Topic 6: Mixed Set (10) Flashcards

1
Q
Which of the following routing protocols relies on hop count as its ONLY metric?
A. BGP
B. EIGRP
C. OSPF
D. RIP
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: 172.16.204.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1 Broadcast address: 172.16.255.255
A. DNS address
B. Subnet mask
C. Default gateway
D. Broadcast address
E. IP address
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following is the BEST way to mitigate security threats on a network?
A. Social engineering
B. User training
C. Incident response
D. Man-in-the- middle
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?
A. An IPS
B. A protocol analyzer
C. A traffic shaper
D. An IDS
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is an IPv6 address?
A. 00:14:38:05:7B:E5
B. 10.10.1.1
C. 192.168.1.1
D. 2001:cdba::3257:9652
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the remote access?
A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following is a routed protocol that functions at layer 3 of the OSI model?
A. IP
B. Frame relay
C. PPP
D. ADSL
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Something you have, something you are, and something you know are the three tenets of:
A. Social engineering
B. Change management
C. Remote access
D. Access control
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A firewall that operates at Layer 7 of the OSI model is known as a(n):
A. Circuit gateway
B. Packet filter
C. Application level
D. Redundant firewall
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following allows a central point to simultaneously address other points without addressing all of them?
A. Multicast
B. Subnetting
C. Unicast
D. Broadcast
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following WAP security features offers the STRONGEST encryption?
A. WPA
B. WPA2
C. WEP
D. Hidden SSID
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following mediums is circuit switched?
A. PSTN
B. ATM
C. Frame relay
D. MPLS
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is true about tunneling and encryption?
A. SIP encrypts all data going through the tunnel.
B. PPTP creates a secure tunnel.
C. SSL VPN provides a secure tunnel.
D. RAS is a secure way to create a tunnel.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following is a secure way to connect to a device?
A. RSH
B. TFTP
C. SNMPv2
D. SFTP
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
A

Answer: D

18
Q
Which of the following are network topologies? (Select TWO).
A. Ethernet
B. Duplex
C. Star
D. Circular
E. Bus
A

Answer: C,E

19
Q
Which of the following uses eight groups of characters for addressing?
A. MAC
B. IPv4
C. IPv6
D. DHCP
A

Answer: C

20
Q
A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Smurfing
A

Answer: B

21
Q
Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?
A. 10GBaseLR
B. 10GBaseSR
C. 10GBaseX
D. 10GBaseT
A

Answer: D

22
Q
Which of the following is the network topology in which computers connect in a closed circle?
A. Bus
B. Mesh
C. Ring
D. Star
A

Answer: C

23
Q
Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?
A. RTP
B. NTP
C. TFTP
D. ARP
A

Answer: B

24
Q
An administrator is replacing an existing WAP because the customer is reporting that the connection speeds are too slow. Which of the following should be installed?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

Answer: D

25
Q
Which of the following cables has the MOST twists per inch?
A. CAT3
B. CAT5
C. CAY5e
D. CAT6
A

Answer: D

26
Q
Which of the following is true about an IP address if the first bit is a one and the second bit is a zero?
A. The address is a Class A address.
B. The address is a Class B address.
C. The address is a Class C address.
D. The address is a Class D address.
A

Answer: B

27
Q
Which of the following cables is MOST likely to be terminated into a patch panel?
A. Serial
B. RG-6
C. RG-59
D. CAT6
A

Answer: D

28
Q
Which of the following MUST be kept synchronized in order for Kerberos to work?
A. Certificate
B. Ticket
C. Time
D. Token
A

Answer: C

29
Q
Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?
A. IPS
B. Application layer firewall
C. IDS
D. An unmanaged switch
A

Answer: B

30
Q
Which of the following uses certificates as a form of security?
A. Kerberos
B. LDAP
C. PKI
D. CHAP
A

Answer: C

31
Q
Which of the following cables will MOST likely be used to connect to a satellite dish?
A. RG-6
B. CAT5e
C. Fiber
D. CAT6
A

Answer: A

32
Q
A VoIP line will MOST likely have which of the following connectors?
A. RJ-11
B. DB-25
C. BNC
D. RJ-45
A

Answer: D

33
Q
Which of the following is a proprietary routing protocol?
A. RIP
B. EIGRP
C. OSPF
D. BGP
A

Answer: B

34
Q
Which of the following is an invalid MAC address?
A. AA:CE:58:FD:90:08
B. 44:98:3E:F8:33:23
C. 56:AD:BX:89:55:54
D. 94:9E:FE:EE:8C:DF
A

Answer: C

35
Q
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?
A. Star
B. Mesh
C. Bus
D. Ring
A

Answer: D

36
Q
A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage?
A. netsh lan
B. netsh interface
C. netsh wlan
D. netsh winsock
A

Answer: D

37
Q
Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).
A. Cable modern
B. Layer 2 switch
C. Router
D. NIDS
E. Layer 3 switch
A

Answer: C,E

38
Q
Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
A. Switch
B. Proxy Server
C. Router
D. VPN Concetnrator
A

Answer: A

39
Q
The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?
A. 1
B. 3
C. 4
D. 5
A

Answer: C

40
Q
Which of the following is used to provide hot standby capabilities using paired routers?
A. CARP
B. L2TP
C. PPTP
D. ISAKMP
A

Answer: A