
A

D. Ring

87
Q
Which of the following network scanners detects and sends out alerts for malicious network activity? 
A. Packet sniffers
B. IDS
C. Post scanners
D. IPS
A

B. IDS

88
Q
Which of the following connections push and twist-on?
A. LC
B. Sc
C. ST
D. RJ-45
A

C. ST

89
Q
Which of the following is a social engineering attack?
A. Worms
B. Man-in-the-middle
C. Phishing
D. Evil twin
A

C. Phishing

90
Q
Which of the following performs posture assessments for unknown devices that connect to the network?
A. PKI
B. EAP
C. NAC
D. AAA
A

C. NAC

91
Q

Peer to peer networks are used to pass information in between which of the following?
A. Several clients to a centralized server
B. One client to another
C. Several servers to several centralized clients
D. One client to a centralized server

A

B. One client to another

92
Q
Which of the following threats is MOST likely to enable an attacker to modify data in transit?
A. DoS
B. Smurf attack
C. Virus
D. Man-in-the-middle
A

D. Man-in-the-middle

93
Q
Which of the following mitigation techniques is MOST effective against a DoS attack?
A. IDS
B. Anitvirus
C. Redundancy
D. Backups
A

C. Redundancy

94
Q
Which of the following solutions will detect and disable a rogue access point?
A. Port scan
B. Packet sniffer
C. IPS
D. IDS
A

C. IPS

95
Q
Which of the following is a valid MAC address?
A. 00:AB:C4:FE:60:D3
B. 00-AE-S3-BC-90-F7
C. 13-12-BC-DA-97
D. 15:FA:97:44:AB
A

A. 00:AB:C4:FE:60:D3

96
Q
Which of the following connector types will MOST likely be located on a serial cable?
A. DB-9
B. LC
C. ST
D. BNC
A

A. DB-9

97
Q
T568B wiring scheme is typically found on which of the following components?
A. Demarc extension
B. 66 block
C. Patch panel
D. Vertical cross connect
A

C. Patch panel

98
Q
Which of the following is an encrypted remote access protocol?
A. RDP
B. PoE
C. RAS
D. PPP
A

A. RDP

99
Q

Port scanner and packet sniffer differ in functionality because:
A. Packet sniffers and port scanners are just different names for the same device
B. Packet sniffers can only log events on traffic activity and port scanners can route malicious packets
C. Packet sniffers watch all traffic over certain ports and port scanners watch traffic on certain NICs
D. port scanners are limited to detecting open ports and packet sniffers watch all traffic

A

D. port scanners are limited to detecting open ports and packet sniffers watch all traffic