Practice Test Flashcards
You suspect that someone is capturing the data sent on your network. You want to capture data to ensure that it is encrypted and cannot be read by intruders. Which of the following network utilities can both intruders and administrators use
to capture network traffic?
A. Port scanner
B. Packet filter
C. Data watcher
D. Packet sniffer
D. Both administrators and hackers use packet sniffers on networks to capture
network data. They are either a hardware device or software and eavesdrop on network transmissions traveling throughout the network. The packet sniffer
quietly captures data and saves it to be reviewed later. Answer A is incorrect because port scanners monitor traffic into and out of ports such as those
connected to a switch. Answers B and C are not valid traffic-monitoring technologies.
- You have been hired to review the security of a company’s network. Upon investigation, you notice that a wireless AP has been installed in a wiring closet without the consent of the administrator. The AP is actively used by remote users to access resources on the company’s network. Which security problem does this represent?
A. Rogue protocol interception
B. Rogue AP
C. Network sniffing
D. Social engineering
B. A rogue access point describes a situation in which a wireless access point has been placed on a network without the administrator’s knowledge. The result is that it is possible to remotely access the rogue access point, because it likely does not adhere to company security policies. Answers A and C are not valid security risk types. Answer D is a type of attack that involves tricking people into performing actions or divulging confidential information such as passwords or usernames.
- You have been employed by a small company to implement a fault-tolerant hard
disk configuration. You have purchased four 4TB hard disks, and you plan to
install RAID 5 on the server. What is the storage capacity of the RAID solution?
A. 12TB
B. 4TB
C. 8TB
D. 16TB
A. RAID 5 reserves the equivalent space of one disk in the array for parity information. The parity information is used to rebuild the data in the event of a hard disk crash. This scenario has four 4TB hard disks. With one reserved for parity, you have 16TB total space; with 4TB removed for parity, there are 12TB of actual data storage
You have been called in to troubleshoot a small network. The network uses
TCP/IP and statically assigned IPv4 information. You add a new workstation to
the network. It can connect to the local network but not to a server on a remote
network. Which of the following is most likely the cause of the problem?
❍ A. Incorrect IP address.
❍ B. Incorrect default gateway.
❍ C. The DHCP server is unavailable.
❍ D. Duplicate IP addresses are being used.
B. To connect to systems on a remote network, the default gateway address
must be correctly assigned. If this address is manually entered, the number
might have been incorrectly entered. Because the system can connect to the
local network, the address is correctly assigned. Answer C is incorrect because
IP addresses are statically assigned. Answer D is incorrect because duplicate
addresses prevent the system from logging on to the network.
Under what circumstance would you change the default channel on an access
point?
❍ A. When channel overlap occurs between access points
❍ B. To release and renew the SSID
❍ C. To increase the security settings
❍ D. To decrease the security settings
A. Ordinarily the default channel used with a wireless device is adequate.
However, it may be necessary to change the channel if overlap with another
nearby access point occurs. The channel should be changed to another,
nonoverlapping channel. Answer B is not valid. Answers C and D are incorrect
because changing the channel would not inherently impact the security
settings.
On several occasions your wireless router has been compromised, and intruders
are logging onto it. Which of the following strategies could you use to increase
the security of the wireless routers? (Choose the two best answers.)
❍ A. Use SSL
❍ B. Disable SSID broadcast
❍ C. Use MAC filtering
❍ D. Use wireless filtering
B, C. Administrators can take several security steps to help secure a wireless
access point. This includes disabling the SSID broadcast. This makes it more
difficult for intruders to get the name of your wireless network. MAC filtering
is used to accept or deny client systems based on their MAC address. MAC
filtering is an example of an access control list (ACL). Answer A is incorrect
because SSL is a security protocol used to increase data transmission
security. Answer D is incorrect because wireless filtering is not a valid security
measure.
You have just purchased a new wireless access point. You change the security
settings to use 128-bit encryption. How must the client systems be configured?
❍ A. All client systems must be set to 128-bit encryption.
❍ B. The client system inherits security settings from the AP.
❍ C. Wireless security does not support 128-bit encryption.
❍ D. The client wireless settings must be set to autodetect
A. On a wireless connection between an access point and the client, each system
must be configured to use the same settings, which includes the SSID,
and security settings. In this question, both the client and the AP must be
configured to use 128-bit encryption. Answer B is incorrect because the client
does not inherit the information from the AP. Answer C is incorrect because
wireless security (including WEP) does support 128-bit encryption (with
WPA and WPA2 supporting 256-bit encryption). Answer D is incorrect
because not all wireless clients have an autodetect feature.
8. Which of the following topology type offers the greatest amount of redundancy? ❍ A. Star ❍ B. Bus ❍ C. Ring ❍ D. Mesh
D. In a mesh topology, each device is connected directly to every other device
on the network. Such a structure requires that each device have at least two
network connections. Answers A, B, and C do not offer the same level of
redundancy as a mesh topology.
You need to install a network printer, and you require the printer’s MAC address
to finish the installation. Which of the following is a valid MAC address?
❍ A. 192.168.2.13
❍ B. 0x00007856
❍ C. 00:04:e2:1c:7b:5a
❍ D. 56g78:00h6:1415
C. A MAC address contains six hexadecimal number sets. The first three sets
represent the manufacturer’s code, whereas the last three identify the unique
station ID. Answer A is incorrect because the number is a valid internal IP
address. Answers B and D are not valid MAC addresses.
You have been called in to replace a faulty ST connector. Which of the following media types are you working with? ❍ A. RG-58 ❍ B. RG-62 ❍ C. Single-mode fiber ❍ D. SCSI
C. ST connectors are a twist-type connector used with single-mode fiber.
Answer A is incorrect because RG-58 (thin coax) uses BNC-type connectors.
Answer B is incorrect because RG-62 (thick coax) uses vampire-type AUI connectors.
Answer D is incorrect because SCSI cables use a variety of connector
types, none of which include ST connectors.
- Your manager asks you to recommend a secure way to copy files between a
server on your network and a remote server in another location. Which of the following
solutions are you most likely to recommend?
❍ A. TFTP
❍ B. FTP
❍ C. SFTP
❍ D. IGMP
C. Secure File Transfer Protocol (SFTP) enables you to securely copy files
from one location to another. SFTP provides authentication and encryption
capabilities to safeguard data. Answer A is incorrect because TFTP is a mechanism
that provides file-transfer capabilities, but it does not provide security.
Answer B is incorrect because FTP provides basic authentication mechanisms,
but it does not provide encryption. Answer D is incorrect because IGMP is a
protocol associated with multicast group communications. It is not a file
transfer protocol.
- You are setting up a wide area network between two school campuses, and you
decide to use BRI ISDN. What is the maximum throughput of your connection?
❍ A. 64Kbps
❍ B. 128Kbps
❍ C. 128Mbps
❍ D. 64Mbps
B. BRI ISDN uses two 64-Kbps data channels. Combined, BRI ISDN offers a
128-Kbps transfer rate.
- You are troubleshooting an older 100BaseT network, and you suspect that the
maximum cable length has been exceeded. What is the maximum length of a
100BaseT network segment?
❍ A. 25 meters
❍ B. 100 meters
❍ C. 185 meters
❍ D. 500 meters
100BaseT is an Ethernet network standard implemented using thin twisted-
pair cable. The maximum length of a segment is 100 meters. When cable
is run beyond 100 meters, repeaters can be used to regenerate the signal for
longer transmission distances.
- Which of the following is a valid IPv6 address?
❍ A. 42DE:7E55:63F2:21AA:CBD4:D773
❍ B.42CD:7E55:63F2:21GA:CBD4:D773:CC21:554F
❍ C. 42DE:7E55:63F2:21AA
❍ D.42DE:7E55:63F2:21AA:CBD4:D773:CC21:554F
D. IPv6 uses a 128-bit address, which is expressed as eight octet pairs in hexadecimal
format, separated by colons. Because it is hexadecimal, only numbers
and the letters A through F can be used.
While troubleshooting a network connectivity problem on a Windows Server system,
you need to view a list of the IP addresses that have been resolved to MAC
addresses. What command would you use to do this?
❍ A. arp -a
❍ B. nbtstat -a
❍ C. arp -d
❍ D. arp -s
A. The arp -a command is used to display the IP addresses that have been
resolved to MAC addresses. The nbtstat command (answer B) is used to
view protocol statistics for NetBIOS connections. arp -d (answer C) is used
to delete entries in the ARP cache. The arp -s command (answer D) enables
you to add static entries to the ARP cache.
- While troubleshooting a DNS issue from a UNIX server, you suspect that the
DNS record for one of your other servers is incorrect. Which of the following utilities
are you most likely to use to troubleshoot this problem?
❍ A. ipconfig
❍ B. dig
❍ C. netstat
❍ D. nbtstat
B. The dig command is used on UNIX and Linux systems to perform manual
name resolutions against a DNS server. This can be useful in troubleshooting
DNS-related issues. The ipconfig, netstat, and nbtstat commands
are all Windows-based commands, so they would not be used in this scenario.
A miscreant has added a rogue access point to your wireless network. Users are
mistakenly connecting to that access point instead of the legitimate one they
should connect to. What is this type of attack which eavesdrops on the wireless
network known as?
❍ A. Evil twin
❍ B. War driving
❍ C. WEP cracking
❍ D. DDoS
A. An evil twin is a type of attack in which a rogue access point poses as a
legitimate one and eavesdrops on the network communications. Answer B is
incorrect because war driving involves the act of seeking out wireless networks
(usually from a vehicle, hence the name) and not setting up a rogue access
point. Answer C is incorrect because WEO cracking involves breaking the
WEP encryption on an existing access point and not installing a rogue one.
Answer D is incorrect because DDoS is a Distributed Denial of Service attack
intended to bring down a server by keeping it too busy responding to echo
requests that it cannot service legitimate requests for data.
- You are experiencing problems with the network connectivity of a Windows 7
system. You suspect that there might be a problem with an incorrect route in the
routing table. Which of the following TCP/IP utilities can you use to view the
routing table? (Choose two.)
❍ A. tracert
❍ B. nbstat
❍ C. route
❍ D. netstat
❍ E. ping
C, D. Both the route and netstat commands can be used to view the routing
table on a Windows 7 system. Answer A is incorrect because the tracert
utility is used to track the route a packet takes between two destinations.
Answer B is incorrect because the nbtstat command is used to view statistical
information for NetBIOS connections. Answer E is incorrect because the
ping utility is used to test network connectivity.
- Which of the following best describes the function of asymmetric key encryption?
❍ A. It uses both a private and public key to encrypt and decrypt messages.
❍ B. It uses two private keys to encrypt and decrypt messages.
❍ C. It uses a single key for both encryption and decryption.
❍ D. It uses three separate keys for both encryption and decryption.
A. Asymmetric key encryption uses both a private and public key to encrypt
and decrypt messages. The public key is used to encrypt a message or verify a
signature, and the private key is used to decrypt the message or sign a document.
In a symmetric key encryption strategy, a single key is used for both
encryption and decryption. None of the other answers represents asymmetric
key encryption.
- Which of the following services provides name resolution services for FQDNs?
❍ A. DNS ❍ B. DHCP ❍ C. WINS ❍ D. ARP ❍ E. NTP
A. The Domain Name System (DNS) resolves Fully Qualified Domain
Names (FQDNs) to IP addresses. Answer B is incorrect because Dynamic
Host Configuration Protocol (DHCP) provides automatic IP address assignment.
Answer C is incorrect because the Windows Internet Naming Service
(WINS) provides NetBIOS computer name to IP address resolution. Answer
D is incorrect because Address Resolution Protocol (ARP) resolves IP
addresses to MAC addresses. Answer E is incorrect because Network Time
Protocol (NTP) facilitates the communication of time information between
systems.
- You are installing a 100BaseFX network, and you need to purchase connectors.
Which of the following might you purchase? (Choose two.)
❍ A. RJ-45
❍ B. ST
❍ C. BNC
❍ D. SC
B, D. 100BaseFX networks use fiber media, which can use either ST or SC
connectors. Answer A is incorrect because RJ-45 connectors are used with
UTP media. Answer C is incorrect because BNC connectors are used with
thin coax media on 10Base2 networks.
- To increase wireless network security, you have decided to implement portbased
security. Which of the following standards specifies port-based access
control?
❍ A. 802.11x
❍ B. 802.1x
❍ C. 802.11b
❍ D. 802.1b
B. 802.1x is an IEEE standard specifying port-based network access control.
Port-based network access control uses the physical characteristics of a
switched local area network (LAN) infrastructure to authenticate devices
attached to a LAN port and to prevent access to that port in cases where the
authentication process fails. Answer A is incorrect because 802.11x is not a
security standard but sometimes is used to refer to all wireless network standards,
such as 802.11b/g/a/n. Answer C, 802.11b, is an actual wireless standard
specifying transmission speeds of 11Mbps.
- When designing a network, you have been asked to select a cable that offers the
most resistance to crosstalk. Which of the following are you likely to choose?
❍ A. Multimode fiber-optic
❍ B. Shielded twisted pair
❍ C. UTP
❍ D. Shielded mesh
A. Unlike copper-based media, fiber-optic media is resistant to crosstalk
because it uses light transmissions. Answer B is incorrect because STP offers
greater resistance to crosstalk than regular UTP but is not as resistant as
fiber-optic cable. Answer C is incorrect because UTP cable is more susceptible
to crosstalk than either STP or fiber-optic. Answer D is incorrect because
shielded mesh is not a type of cable.
- Which of the following are considered disaster recovery measures? (Choose
two. )
❍ A. Backups
❍ B. UPS
❍ C. RAID 5
❍ D. Offsite data storage
A, D. Both backups and offsite data storage are considered disaster recovery
measures. Answer B is incorrect because a UPS is considered a fault-tolerance
measure, not a disaster recovery measure. Answer C is incorrect because
RAID 5 is considered a fault-tolerance measure, not a disaster recovery
measure.