Security and Malware

snakesailboatSecurity

Feb 23, 2014 (3 years and 3 months ago)

123 views

Security and Malware

Practice Test

Name: _________________________________

1.

Which of the following MUST be used to implement a wireless network supporting EAP
-
TTLS?

In
other words, EAP
-
TTLS is part of which of the following?

A.Kerberos

B.Two

factor authentication

C.CHAP

D.PKI (Public Key Infrastructure)

Correct Answer:

2.

Which of the following is used to restrict access according to user policies?

A.Content filter

firewall

B.DHCP server

C.DNS server

D.VPN concentrator

Correct Answer:

3.

Which of

the following may be
used to filter outgoing network requests?

A.Proxy server

B.VPN concentrator

C.DHCP server

D.IIS server

Correct Answer:

4.

Which of the following network devices hides network nodes behind one public IP address?

(Select two)

A.Layer

3 switch

B.Content filter

C.

VPN server
D.Proxy server

E. NAT router

Correct Answer:


5.

Jeff, a technician, is setting up an IDS

(Intruder Detection System)

security device. Which of the
following should be configured on the

switch to utilize the IDS?

A.Po
E

B.Port mirroring

C.Convergence

D.Port speed

Correct Answer:



6.

During a disaster recovery test, several billing representatives need to be temporarily setup to take
payments

from customers. It has been determined that this will need to occur over a
wireless
network, with security being

enforced where possible. Which of the following configurations should
be used in this scenario?

A.WPA2, SSID enabled, and 802.11n.

B.WEP, SSID enabled, and 802.11b.


C.WEP, SSID disabled, and 802.11g.

D.WPA2, SSID disa
bled, and 802.11a.

Correct Answer:

7.

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur
to an outside

DNS server?

A.20

B.53

C.80

D.3389

Correct Answer:

8.

The XYZ
company

wants the public to be able to connect to the wireless network with minimal
security, but not be able to

connect to the private internal network. Which of the following firewall
rules would BEST accomplish this?

A.Content filtering on the wireless access
point

B.Allow traffic from the wireless access point

C.Block traffic from the wireless access point

D.Packet filtering on the wireless access point

Correct Answer:

9.

Lisa, a network administrator, must implement a wireless security encryption protocol that

supports
the AES

cipher

and CNMP security
. Which of the following should be implemented?

A.WEP

B.TKIP

C.WPA2

D.WPA Enterprise

Correct Answer:

10.

Kim, a technician, has opened ports on the firewall to route to specific devices. Which of the
following did she

MOST likely setup?

A.Deep packet inspection

B.DDNS

C.Port forwarding

D.DMZ

Correct Answer:



11.

An office would like to set up an unsecured wireless network for their customers in their lounge
area. Which of

the following firewall capabilities should be conf
igured to prevent the wireless traffic
from communicating with

the office's LAN traffic?

A.NAT

B.Stateful inspection

C.Packet filtering

D.Port security

Correct Answer:

12.

Kim, a technician, suspects a virus has infected the network and is using up bandwidth.

She needs
to quickly

determine which workstation is infected with the virus. Which of the following would
BEST help Kim?

A.Web server

B.Syslog

C.Network sniffer

D.SNMP

Correct Answer:

13.

Which of the following is an Authentication, Authorization, and Accoun
ting (AAA) technology that is
MOST

widely used with remote access?

A.PKI


B.VPN

C.MS
-
CHAP

D.RADIUS

Correct Answer:

14.

Which of the following servers would MOST likely be placed in a DMZ?

A.Proxy Server

B.Web Server

C.File Server

D.Intranet Server

Correct Answer:

15.

Zach, a user, logs into a system and automatically has access to other network resources without
having to log

in again. Which of the following is MOST likely implemented at Zach's location?

A.Biometric authentication

B.Single sign
-
on

C.80
2.1x access control

D.Two
-
factor authentication

Correct Answer:

16.

Which of the following is the BEST encryption protocol to use to allow customers to access a
secure website

from the Internet without using VPNs?

A.IPSec

B.TLS

C.SSL version 1

D.SSL version 2

Correct Answer:

17.

Which of the following wireless security measures, although widely implemented, does not provide
strong

security?


A.IPSec

B.WPA2

C.MAC address filtering

D.802.1x

Correct Answer:

18.

Kim, a technician, suspects an attacker has accessed the ne
twork. Which of the following would
BEST help

confirm her theory?

A.SNMP

B.Traffic analysis

C.Network sniffer

D.System logs

Correct Answer:

19.

Jeff, a network technician, has been asked to add a web server and email server to the company's
network.

The compa
ny's stateful firewall must remain in place to prevent any external originating
traffic from entering the

internal network segment. Which of the following is the BEST solution to
ensure protecting the internal network

and implementing the new servers?

A.Bl
ock all TCP Port 80 traffic

B.Enable WPA encryption

C.Create a DMZ

D.Add an implicit deny
to the firewall

Correct Answer:

20.

An organization recently installed a firewall on the network. Employees must have access to their
work

computer from their home compu
ter. In which of the following ways should the firewall be
configured?

A.Allow TCP port 3389 outbound

B.Allow UDP port 3389 inbound


C.Allow UDP port 3389 outbound

D.Allow TCP port 3389 inbound

Correct Answer:

21.

An organization recently installed a firewall

on the network. Employees must be able to send and
receive email

from a POP3 server. In which of the following ways should the firewall be
configured? (Select TWO).

A.Allow TCP port 23

B.Allow TCP port 25

C.Allow TCP port 110

D.Allow UDP port 25

E.Allow

UDP port 110

Correct Answer:

22.

Which of the following is occurring when Jeff, an employee, unintentionally gives information that
is used

maliciously?

A.Tailgating

B.DoS attack

C.DDoS attack

D.Social engineering

Correct Answer:

23.

Which of the following atta
cks creates a buffer overflow to stop access to a system?

A.Blue jacking

B.DoS

C.Netstat

D.Man
-
in
-
the
-
middle

Correct Answer:

24.

Which of the following basic devices blocks ports and can sometimes filter data?

A.Repeater B.

Hub
C.Firewall

D.Switch

Correct Ans
wer:

25.

Which of the following devices will monitor for propagating worms?

A.Firewall

B.Proxy server

C.Mail server

D.IDS

Correct Answer: