INFO 385 - Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Your Cisco router has three network interfaces configured. -S0/1/0 is a WAN interface that is connected to an ISP. -F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. -F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.2.0/24. You have configured an access control list on this router using the following rules: -deny ip 192.168.1.0 0.0.0.255 any -deny ip 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?

Add a permit statement to the bottom of the access list.

You have a network that's connected using a physical star topology. One of the drop cables connecting a workstation has been removed. Which of the following BEST describes the effect that this will have on network communications?

All devices except the device connected with the drop cable will be able to communicate.

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network?

All network nodes EXCEPT the printer will be available.

Which of the following describes how access control lists can improve network security?

An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Which of the following is true about an intrusion detection system?

An intrusion detection system monitors data packets for malicious or unauthorized traffic

You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the internet. The ISP's cable modem has only one RJ45 port. You need to set up the network within the following parameters: -Spend as little money as possible -Do not purchase unnecessary equipment -Computers need to have a gigabit connection to the network -New devices should not require management or configuration. You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs. What should you purchase?

An unmanaged switch and CAT 5e cabling

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have any difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. Which of the following might you suspect as the problem?

Failed patch cable between the client system and the wall jack.

Which IDS traffic assessment indicates that the system identified harmless traffic as offensive and generated an alarm or stopped the traffic?

False positive

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collision?

Faulty network card

Which type of cabling do Ethernet 100BaseFX networks use?

Fiber optic

Which of the following chains is used for incoming connections that aren't delivered locally?

Forward

Which of the following is a device that can send and receive data simultaneously?

Full-duplex

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.

Host-based IDS

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-bases attacks. What solution should you use?

Host-based firewall

You're concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack if possible. Which tool should you sue?

IPS

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

In-Band Management -Competes with normal network traffic for bandwidth. -Must be encrypted to protect communications from sniffing. -Affected by network outages. Out-of-band management -Uses a dedicated communication channel. -Does not compete with normal network traffic for bandwidth.

Which of the following is true about an unmanaged switch?

It can connect to all devices in a small area

Which of the following is true about an NIDS?

It detects malicious or unusual income and outgoing traffic in real time.

As a network administrator, you have 10 VLANs on your network that need to communicate with each other. Which of the following network devices is the BEST choice for allowing communication between 10 VLANs?

Layer 3 switch

On your network, you have a VLAN for the sales staff and a VLAN for the production staff. Both need to be able to communicate over the network. Which of the following devices would work BEST for communication between VLANs?

Layer 3 switch

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Managed Switch -Provides port security features -Supports VLANs -Can be configured over a network connection -Can be configured over a dedicated communication channel Unmanaged Switch -Commonly sold at retail stores -Provides very few configuration option

Which of the following BEST describes port aggregation?

Multiple ports linked together and used as a single logical port

Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6?

NDP

You have a network connected using a physical bus topology. One of the cables that connects a workstation to the bus breaks. Which of the following BEST describes what effect this will have on network communications?

No devices will be able to communicate.

You are configuring a switch so that you can manage it via PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch# config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 225.225.225.0 Will this configuration work?

No, the no shutdown command needs to be entered

Which of the following is required to establish a new network switch and configure its IP address for the first time?

Out-of-band management

Which of the following methods is best to have when a network goes down?

Out-of-band management

Which IDS type can alert you to trespassers?

PIDS

Which of the following is a firewall function?

Packet filtering

What do you need to configure on a firewall to allow traffic directed to the public resources on the screened subnet?

Packet filters

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen?

PoE++ Type 4

Your organization's management wants to monitor all the customer services calls. The calls are taken on VoIP phones. Which of the following configurations would BEST help you set up a way to monitor the calls?

Port mirroring

Which of the following switch features allows you to configure how the switch's MAC address table is filled?

Port security

Which of the following standards does a rollover cable typically use?

RS232 (Serial)

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?

Replace the network card in the user's computer

Based on the diagram, which type of proxy server is handling the client's request? (Can't paste a picture so this is roughly what it looks like) [Client Laptop] -------Client Request -------- > [Internet Cloud] --- [Proxy Server] -------Split into 3 ------- Server 1, Server 2, Server 3

Reverse proxy server

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tests. What type of cable would you most likely use?

Rollover

Which of the following connections would you use a straight-through cable for?

Router to a regular port on a switch

Which of the following uses access control lists (ACLs) to filter packets as a form of security?

Screened router

Which of the following can server as a buffer zone between a private, secured network and an untrusted network?

Screened subnet

Which of the following is another name for a firewall that performs router functions?

Screening router

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database?

Signature-based IDS

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature allows the switching loops and ensures that there is only a single active path between any two switches?

Spanning Tree

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch doesn't support auto-MDI. What type of cable should be used?

Straight-Through

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would BEST reduce the number of collisions and provide future growth?

Switch

In which type of device is a MAC address table stored?

Switch

Which of the following is a communication device that connects other network devices through cables and receives and forwards data to a specified destination within a LAN?

Switch

A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next?

The frame is replicated and sent to every active port on the switch except the source port.

Which of the following describes the worst possible action by an IDS?

The system identified harmful traffic as harmless and allowed it to pass without generating any alerts.

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

Which device combines multiple security features, such as anti-spam, load-balancing, and antivirus, into a single network appliance?

Unified Threat Management (UTM)

Which of the following combines several layers of security services and network functions into one piece of hardware?

Unified Threat Management (UTM)

You've just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Update the signature files

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use?

Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from the other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?

VLAN

Which of the following is the BEST solution to allow access to private resources from the internet?

VPN

For which of the following devices does a voice VLAN prioritize traffic?

VoIP phone

Which of the following is true about a firewall?

You must manually specific which traffic you want to allow through the firewall. Everything else is blocked.

In which of the following situations would you MOST likely implement a screened subnet?

You want to protect a public web server from attack

Which command would you use on a switch to enable management from a remote network?

ip default-gateway 192.168.10.185

Which IDS method defines a baseline of normal network traffic and then looks for anything that falls outside of that baseline?

Anomaly-based

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Bastion

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?

CSMA/CD

Which of the following does the sudo iptables -F command accomplish?

Clears all the current rules.

Which of the following is true about half-duplex mode?

Collision detection is turned on.

Computers A and B are on the same VLAN and are separated by two switches, as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following BESTS describes the composition of the frame as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B

What does the ip address dhcp command allow you to do?

Configure a switch to obtain an IP address from a DHCP server

You want to create a loopback plug using a single RJ45 connector. How should you connect the wires?

Connect pin 1 to pin 3 and pin 2 to pin 6

You want to create a rollover cable that has an RJ45 connector on both ends. how should you connect the wires within the connectors?

Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a switch

You need to connect two switches using their uplink ports. The switches do not support auto-MDI.What type of cable should be used?

Crossover

You need to transfer data from one laptop to another, and you would like to use an ethernet cable. You do not have a hub or a switch. What type of cable should you use?

Crossover

Which level of the OSI model does a Layer 2 switch operate at?

Data Link layer

Which of the following BEST describes a stateful inspection?

Determines the legitimacy of traffic based on the state of the connection from which the traffic originated.

You have a network that's connected using a full physical mesh topology. The link between Device A and Device B is broken. Which of the following BEST describes the effect that this will have on network communications?

Device A will be able to communicate with all other devices.

You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem?

Failed patch cable

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multimode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.)

-1000Base-SX -10GBase-SR

You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for this implementation? (Select two.)

-10GBaseLR standards -Single-mode fiber

Which of the following is true about reverse proxy? (Select two.)

-Can perform load balancing, authentication, and caching. -Handles requests from the internet to a server on a private network.

Which of the following are characteristics of a packet-filtering firewall? (Select two.)

-Filters IP address and port -Stateless

Which statements accurately descibe the port states of both bridges and switches? (Select two.)

-In the learning state, the MAC address table can be populated, but frames are not forwarded -Ports in a blocked state still receive BPDUs

Which options are you able to set on a firewall? (Select three.)

-Port Number -Packet Source Address -Packet Destination Address

You are managing a network and have used firewalls to create a screened subnet. You have a web server that internet users need to access. It must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

-Put the database server on the private network -Put the web server inside the screened subnet

You have used firewalls to create a screened subnet. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

-Put the web server inside the screened subnet -Put the database server on the private network

Which of the following connectors is typically used for the ends of a rollover cable?

-Serial -RJ45

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.)

-Single-mode fiber -1000BaseLX

Which of the following physical topologies are used with Ethernet networks? (Select two.)

-Star -Bus

Which of the following are true about routed firewalls? (Select two.)

-Supports multiple interfaces -Counts as a router hop

Which of the following are specific to extended Access control lists? (Select two.)

-Use the number ranges 100-199 and 2000-2699. -Are the most used type of ACL.

Your network follows the 100Base-TX specifications for Fast Ethernet. What is the maximum cable segment length allowed?

100 meters

Which Gigabit Ethernet standard uses multimode fiber optic cabling and supports network segments up to a maximum of 550 meters long?

1000Base-SX

Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single-mode fiber optic cable?

1000BaseLX

How many network interfaces does a dual-homed gateway typically have?

3

Your network follows the 100Base-FX specifications for Fast Ethernet and uses half-duplex multimode cable. What is the maximum cable segment length allowed?

412 meters

Which of the following is the open standard for tagging Layer 2 frames?

802.1q

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation?

9000

Which of the following BEST describes Ethernet flow control?

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

Your company has an internet connection. You also have a web server and an email server that you want to make available to your internet users, and you want to create a screened subnet for these two servers. Which of the following should you use?

A network-based firewall

Which of the following is true about a network-based firewall?

A network-based firewall is installed at the end of a private network or network segment

How does a proxy server differ from a packet filtering firewall?

A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.


संबंधित स्टडी सेट्स

Chapter 29: Vertebrate evolution and diversity

View Set

Chapter 24 Diuretic Therapy and Drugs for Renal Failure

View Set

Chapter 27: Disorders of the bladder and lower urinary tract

View Set

BA 352 Learning Objectives Exam 1

View Set

DNA and the Gene: Synthesis & Repair

View Set

Social Media Strategy - from A to Z

View Set

Developmental Psychology (Ch. 9)

View Set