New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA JK0-023 Dumps Questions Answers

Page: 1 / 30
Total 1112 questions

CompTIA Network+ certification Questions and Answers

Question 1

In which of the following wireless standards is MIMO used?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Question 2

Which of the following has the HIGHEST data rate speed?

Options:

A.

T1

B.

ADSL

C.

SDSL

D.

OC-3

Question 3

Which of the following is used for SONET connections and requires a wavelength of 1310nm?

Options:

A.

10GBASECX4

B.

10GBASELX4

C.

10GBASELW

D.

10GBASESR

Question 4

Which of the following connectors is used for coaxial copper cable?

Options:

A.

BNC

B.

DB-9

C.

RJ-11

D.

ST

Question 5

Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

Options:

A.

Install two CAT6 cables with a repeater.

B.

Install a 500 foot (152 meter) CAT5 cable.

C.

Install a 500 foot (152 meter) CAT5e cable.

D.

Install three CAT6 cables with a repeater.

Question 6

Which of the following 802.11 standards transmits the signals the GREATEST distance?

Options:

A.

a

B.

b

C.

g

D.

n

Question 7

The unit responsible for the successful shaping and transmission of a digital signal is called:

Options:

A.

demarc.

B.

T1 hub.

C.

smart jack.

D.

CSU/DSU.

Question 8

An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?

Options:

A.

Improper grounding

B.

TXRX reversed

C.

Incorrect termination

D.

Outdated NIC drivers

Question 9

Which of the following allows 802.11n higher transfer speeds than the previous wireless standards?

Options:

A.

Dual frequency

B.

Enhanced encryption

C.

MIMO technology

D.

Backwards compatibility

Question 10

Which of the following wireless standards operates on the same frequency as 802.11a?

Options:

A.

Compatible with 802.11b wireless networks

B.

Compatible with 802.11g wireless networks

C.

Compatible with 802.11i wireless networks

D.

Compatible with 802.11n wireless networks

Question 11

Kurt, a technician, notices a newly installed CAT5 cable is longer than the standard maximum length. Which of the following problems would this MOST likely cause?

Options:

A.

Split cable

B.

EMI

C.

DB loss

D.

Crosstalk

Question 12

Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?

Options:

A.

10GBaseER

B.

10GBaseSR

C.

10GBaseTX

D.

10GBaseT

Question 13

Which of the following fiber types is MOST often used indoors?

Options:

A.

Plenum

B.

Modal conditioning

C.

Multimode

D.

Singlemode

Question 14

Which of the following BEST describes the point at which an ISP’s responsibility for an Internet connection ends?

Options:

A.

Router

B.

MDF

C.

IDF

D.

Demarc

Question 15

Which of the following components of wiring distribution is referred to as the core communications closet for an organization?

Options:

A.

MDF

B.

Smart jack

C.

IDF

D.

Demarc extension

Question 16

Which of the following defines a rack located in an office building between the main rack and other office equipment?

Options:

A.

DSU

B.

MDF

C.

CSU

D.

IDF

Question 17

In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?

Options:

A.

MIMO, DSSS

B.

MIMO, OFDM

C.

CSMA, DSSS

D.

CSMA, CDMA

Question 18

Which of the following spreads out each of the individual wires of a UTP cable onto their own metal connector?

Options:

A.

BNC connection

B.

110 block

C.

Plenum

D.

LC connector

Question 19

Which of the following would be considered a Demarc extension?

Options:

A.

A patch cable connecting a cable modem with a wireless router

B.

Patch panel wiring

C.

Punch down block wiring

D.

Copper wire connecting the main PSTN point of entry to a wall data outlet

Question 20

Which of the following can MOST likely cause intermittent connection problems with a CAT5 network cable?

Options:

A.

Cable has been looped too many times.

B.

Cable has a twist tie attached too close to the connector.

C.

Cable is too warm.

D.

Cable is run too close to a fluorescent light.

Question 21

Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?

Options:

A.

Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.

B.

Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.

C.

Manually adjust the duplex mode on the server’s link.

D.

Configure the laptop to receive a DHCP address from the server, rather than manually setting one.

Question 22

In a small office environment, one computer is set up to provide Internet access to three other computers that are not interconnected. This is an example of which of the following topology types?

Options:

A.

Peer-to-peer

B.

Point-to-multipoint

C.

Hybrid

D.

Point-to-point

Question 23

At which of the following locations does the responsibility of a Telco provider cease?

Options:

A.

IDF

B.

CSU

C.

Demarc

D.

MDF

Question 24

Which of the following connectors are MOST commonly used on a POTS line?

Options:

A.

RJ-45

B.

MTRJ

C.

DB-9

D.

RJ-11

Question 25

A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?

Options:

A.

NIC bonding

B.

Proxy server

C.

Firewall ACLs

D.

VLANs

Question 26

Which of the following is the control when observing network bandwidth patterns over time?

Options:

A.

Network log

B.

Baseline

C.

Flow data

D.

Interface statistics

Question 27

A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem?

Options:

A.

Environmental monitor

B.

Cable tester

C.

TDR

D.

Loopback plug

Question 28

Which of the following features can BEST be used to facilitate authorized remote access to a network?

Options:

A.

VPN concentrator

B.

Proxy server

C.

Content filter

D.

Load balancer

Question 29

A company has been just opened a new site in another country. Both sites share information across the WAN continuously throughout the business day. Which of the following should be implemented to ensure both sites are accessible?

Options:

A.

Traffic shaping

B.

QoS

C.

Caching engines

D.

High availability

Question 30

Which of the following network performance methods would Lisa, a technician, use with SIP phones?

Options:

A.

CARP

B.

Load balancing

C.

QoS

D.

Caching engines

Question 31

Kim, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user’s workstation with IP address 192.168.1.45. To identify the workstation’s packets Kim wants to use the workstation’s MAC address. Which of the following protocols would provide the needed information?

Options:

A.

DHCP

B.

ARP

C.

DNS

D.

PING

Question 32

A technician testing an Ethernet card uses a cable wired with pins 1,2 to pins 3,6 on the same RJ-45 plug. Which of the following describes what the technician is using?

Options:

A.

RS-232

B.

Rollover cable

C.

Loopback

D.

Point to point cable

Question 33

Which of the following syslog severity codes indicates an emergency and that the system is unusable?

Options:

A.

0

B.

1

C.

6

D.

7

Question 34

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?

Options:

A.

Cable tester

B.

Toner probe

C.

Cable crimper

D.

Punch down tool

Question 35

An IT manager is looking for a solution that can easily trace back suspicious Internet browsing to particular users at a company. Which of the following can BEST provide this functionality?

Options:

A.

Layer 3 managed switch

B.

VPN concentrator

C.

Load balancer

D.

Content filter

Question 36

Kurt, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this?

Options:

A.

History logs

B.

Event logs

C.

Syslog server

D.

Traffic analyzer

Question 37

A server that filters traffic between a WAN and a LAN is which of the following?

Options:

A.

Proxy server

B.

RAS server

C.

Default gateway

D.

Email server

Question 38

Which of the following commands can a network technician use to check whether the DNS server for a given domain is reachable?

Options:

A.

nmap

B.

nbtstat

C.

dig

D.

arp

Question 39

Which of the following BEST describes a load balancer?

Options:

A.

A device that splits traffic between multiple nodes of a clustered service.

B.

A device that allows multiple computers to access the internet through a single public IP address.

C.

A device that filters internet content based on rules and ACLs.

D.

A device that separates users onto separate WAPs for even distribution.

Question 40

When troubleshooting a connectivity issue, which of the following commands will give Joe, the technician, a list of the host names connected to the network?

Options:

A.

ping

B.

nbstat

C.

arp

D.

msconfig

Question 41

After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?

Options:

A.

Multimeter

B.

Cable certifier

C.

Cable tester

D.

Toner probe

Question 42

Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?

Options:

A.

IP filtering

B.

Application filtering

C.

MAC filtering

D.

Port filtering

Question 43

Lisa, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).

Options:

A.

Cable certifier

B.

Multimeter

C.

Crimper

D.

Punch down tool

E.

Loopback plug

Question 44

A company has a server with redundant power supplies. Which of the following is this an example of?

Options:

A.

Traffic shaping

B.

Caching engines

C.

Fault tolerance

D.

Load balancing

Question 45

Which of the following network appliances will only detect and not prevent malicious network activity?

Options:

A.

IDS

B.

Network sniffer

C.

IPS

D.

Firewall

Question 46

Karen, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads. Which of the following protocols will the tool use to show the necessary information?

Options:

A.

SNMP

B.

NTP

C.

SIP

D.

PPTP

Question 47

Which of the following defines access for a network?

Options:

A.

ACL

B.

RDP

C.

RAS

D.

ARP

Question 48

Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation?

Options:

A.

Content filter

B.

Proxy server

C.

Layer 3 switch

D.

Firewall

Question 49

Which of the following network protocols is used for a secure command line interface for management of network devices?

Options:

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Question 50

The network technician has recently implemented VLANs on the company network. Ever since this implementation, sections within the company can no longer share information. While troubleshooting, the technician realizes they are unable to ping a device from another VLAN. Which of the following needs to be configured to fix this problem?

Options:

A.

Clear the ARP table

B.

Add host entries on the user’s computer

C.

Configure 802.1x trunks on the switches

D.

Configure 802.1q trunks on the switches

Question 51

Assigning IP addresses from a pool of predetermined available addresses is the role of which of the following network appliances?

Options:

A.

RADIUS

B.

DNS

C.

DHCP

D.

IDS

Question 52

Which of the following is an advantage of dynamic routing?

Options:

A.

It can reroute connectivity in the event of failure.

B.

It is the simplest form of routing.

C.

The routes do not change.

D.

The setup and configuration are done manually.

Question 53

A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?

Options:

A.

VPN

B.

Throughput tester

C.

Firewall

D.

OC3

Question 54

Which of the following default ports would need to be open on a firewall to allow remote desktop access?

Options:

A.

143

B.

443

C.

3389

D.

8080

Question 55

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

Options:

A.

Telnet

B.

FTP

C.

SNMP

D.

SSH

E.

RDP

Question 56

A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?

Options:

A.

Fiber optic

B.

Wireless

C.

CAT5e

D.

CAT3

Question 57

Which of the following addresses is a class B private address?

Options:

A.

132.216.14.184

B.

152.119.25.213

C.

162.17.43.22

D.

172.23.226.34

Question 58

Which of the following wireless standards provide speeds up to 150Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 59

At which of the following layers of the OSI model is the Logical Link Control found?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Question 60

Drag and drop the following maximum speeds to their corresponding wireless standards. Tokens can be used more than once.

Options:

Question 61

A technician is looking to secure an entire network by blocking all non-essential ports. Which of the following devices would BEST provide this functionality?

Options:

A.

Firewall

B.

Honeynet

C.

IDS

D.

IPS

Question 62

A user reports that they are unable to access a new server but are able to access all other network resources. Based on the following firewall rules and network information, which of the following ACL entries is the cause?

User’s IP: 192.168.5.14

Server IP: 192.168.5.17

Firewall rules:

Permit 192.168.5.16/28192.168.5.0/28

Permit 192.168.5.0/24192.168.4.0/24

Permit 192.168.4.0/24192.168.5.0/24

Deny 192.168.5.0/28192.168.5.16/28

Deny 192.168.14.0/24192.168.5.16/28

Deny 192.168.0.0/24192.168.5.0/24

Options:

A.

Deny 192.168.0.0/24192.168.5.0/24

B.

Deny 192.168.5.0/28192.168.5.16/28

C.

Deny 192.168.14.0/24192.168.5.16/28

D.

Implicit Deny rule

Question 63

Which of the following is a fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

GBIC

C.

MT-RJ

D.

SC

Question 64

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

Options:

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Question 65

Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?

Options:

A.

Cable tester

B.

Toner probe

C.

OTDR

D.

Loopback plug

Question 66

A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?

Options:

A.

LLDP

B.

VLAN tagging

C.

QoS

D.

SIP trunking

Question 67

Which of the following cable types is unshielded?

Options:

A.

STP

B.

Twinax

C.

UTP

D.

Coax

Question 68

Which of the following source ports is MOST likely to be used by a client when making an outbound TCP connection to a windows server?

Options:

A.

80

B.

445

C.

3000

D.

3389

Question 69

Which of the following network topologies is ONLY possible between two users?

Options:

A.

Star

B.

Client-server

C.

Hybrid

D.

Peer-to-peer

Question 70

Which of the following network protocols is used to transport email between servers?

Options:

A.

IMAP4

B.

POP3

C.

SNMP

D.

SMTP

Question 71

Which of the following provides the STRONGEST security for a tunneled connection over the Internet?

Options:

A.

RDP

B.

SMTP

C.

RAS

D.

IPSec

Question 72

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

Options:

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

Question 73

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).

Options:

A.

172.16.0.255

B.

172.16.0.0

C.

172.16.1.1

D.

172.16.8.0

E.

172.16.256.255

Question 74

Which of the following is used to describe trunking VLANs on a network?

Options:

A.

802.11a

B.

802.11i

C.

802.1q

D.

802.1x

Question 75

Which IEEE protocol is used with VLAN technology?

Options:

A.

802.11a

B.

802.11b

C.

802.1m

D.

802.1q

Question 76

Which of the following uses port 23 by default?

Options:

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

Question 77

Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?

Options:

A.

CNAME

B.

A

C.

MX

D.

PTR

Question 78

Which of the following exist at layer three of the OSI model? (Select TWO).

Options:

A.

NIC

B.

Switch

C.

Frame

D.

Packet

E.

Router

F.

Cable

Question 79

Which of the following is the definition of a DNS server?

Options:

A.

Hosts proprietary business applications

B.

Translates FQDN’s to IP addresses

C.

Provides network IDS/IPS security

D.

Assigns IP addresses to network devices

Question 80

Which of the following assists a network administrator in reverse engineering malware and viruses?

Options:

A.

Virtual switches

B.

Virtual machines

C.

VLANs

D.

IDS

Question 81

IP address based routing occurs on which of the following layers of the OSI model?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Question 82

Which of the following is the common port used for IMAP?

Options:

A.

25

B.

53

C.

143

D.

443

Question 83

Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?

Options:

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Question 84

Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?

Options:

A.

TCP

B.

FTP

C.

TFTP

D.

UDP

Question 85

Zach, a network administrator, is responding to a support ticket. The ticket does not have enough information to determine the problem. Which of the following should Zach perform FIRST before responding to the ticket?

Options:

A.

Determine if anything has changed.

B.

Test a theory to determine a cause.

C.

Establish a plan of action to resolve the problem.

D.

Escalate the problem if necessary.

Question 86

Which of the following is an invalid MAC address?

Options:

A.

AA:CE:58:FD:90:08

B.

44:98:3E:F8:33:23

C.

56:AD:BX:89:55:54

D.

94:9E:FE:EE:8C:DF

Question 87

Which of the following protocols is commonly used for VoIP technology?

Options:

A.

Telnet

B.

SMTP

C.

SIP

D.

SNMP

Question 88

At which layer of the OSI model do MAC addresses operate?

Options:

A.

Data Link

B.

Network

C.

Application

D.

Physical

Question 89

Which TCP/IP model layer does the OSI model layer named 'session' respond to?

Options:

A.

Application

B.

Presentation

C.

Internet

D.

Transport

Question 90

Which of the following is the MAXIMUM hop count for RIP before the network is considered converged?

Options:

A.

1

B.

5

C.

10

D.

15

Question 91

Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

Options:

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.192

D.

255.255.255.248

Question 92

Which of the following network protocols is used to resolve FQDNs to IP addresses?

Options:

A.

DNS

B.

FTP

C.

DHCP

D.

APIPA

Question 93

Which of the following services would have assigned the IP address 169.254.1.89?

Options:

A.

DHCP

B.

APIPA

C.

IDS

D.

DNS

Question 94

If a NIC does not have a link light, there is a failure at which of the following OSI layers?

Options:

A.

Physical

B.

Session

C.

Data link

D.

Presentation

Question 95

Which of the following protocols is used by the ping command?

Options:

A.

SMTP

B.

ICMP

C.

TFTP

D.

ARP

Question 96

At which layer of the OSI and TCP/IP model would HTTP and FTP be found?

Options:

A.

Application

B.

Network

C.

Session

D.

Data Link

Question 97

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Question 98

Which of the following network tools is used to identify running services on host devices?

Options:

A.

IDS

B.

IPS

C.

Firewall

D.

NMAP

Question 99

A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this?

Options:

A.

WPA encryption

B.

MAC filtering

C.

Changing antenna type

D.

Decreasing radio strength

Question 100

Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?

Options:

A.

MAC filtering

B.

RAS

C.

SSL VPN

D.

L2TP

Question 101

A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?

Options:

A.

tracert

B.

QoS

C.

ipconfig

D.

MAC filtering

Question 102

Which of the following is a standard measure of signal power?

Options:

A.

MHz

B.

mips

C.

dBm

D.

Gbps

Question 103

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

Options:

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Question 104

A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).

Options:

A.

Change the encryption method to WPA

B.

Limit the DHCP scope to only have three addresses total

C.

Enable the SSID broadcast

D.

Enable and configure MAC filtering

E.

Change the broadcast channel to a less commonly used channel

Question 105

Which of the following security appliances are used to only identify traffic on individual systems?

Options:

A.

Host based IPS

B.

Application based IPS

C.

Network based IDS

D.

Host based IDS

Question 106

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Question 107

Which of the following should the last line of an ACL normally contain?

Options:

A.

Explicit allow

B.

Statically routed

C.

Random access

D.

Implicit deny

Question 108

Which of the following should be mitigated by employing proper coding techniques when developing software?

Options:

A.

Distributed denial of service attacks

B.

Buffer overflows

C.

War driving

D.

Packet sniffing

Question 109

Lisa, an administrator, believes that the network has been attacked and MAC addresses have been captured allowing unauthorized computers to access the network. Which of the following tools did the attackers MOST likely use to accomplish this?

Options:

A.

Intrusion prevention software

B.

Packet sniffer

C.

Intrusion detection software

D.

Port scanner

Question 110

An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?

Options:

A.

Allow TCP port 3389 outbound

B.

Allow UDP port 3389 inbound

C.

Allow UDP port 3389 outbound

D.

Allow TCP port 3389 inbound

Question 111

Which of the following solutions will detect and disable a rogue access point?

Options:

A.

Port scan

B.

Packet sniffer

C.

IPS

D.

IDS

Question 112

Which of the following tools could attempt to detect operating system vulnerabilities?

Options:

A.

nslookup

B.

honeynet

C.

netstat

D.

nessus

Question 113

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

Options:

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

Question 114

Which of the following is MOST commonly implemented for remote access to UNIX systems?

Options:

A.

SSL

B.

RSH

C.

SSH

D.

RDP

Question 115

A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?

Options:

A.

Kerberos

B.

CHAP

C.

TACACS+

D.

RADIUS

Question 116

Which of the following protocols works at the LOWEST layer of the OSI model?

Options:

A.

L2TP

B.

PPTP

C.

ISAKMP

D.

IPSec

Question 117

A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?

Options:

A.

Behavior based IDS

B.

Network based IDS

C.

Signature based IDS

D.

Honeypot

Question 118

Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?

Options:

A.

Man-in-the-middle

B.

Denial of service

C.

Ping flooding

D.

Smurfing

Question 119

A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?

Options:

A.

Stateful inspection

B.

WEP

C.

WPA

D.

Open with EAP

Question 120

Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic?

Options:

A.

Port filtering

B.

IP filtering

C.

MAC filtering

D.

Application filtering

Page: 1 / 30
Total 1112 questions