S+ Objective 1.2 Quiz

Description

Given a scenario, use secure network administration principles.
Tyler Hampton
Quiz by Tyler Hampton, updated more than 1 year ago
Tyler Hampton
Created by Tyler Hampton over 6 years ago
20
0

Resource summary

Question 1

Question
Which of the following is a protection feature built into many firewalls that allows the administrator to tweak the tolerance for unanswered login attacks?
Answer
  • MAC filter
  • Flood Guard
  • MAC limiter
  • Security posture

Question 2

Question
A newly hired junior administrator will assume your position temporarily while you attend a conference. You're trying to explain the basics of security to her in as short a period of time as possible. Which of the following best describes an ACL?
Answer
  • ACLs provide individual access control to resources
  • ACLs aren't used in today's systems
  • The ACL process is dynamic in nature
  • ACLs are used to authenticate users

Question 3

Question
A network technician incorrectly wired connections between switches in your organization's network. It effectively disabled the switch as though it was a victim of a denial-of-service attack. What should be done to prevent this in the future?
Answer
  • Install an IDS
  • Only use layer 2 switches
  • Install SNMP on the switches
  • Implement STP or RSTP

Question 4

Question
Your organization frequently has guests visiting in various conference rooms throughout the bubilding. These guests need access to the Internet via wall jacks, but should not be able to access internal network resources. Employees need to access to both the internal network and the Internet. What would BEST meet this need?
Answer
  • PAT and NAT
  • DMZ and VPN
  • VLANs and 802.1x
  • Routers and Layer 3 Switches

Question 5

Question
What would you configure on a Layer 3 device to allow FTP traffic to pass through?
Answer
  • Firewall
  • Implicit Deny
  • Port Security
  • Access Control List

Question 6

Question
What type of device would have the following entries used to define its operation? permit IP any any eq 80 permit IP any any eq 443 deny IP any any
Answer
  • Layer 2 switch
  • Firewall
  • Access Control List
  • Proxy Server

Question 7

Question
Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. Which of the following is the MOST likely cause for this problem?
Answer
  • The RADIUS server certificate expired
  • DNS is providing incorrect host names
  • DHCP is issuing duplicate IP addresses
  • MAC filtering is enabled.

Question 8

Question
What would administrators typically place at the end of an ACL of a firewall?
Answer
  • Allow all all
  • Timestamp
  • Password
  • Implicit Deny
Show full summary Hide full summary

Similar

S+ Objective 1.4 Quiz
Tyler Hampton
S+ Objective 1.1 Quiz
Tyler Hampton
S+ Objective 1.4 Protocol Definitions Flashcards
Tyler Hampton
Security+ High Availability Percentages
Lyndsay Badding
Security+ Cryptography
Lyndsay Badding
S+ Objective 2.1 Risk Calculation Flashcards
Tyler Hampton
S+ Objective 5.1 Authentication Services Flashcards
Tyler Hampton
S+ Obj 3.2 Cyber Attacks Flashcards
Tyler Hampton
S+ Objective 5.1 Authentication Services Visualization
Tyler Hampton
S+ Objective 1.1 Network Technologies Flashcards
Tyler Hampton
S+ Objective 1.1 Network Devices Flashcards
Tyler Hampton