Network + Practice Questions 401-504 Flashcards
QUESTION NO: 401
Which of the following are components of IPSec? (Select TWO).
A. AH B. ESP C. SSH D. ICA E. TLS
Answer: A,B
QUESTION NO: 402
In IPSec, which of the following is an agreement on how devices will securely transmit
information?
A. SA
B. ESP
C. AH
D. ISAKMP
Answer: A
QUESTION NO: 403
An organization recently installed a firewall on the network. Employees must have access to their
work computer from their home computer. In which of the following ways should the firewall be
configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
Answer: D
QUESTION NO: 404
An organization recently installed a firewall on the network. Employees must be able to send and
receive email from a POP3 server. In which of the following ways should the firewall be
configured? (Select TWO).
A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110
Answer: B,C
QUESTION NO: 405
Which of the following OSI model layers is responsible for data encryption?
A. Application
B. Presentation
C. Physical
D. Data Link
Answer: B
QUESTION NO: 406
Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable
was replaced, there were no issues with connectivity. Immediately after the cable was replaced,
users report that they are unable to access a database application on the server. Which of the
following is the MOST likely reason for the inaccessibility?
A. Lisa used a short patch cable.
B. Lisa used a cable with an RJ-45 connector.
C. Lisa used a crossover cable.
D. Lisa used a patch cable that was over 50 meters long.
Answer: C
QUESTION NO: 407
Which of the following exterior routing protocols uses an algorithm to determine the quickest route
to a destination?
A. RIP
B. OSPF
C. BGP
D. RIPv2
Answer: C
QUESTION NO: 408
Which of the following is occurring when Jeff, an employee, unintentionally gives information that
is used maliciously?
A. Tailgating
B. DoS attack
C. DDoS attack
D. Social engineering
Answer: D
QUESTION NO: 409
Which of the following OSI model layers is used for logical addressing?
A. Physical
B. Transport
C. Network
D. Data link
Answer: C
QUESTION NO: 410
Which of the following attacks creates a buffer overflow to stop access to a system?
A. Blue jacking
B. DoS
C. Netstat
D. Man-in-the-middle
Answer: B
QUESTION NO: 411
Please refer to the attached exhibit.
Which of the following types of configuration management documentation is represented?
A. Network security policy
B. Network baseline
C. Logical network diagram
D. Wiring schematic
Answer: C
QUESTION NO: 412
In which of the following layers of the OSI model does the TCP protocol operate?
A. Session
B. Network
C. Data link
D. Transport
Answer: D
QUESTION NO: 413
Which of the following basic devices blocks ports and can sometimes filter data?
A. Repeater
B. Hub
C. Firewall
D. Switch
Answer: C
QUESTION NO: 414
At which of the following layers of the OSI model does an unmanaged switch operate?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: B
QUESTION NO: 415
Which of the following devices will monitor for propagating worms?
A. Firewall
B. Proxy server
C. Mail server
D. IDS
Answer: D
QUESTION NO: 416
Which of the following is an authentication, authorization, and accounting method that provides
administrative access to network devices?
A. PKI
B. TACACS+
C. CHAP
D. SSH
Answer: B
QUESTION NO: 417
Which of the following network tools is used to identify running services on host devices?
A. IDS
B. IPS
C. Firewall
D. NMAP
Answer: D
QUESTION NO: 418
Which of the following security devices is used in providing packet and MAC address filtering
services for the network?
A. Host-based proxy server
B. Network-based firewall
C. IDS
D. IPS
Answer: B
QUESTION NO: 419
Which of the following would Kim, a technician, use in voice over IP communications?
A. SNTP
B. SCP
C. SMTP
D. SIP
Answer: D
QUESTION NO: 420
Which of the following is the MOST appropriate to use when routing Internet traffic through
multiple ISP connections?
A. BGP
B. SNAT
C. RIP
D. GPG
Answer: A
QUESTION NO: 421
Which of the following protocols allows more than three non-overlapping channels?
A. 802.11a
B. 802.11g
C. 802.1q
D. 802.15
Answer: A
QUESTION NO: 422
Which of the following represents the physical address of a network access card?
A. FF01:D2:C4:87::11
B. 00-30-48-83-9B-C8
C. 08-9D-35-22-L2-34-FF-21
D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
Answer: B
QUESTION NO: 423
ADSL, PPP, and ATM all operate at which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 4
D. Layer 7
Answer: B
QUESTION NO: 424
Which of the following OSI layers BEST describes where an HTTP proxy operates?
A. Transport
B. Application
C. Presentation
D. Session
Answer: B
QUESTION NO: 425
Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of
service attack is occurring?
A. RAS
B. RDP
C. IDS
D. VPN
Answer: C
QUESTION NO: 426
A MAC address is used at which of the following layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: B
QUESTION NO: 427
Multimode fiber should be used in place of copper when:
A. distances are short.
B. EMI is a concern.
C. PoE is necessary.
D. the switch has BNC connectors.
Answer: B
QUESTION NO: 428
Zach, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to
the MDF, through a room that has a large number of motors. Which of the following would be the
BEST cable type to choose?
A. CAT3
B. STP
C. Coaxial
D. Fiber
Answer: D
QUESTION NO: 429
A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the
following can be used to connect the device to the network?
A. Fiber multiplexer
B. Repeater
C. Attenuator
D. OTDR
Answer: B
QUESTION NO: 430
Which of the following regulates the amount of network traffic a single node receives in a server
cluster?
A. Load balancer
B. Proxy server
C. Content filter
D. Quality of service
Answer: A
QUESTION NO: 431
Lisa, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that
utilization issues do not occur on the company’s T1 Internet access network. Which of the
following optimizations should Lisa implement?
A. Load balancing
B. Caching engine
C. Traffic shaping
D. Quality of service
A. Load balancing
B. Caching engine
C. Traffic shaping
D. Quality of service
QUESTION NO: 432
Which of the following evaluates packet payload when detecting network threats?
A. IPS
B. Proxy server
C. Caching server
D. Content filter
Answer: A
QUESTION NO: 433
A disassociation request is a way to mitigate which of the following threats?
A. ARP poisoning
B. Rogue AP
C. Man-in-the-middle attack
D. Botnet
Answer: B
QUESTION NO: 434
A crossover cable is MOST commonly associated with which of the following layers of the OSI
model?
A. Session
B. Application
C. Network
D. Physical
Answer: D
QUESTION NO: 435
Which of the following documents will allow Kim, an administrator, to determine a change from the
standard default system configuration?
A. Baseline
B. Physical network diagram
C. Wiring schematic
D. Logical diagram
Answer: A
QUESTION NO: 436
Which of the following capabilities of a firewall allows Zach, an administrator, to block traffic based
on key words determined by the company?
A. Stateless traffic monitor
B. Stateful traffic monitor
C. Signature identification
D. Content filter
Answer: D
QUESTION NO: 437
Which of the following allows a malicious attacker to view network traffic if the attacker is on the
same network segment as Jeff, an administrator?
A. DoS attack
B. Man-in-the-middle attack
C. Smurf attack
D. Xmas attack
Answer: B
QUESTION NO: 438
Which of the following cable types would have the LEAST amount of EMI?
A. CAT3
B. CAT5
C. STP CAT6
D. Plenum CAT6
Answer: C
QUESTION NO: 439
Which of the following WAN technologies uses four wires for digital and a 66 block?
A. Cable
B. ATM
C. T3
D. POTS
Answer: D
QUESTION NO: 440
Which of the following has the HIGHEST data rate speed?
A. T1
B. ADSL
C. SDSL
D. OC-3
Answer: D
QUESTION NO: 441
Which of the following is designed to be used with multimode fiber over short wavelengths?
A. 10GBaseLW
B. 10GBaseER
C. 10GBaseSW
D. 10GBaseLR
Answer: C