Tyler Hampton
Quiz by , created more than 1 year ago

Given a scenario, use secure network administration principles.

20
0
0
Tyler Hampton
Created by Tyler Hampton over 6 years ago
Close

S+ Objective 1.2 Quiz

Question 1 of 8

1

Which of the following is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks?

Select one of the following:

  • MAC filter

  • Flood Guard

  • MAC limiter

  • Security posture

Explanation

Question 2 of 8

1

A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?

Select one of the following:

  • ACLs provide individual access control to resources

  • ACLs aren't used in today's systems

  • The ACL process is dynamic in nature

  • ACLs are used to authenticate users

Explanation

Question 3 of 8

1

A network technician incorrectly wired connections between switches in your organization's network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. What should be done to prevent this in the future?

Select one of the following:

  • Install an IDS

  • Only use layer 2 switches

  • Install SNMP on the switches

  • Implement STP or RSTP

Explanation

Question 4 of 8

1

Your organization frequently has guests visiting in various conference rooms throughout the bubilding. These guests need access to the Internet via wall jacks, but should not be able to access internal network resources. Employees need to access to both the internal network and the Internet. What would BEST meet this need?

Select one of the following:

  • PAT and NAT

  • DMZ and VPN

  • VLANs and 802.1x

  • Routers and Layer 3 Switches

Explanation

Question 5 of 8

1

What would you configure on a Layer 3 device to allow FTP traffic to pass through?

Select one of the following:

  • Firewall

  • Implicit Deny

  • Port Security

  • Access Control List

Explanation

Question 6 of 8

1

What type of device would have the following entries used to define its operation?
permit IP any any eq 80
permit IP any any eq 443
deny IP any any

Select one of the following:

  • Layer 2 switch

  • Firewall

  • Access Control List

  • Proxy Server

Explanation

Question 7 of 8

1

Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. Which of the following is the MOST likely cause for this problem?

Select one of the following:

  • The RADIUS server certificate expired

  • DNS is providing incorrect host names

  • DHCP is issuing duplicate IP addresses

  • MAC filtering is enabled.

Explanation

Question 8 of 8

1

What would administrators typically place at the end of an ACL of a firewall?

Select one of the following:

  • Allow all all

  • Timestamp

  • Password

  • Implicit Deny

Explanation