Exam Sim Questions Flashcards
Review Observed Exam Questions
You want to ensure that the sender of the message or network transmission is authenticated, and not an imposter or a phishing attempt. What method provides the highest level of origin authentication?
AES-CCMP (Advanced Encryption Standard)(Counter Mode with Cypher Block Chaining Media Access Control Protocol)
You use a computer on a TCP/IP network to transfer data through well-known TCP port 80. Which protocol is most likely being used to transfer data?
HTTP (Hypertext Transfer Protocol)
Computer A needs the IP address of Computer B, but Computer A only knows Computer B’s FQDN. Where is this information found?
Forward Zone [FQDN = Fully Qualified Domain Name]
Which attack directs user traffic to a malicious web site without any outside communication from an attacker?
DNS poisoning
You are documenting the network layout for your company. You have discovered a firewall that has two network interfaces. Which firewall architecture have you discovered?
dual-homed firewall
You are the network administrator for a healthcare organisation. Recently several federal and state government laws hav been enacted which will affect network operations. Which change management documentation should record this information?
Regulations
Your company needs to be able to provide employees access to a suite of application. However, you do not want the employees to install a local copy of the applications. What method should you use to deploy the suite of applications?
SaaS (Software as a Service)
You are concerned about malware and workstation security, and you do not want users to use USB flash drives to export or import files. You also have no need for Telnet or FTP services. What should you do to increase security on your systems?
- Disable device ports
- Disable unnecessary services
What should a business with a main office downtown use to communicate with various offices in nearby suburban locations?
MAN (Metropolitan Area Network)
You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via email. What is the issue?
VLAN mismatch
You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next?
Connect to the network and try to transfer a file
You have been hired as a consultant for the medium-sized business. As part of your duties, you need to make recommendations on changes to the network. You decide that you want to install agents on the network devices to monitor network traffic and record the behaviour of network components. You will then use the statistical data that is gathered to make your recommendations. Which standard should you deploy?
SNMP (Simple Network Management Protocol)
For a new office space, you have been asked to choose a best cost solution for providing wireless network access for up to 60 employees. Your boss has informed you that there will be a mix of 802.11n and 802.11ac devices in use. The maximum distance from WAP to any user is 150ft (46M). Which kind of wireless access point should you buy?
802.1n the maximum indoor range is 230ft (70m) where as 802.11ac is only 115ft (35M)
Prior to deploying a new wireless access point at a retail store that is located in a strip mall, you decide to perform a site survey. What is the purpose of doing this?
- to calculate the number of access points required for the coverage area
- to find the frequency and power settings to be used on access points
You need to deploy 802.1x authentication that supports client-side digital certificates for authentication with access points. Which technology should you deploy?
EAP-TLS (Extensible Authentication Protocol with Transport Layer Security)
You install a second NIC in your Linux computer. Then you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0 . What command should you issue at a command prompt to configure the NIC?
ifconfig eth1 192.168.0.1 netmask 255.255.255.0 up
Which statement is true of a network based intrusion detection system? (NIDS).
a) an NIDS generate a finite number of alarms
b) An NIDS does not analyse realtime information
c) a NIDS cannot detect an intruder who is logged on to a host computer
d) an NIDS is active while gathering data over the network
c) a NIDS cannot detect an intruder who is logged on to a host computer
You have been hired as a network administrator for a large corporation. This network includes a large number of switches that must be identically configured. In the past this information has been configured manually. You want to automatically propagate the VLAN information to all switches on the LAN. What should you use?
802.1q VTP
To automatically propagate VLAN information to all switches on the LAN you should use VLAN Trunking Protocol (VTP) which is also referred to as 802.1q.
You have decided to implement ISAKMP. What is provided by this technology?
A protocol that works with IPSec to establish a secure session.
Internet Security Association and Key Management Protocol (ISAKMP)
What attack involves the use of multiple computers with the purpose of denying legitimate access to a critical server?
distributed denial-of-service (DDOS) attack
Your company is building a new facility, and you are tasked with designing the new network at that site. You will need multiple servers, switches, patch panels, UPS equipment and other equipment. You need to plan and document the placement of the equipment in the site’s network data centre. Which tool should you use?
Rack Diagrams - rack diagrams depict the placement of network equipment such as: routers, switches, hubs, patch panels, servers and more in a standard 19” wide cabinet called a rack
You have implemented an Ethernet CSMA/CD network for your company. Users complain of delays. When you research the issues, you discover that the network has low throughput. What is the most likely cause of delay on this network?
Collisions - an excessively high number of collisions occurring for a sustained length of time can cause delays and slow throughput. CSMA/CD will negotiate standoff timers to allow multiple devices to communicate on congested network segments
Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network?
VoIP-PSTN gateway -These devices establish the routing of calls to the existing PSTN network
You administer your company’s network, which is connected to the internet. A firewall is configured between the company network and the internet. You want to prevent users on the internet from using HTTP to connect to computers on the company network. Which well-known TCP port should you block to prevent internet users from entering the company’s network on that port?
80 TCP