Exam 141-150 Flashcards

1
Q

A network technician is testing a new firewall configuration. The company wants Internet access using HTIP and HTIPS
for web browsing following ACL files have been placed on the outside firewall interface.
Outbound
Permit TCP any any port 80
Permit TCP any any port 443
Inbound
Deny IP any any
Using the above configuration, the technician is unable to reach websites using their URLs. Which of the following
actions should be taken in allow the technician to access the websites?

A. IP port 53 needs to be permitted outbound.
B. The inbound and outbound ACLs need to be switched.
C. TCP ports 20 and 21 need to be used for web browsing.
D. Web browsing requires UDP not TCP ports to be permitted.

A

A. IP port 53 needs to be permitted outbound.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs
between devices. Which of the following tools are MOST likely needed to complete the task? (Choose three.)

A. Wire stripper 
B. Cable crimper 
C. RJ-11 connectors 
D. RJ-45 connectors 
E. Multimeter 
F. Punchdown tool 
G. Tone generator
A

A. Wire stripper
B. Cable crimper
D. RJ-45 connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator is setting up a web-based application that needs to be continually accessible to the end users.
Which of the following concepts would BEST ensure this requirement?

A. High availability
B. Snapshots
C. NIC teaming
D. Cold site

A

A. High availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?

A. ISDN 
B. MPLS 
C. PRI 
D. Broadband cable 
E. Frame relay
A

E. Frame relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

A. penetration testing
B. vulnerability scanning
C. reconnaissance
D. social engineering

A

A. penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?

A. Smurf attack
B. Rogue AP
C. Compromised system
D. Unintentional DoS

A

C. Compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An office user cannot access local network drives but has full access tothe Internet. A techniciantroubleshoots the issue
and observes the following output of the ipconfig command:
Which of the following would MOST likely allow the network drives to be accessed?
A. Update the WLAN adapter driver
B. Disable the WLAN adapter
C. Check the wireless DHCP configuration
D. Disable the LAN adapter

A

B. Disable the WLAN adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired
employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website.
The speed testing website shows lower download and upload speeds for the wired network than the wireless network.
Which of the following is the MOST likely explanation?

A. There is less local congestion on the wireless network
B. The testing server for the wired network was farther away
C. The firewall is configured to throttle traffic to specific websites
D. The wireless access points were misconfigured

A

B. The testing server for the wired network was farther away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an
organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the
organization’s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow
through the access point to the legitimate site while the data traversing the network is logged for latest analysis and
exploitation. Which of the following attacks has the analyst successfully performed in this scenario?

A. Bluesnarfing 
B. Session hijacking 
C. MAC spoofing 
D. VLAN hopping 
E. Man-in-the-middle
A

E. Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly