Quiz Network+ 008

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A 48-bit Media Access Control (MAC) address is a unique number assigned to every network adapter. A network access method whereby the MAC address (a.k.a. physical address) of the Network Interface Card (NIC) is used to grant/deny network access is known as MAC filtering or MAC address filtering. A. True B. False

A

A command-line utility used for checking the reachability of a remote network host is called: A. ping B. tracert C. dig D. netstat

A

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as: A. ACL B. CSR C. DLP D. AUP

A

A type of technology that provides control over the usage of a mobile device within a designated area is known as: A. Geofencing B. Quarantine network C. RADIUS D. GPS tagging

A

Changing the native VLAN on all trunk ports to an unused VLAN ID is one of the countermeasures against VLAN hopping. A. True B. False

A

Control Plane Policing (CoPP) is a Cisco-proprietary security feature designed to protect routers and switches against reconnaissance and Denial-of-Service (DoS) attacks. A. True B. False

A

Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an unencrypted form (in cleartext). SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit (i.e. validation of data integrity). A. True B. False

A

The process of securing networking devices should include the practice of disabling unused physical ports. A. True B. False

A

What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings? A. ifconfig B. netstat C. nslookup D. ipconfig

A

Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening? A. -a B. -p C. -e D. -r

A

Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP? A. PSK B. 802.1X C. SAE D. TKIP

A

Which of the following factors are considered important for creating strong passwords? (Select 2 answers) A. Password length B. Minimum password age C. Password history D. Password complexity E. Maximum password age

A,D

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called: A. DHCP scope B. DHCP reservation C. DHCP snooping D. DHCP relay agent

C

According to the troubleshooting methodology, verification of full system functionality and implementation of applicable preventive measures should be performed as the: A. Next step after documenting findings, actions, and outcomes B. First step of the troubleshooting process C. Next step after implementing the solution D. Last step of the troubleshooting process

C

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: A. War chalking B. Tailgating C. War driving D. Shoulder surfing

C

In IPv6, a router periodically sends a special type of message to announce its presence on the network. A mechanism that allows to filter these messages (i.e. reject those that are labeled as unwanted or rogue) is known as: A. Root Guard B. Flood Guard C. RA Guard D. BPDU Guard

C

Private VLANs are created via: A. Port mirroring B. Port forwarding C. Port isolation D. Port aggregation

C

The arp command can be used to perform what kind of resolution? A. IP to FQDN B. MAC to IP C. IP to MAC D. FQDN to IP

C

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings? A. ifconfig B. nslookup C. ipconfig D. netstat

C

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network? A. -a B. -n C. -b D. -p

C

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a

C

Which of the following answers refers to a security solution that allows administrators to block network access for users until they perform required action? A. Honeypot B. Quarantine network C. Captive portal D. Firewall

C

Which of the following command-line utilities provides unencrypted access to a command-line interface on a remote host? A. rdp B. vnc C. telnet D. ssh

C

Which of the following commands displays the name of the current computer a user is connected to? A. host B. hosts C. hostname D. localhost

C

Which of the following passwords is the most complex? A. YzGdL3tU8wx B. T$7C52WL4S9@W0 C. G$L3tU8wY@z D. @TxBL$nW@Xt*a#

C

Which step of the troubleshooting process involves reestablishing a new theory or escalating the problem? A. Identifying the problem B. Establishing a theory of probable cause C. Testing the theory to determine the cause D. Establishing a plan of action to resolve the problem

C

A strong password that meets the password complexity requirement should contain: (Select the best answer) A. Lowercase letters (a-z) B. Non-alphanumeric characters if permitted (e.g. !, @, #, $) C. Digits (0-9) D. Uppercase letters (A-Z) E. A combination of characters from at least 3 character groups

E

In the context of implementing secure network designs, the term "Port security" may apply to: A. Disabling physical ports on a device (e.g. RJ-45 device ports on a router, switch, or patch panel) B. Implementing MAC address filtering C. Disabling unused logical ports (TCP/UDP) D. Implementing Port-based Network Access Control (defined in the IEEE 802.1X standard) E. All of the above ( Your answer)

E

In the troubleshooting methodology, the process of establishing a theory of probable problem cause does not involve: A. Top-to-bottom OSI layer approach B. Applying multiple approaches to the problem C. Verifying the most common issues (Questioning the obvious) D. Bottom-to-top OSI layer approach E. Asking for assistance (Escalating)

E

Which of the following actions would be of help in the process of web server hardening? A. Removing server version banner B. Disabling unnecessary ports, services, and accounts C. Keeping the system up to date via updates and patches D. Enabling and monitoring logs E. Permissions audits F. All of the above

F

Which of the following actions allow(s) to improve the security of a SOHO router? A. Changing default admin credentials B. Implementing MAC address filtering C. Blocking unwanted traffic via firewall settings D. Disabling unused physical ports E. Implementing content filtering F. Performing firmware updates G. Implementing physical security controls (e.g. a door lock) H. All of the above

H

A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as: A. nbtstat B. traceroute C. netstat D. tracert

B

In the troubleshooting methodology, establishing a theory of probable cause should come as the: A. First step of the troubleshooting process B. Second step of the troubleshooting process C. Third step of the troubleshooting process D. Fourth step of the troubleshooting process

B

Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve: A. Verifying full system functionality B. Testing the theory to determine the problem cause C. Implementing the solution D. Establishing a plan of action to resolve the problem

B

The ip command in Linux is the preferred replacement for: A. netstat B. ifconfig C. nsloookup D. ipconfig

B

The last step of the troubleshooting process should involve: A. Implementing preventive measures B. Documenting findings, actions, outcomes, and conclusions C. Implementing the solution D. Verifying full system functionality E. Identifying potential effects of the implemented solution

B

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? A. tracert -d B. arp -a C. netstat -n D. route print

B

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)? A. -S srcaddr B. /all C. -i address D. eth_addr

B

Which of the following answers refers to a dedicated security mechanism that prevents ARP attacks? A. SIEM B. DAI C. UTM D. NGFW

B

Which of the following command-line tools is used for discovering hosts and services on a network? A. tracert B. nmap C. netcat D. tcpdump

B

Which of the following policies applies to any requests that fall outside the criteria defined in an ACL? A. Fair access policy B. Implicit deny policy C. Transitive trust D. Context-aware authentication

B

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? A. Protocol analyzer B. WAP power level controls C. Logical network diagram D. Network mapper

B

Which of the network software tools listed below allows for obtaining a domain name to IP address mapping? A. netstat B. nslookup C. tracert D. pathping

B

In the troubleshooting methodology, a solution to the problem should be implemented: (Select 2 answers) A. Before escalating the problem B. After establishing a plan of action and identifying potential effects of the implemented solution C. Before verifying full system functionality and implementing preventive measures D. After verifying full system functionality and implementing preventive measures E. Before reestablishing a new theory if the current theory has not been confirmed F. After documenting findings, actions, outcomes, and conclusions

B,C

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) A. ifconfig eth0 down B. ipconfig /release C. ifconfig eth0 up D. ipconfig /renew

B,D

The last step of the troubleshooting process should come as the next consecutive step after: (Select 2 answers) A. Implementing the solution B. Verifying full system functionality C. Identifying potential effects of the implemented solution D. Documenting findings, actions, outcomes, and conclusions E. Implementing preventive measures

B,E

Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers) A. netstat -p B. route print C. netstat -a D. print route E. netstat -r

B,E

Which specific actions are not be performed in the first step of the troubleshooting process? (Select 2 answers) A. Gathering information B. Establishing a plan of action to resolve the problem C. Questioning users D. Identifying symptoms E. Determining recent changes F. Establishing a theory of probable cause G. Duplicating the problem

B,F

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers) A. ARP poisoning B. On-path attack C. MAC spoofing D. Replay attack E. MAC cloning

C,E

Once a plan of action to resolve a problem has been established, the next step in the troubleshooting process should involve: (Select 2 answers) A. Conducting research based on symptoms B. Testing the theory to determine problem cause C. Implementing the solution D. Establishing a theory of probable cause of the problem E. Asking for assistance as necessary (Escalating)

C,E

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called: A. ping B. traceroute C. nslookup D. tracert

D

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? A. CRL B. NAT C. BCP D. ACL

D

Which of the following answers refers to a command-line packet capturing utility? A. netcat B. tcpreplay C. nmap D. tcpdump

D

Which of the following command-line tools is used for discovering hosts and services on a network? A. Implementing preventative measures B. Establishing a theory of probable cause of the problem C. Verifying full system functionality D. Identifying the problem E. Establishing a plan of action to resolve the problem

D

Which step of the troubleshooting process involves establishing a plan of action to resolve the problem? A. First step B. Second step C. Third step D. Fourth step

D

Which step of the troubleshooting process involves identifying potential effects of the implemented solution? A. First step B. Second step C. Third step D. Fourth step

D


Set pelajaran terkait

British Acts/Taxes Pre-Revolution

View Set

Human Biology 175-Chapter 1 Terms

View Set

English Language Unit 3 Outcome 1 Glossary of Terms

View Set

Chapter 45 Review Questions [Endocrine System]

View Set

BUSA 3000 Final exam, Ch. 8 MAN 3600, Ch 7 MAN3600, Int. Buisness

View Set

Health Insurance Chapter 3 Health insurance basics

View Set