Test 4 Flashcards
Which of the following companents of IPSec? (Select TWO)
A. AH
B. ESP
C. SSH
D. ICA
E. TLS
A. AH
B. ESP
In IPSec. which of the following is an agreement on how devices wil lsecurely transmit information?
A. SA
B. ESP
C. AH
D. ISAKMP
A. SA
An organization recently installed a firewall on the network. Employees must have access to their work computers from their home computer. In which of the following ways should the firewall be configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
D. Allow TCP port 3389 inbound
An organization recently installed a firewall on the network. Employees must be able toe send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO) A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110
B. Allow TCP port 25
C. Allow TCP port 110
Which of the following OSI model layers is responsible for data encryption? A. Application B. Presentation C. Physical D. Data link
B. Presentation
Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced, there were no issues with connectivity. Immediately after the cable was replaced, users report that they are unable to access a database application on the server. Which of the following is the MOST likely reason for the inaccessibility?
A. Lisa used a short patch cable
B. Lisa used a cable with an RJ-45 connector
C. Lisa used a crossover cable
D. Lisa used a patch cable that was over 5o meters long
C. Lisa used a crossover cable
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination? A. RIP B. OSPF C. BGP D. RIPv2
C. BGP
Which of the following is occurring when Jeff, an employee, unintentionally gives information that is used maliciously? A. Tailgating B. DoS attack C. DDoS attack D. Social engineering
D. Social engineering
Which of the following OSI model layers is used for logical addressing? A. Physical B. Transport C. Network D. Data link
C. Network
Which of the following attacks creates a buffer overflow to stop access to a system? A. Blue jacking B. DoS C. Netstat D. Man-in-the-middle
B. DoS
In which of the following layers of the OSI model dpes TCP operate? A. Session B. Network C. Data Link D. Transport
D. Transport
Which of the following basic devices blocks ports and can sometimes filter data? A. Repeater B. Hub C. Firewall D. Switch
C. Firewall
At which of the following layers of the OSI model does an unmanaged switch operate? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2
Which of the following devices will monitor for propagating worms? A. Firewall B. Proxy server C. Mail server D. IDS
D. IDS
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices. A. PKI B. TACACS+ C. CHAP D. SSH
B. TACACS+
Which of the following network tools is used to identify running services on host devices? A. IDS B. IPS C. Firewall D. NMAP
D. NMAP
Which of the following security devices is used in providing packet and MAC address filtering services for the network? A. Host-based proxy server B. Network-based firewall C. IDS D. IPS
B. Network-based firewall
Which of the following would Kim, a technician, use in voice over IP communications? A. SNTP B. SCP C. SMTP D. SIP
D. SIP
Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections? A. BGP B. SNAT C. RIP D. GPG
A. BGP
Which of the following protocols allows more than three non-overlapping channels? A. 802.11a B. 802.11g C. 802.1q D. 802.15
A. 802.11a
Which of the following represents the physical address of a network access card? A. FF01:D2:C4:87::11 B. 00-30-48-83-9B-C8 C. 08-9D-35-22-L2-34-FF-21 D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
B. 00-30-48-83-9B-C8
ADSL, PPP, and ATM all operate at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 7
B. Layer 2
Which of the following OSI layers BEST describes where an HTTP proxy operates? A. Transport B. Application C. Presentation D. Session
B. Application
Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of service attack is occurring? A. RAS B. RDP C. IDS D. VPN
C. IDS
A MAC address is used at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2
Multimode fiber should be used in place of copper when: A. Distances are short B. EMI is a concern C. PoE is necessary D. Th switch has BNC connectors
B. EMI is a concern
Zach, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose? A. CAT3 B. STP C. Coaxial D. Fiber
D. Fiber
A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network? A. River multiplexer B. Repeater C. Attenuator D. OTDR
Repeater
Which of the following regulates the amount of network traffic a single node receives in a server cluster? A. Load balancer B. Proxy server C. Content filter D. Quality of Service
A. Load balancer
Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 internet access network. Which of the following optimizations should Lisa implement? A. Load balancing B. Caching engine C. Traffic shaping D. Quality of service
C. Traffic shaping
Which of the following evaluates packet payload when detecting network threats? A. IPS B. Proxy server C. Caching server D. Content filter
A. IPS
A disassociation request is a way to mitigate which of the following threats? A. ARP poisoning B. Rogue AP C. Man-in-the-middle attack D. Botnet
B. Rogue AP
A crossover cable is MOST commonly associated with which of the following layers of the OSI model? A. Session B. Application C. Network D. Physical
D. Physical
Which of the following documents will allow Kim, an administrator, to determine a change from the standard default system configuration? A. Baseline B. Physical network diagram C. Wiring schematic D. Logical diagram
A. Baseline
Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based on key words determined by the company? A. Stateless traffic monitor B. Stateful traffic monitor C. Signature identification D. Content filter
D. Content filter
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Jeff, an administrator? A. DoS attack B. Man-in-the-middle attack C. Smurf attack D. Xmas attack
B. Man-in-the-middle attack
Which of the following cable types would have the LEAST amount of EMI? A. CAT3 B. CAT5 C. STP CAT6 D. Plenum CAT6
C. STP CAT6
Which of the following WAN technologies uses four wires for digital and a 66 block? A. Cable B. ATM C. T3 D. POTS
D. POTS
Which of the following has the HIGHEST data rate speed? A. T1 B. ADSL C. SDSL D. OC-3
D. OC-3