Tyler Hampton
Test por , creado hace más de 1 año

Given a scenario, use secure network administration principles.

20
0
0
Tyler Hampton
Creado por Tyler Hampton hace más de 6 años
Cerrar

S+ Objective 1.2 Quiz

Pregunta 1 de 8

1

Which of the following is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks?

Selecciona una de las siguientes respuestas posibles:

  • MAC filter

  • Flood Guard

  • MAC limiter

  • Security posture

Explicación

Pregunta 2 de 8

1

A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?

Selecciona una de las siguientes respuestas posibles:

  • ACLs provide individual access control to resources

  • ACLs aren't used in today's systems

  • The ACL process is dynamic in nature

  • ACLs are used to authenticate users

Explicación

Pregunta 3 de 8

1

A network technician incorrectly wired connections between switches in your organization's network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. What should be done to prevent this in the future?

Selecciona una de las siguientes respuestas posibles:

  • Install an IDS

  • Only use layer 2 switches

  • Install SNMP on the switches

  • Implement STP or RSTP

Explicación

Pregunta 4 de 8

1

Your organization frequently has guests visiting in various conference rooms throughout the bubilding. These guests need access to the Internet via wall jacks, but should not be able to access internal network resources. Employees need to access to both the internal network and the Internet. What would BEST meet this need?

Selecciona una de las siguientes respuestas posibles:

  • PAT and NAT

  • DMZ and VPN

  • VLANs and 802.1x

  • Routers and Layer 3 Switches

Explicación

Pregunta 5 de 8

1

What would you configure on a Layer 3 device to allow FTP traffic to pass through?

Selecciona una de las siguientes respuestas posibles:

  • Firewall

  • Implicit Deny

  • Port Security

  • Access Control List

Explicación

Pregunta 6 de 8

1

What type of device would have the following entries used to define its operation?
permit IP any any eq 80
permit IP any any eq 443
deny IP any any

Selecciona una de las siguientes respuestas posibles:

  • Layer 2 switch

  • Firewall

  • Access Control List

  • Proxy Server

Explicación

Pregunta 7 de 8

1

Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. Which of the following is the MOST likely cause for this problem?

Selecciona una de las siguientes respuestas posibles:

  • The RADIUS server certificate expired

  • DNS is providing incorrect host names

  • DHCP is issuing duplicate IP addresses

  • MAC filtering is enabled.

Explicación

Pregunta 8 de 8

1

What would administrators typically place at the end of an ACL of a firewall?

Selecciona una de las siguientes respuestas posibles:

  • Allow all all

  • Timestamp

  • Password

  • Implicit Deny

Explicación