100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Chapter 13 Network Pro practice exams questions and answers

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
02-02-2024
Written in
2023/2024

Chapter 13 Network Pro practice exams questions and answers

Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
February 2, 2024
Number of pages
17
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Chapter 13 Network Pro practice exams
questions and answers

You have just purchased a new network device and are getting ready to connect it to
your network. Which of the following should you do to increase its security? select two -
Answer- Apply all patches and updates

Change default account password

As a victim of a Smurf attack, what protection measure is the most effective during the
attack? - Answer- Communication with our upstream provider

Which of the following attacks tries to associate an incorrect MAC address with a know
IP address? - Answer- ARP poisoning

Which of the following best describes the Ping of Death exploit? - Answer- An ICMP
packet larger than 65,536 bytes?

Which exploit seeks to maliciously re-associate the IP address of a legitimate network
host with the MAC address of the attacker's computer? - Answer- ARP poisoning

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

A salesperson in your organization spent most of her time traveling between customers
sites. After a customer visit, she must complete various managerial tasks, such as
updating your organizations order database.
Because she rarely...
many of the things...
Which key step should you take when implementing this configurations? select two -
Answer- Configure the VPN connection to us IPsec

,Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose? - Answer- Support secured communications
over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data
securely over an IP network. Which of the following protocols is suitable for this task? -
Answer- PPTP

Which of the following protocols can your portable computer use to connect to your
company's network via a virtual tunnel through the internet? select two - Answer- L2TP
PPTP

IPsec is implemented through two separate protocols. What are these protocols called?
select two - Answer- AH
ESP

Which of the following network layer protocols provides authentications and encryptions
services for IP based network traffic? - Answer- IPsec

Which of the following statements about SSL VPN are true? select two - Answer- Uses
port 443
Encrypts the entire communication session

Which of the following can route layer 3 protocols across an IP network? - Answer- GRE

You have just downloaded a file. You created a hash of the file and compare it to the
hash posted on the website. The two hashes match. What do you know about the file? -
Answer- Your copy is the same as the copy posted on the website

Which of the following network devices or services prevents the use of IPsec in most
cases? - Answer- NAT

• The office manager informs you that her desktop system will no longer boot and asks
you to repair or replace it, recovering as much data as possible in the process. You
carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client? - Answer-
Implement a hardware checkout policy

What is a secure doorway that can be used in coordination with a mantrap to allow easy
egress from a secured environment but which actively prevents re-entrance through the
exit portal? - Answer- Turnstiles

Which of the following are solutions that address physical security?(Select two) -
Answer- Require identification and name badges for all employees //Escort visitors at all
times

, Which of the following can be used to stop piggybacking that has been occurring at the
front entrance where employees should swipe their smart cards to gain entry? - Answer-
Deploy a mantrap

You want to use CCTV to increase the physical security of your building. Which of the
following camera types would offer the sharpest image at the greatest distance under
the lowest lighting conditions? - Answer- 500 resolution, 50mm, .05 LUX

You want to use CCTV to increase your physical security. You want to be able to
remotely control the camera position. Which type of camera should you choose? -
Answer- PTZ

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer- Security guards

Which of the following CCTV types would you use in areas with little or no lights? -
Answer- Infrared

Which of the following CCTV camera types lets you adjust the distance that the camera
can see? - Answer- Varifocal

Which of the following controls is an example of a physical access control method? -
Answer- Locks on doors

You have 5 salesmen who work out of your office and who frequently leave their laptops
laying on their desk in their cubicles. You are concerned that someone might walk by
and take one of these laptops.
Which of the following is the best protection to implement to address your concerns? -
Answer- Use cable locks to chain the laptops to the desks

Match each physical security control on the left with an appropriate example of that
control on
the right. Each security control may be used once, more than once, or not at all. -
Answer- Hardened carrier
Protected cable distribution
Biometric authentication
Door locks
Barricades
Perimeter barrier
Emergency escape plans
Safety
Alarmed carrier
Protected cable distribution
Antipassback system
Physical access control
$14.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
2814
Member since
3 year
Number of followers
1959
Documents
41009
Last sold
2 days ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.7

534 reviews

5
234
4
83
3
103
2
31
1
83

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions