net+ 12.6.14
Rearrange: Network control Critical applications Background Best effort Excellent effort voice video
0 - Background 1 - Best effort 2 - Excellent effort 3 - Critical applications 4 - Video (< 100ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control
Which Class of Service (CoS) priority value should be assigned to a video conference call?
4
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network? Port mirroring MAC flooding MAC spoofing ARP poisoning
ARP poisoning
Which of the following attacks can also be used to perform denial of service (DoS) attacks? Answer MAC flooding ARP spoofing Null session Hijacking
ARP spoofing
Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? Answer A caching engine Ethernet bonding An application-specific integrated circuit A traffic shaper
ASIC
What is spoofing? Spying on private information or communications. Sending a victim unwanted and unrequested email messages. Changing or falsifying information in order to mislead or re-direct traffic. Capturing network packets in order to examine the contents.
Changing or falsifying information in order to mislead or re-direct traffic.
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this? Answer Circuit-level gateway Bandwidth shaper Content switch Proxy server
Content switch
You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client? Which of the following authentication protocols are you MOST likely to recommend to the client? MS-CHAP PPP EAP CHAP
EAP
Which of the following is the MOST effective protection against IP packet spoofing on a private network? Answer Ingress and egress filters Digital signatures Host-based IDS Antivirus scanners
Ingress and egress filters
Which of the following statements about DSCP are true? The network switch assigns priority values. It uses the DiffServ field to add precedence values. It uses a priority value between 0 and 7. Classification occurs at Layer 3. Classification occurs at Layer 2.
It uses the DiffServ field to add precedence values. Classification occurs at Layer 3.
Which of the following is a feature of MS-CHAPv2 that is not included in CHAP? Answer Hashed shared secret Three-way handshake Mutual authentication Certificate-based authentication
Mutual authentication
Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against? Answer Spoofing Hijacking Filtering Sniffing
Sniffing
Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic? Eliminate unnecessary system applications. Use intrusion detection countermeasures. Use encryption for all sensitive traffic. Implement acceptable use policies.
Use encryption for all sensitive traffic.
A priest saw two nuns doing pushups
application presentation session transport network data link physical
Which of the following is a mechanism for granting and validating certificates? Answer Kerberos AAA PKI RADIUS
public-key infrastructure (PKI)