Tyler Hampton
Quiz von , erstellt am more than 1 year ago

Given a scenario, use secure network administration principles.

20
0
0
Tyler Hampton
Erstellt von Tyler Hampton vor mehr als 6 Jahre
Schließen

S+ Objective 1.2 Quiz

Frage 1 von 8

1

Which of the following is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks?

Wähle eine der folgenden:

  • MAC filter

  • Flood Guard

  • MAC limiter

  • Security posture

Erklärung

Frage 2 von 8

1

A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?

Wähle eine der folgenden:

  • ACLs provide individual access control to resources

  • ACLs aren't used in today's systems

  • The ACL process is dynamic in nature

  • ACLs are used to authenticate users

Erklärung

Frage 3 von 8

1

A network technician incorrectly wired connections between switches in your organization's network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. What should be done to prevent this in the future?

Wähle eine der folgenden:

  • Install an IDS

  • Only use layer 2 switches

  • Install SNMP on the switches

  • Implement STP or RSTP

Erklärung

Frage 4 von 8

1

Your organization frequently has guests visiting in various conference rooms throughout the bubilding. These guests need access to the Internet via wall jacks, but should not be able to access internal network resources. Employees need to access to both the internal network and the Internet. What would BEST meet this need?

Wähle eine der folgenden:

  • PAT and NAT

  • DMZ and VPN

  • VLANs and 802.1x

  • Routers and Layer 3 Switches

Erklärung

Frage 5 von 8

1

What would you configure on a Layer 3 device to allow FTP traffic to pass through?

Wähle eine der folgenden:

  • Firewall

  • Implicit Deny

  • Port Security

  • Access Control List

Erklärung

Frage 6 von 8

1

What type of device would have the following entries used to define its operation?
permit IP any any eq 80
permit IP any any eq 443
deny IP any any

Wähle eine der folgenden:

  • Layer 2 switch

  • Firewall

  • Access Control List

  • Proxy Server

Erklärung

Frage 7 von 8

1

Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. Which of the following is the MOST likely cause for this problem?

Wähle eine der folgenden:

  • The RADIUS server certificate expired

  • DNS is providing incorrect host names

  • DHCP is issuing duplicate IP addresses

  • MAC filtering is enabled.

Erklärung

Frage 8 von 8

1

What would administrators typically place at the end of an ACL of a firewall?

Wähle eine der folgenden:

  • Allow all all

  • Timestamp

  • Password

  • Implicit Deny

Erklärung