Topic 6: Mixed Set (9) Flashcards

1
Q
Which of the following WAN technologies decreases bandwidth performance as the distance from the provider increases?
A. DSL
B. T1
C. Frame relay
D. ISDN
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following allows for spatial reuse utilizing several multipath distortions as RF data streams?
A. Omni-directional
B. MIMO
C. Distributed
D. Beam forming
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following areas MUST all other OSPF areas connect to in a properly configured network?
A. 0
B. 1
C. 110
D. 255
A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A network technician needs to implement an Ethernet network in a factory environment. Existing shielded twisted pair wiring does not provide enough protection from the interference of the factory equipment. Which of the following copper wired Ethernet networks should be used?
A. 10Base2
B. 100BaseFX
C. 100BaseT
D. 10GBaseSR
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following should a first responder perform when arriving at a site to perform a basic forensic investigation?
A. Isolate the area and block radio transmissions to the device.
B. Search for hidden storage devices and duplicate them on site.
C. Power off all computers and devices to stop them from erasing data.
D. Utilize a strong magnet to secure all data on drives from being erased.

A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A technician wants to configure the inbound port of a router to prevent FTP traffic from leaving the LAN. Which of the following should be placed on the router interface to accomplish this goal?
A. Static routes for all port 80 traffic
B. DHCP reservations for all /24 subnets
C. ACL for ports 20 and 21
D. MAC filtering using wildcards
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likely problem?
A. Faulty crossover cable
B. DNS server is down
C. Switching loop
D. Outside interface shutdown
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).
A. dig
B. nslookup
C. nbstat
D. ifconfig
E. ipconfig
A

Answer: D,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
When querying a DNS server for an AAAA record, which of the following is an appropriate response?
A. 192.168.2.1
B. 00:f3:82:99:a2:b8
C. 61.23.168.192.in-addr.arpa
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?
A. Replace the router with a Layer 2 switch that supports VLANs
B. Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D. AllowICMP to pass through the Router

A

Answer: D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Layer 2 switch
B. Content filter
C. Load balancer
D. Traffic analyzer
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?
A. Port security is blocking all traffic.
B. An IDS is blocking all traffic.
C. Implicit deny is blocking all traffic.
D. SMTP is blocking all traffic.

A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?
A. Data link
B. Network
C. Session
D. Physical
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following uses types and codes rather than ports?
A. EIGRP
B. ICMP
C. UDP
D. IPv6
A

Answer: B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?
A. Determine if anything has changed
B. Once a theory is confirmed determine the next step is to resolve the problem
C. Implement the solution or escalate as necessary
D. Question the obvious

A

Answer: A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following defines an IP address that is NOT routed on the Internet?
A. Multicast
B. Public
C. Private
D. Classful
A

Answer: C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?
A. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer
A

Answer: B

18
Q
Which of the following specifications would Sara, an administrator, implement as a network access control?
A. 802.1q
B. 802.3
C. 802.11n
D. 802.1x
A

Answer: D

19
Q
Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?
A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
A

Answer: A

20
Q
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?
A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing
A

Answer: D

21
Q
Which of the following provides the MOST protection against zero day attacks via email attachments?
A. Anti-spam
B. Anti-virus
C. Host-based firewalls
D. Patch management
A

Answer: A

22
Q
Which of the following access controls enforces permissions based on data labeling at specific levels?
A. Mandatory access control
B. Separation of duties access control
C. Discretionary access control
D. Role based access control
A

Answer: A

23
Q
A username provides which of the following?
A. Biometrics
B. Identification
C. Authorization
D. Authentication
A

Answer: B

24
Q
Use of group accounts should be minimized to ensure which of the following?
A. Password security
B. Regular auditing
C. Baseline management
D. Individual accountability
A

Answer: D

25
Q
Privilege creep among long-term employees can be mitigated by which of the following procedures?
A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation
A

Answer: A

26
Q
Which of the following wireless standards is capable of ONLY operating on 5.8GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

Answer: A

27
Q
Which of the following protocols are used to connect devices in a secure manner? (Select TWO).
A. TELNET
B. SSH
C. RDP
D. HTTP
E. DNS
F. FTP
A

Answer: B,C

28
Q
Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?
A. RDP
B. SSL VPN
C. ISAKMP
D. TLS 2.0
A

Answer: B

29
Q
Which of the following is based ENTIRELY on using ICMP packets?
A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack
A

Answer: D

30
Q
Which of the following could be used to stop unknown threats?
A. DMZ
B. Signature based IPS
C. Behavior based IPS
D. Honeypots
A

Answer: C

31
Q

Which of the following describes a DNS server?
A. Translates an IP address to a name
B. Caches commonly viewed web pages
C. Assigns IP addresses to network devices
D. Provides port security for a network

A

Answer: A

32
Q
A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should the technician do NEXT?
A. Implement the solution
B. Question users
C. Test the theory
D. Escalate the problem
A

Answer: C

33
Q
A company has just installed wireless in their office. In one corner of the office building users are not able to establish a connection. Which of the following can be changed on the AP to help resolve this issue?
A. SSID
B. Channels
C. Signal strength
D. Encryption
A

Answer: C

34
Q
Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?
A. CAT3
B. CAT5
C. CAT5e
D. CAT6
A

Answer: B

35
Q
A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point. Which of the following is the MOST likely reason some users cannot connect?
A. Incorrect channel
B. Weak encryption
C. Incompatible NICs
D. Incorrect SSID
A

Answer: C

36
Q
Which of the following will allow multiple frequencies to be combined?
A. WiMAX
B. MPLS
C. MIMO
D. Channel bonding
A

Answer: D

37
Q
Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?
A. NAT
B. RIP
C. PAT
D. ACL
A

Answer: C

38
Q
Which of the following allows a technician to gather information about the operating system?
A. Domain services
B. Fingerprinting
C. Countermeasures
D. Reconnaissance
A

Answer: B

39
Q
Which of the following is indicative of an FTP bounce?
A. Arbitrary IP address
B. Reverse DNS lookups
C. Same Port Number
D. File Transfer Success
A

Answer: A

40
Q
The software that allows a machine to run multiple operating systems at once is called the:
A. Server manager
B. Hypervisor
C. Boot loader
D. Partition manager
A

Answer: B