Questions with Answers Correct!!
Which tools are tunneling protocols?
PPTP and L2TP
OpenVPN and IPsec
IPSec and Radius
HTTP and HTTPS - ANSWERSPPTP and L2TP
A type of VPN connection where a single computer logs into a remote network and
becomes, for all intents and purposes, a member of that network is commonly called
a(n) __________ connection.
host-to-site
open
virtual
routed - ANSWERShost-to-site
Which tool can be used to identify the location of a cable break in a copper cable?
cable tester
certifier
time domain reflectometer
optical time domain reflectometer - ANSWERStime domain reflectometer
Which document is arguably the most famous of all security policies as this is one
document that pretty much everyone who works for any organization is required to read,
and in many cases sign, before they can start work?
material safeties data sheet (MSDS)
forensics report
acceptable use policy (AUP)
exit plan - ANSWERSacceptable use policy (AUP)
,Generally, what do software as a service (SaaS) providers charge you for?
security
what you use
subscriptions
time - ANSWERSsubscriptions
Which tool is an open-source tool for penetration testing pretty much every aspect of
wireless networks?
Aircrack-ng
Armitage
Kali Linux
OpenVAS - ANSWERSAircrack-ng
Which command can be used on a Windows computer to view the IP settings?
ip
ss
ipconfig
ifconfig - ANSWERSipconfig
What is an advantage of fiber-optic cabling?
signals travel more slowly
easier and cheaper to install than UTP
greater maximum distance
susceptible to electrical interference - ANSWERSgreater maximum distance
Which component houses network engineers and technicians who maintain the
applications housed in the data center, such as databases, Web servers, and so forth?
main distribution frame (MDF)
power distribution unit (PDU)
intermediate distribution frame (IDF)
network operations center (NOC) - ANSWERSnetwork operations center (NOC)
Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems?
2427 and 2727
5004 and 5005
5030 and 5031
5060 and 5061 - ANSWERS5060 and 5061
Which term refers to a single computer under the control of an operator?
, DDoS
smurf attack
phishing
zombie - ANSWERSzombie
Which value of the ECN field indicates "QoS aware, no congestion"?
00
10
11
20 - ANSWERS10
Which type of network is created when you use encrypted tunnels between a computer
or a remote network and a private network through the Internet?
peer-to-peer
dial-up
client/server
virtual private network (VPN) - ANSWERSvirtual private network (VPN)
Which term represents a measurement of how well a wireless device is connecting to
other devices?
mode
signal strength
link state
access - ANSWERSsignal strength
The physical location where connections come in from the outside world is known as
the ____________________.
telecommunications room (TCR)
customer premises equipment (CPE)
demarcation point (demarc)
power distribution unit (PDU) - ANSWERSdemarcation point (demarc)
Which service is considered to be the middle of the service-layer cake?
platform as a service (PaaS)
desktop as a service (DaaS)
software as a service (SaaS)
infrastructure as a service (IaaS) - ANSWERSplatform as a service (PaaS)
Which tool is an installed on the system in lieu of an operating system?