Topic 6: Mixed Set (10) Flashcards
1
Q
Which of the following routing protocols relies on hop count as its ONLY metric? A. BGP B. EIGRP C. OSPF D. RIP
A
Answer: D
2
Q
A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: 172.16.204.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1 Broadcast address: 172.16.255.255 A. DNS address B. Subnet mask C. Default gateway D. Broadcast address E. IP address
A
Answer: C
3
Q
A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following? A. Phishing B. Social engineering C. Man-in-the-middle D. Shoulder surfing
A
Answer: C
4
Q
Which of the following is the BEST way to mitigate security threats on a network? A. Social engineering B. User training C. Incident response D. Man-in-the- middle
A
Answer: B
5
Q
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks? A. An IPS B. A protocol analyzer C. A traffic shaper D. An IDS
A
Answer: A
6
Q
Which of the following is an IPv6 address? A. 00:14:38:05:7B:E5 B. 10.10.1.1 C. 192.168.1.1 D. 2001:cdba::3257:9652
A
Answer: D
7
Q
A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the remote access? A. Site-to-site VPN B. Network-based firewall C. SSL VPN D. Host-based firewall
A
Answer: C
8
Q
Which of the following is a routed protocol that functions at layer 3 of the OSI model? A. IP B. Frame relay C. PPP D. ADSL
A
Answer: A
9
Q
Something you have, something you are, and something you know are the three tenets of: A. Social engineering B. Change management C. Remote access D. Access control
A
Answer: D
10
Q
A firewall that operates at Layer 7 of the OSI model is known as a(n): A. Circuit gateway B. Packet filter C. Application level D. Redundant firewall
A
Answer: C
11
Q
Which of the following allows a central point to simultaneously address other points without addressing all of them? A. Multicast B. Subnetting C. Unicast D. Broadcast
A
Answer: A
12
Q
Which of the following WAP security features offers the STRONGEST encryption? A. WPA B. WPA2 C. WEP D. Hidden SSID
A
Answer: B
13
Q
Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
A
Answer: D
14
Q
Which of the following mediums is circuit switched? A. PSTN B. ATM C. Frame relay D. MPLS
A
Answer: A
15
Q
Which of the following is true about tunneling and encryption?
A. SIP encrypts all data going through the tunnel.
B. PPTP creates a secure tunnel.
C. SSL VPN provides a secure tunnel.
D. RAS is a secure way to create a tunnel.
A
Answer: C
16
Q
Which of the following is a secure way to connect to a device? A. RSH B. TFTP C. SNMPv2 D. SFTP
A
Answer: D