Quix7 - D4 - 50Q

Beschreibung

Good Luck!
Requiemdust Sheena
Quiz von Requiemdust Sheena, aktualisiert more than 1 year ago
Requiemdust Sheena
Erstellt von Requiemdust Sheena vor mehr als 4 Jahre
65
0

Zusammenfassung der Ressource

Frage 1

Frage
What important factor differentiates Frame Relay from X.25?
Antworten
  • A. Frame Relay supports multiple PVCs over a single WAN carrier connection.
  • B. Frame Relay is a cell-switching technology instead of a packetswitching technology like X.25.
  • C. Frame Relay does not provide a committed information rate (CIR).
  • D. Frame Relay only requires a DTE on the provider side.

Frage 2

Frage
During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using WPA. What recommendation should Jim make?
Antworten
  • A. Continue to use LEAP. It provides better security than TKIP for WPA networks.
  • B. Use an alternate protocol like PEAP or EAP-TLS and implement WPA2 if supported.
  • C. Continue to use LEAP to avoid authentication issues, but move to WPA2.
  • D. Use an alternate protocol like PEAP or EAP-TLS, and implement Wired Equivalent Privacy to avoid wireless security issues.

Frage 3

Frage
Ben has connected his laptop to his tablet PC using an 802.11g connection. What wireless network mode has he used to connect these devices?
Antworten
  • A. Infrastructure mode
  • B. Wired extension mode
  • C. Ad hoc mode
  • D. Stand-alone mode

Frage 4

Frage
Lauren’s and Nick’s PCs simultaneously send traffic by transmitting at the same time. What network term describes the range of systems on a network that could be affected by this same issue?
Antworten
  • A. The subnet
  • B. The supernet
  • C. A collision domain
  • D. A broadcast domain

Frage 5

Frage
Sarah is manually reviewing a packet capture of TCP traffic and finds that a system is setting the RST flag in the TCP packets it sends repeatedly during a short period of time. What does this flag mean in the TCP packet header?
Antworten
  • A. RST flags mean “Rest.” The server needs traffic to briefly pause.
  • B. RST flags mean “Relay-set.” The packets will be forwarded to the address set in the packet.
  • C. RST flags mean “Resume Standard.” Communications will resume in their normal format.
  • D. RST means “Reset.” The TCP session will be disconnected.

Frage 6

Frage
Gary is deploying a wireless network and wants to deploy the fastest possible wireless technology. Due to technical constraints, he is limited to using a 2.4 GHz option. Which one of the following wireless networking standards should he use?
Antworten
  • A. 802.11a
  • B. 802.11g
  • C. 802.11n
  • D. 802.11ac

Frage 7

Frage
Chris is configuring an IDS to monitor for unencrypted FTP traffic. What ports should Chris use in his configuration?
Antworten
  • A. TCP 20 and 21
  • B. TCP 21 only
  • C. UDP port 69
  • D. TCP port 21 and UDP port 21

Frage 8

Frage
Which OSI layer includes electrical specifications, protocols, and interface standards?
Antworten
  • A. The Transport layer
  • B. The Device layer
  • C. The Physical layer
  • D. The Data Link layer

Frage 9

Frage
FHSS, DSSS, and OFDM all use what wireless communication method that occurs over multiple frequencies simultaneously?
Antworten
  • A. WiFi
  • B. Spread Spectrum
  • C. Multiplexing
  • D. Orthogonal modulation

Frage 10

Frage
Brian is selecting an authentication protocol for a PPP connection. He would like to select an option that encrypts both usernames and passwords and protects against replay using a challenge/response dialog. He would also like to reauthenticate remote systems periodically. Which protocol should he use?
Antworten
  • A. PAP
  • B. CHAP
  • C. EAP
  • D. LEAP

Frage 11

Frage
Which one of the following protocols is commonly used to provide backend authentication services for a VPN?
Antworten
  • A. HTTPS
  • B. RADIUS
  • C. ESP
  • D. AH

Frage 12

Frage
What network topology is shown in the following image?
Antworten
  • A. A ring
  • B. A bus
  • C. A star
  • D. A mesh

Frage 13

Frage
What type of firewall design is shown in the diagram?
Antworten
  • A. A single-tier firewall
  • B. A two-tier firewall
  • C. A three-tier firewall
  • D. A four-tier firewall

Frage 14

Frage
If the VPN grants remote users the same access to network and system resources as local workstations have, what security issue should Chris raise?
Antworten
  • A. VPN users will not be able to access the web server.
  • B. There is no additional security issue; the VPN concentrator’s logical network location matches the logical network location of the workstations.
  • C. Web server traffic is not subjected to stateful inspection.
  • D. VPN users should only connect from managed PCs.

Frage 15

Frage
If Chris wants to stop cross-site scripting attacks against the web server, what is the best device for this purpose, and where should he put it?
Antworten
  • A. A firewall, location A
  • B. An IDS, location A
  • C. An IPS, location B
  • D. A WAF, location C

Frage 16

Frage
Susan is deploying a routing protocol that maintains a list of destination networks with metrics that include the distance in hops to them and the direction traffic should be sent to them. What type of protocol is she using?
Antworten
  • A. A link-state protocol
  • B. A link-distance protocol
  • C. A destination metric protocol
  • D. A distance-vector protocol

Frage 17

Frage
Ben has configured his network to not broadcast an SSID. Why might Ben disable SSID broadcast, and how could his SSID be discovered?
Antworten
  • A. Disabling SSID broadcast prevents attackers from discovering the encryption key. The SSID can be recovered from decrypted packets.
  • B. Disabling SSID broadcast hides networks from unauthorized personnel. The SSID can be discovered using a wireless sniffer.
  • C. Disabling SSID broadcast prevents issues with beacon frames. The SSID can be recovered by reconstructing the BSSID.
  • D. Disabling SSID broadcast helps avoid SSID conflicts. The SSID can be discovered by attempting to connect to the network.

Frage 18

Frage
What network tool can be used to protect the identity of clients while providing Internet access by accepting client requests, altering the source addresses of the requests, mapping requests to clients, and sending the modified requests out to their destination?
Antworten
  • A. A gateway
  • B. A proxy
  • C. A router
  • D. A firewall

Frage 19

Frage
During troubleshooting, Chris uses the nslookup command to check the IP address of a host he is attempting to connect to. The IP he sees in the response is not the IP that should resolve when the lookup is done. What type of attack has likely been conducted?
Antworten
  • A. DNS spoofing
  • B. DNS poisoning
  • C. ARP spoofing
  • D. A Cain attack

Frage 20

Frage
A remote access tool that copies what is displayed on a desktop PC to a remote computer is an example of what type of technology?
Antworten
  • A. Remote node operation
  • B. Screen scraping
  • C. Remote control
  • D. RDP

Frage 21

Frage
Which email security solution provides two major usage modes: (1) signed messages that provide integrity, sender authentication, and nonrepudiation; and (2) an enveloped message mode that provides integrity, sender authentication, and confidentiality?
Antworten
  • A. S/MIME
  • B. MOSS
  • C. PEM
  • D. DKIM

Frage 22

Frage
During a security assessment, Jim discovers that the organization he is working with uses a multilayer protocol to handle SCADA systems and recently connected the SCADA network to the rest of the organization’s production network. What concern should he raise about serial data transfers carried via TCP/IP?
Antworten
  • A. SCADA devices that are now connected to the network can now be attacked over the network.
  • B. Serial data over TCP/IP cannot be encrypted.
  • C. Serial data cannot be carried in TCP packets.
  • D. TCP/IP’s throughput can allow for easy denial of service attacks against serial devices.

Frage 23

Frage
What type of key does WEP use to encrypt wireless communications?
Antworten
  • A. An asymmetric key
  • B. Unique key sets for each host
  • C. A predefined shared static key
  • D. Unique asymmetric keys for each host

Frage 24

Frage
Arnold is receiving reports from end users that their internet connections are extremely slow. He looks at the firewall and determines that there are thousands of unexpected inbound connections per second arriving from all over the world. What type of attack is most likely occurring?
Antworten
  • A. A worm
  • B. A denial of service attack
  • C. A virus
  • D. A smurf attack

Frage 25

Frage
What speed and frequency range is used by 802.11n?
Antworten
  • A. 54 Mbps, 5 GHz
  • B. 200+ Mbps, 5GHz
  • C. 200+ Mbps, 2.4 and 5 GHz
  • D. 1 Gbps, 5 GHz

Frage 26

Frage
The Address Resolution Protocol (ARP) and the Reverse Address Resolution Protocol (RARP) operate at what layer of the OSI model?
Antworten
  • A. Layer 1
  • B. Layer 2
  • C. Layer 3
  • D. Layer 4

Frage 27

Frage
Which of the following is a converged protocol that allows storage mounts over TCP, and which is frequently used as a lower-cost alternative to Fibre Channel?
Antworten
  • A. MPLS
  • B. SDN
  • C. VoIP
  • D. iSCSI

Frage 28

Frage
Chris is building an Ethernet network and knows that he needs to span a distance of more than 150 meters with his 1000BaseT network. What network technology should he use to help with this?
Antworten
  • A. Install a repeater or a concentrator before 100 meters.
  • B. Use Category 7 cable, which has better shielding for higher speeds.
  • C. Install a gateway to handle the distance.
  • D. Use STP cable to handle the longer distance at high speeds.

Frage 29

Frage
What protocol is the messaging traffic most likely to use based on the diagram?
Antworten
  • A. SLACK
  • B. HTTP
  • C. SMTP
  • D. HTTPS

Frage 30

Frage
What security concern does sending internal communications from A to B raise?
Antworten
  • A. The firewall does not protect system B.
  • B. System C can see the broadcast traffic from system A to B.
  • C. It is traveling via an unencrypted protocol.
  • D. Messaging does not provide nonrepudation.

Frage 31

Frage
How could Lauren’s company best address a desire for secure messaging for users of internal systems A and C?
Antworten
  • A. Use a third-party messaging service.
  • B. Implement and use a locally hosted service.
  • C. Use HTTPS.
  • D. Discontinue use of messaging and instead use email, which is more secure.

Frage 32

Frage
Which of the following drawbacks is a concern when multilayer protocols are allowed?
Antworten
  • A. A range of protocols may be used at higher layers.
  • B. Covert channels are allowed.
  • C. Filters cannot be bypassed.
  • D. Encryption can’t be incorporated at multiple layers.

Frage 33

Frage
What network topology is shown in the following image?
Antworten
  • A. A ring
  • B. A star
  • C. A bus
  • D. A mesh

Frage 34

Frage
Chris uses a cellular hot spot (modem) to provide internet access when he is traveling. If he leaves the hot spot connected to his PC while his PC is on his organization’s corporate network, what security issue might he cause?
Antworten
  • A. Traffic may not be routed properly, exposing sensitive data.
  • B. His system may act as a bridge from the internet to the local network.
  • C. His system may be a portal for a reflected DDoS attack.
  • D. Security administrators may not be able to determine his IP address if a security issue occurs.

Frage 35

Frage
In her role as an information security professional, Susan has been asked to identify areas where her organization’s wireless network may be accessible even though it isn’t intended to be. What should Susan do to determine where her organization’s wireless network is accessible?
Antworten
  • A. A site survey
  • B. Warwalking
  • C. Wardriving
  • D. A design map

Frage 36

Frage
The DARPA TCP/IP model’s Application layer matches up to what three OSI model layers?
Antworten
  • A. Application, Presentation, and Transport.
  • B. Presentation, Session, and Transport.
  • C. Application, Presentation, and Session.
  • D. There is not a direct match. The TCP model was created before the OSI model.

Frage 37

Frage
One of Susan’s attacks during a penetration test involves inserting false ARP data into a system’s ARP cache. When the system attempts to send traffic to the address it believes belongs to a legitimate system, it will instead send that traffic to a system she controls. What is this attack called?
Antworten
  • A. RARP flooding
  • B. ARP cache poisoning
  • C. A denial of ARP attack
  • D. ARP buffer blasting

Frage 38

Frage
Sue modifies her MAC address to one that is allowed on a network that uses MAC filtering to provide security. What is the technique Sue used, and what nonsecurity issue could her actions cause?
Antworten
  • A. Broadcast domain exploit, address conflict
  • B. Spoofing, token loss
  • C. Spoofing, address conflict
  • D. Sham EUI creation, token loss

Frage 39

Frage
Jim’s audit of a large organization’s traditional PBX showed that Direct Inward System Access (DISA) was being abused by third parties. What issue is most likely to lead to this problem?
Antworten
  • A. The PBX was not fully patched.
  • B. The dial-in modem lines use unpublished numbers.
  • C. DISA is set up to only allow local calls.
  • D. One or more users’ access codes have been compromised.

Frage 40

Frage
SMTP, HTTP, and SNMP all occur at what layer of the OSI model?
Antworten
  • A. Layer 4
  • B. Layer 5
  • C. Layer 6
  • D. Layer 7

Frage 41

Frage
Lauren uses the ping utility to check whether a remote system is up as part of a penetration testing exercise. If she does not want to see her own ping packets, what protocol should she filter out from her packet sniffer’s logs?
Antworten
  • A. UDP
  • B. TCP
  • C. IP
  • D. ICMP

Frage 42

Frage
Lauren wants to provide port-based authentication on her network to ensure that clients must authenticate before using the network. What technology is an appropriate solution for this requirement?
Antworten
  • A. 802.11a
  • B. 802.3
  • C. 802.15.1
  • D. 802.1x

Frage 43

Frage
Ben has deployed a 1000BaseT 1 gigabit network and needs to run a cable to another building. If Ben is running his link directly from a switch to another switch in that building, what is the maximum distance Ben can cover according to the 1000BaseT specification?
Antworten
  • A. 2 kilometers
  • B. 500 meters
  • C. 185 meters
  • D. 100 meters

Frage 44

Frage
Jim is building the network for a remote site that only has ISDN as an option for connectivity. What type of ISDN should he look for to get the maximum speed possible?
Antworten
  • A. BRI
  • B. BPRI
  • C. PRI
  • D. D channel

Frage 45

Frage
SPIT attacks target what technology?
Antworten
  • A. Virtualization platforms
  • B. Web services
  • C. VoIP systems
  • D. Secure Process Internal Transfers

Frage 46

Frage
What does a bluesnarfing attack target?
Antworten
  • A. Data on IBM systems
  • B. An outbound phone call via Bluetooth
  • C. 802.11b networks
  • D. Data from a Bluetooth-enabled device

Frage 47

Frage
Which of the following options includes standards or protocols that exist in layer 6 of the OSI model?
Antworten
  • A. NFS, SQL, and RPC
  • B. TCP, UDP, and TLS
  • C. JPEG, ASCII, and MIDI
  • D. HTTP, FTP, and SMTP

Frage 48

Frage
What network topology is shown here?
Antworten
  • A. A ring
  • B. A bus
  • C. A star
  • D. A mesh

Frage 49

Frage
There are four common VPN protocols. Which group listed contains all of the common VPN protocols?
Antworten
  • A. PPTP, LTP, L2TP, IPsec
  • B. PPP, L2TP, IPsec, VNC
  • C. PPTP, L2F, L2TP, IPsec
  • D. PPTP, L2TP, IPsec, SPAP

Frage 50

Frage
What network technology is best described as a token-passing network that uses a pair of rings with traffic flowing in opposite directions?
Antworten
  • A. A ring topology
  • B. Token Ring
  • C. FDDI
  • D. SONET
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Sozialpsychologie
jtefert
Haftpflichtversicherungen
Christine Zehnder
Unfallversicherung
Christine Zehnder
Einführung in die Forschungsmethoden Kompakt
Angelina Idt
GPSY ALPS
Simon Wirsching
Prüfungsfragen Katalog : Berufs-, Gesetzes- und Staatskunde (Fertig)
Katharina Schöps
WIRK III
luis r
Korre - mögliche Fragen
Anna c.
BM13 Swertz 2018 Quiz 1
Daniel Martinovic
Vetie-Chirurgie 2017
Ju Pi