Chapter 13 Network Pro practice exams questions and answers
Chapter 13 Network Pro practice exams questions and answers You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? select two -Answer- Apply all patches and updates Change default account password As a victim of a Smurf attack, what protection measure is the most effective during the attack? - Answer-Communication with our upstream provider Which of the following attacks tries to associate an incorrect MAC address with a know IP address? -Answer-ARP poisoning Which of the following best describes the Ping of Death exploit? -Answer-An ICMP packet larger than 65,536 bytes? Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer? -Answer-ARP poisoning You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? -Answer-VPN concentrator You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? -Answer-VPN concentrator A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two -Answer- Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection A VPN is used primarily for what purpose? -Answer-Support secured communications over an untrusted network. You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? -Answer-PPTP Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two -Answer-L2TP PPTP IPsec is implemented through two separate protocols. What are these protocols called? select two -Answer-AH ESP Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic? -Answer-IPsec Which of the following statements about SSL VPN are true? select two -Answer-Uses port 443 Encrypts the entire communication session Which of the following can route layer 3 protocols across an IP network? -Answer-GRE You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file? -Answer-Your copy is the same as the copy posted on the website Which of the following network devices or services prevents the use of IPsec in most cases? - Answer-NAT • The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it. What securityrelated recommendations should you make to this client? -Answer-Implement a hardware checkout policy What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal? - Answer-Turnstile
Written for
- Institution
- TestOut Network Pro
- Course
- TestOut Network Pro
Document information
- Uploaded on
- February 3, 2024
- Number of pages
- 18
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
chapter 13 network pro practice exams questions an
Also available in package deal