Test 4 Flashcards
Which of the following companents of IPSec? (Select TWO)
A. AH
B. ESP
C. SSH
D. ICA
E. TLS
A. AH
B. ESP
In IPSec. which of the following is an agreement on how devices wil lsecurely transmit information?
A. SA
B. ESP
C. AH
D. ISAKMP
A. SA
An organization recently installed a firewall on the network. Employees must have access to their work computers from their home computer. In which of the following ways should the firewall be configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
D. Allow TCP port 3389 inbound
An organization recently installed a firewall on the network. Employees must be able toe send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO) A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110
B. Allow TCP port 25
C. Allow TCP port 110
Which of the following OSI model layers is responsible for data encryption? A. Application B. Presentation C. Physical D. Data link
B. Presentation
Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced, there were no issues with connectivity. Immediately after the cable was replaced, users report that they are unable to access a database application on the server. Which of the following is the MOST likely reason for the inaccessibility?
A. Lisa used a short patch cable
B. Lisa used a cable with an RJ-45 connector
C. Lisa used a crossover cable
D. Lisa used a patch cable that was over 5o meters long
C. Lisa used a crossover cable
Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination? A. RIP B. OSPF C. BGP D. RIPv2
C. BGP
Which of the following is occurring when Jeff, an employee, unintentionally gives information that is used maliciously? A. Tailgating B. DoS attack C. DDoS attack D. Social engineering
D. Social engineering
Which of the following OSI model layers is used for logical addressing? A. Physical B. Transport C. Network D. Data link
C. Network
Which of the following attacks creates a buffer overflow to stop access to a system? A. Blue jacking B. DoS C. Netstat D. Man-in-the-middle
B. DoS
In which of the following layers of the OSI model dpes TCP operate? A. Session B. Network C. Data Link D. Transport
D. Transport
Which of the following basic devices blocks ports and can sometimes filter data? A. Repeater B. Hub C. Firewall D. Switch
C. Firewall
At which of the following layers of the OSI model does an unmanaged switch operate? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
B. Layer 2
Which of the following devices will monitor for propagating worms? A. Firewall B. Proxy server C. Mail server D. IDS
D. IDS
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices. A. PKI B. TACACS+ C. CHAP D. SSH
B. TACACS+
Which of the following network tools is used to identify running services on host devices? A. IDS B. IPS C. Firewall D. NMAP
D. NMAP
Which of the following security devices is used in providing packet and MAC address filtering services for the network? A. Host-based proxy server B. Network-based firewall C. IDS D. IPS
B. Network-based firewall
Which of the following would Kim, a technician, use in voice over IP communications? A. SNTP B. SCP C. SMTP D. SIP
D. SIP
Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections? A. BGP B. SNAT C. RIP D. GPG
A. BGP
Which of the following protocols allows more than three non-overlapping channels? A. 802.11a B. 802.11g C. 802.1q D. 802.15
A. 802.11a
Which of the following represents the physical address of a network access card? A. FF01:D2:C4:87::11 B. 00-30-48-83-9B-C8 C. 08-9D-35-22-L2-34-FF-21 D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A
B. 00-30-48-83-9B-C8
ADSL, PPP, and ATM all operate at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 4 D. Layer 7
B. Layer 2
Which of the following OSI layers BEST describes where an HTTP proxy operates? A. Transport B. Application C. Presentation D. Session
B. Application
Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of service attack is occurring? A. RAS B. RDP C. IDS D. VPN
C. IDS