Practice Exam B

Card Set Information

Author:
a2k2d2
ID:
245883
Filename:
Practice Exam B
Updated:
2013-11-08 15:25:31
Tags:
Practice Exam
Folders:

Description:
Practice Exam B
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user a2k2d2 on FreezingBlue Flashcards. What would you like to do?


  1. A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network.
    Which of the following protocols needs to be denied?

    A. TCP
    B. ICMP
    C. ARP
    D. SMTP
    B. ICMP
    (this multiple choice question has been scrambled)
  2. A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access
    Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?

    A. Implicit deny
    B. HTTP transports over UDP
    C. Website is down
    D. DNS server failure
    A. Implicit deny
    (this multiple choice question has been scrambled)
  3. The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?

    A. 66 block
    B. VPN
    C. Smart jack
    D. MDF
    D. MDF
    (this multiple choice question has been scrambled)
  4. A recent flood in the office caused a lot of equipment to be damaged and the manager of the IT department would like a way to prevent such an incident in the future. Which of the following is the BEST way to mitigate such an equipment failure?

    A. Reduce the power input on the replacement servers.
    B. Cover the servers with plastic tarps.
    C. Purchase twice as many servers to create high availability clusters.
    D. Transfer the replacement servers offsite to a data center.
    D. Transfer the replacement servers offsite to a data center.
    (this multiple choice question has been scrambled)
  5. Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?

    A. DMZ
    B. Evil twin
    C. Honeypot
    D. Honeynet
    C. Honeypot
    (this multiple choice question has been scrambled)
  6. Which of the following is the FASTEST Ethernet technology?

    A. 10BaseT
    B. 1000BaseT
    C. 10GBaseSR
    D. 100BaseFX
    C. 10GBaseSR
    (this multiple choice question has been scrambled)
  7. A Chief Executive Officer (CEO) decided that only a limited number of authorized company workstations will be able to connect to the
    Internet. Which of the following would BEST accomplish this goal?

    A. Enable MAC address filtering
    B. Use content filtering
    C. Install and configure IDS
    D. Enable RAS on the network firewall
    A. Enable MAC address filtering
    (this multiple choice question has been scrambled)
  8. Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

    A. IP filtering
    B. MAC filtering
    C. Content filtering
    D. Port filtering
    D. Port filtering
    (this multiple choice question has been scrambled)
  9. Companies trying to cut down on constant documentation of IP addresses could use which of the following?

    A. More reservations
    B. Longer lease times
    C. Dynamic IP addressing
    D. Larger scopes
    C. Dynamic IP addressing
    (this multiple choice question has been scrambled)
  10. Multiple computers are connected to a hub near a wall plate. In order to get to the computers, students step on and around the cable that connects the teacher's station, a few feet away, to the same hub. The teacher
    is experiencing no network connectivity. Which of the following is MOST likely the problem?

    A. Cross-talk
    B. Distance
    C. Split cables
    D. EMI
    C. Split cables
    (this multiple choice question has been scrambled)
  11. A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?

    A. route
    B. ipconfig
    C. arp
    D. tracert
    B. ipconfig
    (this multiple choice question has been scrambled)
  12. In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

    A. ping
    B. NMAP
    C. nslookup
    D. tracert
    D. tracert
    (this multiple choice question has been scrambled)
  13. A network administrator suspects that recent traffic problems could be caused by a high CPU load on company routers. Which of the
    following would BEST be used to monitor CPU cycles on the routers?

    A. TACACS+
    B. Syslog
    C. SNMP
    D. DOCSIS
    C. SNMP
    (this multiple choice question has been scrambled)
  14. Which of the following network topologies describes a network where each node is connected to every other node?

    A. Ring
    B. Mesh
    C. Bus
    D. Star
    B. Mesh
    (this multiple choice question has been scrambled)
  15. Which of the following DHCP properties defines the size of the pool of available IP addresses?

    A. Reservations
    B. Scope
    C. Leases
    D. Options
    B. Scope
    (this multiple choice question has been scrambled)
  16. Which of the following supports faster wireless broadband speeds?

    A. OC-3
    B. WiMAX
    C. ISDN
    D. Satellite
    B. WiMAX
    (this multiple choice question has been scrambled)
  17. A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

    A. Port security on the Ethernet switch has disabled the port.
    B. Firewall needs to be updated for the new NAS device.
    C. The network cable connecting the NAS to the network switch is bad.
    D. The network port that the appliance is connected to is assigned to the wrong VLAN.
    A. Port security on the Ethernet switch has disabled the port.
    (this multiple choice question has been scrambled)
  18. A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?

    A. EAP-TTLS
    B. MS-CHAPv2
    C. MAC ACL
    D. EAP-PEAP
    A. EAP-TTLS
    (this multiple choice question has been scrambled)
  19. A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

    A. WPA2
    B. VPN
    C. WPA
    D. WEP
    D. WEP
    (this multiple choice question has been scrambled)
  20. Which of the following protocols works at the LOWEST layer of the OSI model?

    A. ISAKMP
    B. L2TP
    C. IPSec
    D. PPTP
    B. L2TP
    (this multiple choice question has been scrambled)
  21. A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?

    A. Signal strength
    B. TX/RX channel
    C. Transmission power
    D. WAP placement
    D. WAP placement
    (this multiple choice question has been scrambled)
  22. A network administrator needs to implement a monitoring tool to send log information to a server and receive log information from other clients. Which should be implemented (Select TWO).

    A. SNMP
    B. Network sniffer
    C. Syslog
    D. System log
    E. History log
    • C. Syslog
    • D. System log
  23. Which of the following network appliances will only detect and not prevent malicious network activity?

    A. IDS
    B. IPS
    C. Firewall
    D. Network sniffer
    A. IDS
    (this multiple choice question has been scrambled)
  24. Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this?

    A. MAC filtering
    B. SSID broadcast disable
    C. Decreasing radio strength
    D. WEP encryption
    C. Decreasing radio strength
    (this multiple choice question has been scrambled)
  25. A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of
    application?

    A. Network maps
    B. Traffic analysis
    C. Syslog
    D. ICMP
    B. Traffic analysis
    (this multiple choice question has been scrambled)
  26. An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection?

    A. RTP
    B. RDP
    C. RIP
    D. RAS
    B. RDP
    (this multiple choice question has been scrambled)
  27. A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue?

    A. SNMP
    B. SNAT
    C. SNTP
    D. SMTP
    A. SNMP
    (this multiple choice question has been scrambled)
  28. Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe?

    A. Syslog
    B. SNMP
    C. Network sniffer
    D. Web server
    C. Network sniffer
    (this multiple choice question has been scrambled)
  29. When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network?

    A. nbstat
    B. arp
    C. ping
    D. msconfig
    A. nbstat
    (this multiple choice question has been scrambled)
  30. Which of the following WAN technologies has the HIGHEST latency?

    A. Satellite
    B. WiMAX
    C. LTE
    D. ADSL
    A. Satellite
    (this multiple choice question has been scrambled)
  31. Which of the following connectors are MOST commonly used on a POTS line?

    A. MTRJ
    B. RJ-11
    C. DB-9
    D. RJ-45
    B. RJ-11
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview