B.2.3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Match the Class of Service (CoS) priority on the left with its corresponding value on the right.

0 - Background 1 - Best effort 2 - Excellent effort 3 - Critical applications 4 - Video (< 100ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control

Which of the following strategies can protect you from a rainbow table password attack?

Add random bits to the password before hashing takes place.

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Bastion

When designing a firewall, what is the recommended approach for opening and closing ports?

Close all ports. Open only those ports required by applications inside the screened subnet.

B.2.5 You are a network technician for a small consulting firm. Many users have reported issues with accessing the network. After some initial troubleshooting, you discover that devices are not receiving their IP configurations. You look into the issue and discover that the network is being targeted by a denial-of-service attack.

DHCP starvation attack

Which of the following are characteristics of a circuit-level gateway? (Select two.)

Filters based on sessions Stateful

Jessica needs to set up a firewall to protect her internal network from the internet. Which of the following would be the BEST type of firewall for her to use?

Hardware

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works.

Identify the results and side effects of the solution.

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:

Incorrect subnet mask

You're troubleshooting an IP addressing issue, and you issue a command to view the system's TCP/IP configuration. The command you use produces the following output:

Linux

Which of the following do switches and wireless access points use to control access through a device?

MAC address filtering

Which of the following is a feature of MS-CHAPv2 that is not included in CHAP?

Mutual authentication

Which of the following scenarios would benefit the most from a UTM device?

Offices where space limits don't allow for multiple security appliances.

What is the primary difference between impersonation and masquerading?

One is more active, and the other is more passive.

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?

Port scanner

Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the following main intrusion detection and prevention goals? (Select two.)

Reveals information about an attacker's methods and gathers evidence for identification or prosecution purposes. Offers attackers a target that occupies their time and attention while distracting them from valid resources.

Which of the following is undetectable software that allows administrator-level access?

Rootkit

Which of the following are true about routed firewalls? (Select two.)

Supports multiple interfaces. Counts as a router hop.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the MOST likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point.

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults.

There are overlapping channels.

Which device combines multiple security features, such as anti-spam, load-balancing, and antivirus, into a single network appliance?

Unified Threat Management (UTM)

You're troubleshooting a connectivity problem where one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame.

Use a cable tester to test the cable between the computer system and the network switch.

You've just been hired as a network administrator. A user has just changed offices and needs you to activate the network and telephone connections in their office. However, the wiring at the punchdown block is labeled poorly, and you're unable to tell which wires go to the user's office.

Use a tone generator to locate the correct wiring.

Your company is a small startup that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access.

VLAN

What is the main difference between vulnerability scanning and penetration testing?

Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management.

Which type of data will be transmitted on the network? Is the size of the business expected to grow in the future? How many devices will need to be supported?

In which of the following situations would you MOST likely implement a screened subnet?

You want to protect a public web server from attack

Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3Internet Address Physical Address Type192.168.1.23 00-d1-b6-b7-c2-af dynamic

arp

You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server system. The system is operating satisfactorily and is able to communicate with other systems on the local network. However it is unable to access any systems on other segments of the corporate network.

ipconfig

Which TCP/IP utility gives you the following output?

netstat -a

Which TCP/IP utility gives you the following output?

netstat -r

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet.

[email protected]


संबंधित स्टडी सेट्स

Chapter 48: Assessment and Care of Patients with Ear and Hearing Problems

View Set

A Separate Peace: Ch. 1-2 questions

View Set

Conceptual questions from Chapter 8

View Set

Psych 401 Chapter 9- Industrial Organizational Psychology

View Set

Biology Lab Quiz 1: Cell Diversity

View Set