QUESTIONS AND ANSWERS RATED A+ 2023
Which network device or component ensures that the computers on the network
meet an organization's security policies? - ANSWER: NAC
You have been hired as a security consultant by a new small business. The business
owner wants to implement a secure Web site. You suggest that the Web pages be
secured using SSL. Which protocol should be used? - ANSWER: HTTPS
Your company currently uses IPv4 addresses on its network. You need to convince
your organization to start using IPv6 addresses. Which two reasons for changing
should you give management? - ANSWER: It has 340 undecillion available addresses
It uses 128-bit addresses
Omni Antenna - ANSWER: a multi-directional antenna that radiates radio wave
power uniformly in all directions in one plane with a radiation pattern shaped like a
doughnut
Yagi Antenna - ANSWER: a directional antenna with high gain and narrow radiation
pattern
Sector Antenna - ANSWER: a directional antenna with a circle measured in degrees
of arc radiation pattern
Dipole - ANSWER: the earliest, simplest, and most widely used antenna with a
radiation pattern shaped like a doughnut
Platform as a Service (PaaS) - ANSWER: Allows organizations to deploy Web servers,
databases, and development tools in a cloud
Software as a Service (SaaS) - ANSWER: Allows organizations to run applications in a
cloud
Infrastructure as a Service (IaaS) - ANSWER: Allows organizations to deploy virtual
machines, servers, and storage in a cloud
Your company implements an Ethernet network. During a recent analysis, you
discover that network throughput capacity has been wasted as a result of the lack of
loop protection. What should you deploy to prevent this problem? - ANSWER: STP
Which network entity acts as the interface between a local area network and the
Internet using one IP address? - ANSWER: NAT router
Several users report that they are having trouble connecting to the organization's
Web site that uses HTTPS. When you research this issue, you discover that the Web
, client and Web server are not establishing a TCP/IP connection. During which phase
of SSL communication is the problem occurring? - ANSWER: handshake
Management of your company wants to allow the departments to share files using
some form of File Transfer Protocol (FTP). You need to explain the different FTP
deployments. By default, which FTP solution provides the LEAST amount of security?
- ANSWER: TFTP
Your company has a UNIX computer. Several users have requested remote access to
this server. You need to implement a solution that transmits encrypted
authentication information over a secure communications channel and transmits
data securely during terminal connections with UNIX computers. Which technology
should you use? - ANSWER: SSH
Your company has decided to deploy a data storage network solution. You have
been asked to research the available options and report the results, including
deployment cost, performance, and security issues. Which of the following solutions
should NOT be included as part of your research? - ANSWER: RAID
Your organization purchases a set of offices adjacent to your current office. You need
to broaden the area to which a wireless access point (AP) can transmit. What should
you do - ANSWER: Adjust the power level setting slightly higher.
Which network devices can you use to connect two or more of the LAN segments
together without collisions? - ANSWER: Router
Switch
Bridge
You have been hired as a company's network administrator. The company's network
currently uses statically configured IPv4 addresses. You have been given a list of
addresses that are used on the network that include the addresses listed in the
options. However, you are sure that some of these addresses are NOT IPv4
addresses. Which addresses are not valid? - ANSWER: fe80::200:f8ff:fe21:67cf
00-0C-F1-56-98-AD
You need to ensure that a single document transmitted from your Web server is
encrypted.
What should you do? - ANSWER: Use S-HTTP
Often the sales people for your company need to connect some wireless devices
together without having an access point available. You need to set up their laptops
to ensure that this communication is possible. Which communications mode should
you use? - ANSWER: ad hoc
You have discovered that hackers are gaining access to your WEP wireless network.
After researching, you discover that the hackers are using war driving. You need to