SLOA5 Final Review
A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ASCII output only. Which of the following tcpdump options will achieve this output?
-SX port 443
Which Class of Service (CoS) priority value should be assigned to a video conference call?
4
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standard works best in this situation?
802.11n
Which deviation in power is the longest?
A blackout
You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You're sure that your laptop's wireless adapter works because you use a wireless connection at work. What is the MOST likely cause of the problem?
A mismatched SSID
Which of the following is the strongest form of multi-factor authentication?
A password, a biometric scan, and a token device
Which of the following should you include in your site survey kit?
A tall ladder
Which of the following is an example of two-factor authentication?
A token device and PIN
You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the name of the company requesting payment?
ACME, Inc
Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software?
An application-specific integrated circuit
Which of the following uses a 2.4 GHz ISM band, has fast transmission rates, and has been used for applications like geocaching and health monitors?
Ant+
You are using a protocol analyzer to capture network traffic. You want to only capture the frames coming from a specific IP address. Which of the following can you use to simplify this process?
Capture filters
Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal?
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this?
Content Switch
A user reports that she can't connect to the internet. After some investigation, you find that the wireless router has been misconfigured. You're responsible for managing and maintaining the wireless access point. What should you do next?
Create an action plan
Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next?
Determine if escalation is needed
A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?
Determine what has changed.
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
Disable SSID broadcast
You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client?
EAP
Which EAP implementation is MOST secure?
EAP-TLS
Which of the following conditions can low humidity result in?
Electrostatic discharge
Which of the following features are supplied by WPA2 on a wireless network?
Encryption
You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy?
Establish the symptoms
A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement?
Ethernet bonding
You maintain the network for an industrial manufacturing company. A short-circuit of a switch in the server room starts an electrical fire. Which of the following should you use to suppress the fire?
Halon or CO2
Most equipment is cooled by bringing cold air in the front and ducting the heat out the back. What is the term for where heat is sent?
Hot aisle
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?
Identify possible side effects of the solution.
A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?
Identify the affected areas of the network.
A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?
Identify the results and side effects of the solution.
The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do?
Implement a captive portal.
Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of your facility's unique construction, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?
Implement antenna diversity
Which of the following do switches and wireless access points use to control access through a device?
MAC address filtering
Which of the following does an SNR higher than 1:1 indicate?
More signal than noise
Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?
Multilayer switch
Which of the following is a feature of MS-CHAPv2 that is not included in CHAP?
Mutual authentication
You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task?
Network segmentation
Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environmental monitoring device within the rack. Currently, the device shows that the temperature within the rack is 70 degrees Fahrenheit (21 degrees Celsius). What should you do?
Nothing, the temperature within the rack is within acceptable limits.
You're setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern?
Omni-directional
You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process?
On a RADIUS server
You need to place a wireless access point in your two-story building while avoiding interference. Which of the following is the best location for the access point?
On the top floor
With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 filter?
Only packets with 192.168.0.34 in either the source or destination address are captured.
Which of the following is a mechanism for granting and validating certificates?
PKI
You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic by protocol. Which tool should you use?
Packet sniffer
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
Place access points above where most clients are.
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that's connected to a hub with three other computers. The hub is connected to a switch that's connected to the router. When you run the software, you see frames addressed to the four workstations but not to the router. Which feature should you configure on the switch?
Port mirroring
You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?
Port scanner
You want to identify the traffic that is generated and sent through a network by a specific application on a device. Which tool should you use?
Protocol analyzer
Which of the following is a platform-independent authentication system that maintains a database of user accounts and passwords to centralize the maintenance of those accounts?
RADIUS
You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with it. Which of the following strategies could you try to increase signal strength?
Replace the omni-directional antenna with a directional antenna.
Your company security policy states that wireless networks are not to be used because of the potential security risk they present. One day you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?
Rogue access point
You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network, and you've come to the conclusion that you must manually configure the wireless access point (WAP). Which of the following values uniquely identifies the WAP?
SSID
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?
Test the solution
A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem?
The client system has moved too far away from the access point.
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the MOST likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point.
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults. Which of the following might you suspect is the cause of the connectivity problems?
There are overlapping channels
With Kerberos authentication, which of the following terms describes the token that verifies the user's identity to the target system?
Ticket
Which of the following ensures that power is supplied to a server or device during short power outages?
Uninterruptible power supply
Which of the following wireless security methods uses a common shared key that's configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
Which of the following provides security for wireless networks?
WPA
Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?
Z-Wave
Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?
arp
You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
ifconfig
Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output?
netstat
Which TCP/IP utility gives you the following output?
netstat -a
Which TCP/IP utility gives the following output?
ping
While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network?
traceroute