Topic 6: Mixed Set (16) Flashcards
A guest network segment typically exists to:
A. provide transient users with access to a subnet of network services
B. prevent the introduction of authorized devices with out-of-date security controls.
C. allow staff to access external websites without detection
D. simplify firewall ACLs by denying all Internet traffic
Answer: A
Which of the following can ESD cause when working on network hardware? A. component failure B. increased latency C. decreased performance D. power surge
Answer: A
After noticing performance degradation on the network, a systems administrator determines a significant amount of data is passing through the firewall on port 23. The systems administrator wants to prevent this unauthorized access and also wants only to allow remote administration of a server at address 10.1.1.5, using a secure protocol. Which of the following firewall rules should the systems administrator add to achieve these goals? (Select TWO). A. Deny any any any 23 B. Deny any 23 any any C. Permit any any 10.1.1.5 22 D. Permit 10.1.1.5 22 any any E. Permit any any any 22 F. Deny 10.1.1.5 23 any any
Answer: A,C
A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem? A. network maps B. cable management C. release notes D. change management
Answer: D
A patch panel was recently installed in a new IDF. The technician was reviewing the ports on the patch panel, and though they looked correct, they were too small to receive patch cables with RJ- 45 connectors. Which of the following types of connectors should be used on this patch panel? A. RJ-11 B. RJ-48C C. RS-232 D. DB-25
Answer: A
A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should the network administrator use to ensure the data transferred is confidential? A. authpriv B. SHA C. MD5 D. authentication passphrase
Answer: A
Which of the following BEST describes the differences between VLAN hopping and session hijacking?
A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands.
B. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection.
C. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges.
D. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation.
Answer: A
The marketing department leverages social media for company promotions. However, the Chief Financial Officer (CFO) is concerned about a loss of productivity due to other employees using the company network to watch online videos and social networking. Which of the following should be implemented? A. SOW B. SLA C. ACL D. AUP
Answer: D
A network administrator is setting up a web server that will host a web application. Which of the following ports must be open to provide for secured and unsecured access to that front end? (Select TWO). A. 22 B. 25 C. 80 D. 443 E. 8080
Answer: C,D
A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician verifies other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located? A. network B. physical C. transport D. application
Answer: B
Which of the following physical security controls is ONLY a detective control? A. CCTV B. Biometrics C. Mantrap D. Guards
Answer: A
A junior administrator replaced an old 10/100 switch with a 10/100/1000 switch in the datacenter and migrated all file server connections. Since then, throughput has significantly degraded. A senior network administrator looked at the interfaces and noticed a significant number of collisions and errors. Which of the following is the MOST likely reason for the erratic behavior? A. Duplex mismatch B. Faulty cabling C. Improper VLAN configuration D. Improper tagging/untagging of ports
Answer: A
A company has implemented a major network upgrade, replacing all the switches and printers. Which of the following is the LAST step in the change management process?
A. Document network configurations.
B. Acquire approvals from management.
C. Adhere to the announced maintenance windows.
D. Notify all stakeholders pf changes to the plan.
Answer: A
A network administrator is configuring an ACL that blocks all ping traffic from leaving the local network on the router. Which of the following ACLs will work?
A. access-list 100 deny udp any any eq echo
B. access-list 100 deny ping any any echo
C. access-list 100 deny icmp any any echo
D. access-list 100 deny igmp any any echo
Answer: C
The presence of a Media Access Unit (MAU) is indicative of which of the following network types? A. Token ring B. Star C. Full mesh D. Bus
Answer: A
A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement? A. LAN B. PAN C. MAN D. WAN
Answer: C