Filters
Question type

Study Flashcards

A network administrator is concerned that the network is vulnerable to a denial-of-service attack.What steps should be taken to reduce this threat? (Select all that apply.)


A) Use access lists to allow only sources from the network to enter the router's interfaces.
B) Set up a spoofing account so that the attacker doesn't know which machine to attack.
C) There isn't a way to reduce this threat.
D) Configure the router to block directed broadcasts to the network.
E) Prevent intrusions.

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

The network administrator suspects that packet sniffing is being used to capture data packets in the network.The network administrator is using an SSH connection for all critical applications,and switches are being used on all network connections.Should the network administrator be concerned?


A) No, the SSH connection is fully encrypted and this cannot be decoded.
B) Yes, the SSH connection is not very strong and parts are in plain text.
C) No, the time required to decode the SSH is too lengthy to be a threat.
D) Yes, the network administrator should be concerned if someone is suspected of having internal access.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

There is a new virus reported on the Internet.What steps should the network administrator take to protect the network from the threat?


A) Convert all operating systems to Linux.
B) Make sure antivirus software is installed with the most current version.
C) Use a personal firewall.
D) Use firewall software that permits only trusted sites.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Network operations documentation includes which of the following?


A) Asset management
B) Network drawings and diagrams
C) Vendor documentation
D) All of the above

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What wireless security technology replaces WEP as the main security mechanism?


A) WPA
B) WEP2
C) SSID
D) MACSEC

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

When would a network administrator use L2TP?


A) When configuring routing for a network
B) When configuring a remote user's tunneling protocol
C) To block ICMP packets from coming into a network
D) To help with packet filtering

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Single sign-on (SSO) allows a user to do which of the following?


A) Access all authorized services and systems.
B) Access just email, with only one login per week.
C) Administrator access to all services and systems.
D) None of the above is correct.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

A

What technology or technologies use the AAA protocol framework?


A) RADIUS
B) TACACS+
C) Both RADIUS and TACACS+
D) Neither RADIUS nor TACACS+

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Authentication methods are based on _______.


A) Something you have
B) Something you want
C) Someone you know
D) None of the above

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following is a Linux-based port scanner that is now ported to most all operating systems?


A) SNMP
B) TRACE
C) NMAP
D) ICMP

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A user who can view a network file but cannot change it lacks which of the following?


A) Authorization
B) Authentication
C) Accounting
D) Access

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A network administrator is considering placing a firewall on an internal file server in the network.What is the purpose of the firewall,and is it important for the firewall to be stateful?


A) The purpose of the firewall is to hide the file server from the outside but still allow traffic to pass to the outside and back. The firewall must be stateful so that it keeps track of data packet flow.
B) The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back. The firewall should not be stateful unless the file server is not secure.
C) The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back. The firewall must be stateful so that it keeps track of data packet flow.
D) The purpose of the firewall is to hide the file server from the inside but allow traffic to pass to the outside. The firewall must be stateful so that it keeps track of data packet flow.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What ACL entry would eliminate the effect of the implicit deny?


A) permit ip any any
B) permit all
C) permit any
D) permit traffic all

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

An attacker to a network is using social engineering to attack a network.This means which of the following? (Select all that apply.)


A) The attacker claims to be from network support.
B) The attacker is sifting through discarded trash.
C) The attacker uses a dictionary attack.
D) The attacker uses packet sniffing.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

A, B

The network management is concerned about intrusion problems.The network administrator recommends intrusion detection be placed on the network.This will do which of the following? (Select all that apply.)


A) This system will provide IP address information of all possible threats in the network.
B) This system will monitor data packets passing through the network and identify potential attacks.
C) This system will cut down any unnecessary TCP data traffic and convert it to UDP.
D) This system will potentially catch ongoing attacks.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

B, D

What is the name for the process of keeping track of user network activity?


A) Network accounting
B) Net-logging
C) Sys-logging
D) Net-tracking

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

A dictionary attack is being used by an attacker to break into a network.What does this mean?


A) The attacker is using a secret list of code words.
B) The attacker is using only uppercase letters for common words.
C) The attacker is using only lowercase letter for unknown words.
D) The attacker is using known passwords and many variations of upper- and lowercase combinations.
E) All of these answers are correct.

F) C) and E)
G) B) and E)

Correct Answer

verifed

verified

Where might you place servers that require access from the public network?


A) A test lab
B) A safe zone
C) A DMZ
D) A protected hub

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

The network administrator configures a VPN tunnel from a remote office to the main facility.A problem has occurred in the link.Which are the main steps the administrator should take to resolve the problem? (Select all that apply.)


A) Check the source and destination IP address of the tunnel configured on the router.
B) Make sure the IP addresses on the ends of the tunnel are not in the same subnet.
C) Make sure the IP addresses on the ends of the tunnel are in the same subnet.
D) Use the show access-list command to verify the routers are properly configured.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Which is not a stage of forensics examination?


A) Review
B) Analysis
C) Containment
D) Collection

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 22

Related Exams

Show Answer