Neti 104 M6

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In this project, which command option prevents fragmentation of oversized packets?

-f

Your first ping request was assigned a TTL value of 232. What happens to this value each time the PDU passes its next hop?

Decreases by 1

Which type of attack misleads a user to connect to a malicious wireless access point? Evil Twin ARP Spoofing IP Spoofing Phishing MAC Spoofing

Evil Twin

Which Windows features did you have to enable to use the sandbox? Hyper-V Windows Sandbox Both of these

Windows Sandbox

A routing protocol's reliability and priority are rated by what measurement? a. Routing table b. Latency c. AD d. MTU

c. AD

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? a. RIPv2 b. OSPF c. BGP d. IP

c. BGP

What is the standard MTU size for Ethernet II PDUs without fragmentation? 1473 1492 1493 1500

1500

In which type of attack are the cache records manipulated for malicious purposes? [Choose all that apply] ARP Spoofing Ransomware attack DNS Poisoning Denial of Service attack Shoulder Surfing

ARP Spoofing DNS Poisoning

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios? a. Locking rack b. Smart locker c. Access control vestibule d. Locking cabinet

b. Smart locker

Which permission allows a user access to a resource? Password Authorization Username Authentication

Authentication

What specifications define the standards for cable broadband? a. FTTC b. PSTN c. HFC d. DOCSIS

DOCSIS

Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. PDoS attack b. FTP bounce c. DRDoS attack d. Ransomware

DRDoS attack

What type of attack relies on spoofing? a. Pen testing b. Tailgating c. Deauth attack d. Friendly DoS attack

Deauth attack

When a router can't determine a path to a message's destination, where does it send the message? a. Gateway of last resort b. Administrative distance c. Routing table d. Default gateway

Gateway of last resort

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. BYOD b. AUP c. NDA d. MDM

NDA

Which permission needs to be assigned to a user to be able to connect to a VPN connection? Local administrator permissions VPN permissions Network Access permissions Network Administrator permissions

Network Access permissions

Which OSI layer is responsible for directing data from one LAN to another? a. Transport layer b. Physical layer c. Network layer d. Data link layer

Network layer

What did you have to download to use Windows Sandbox the first time? Hyper-V Windows Sandbox Nothing A VMM

Nothing

Which of the following is considered a secure protocol? a. FTP b. Telnet c. HTTP d. SSH

SSH

Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas? Client-to-Site VPN RDP Site-to-Site VPN SSH

Site-to-Site VPN

What kind of device can monitor a connection at the demarc but cannot interpret data? a. DTE b. Smartjack c. CSU/DSU d. Line driver

Smartjack

In a _________ attack, the user is misled by a caller that he is a network technician gathering personal information from the user. DNS Poisoning Denial of Service attack Malware ARP Spoofing Social Engineering

Social Engineering

What kind of route is created when a network administrator configures a router to use a specific path between nodes? a. Trace route b. Static route c. Default route d. Dynamic route

Static route

What method does a GSM network use to separate data on a channel? a. TDMA b. CDMA c. SIM d. TDM

TDMA

In __________________ a malicious user gains physical access to restricted area of the network. On-path attack Shoulder surfing Phishing Tailgaiting

Tailgaiting

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? a. Logic bomb b. Worm c. Virus d. Ransomware

Logic bomb

To be able to remotely manage a Windows device securely, which of the following protocols can be used? RDP RDG SSH VPN

RDP

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? a. Security audit b. Posture assessment c. Exploit d. Data breach

Posture assessment

What is the purpose of Windows Sandbox? Protect host machine from malware Isolate sandbox from the host Create a limited virtual machine All of these

All of these

Which type of attack can be conducted to render a network device inaccessible? [Choose all that apply] Ransomware attack Man-in-the-middle attack Shoulder Surfing VLAN Hopping Denial of Service attack

Denial of Service attackRansomware attack

While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server? Direct Access and VPN (RAS) .Net Framework 4.5 Web Application Proxy Routing

Direct Access and VPN (RAS)

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? a. Vulnerability b. Denial of service c. Insider threat d. Principle of least privilege

Insider threat

Which of these cellular technologies offers the fastest speeds? a. CDMA b. LTE-A c. 4G-LTE d. GSM

LTE-A

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? a. Layer 3 b. Layer 4 c. Layer 2 d. Layer 5

Layer 3

Which program capable of downloading apps was available? Google Chrome Microsoft Edge Both of these Neither of these

Microsoft Edge


Ensembles d'études connexes

NUR190 Mental Health practice for test 1

View Set

Unit 2.01: Intrapersonal and Interpersonal skills

View Set

Medicare License Chapter 2 - Medicare Supplement Policies (Medigap)

View Set

Chapter 36 Gastrointestinal Disorders

View Set