Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Practice Questions 6

Practice Questions 6

Computer Science

Practice Questions 6.13.5

1)Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?

 

2 Which of the following describes marks that attackers place outside a building to identify an open wireless network?

 

 

3 The process of walking around an office building with an 802.11 signal detector known as what?

 

4 Which of the following best describes Bluesnarfing?

 

5 Which of the following sends unsolicited business cards and messages to a Bluetooth device?

 

6 Which of the following is the best protection to prevent attacks on mobile phone through the Bluetooth protocol?  

 

7 You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standard could the network be using? (Select two.) 

 

 

8Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?  

 

9 Which of the following best describes an EVIL TWIN?

 

10 Network packet sniffing is often used to gain the information needed to conduct more specific and detailed attacks. Which of the following is the best defense against packet sniffing?

 

11 Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack? 

 

12 You are concerned that the wireless access points may have been deployed within your organization without authorization. What should you do? (Select two)

 

13 An attacker has hidden and NFC reader behind and NFC-based kiosk in and airport. What kind of attack has occurred?  

 

14 You are implementing a wireless network in a dentist office. The dentist practice is small, so you choose to use an inexpensive, consume-grade access point. what should you do to reduce risk?

 

 

 

Practice Questions 6.14.9

 

15 Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?  

 

16 Which remote access authentication protocol allows for the use of smart cards for authentication?

 

17 Which of the following do switches and wireless access points use to control access through the device?  

 

18 You want to implement 802.1 x authentications on your wireless network. Where would you configure passwords that are used for authentication? 

 

19 You are the wireless network administrator for your organization. As the size of the Organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. Which of the following is TRUE concerning this implementation?

 

20 You are the wireless network administrator for your organization. As the size of the Organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of pre-shared keys. What should you do? (Select two)

 

21 Which EAP implementation is most secure?  

 

22 Which of the following features on a wireless network allows or rejects client connections based on the hardware address?  

 

23 You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from accessing the access point (AP) configuration utility?

 

24 You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?

 

25 What is the LEAST secure place to locate an access point with an omni-directional antenna when creating a wireless cell?  

 

26 What purpose does a wireless site survey server? (Choose two.)

 

27 You need to place a wireless access point in your two-story building. While trying to avoid interference, which of the following is the best location for the access point? 

 

28 The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guest. what should you do?

 

 

 

 

7.1.3  Practice Exam

 

29 You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose? 

 

30 Which of the following is an average of using switches to create virtual LANs?

 

31 Which characteristic of a switch can improve bandwidth utilization and reduce the risk of sniffing attacks on the network?   

 

32 Which of the following devices does "NOT" examine the MAC address in a frame before processing or forwarding the frame?

 

33 What characteristic of hubs poses a security threat? 

 

34 Which of the following describes how a router can be used to implement security on your network?

 

 

7.2.6  Practice Exam

35 A relative new employee in the data entry cubical farm was assigned a user account similar to that of all of the other data entry employees. However, audit logs have shown that this user account has been used to change ACLs on several confidential files and has accessed data in restricted areas. This situation indicates which of the following has occurred? 

 

36 An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions? 

 

37 You've just deployed a new Cisco router that a connects several network segments in your Org. What should you do to increase the security of this device?  

 

38 While deploying a network application, a programmer adds functionally that allows her to access the running program, whithout authentication, to capture debugging data. what type of security weakness does this represent?

 

 

 

7.3.3  Practice Exam

39 Which of the following attacks, if successful, causes a switch to function like a hub?

 

40 Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices? 

 

41 Which is a typical goal of MAC spoofing?

 

42 Which protocol should you disable on the user access ports of a switch? 

 

7.4.3  Practice Exam

 

43 You've just deployed a new Cisco router that a connects several network segments in your Org. What should you do to increase the security of this device? (Select two)

 

44 You've just deployed a new Cisco router that a connects several network segments in your Org. What should you do to increase the security of this device?

 

45 You've just deployed a new Cisco router that a connects several network segments in your Org. What should you do to increase the security of this device? 

 

 

 

7.5.12  Practice Exam

 

46 A virtual LAN can be created using which of the following?

 

47 When configuring VLANs on a switch, what is used to identify VLAN membership of a device?  

 

48 You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?  

 

49 Which of the following applications typically use 802.1x authentication? (Select two)

 

50 You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet Access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?   

 

51 When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

 

52 You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to make sure that visitors cannot plug in their computer to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure? 

 

53 Which of the following solutions would you implement to eliminate switching loops? 

 

54 You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? 

 

55 In which of the following situations would you use port security?

 

 

 

 

56 You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computers has been difficult. You've had problems with patrons brining personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the Internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access point on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do?

 

57 You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive doc. on a computer that would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you implement?

 

58 Which of the following best describes the concept of virtual LAN?  

 

59 Your company is a small start-up company that has leased office in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?

 

60 You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. What feature should your switch support? 

 

 

 

 

7.6.7  Practice Exam

 

61 You are concerned about protecting your network from network-based attacks from the Internet. Specially, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?  

 

62 What do host based intrusion detection systems often rely upon to perform their detection activities?

 

63 What actions can a typical passive intrusion Detection System (IDS) take when it detects and attack? (Select two)

 

64 Which of the following activities are considered passive in regards to the functioning of an IDS? (Select two)

 

65 An active IDS system often performs which of the following actions? (Select two)

 

66 Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database? 

 

67 You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis? 

 

 

68 What is the most common form of host based IDS that employs signature or pattern matching detection methods?

 

69 You have configured a NIDS to monitor network traffic. Which of the following describes an attack that is not detected by the NIDS device?  

 

70 Which of the following describes a false positive when using an IPS device?

 

71 If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?   

 

72 Which of the following devices is capable of detecting and responding to security threats?

 

73 You want to create a collection of computers on your network that appear to have valuable data, but are really computers configured with fake data that could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the methods of attack that is being deployed. What should you implement?

 

74 A honey pot is used for what purpose?  

 

75 Your organization uses a Web server to host an e-commerce site.... What should you do?

 

 

 

 

7.7.4  Practice Exam

 

76 You are implementing an iSCSI SAN that will be used by the file servers in your organization. Which of the following are true in the scenario? (Select two)

 

77 You are implementing a Fibre Channel SAN that will be used by the database servers in your organization. Which of the following are true in this scenario? (Select two)

 

Option 1

Low Cost Option
Download this past answer in few clicks

6.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions