25 questions
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
PaaS
SaaS
XaaS
What is WPA
wi-fi protected access
wired protected access
wired process access
wi-fi process access
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building ?
Place access points above where most clients are
Place access points in the basement
Place access points near outside walls
Place multiple access points in the same area
You are setting up a wireless hotspot in a local coffee shop. You want to disperse the radio signals evenly throughout the coffee shop.
Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern ?
Omni-directional
Directional
Multi-point
Multi-directional
Which VoIP device helps establish the connection between two VoIP Phones
VoIP server
VoIP gateway
VoIP codec
VoIP endpoint
Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects.
Which type of problem is occurring on the VoIP system ?
Latency
Echo
Packet loss
Jitter
You have been contacted by a Company to recommend a wireless Internet solution. The wireless strategy must support a frequency range of 5 GHz, and provide the highest possible transmission speeds.
Which of the following wireless solution would you recommend ?
802.11a
802.11b
802.11g
802.11n
Radius server is used for
Authentication
Authorization
Accounting
All of the above
In your company's wireless network you want to achieve user's credential authentication and also restrict user's device. Which option you will choose ?
Open
802.1x EAP
MAC Address
802.1x EAP + MAC Address
In a Storage Area Network (SAN) implementation the servers that connects to a shared storage devices are called ------------
Target
Initiator
Infiniband
FC
Users on your network report that they have received an email stating that the Company launched a new website and the email asks to click the Website link and log in using user name and password. No one in your company has sent this email.
What type of attack is this ?
Piggybacking
Phishing
Man-in-the-middle
Smurf
To access the internet through PSTN, what kind of connectivity device must you use
CSU/DSU
Modem
Switch
TDM
Which network type divides transmitted data into smaller pieces and allows multiple communications on the network medium ?
Circuit-switched
Packet-switched
Frame-based
Multiplexed
Your Company has developed and implemented countermeasures for the greatest risk to their assets. However, there is still some risk left. What is the remaining risk called ?
Risk
Residual risk
Loss
Exposure
Which of the following protocol can be used to centralize remote access authentication ?
CHAP
RADIUS
EAP
Kerberos
Which of the following is solution that address physical security ?
Implement complex password
Disable guest accounts on computer
Require identification and name badges for all employees
Scan USB before using
An attacker setup 100 drone computers that flood a DNS server with invalid request. This is an example of which kind of attack ?
Dos
Replay
DDoS
Spamming
Which of the following measures are you most likely to implement to protect a system from a worm or Trojan horse ?
Password policy
firewall
Antivirus software
IDS
Which of the following is a text file that a website stores on a client's hard drive to track and record information about the user ?
Digital signature
Certificate
Cookie
Mobile code
You manage a network that uses switch. In the lobby of your building, there are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers into the free network jacks and connect to the network but employees can do that.
What feature should you configure ?
VLANs
Bonding
Port authentication
Spanning tree
Which of the following best describes the ping of death exploit ?
Redirecting echo response from an ICMP communication.
Partial IP packets with overlapping sequence numbers.
Sending multiple spoofed ICMP packets to the victim
an ICMP packets larger than 65,536 bytes
You have just installed a new network-based IDS system that uses signature recognition. What should you do in a regular basis ?
Generate a new baseline
Modify clipping levels
Checking backdoor
Update the signature files.
Which of the following is the most common detection method used by an IDS ?
Behavior
Heuristic
Anomaly
Signature
Which of the following actions should you take to reduce the attack surface of a server ?
Disable unused services
Install a host-based IDS
Install the latest patches and hotfixes
Install anti-malware software
Which of the following is likely to be located in a DMZ ?
FTP server
Backup server
User workstation
Domain controller