net+ 12.6.14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Rearrange: Network control Critical applications Background Best effort Excellent effort voice video

0 - Background 1 - Best effort 2 - Excellent effort 3 - Critical applications 4 - Video (< 100ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control

Which Class of Service (CoS) priority value should be assigned to a video conference call?

4

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network? Port mirroring MAC flooding MAC spoofing ARP poisoning

ARP poisoning

Which of the following attacks can also be used to perform denial of service (DoS) attacks? Answer MAC flooding ARP spoofing Null session Hijacking

ARP spoofing

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? Answer A caching engine Ethernet bonding An application-specific integrated circuit A traffic shaper

ASIC

What is spoofing? Spying on private information or communications. Sending a victim unwanted and unrequested email messages. Changing or falsifying information in order to mislead or re-direct traffic. Capturing network packets in order to examine the contents.

Changing or falsifying information in order to mislead or re-direct traffic.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this? Answer Circuit-level gateway Bandwidth shaper Content switch Proxy server

Content switch

You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client? Which of the following authentication protocols are you MOST likely to recommend to the client? MS-CHAP PPP EAP CHAP

EAP

Which of the following is the MOST effective protection against IP packet spoofing on a private network? Answer Ingress and egress filters Digital signatures Host-based IDS Antivirus scanners

Ingress and egress filters

Which of the following statements about DSCP are true? The network switch assigns priority values. It uses the DiffServ field to add precedence values. It uses a priority value between 0 and 7. Classification occurs at Layer 3. Classification occurs at Layer 2.

It uses the DiffServ field to add precedence values. Classification occurs at Layer 3.

Which of the following is a feature of MS-CHAPv2 that is not included in CHAP? Answer Hashed shared secret Three-way handshake Mutual authentication Certificate-based authentication

Mutual authentication

Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against? Answer Spoofing Hijacking Filtering Sniffing

Sniffing

Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic? Eliminate unnecessary system applications. Use intrusion detection countermeasures. Use encryption for all sensitive traffic. Implement acceptable use policies.

Use encryption for all sensitive traffic.

A priest saw two nuns doing pushups

application presentation session transport network data link physical

Which of the following is a mechanism for granting and validating certificates? Answer Kerberos AAA PKI RADIUS

public-key infrastructure (PKI)


Set pelajaran terkait

Chapter 33: Assessment and Management of Patients with Allergic Disorders PrepU

View Set

A & P Lab Unit 9 Review: Axial Skeleton

View Set

Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations- ML4

View Set

Chapter 37: Assessment and Management of Patients with Allergic Disorders

View Set

Put the steps of the scientific method in order

View Set

HIM 111 Release of Information Fundamentals

View Set

Accounting Test 1 Prep (Part 2: Chapter 13)

View Set

Chapter 1: health and accident insurance

View Set

A&C I practice Integument Final Exam

View Set