Practice Questions Flashcards
Which tool is most commonly used for analyzing and detecting network-based attacks?
A - Wireshark
B - PuTTY
C - Firewall
D - IPS
A Wireshark
Wireshark is used for analysis, firewall and IPS detect but aren’t used for analysis
Which is NOT an DNS record type associated with email routing and security?
A - MX
B - SPF
C - SRV
D - TXT
C - SRV
SRV links services on network
Which access control model can be used to ensure only people with the right clearance level have access to sensitive information?
A - DAC
B - MAC
C - RBAC
D - ABAC
B - MAC
Mandatory Access Control
Which is a distance-vector routing protocol used in smaller networks to route between routers?
A - FTP
B - STP
C - OSPF
D - RIP
D - RIP
Limited to 16 hops
OSPF is a link state protocol, not distance vector
How to ensure employees can only access work-related websites during working hours
A - Configure firewall to block ports used by these websites
B - Deploy proxy server with content filtering
C - Enable port mirroring to monitor employee web traffic in real time
D - Set up logging on the router to capture all employee traffic
B - Proxy Server with content filtering
Which term refers to the backup route that EIGRP uses when the primary route fails?
A - Alternate Path
B - Feasible Successor
C - Secondary Route
D - Standby Route
B - Feasible Successor
Which OSI layer is responsible for data segmentation?
Transport
What is the purpose of a network with an assigned address 10.61.54.18 and mask 255.255.255.252?
A - Network with more than 200 devices
B - Multiple IP addresses assigned to a server
C - Point-to-point link between two routers
D - Reserved for use as a broadcast address
C - Point to Point
The network only contains 4 addresses, including the network address and the broadcast address, so only 2 usable addresses. Must be point to point
Which technology should be used to connect 2 ports from an access switch to the core switch for redundancy and increased bandwidth without creating a loop?
A - Port Spanning
B - Port Mirroring
C - LACP
D - VTP
C - LACP
Link Aggregation Control Protocol
What is best to use to identify the port on a switch that an IP phone is connected? The protocol allows devices to advertise their identity and capabilities across the net.
A - DHCP
B - LLDP
C - DNS
D - SNMP
B - LLDP
Link Layer Discovery Protocol
Which technology uses an X-509 certificate to establish trust between server and client?
A - IPSec
B - PKI
C - SSH
D - WPA2
B - PKI
What to use to enable routing between VMs on different networks without using a dedicated virtual router?
A - NAT
B - NFV
C - VLAN trunking
D - Bridging the virtual NICs
B - NFV
Network Function Virtualization
Which WiFi frequency is most likely to get interference from a microwave?
A - 900 MHz
B - 2.4 GHz
C - 5 GHz
D - 6 GHz
B - 2.4 GHz
What is the primary benefit of using a CDN?
A - Balances server load
B - Caches content, decreases latency, and improve access speed
C - Automatically blocks malicious traffic
D - Reduces cost by eliminating need for multiple data centers
Content Distribution Network
B - Caches content, decreases latency, and improve access speed
Like YouTube - stream data from your local server instead of one on the other side of the world
A computer system or an application that acts as an intermediary between another computer and the Internet:
A - Bridge
B - Proxy
C - Server
D - Gateway
B - Proxy
“Intermediary”
A dedicated storage appliance that can be added to a local network:
A - SAN
B - NAS
C - SSD
D - DAS
B - NAS
Network Attached Storage
A dedicated local network that provides access to shared storage devices:
A - SDN
B - NAS
C - iSCSI
D - SAN
D - SAN
Storage Area Network
A solution that enables the replacement of traditional network hardware functionalities with software via virtualization:
A - SDN
B - VM
C - SVI
D - NFV
D - NFV
Network Function Virtualization
Characteristics of a Network Security Group (NSG)
(Select 3 answers)
A - Primarily used in traditional/non-virtualized network environments
B - Detects or prevents intrusion attempts or malicious activities within the network traffic
C - Provides firewall-like capabilities
D - Applies security rules to specific virtual NICs (more granular control)
E - Used for controlling inbound and outbound traffic in cloud computing environments
F - Applies security rules at the subnet level (less granular control)
C - Provides firewall-like capabilities
D - Applies security rules to specific virtual NICs (more granular control)
E - Used for controlling inbound and outbound traffic in cloud computing environments
Characteristics of a Network Security List (NSL)
(Select 3 answers)
A - Provides firewall-like capabilities
B - Applies security rules at the subnet level (less granular control)
C - Used for controlling inbound and outbound traffic in cloud computing environments
D - Applies security rules to specific virtual NICs (more granular control)
E - Primarily used in traditional/non-virtualized network environments
F - Detects or prevents intrusion attempts or malicious activities within the network traffic
A - Provides firewall-like capabilities
C - Used for controlling inbound and outbound traffic in cloud computing environments
F - Detects or prevents intrusion attempts or malicious activities within the network traffic
A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet:
A - NAT gateway
B - Internet Gateway
C - VPN Gateway
D - Default Gateway
B - Internet Gateway
Functions of a cloud gateway using NAT
(Select 3 answers)
A - Enables instances within a VPC to access external networks
B - Translates private IP addresses to a public IP address
C - Restricts inbound connections from external networks
D - Translates public IP addresses to a private IP address
E - Enables inbound connections from external networks
F - Prevents instances within a VPC from accessing external networks
A - Enables instances within a VPC to access external networks
B - Translates private IP addresses to a public IP address
C - Restricts inbound connections from external networks
Enables a secure, encrypted Internet connection between an on-premises network and cloud resources
A - SSH
B - IPsec
C - SSL/TLS
D - VPN
D - VPN
Provides a dedicated, private connection between an on-premises network and a cloud provider
A - Direct Connect
B - VPN
C - Leased Line
D - Fibre Channel
A - Direct Connect
Private network connection between an organization’s data center and a cloud service provider’s data center.
Bypasses the public internet