• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back

The APIPA address 169.254.10.123 falls into which of the following class of addresses?


A. A


B. B


C. C


D. D

B. B

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?


A. Load balancing internal web servers


B. Redundant network resources


C. Implement fault tolerance on the WAN


D. Implement caching engines

D. Implement caching engines

A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?



A. The router should be listed as 224.0.0.1


B. The NIC is set to the wrong subnet mask


C. The route of last resort is missing


D. Loopback traffic is weighted higher than NIC interface traffic

C. The route of last resort is missing.

Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network.Which of the following settings is incorrect on the client?


A. The mode is incorrect


B. SSID Mismatch


C. Incorrect WEP Key


D. Channel is set incorrectly

B. SSID Mismatch

A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?


A. The DHCP lease pool was not large enough


B. DHCP lease times were set too low


C. The router is not the only DHCP server


D. DHCP was not enabled on the replacement router

C. The router is not the only DHCP server

A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?


A. Kerberos


B. CHAP


C. TACACS+


D. RADIUS

A. Kerberos

Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?


A. WPA2-CCMP


B. WPA


C. WEP


D. WPA2-TKIP

A. WPA2-CCMP

Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?


A. Layer 3


B. Layer 5


C. Layer 6


D. Layer 7

C. Layers 6

A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?


A. DoS


B. Buffer overflow


C. Dictionary file


D. SQL injection

C. Dictionary file

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?


A. Evil twin


B. War chalking


C. Buffer overflow


D. Virus

A. Evil Twin

A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?


A. Behavior based IDS


B. Network based IDS


C. Signature based IDS


D. Honeypot

C. Signature based IDS

A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?


A. Change management


B. Asset management


C. Network sniffer


D. System logs

B. Asset management

Which of the following can be described as a DoS attack?


A. Disabling a specific system and making it unavailable to users


B. Implementing a keylogger


C. Intercepting a packet and decrypting the contents


D. Communicating with employees to get company information

A. Disabling a specific system and making it unavailable to users.

A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?


A. Man-in-the-middle


B. Social engineering


C. Phishing


D. DoS

A. Man-in-the-middle

An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?


A. Antivirus scanner


B. IDS


C. Packet sniffer


D. Toner probe

C. Packet sniffer