Kaplan Questions Flashcards
(99 cards)
Your company implements a honeypot as intrusion prevention. Management is concerned that this honeypot would be considered entrapment and has asked you to ensure that entrapment does not occur. Which situation should you prevent?
You should prevent downloads on a honeypot. Allowing downloads on a honeypot is a possible example of entrapment if it is used to make formal trespassing charges. Entrapment occurs when a hacker is tricked into performing an illegal activity. Entrapment is illegal.
What is the advantage of using wireless bridges over E1/T1 leased lines?
The advantage of wireless bridges over E1/T1 lines is that wireless bridges support higher bandwidth than E1/T1 lines, and E1/T1 lines tend to be more expensive in the long term.
Which of the following would be the best recovery solution in the event that a network segment is unavailable?
Redundant circuits would be the best recovery solution in the event that a network segment becomes unavailable. The redundant circuit can provide a backup route if a NIC, cable, router, or switch fails.
Which of the following attacks directs user traffic to a malicious web site without any outside communication from an attacker?
DNS poisoning, also known as DNS cache poisoning, can direct user traffic to a malicious web site.
You company want to allow remote users to access their Windows network remotely if their network is not connected to the Internet. Which of the following should you implement?
Remote Access Service (RAS) is a service provided by Windows that allows remote access to the network via a dial-up connection. In order to obtain a remote connection, two services need to be in place: RAS and dial-up networking (DUN).
A new file server is configured to allow personnel within the company to store files. Users are reporting that they cannot upload files to the file server. What might be the areas you should examine? (Choose two.)
- Incorrect ACL settings
2. Blocked TCP/UDP ports
You need to connect wireless devices to a wired local area network. Which device should you implement?
An access point is either a software or hardware component that acts as a transceiver for wireless devices, connecting them to a wired local area network (LAN). It serves a similar function as a distribution center sending and receiving signals to and from computers on the network.
Which four of the following statements explains why training employees about proper licensing and use of an organization’s software and hardware is important? (Choose four.)
- To practice good organizational ethics and governance
- To avoid liability from violating license rules or restrictions
- To comply with license restrictions or limitations
- To prevent unauthorized or improper consumption of licenses
Which well-known port is used to forward e-mail on the Internet between e-mail servers?
Simple Mail Transfer Protocol (SMTP) uses port 25 to communicate e-mail transfers.
While reviewing recent performance reports from your network devices, you notice that there are a high number of corrupt packets reaching a router named Router34. What is most likely happening to them?
The packets are being dropped.
You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix this issue?
Install another wireless access point that uses a different non-overlapping channel and the same SSID.
You are designing a SOHO network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable.
Which Ethernet standard should you use on the network?
The 1000BaseCX Ethernet standard supports a data transmission rate of 1 gigabit per second (Gbps) over 150-ohm balanced copper cable.
You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with a SONET network. Which of the following should you implement?
The 10GBaseSW designation is for use with Synchronous Optical Networking (SONET) networks.
You administer computers on a Windows network. You suspect a problem with automatic NetBIOS name resolution on a Windows 7 computer on the network. Which command should you use to troubleshoot the name resolution problem?
the nbtstat -r command
You work for a company that deploys wireless networks for your customers. You have been asked to deploy wireless range extenders for several companies. For which of the following situations does deploying a wireless range extender make sense?
For a sprawling small office/home office layout with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access
Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide?
A baseline defines the minimum level of security and performance of a system in an organization.
Your company wants to upgrade its twisted pair (TP) cable network to handle up to 10 GB data rates over the same distances (up to 90 meters) from switches to network nodes. Which TP category type must the company deploy to meet its requirements?
Cat6a
While troubleshooting a network outage on a 10GBaseSW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
The most likely cause of the issues is the maximum cable length has been exceeded.
The link light on the hub for the cable that connects the hub to the router is not lit. The link lights on the hub for Workstation A and the Server computer are lit. Workstation A and Server can communicate with one another, but neither of these computers can communicate with the Workstation B computer. Workstation B can connect to the Internet through the modem, but Workstation B cannot communicate with either Workstation A or Server.
Which device is most likely causing the communications problem?
The router is most likely causing the communications problem in this scenario.
You need to assign a virtual IP address to an Internet server. What are valid reasons for doing so? (Choose all that apply.)
- To permit multiple servers to share the same address
- To eliminate host dependencies on specific, individual network interfaces
- To permit the same address to access multiple domain names
You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the BEST description of the result of your actions?
Network devices will now operate in full-duplex mode.
Which media-access method does the 802.11 standard specify for wireless networks?
The IEEE 802.11 standard, which is the main standard for wireless LANs, specifies using Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) for its media access method.
Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network?
VoIP-PSTN gateway
Which of these is NOT an example of multifactor authentication?
Username and password is not an example of multifactor authentication.