Tyler Hampton
Quiz por , criado more than 1 year ago

Given a scenario, use secure network administration principles.

20
0
0
Tyler Hampton
Criado por Tyler Hampton mais de 6 anos atrás
Fechar

S+ Objective 1.2 Quiz

Questão 1 de 8

1

Which of the following is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks?

Selecione uma das seguintes:

  • MAC filter

  • Flood Guard

  • MAC limiter

  • Security posture

Explicação

Questão 2 de 8

1

A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?

Selecione uma das seguintes:

  • ACLs provide individual access control to resources

  • ACLs aren't used in today's systems

  • The ACL process is dynamic in nature

  • ACLs are used to authenticate users

Explicação

Questão 3 de 8

1

A network technician incorrectly wired connections between switches in your organization's network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. What should be done to prevent this in the future?

Selecione uma das seguintes:

  • Install an IDS

  • Only use layer 2 switches

  • Install SNMP on the switches

  • Implement STP or RSTP

Explicação

Questão 4 de 8

1

Your organization frequently has guests visiting in various conference rooms throughout the bubilding. These guests need access to the Internet via wall jacks, but should not be able to access internal network resources. Employees need to access to both the internal network and the Internet. What would BEST meet this need?

Selecione uma das seguintes:

  • PAT and NAT

  • DMZ and VPN

  • VLANs and 802.1x

  • Routers and Layer 3 Switches

Explicação

Questão 5 de 8

1

What would you configure on a Layer 3 device to allow FTP traffic to pass through?

Selecione uma das seguintes:

  • Firewall

  • Implicit Deny

  • Port Security

  • Access Control List

Explicação

Questão 6 de 8

1

What type of device would have the following entries used to define its operation?
permit IP any any eq 80
permit IP any any eq 443
deny IP any any

Selecione uma das seguintes:

  • Layer 2 switch

  • Firewall

  • Access Control List

  • Proxy Server

Explicação

Questão 7 de 8

1

Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. Which of the following is the MOST likely cause for this problem?

Selecione uma das seguintes:

  • The RADIUS server certificate expired

  • DNS is providing incorrect host names

  • DHCP is issuing duplicate IP addresses

  • MAC filtering is enabled.

Explicação

Questão 8 de 8

1

What would administrators typically place at the end of an ACL of a firewall?

Selecione uma das seguintes:

  • Allow all all

  • Timestamp

  • Password

  • Implicit Deny

Explicação