CompTIA Network+ #2

100 Questions | Total Attempts: 144

SettingsSettingsSettings
Network Plus Quizzes & Trivia

CompTIA Network+ #2


Questions and Answers
  • 1. 
    Data information is sent onto the network cable using which of the following?
    • A. 

      Communication protocol

    • B. 

      Data Packets

    • C. 

      Media access Method

    • D. 

      Packages

  • 2. 
    To which TCP/IP architecture layer do TCP and UDP belong?
    • A. 

      Application

    • B. 

      Internet

    • C. 

      Network Interface

    • D. 

      Transport

  • 3. 
    Which IEEE standard defines the communication protocol for Wireless?
    • A. 

      802.3

    • B. 

      802.5

    • C. 

      802.11

    • D. 

      802.15

    • E. 

      802.16

  • 4. 
    Which protocol is used to convert logical IP addresses to physical MAC addresses?
    • A. 

      IMAP4 Internet Message Access Protocol 4

    • B. 

      DNS Domain Name Service

    • C. 

      ARP Address Resolution Protocol

    • D. 

      RIP Routing Internet Protocol

  • 5. 
    224.106.27.170 is a Class _____ IP Address.
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

    • E. 

      E

  • 6. 
    What type of attack sends a lot of 1/2 open TCP connections which prevent users from being able to access the server?
    • A. 

      DOS

    • B. 

      Synflood

    • C. 

      Ping of Death

    • D. 

      Smurf Attack

    • E. 

      DDOS

  • 7. 
    This authentication defines message formats rather than being an authentication mechanism. There are more than 40 of these methods now. They are PPP extensions also used in wireless with multiple authentication methods.
    • A. 

      CHAP (Challenge Handshake Protocol)

    • B. 

      EAP (Extensible Authentication Protocol)

    • C. 

      PPPoE (Point to Point over Eithernet Protocol)

    • D. 

      Mutual Authentication

  • 8. 
    The users in a subset of Kerbos are refered to as a __________.
    • A. 

      Principal

    • B. 

      Authentication Server (AS)

    • C. 

      Ticket-Granting Server (TGS)

    • D. 

      Key Distribution Center (KDC)

    • E. 

      Realm

  • 9. 
    This Kerbos item is a record used by a client to authenticate to a server. It contains the clients identity, session key, timestamp and checksum. The recods is secured by the resource servers secret key.
    • A. 

      Credentials

    • B. 

      Session Key

    • C. 

      Authenticator

    • D. 

      Ticket

    • E. 

      Ticket-Granting Ticket (TGT)

  • 10. 
    The Ping utility is the most common use of which protocol?
    • A. 

      ARP Adress Resolution Protocol

    • B. 

      ICMP / ICMPv6 Internet Control Message Protocol

    • C. 

      IGMP Internet Group Message Protocol

    • D. 

      RIP Routing Internet Protocol

  • 11. 
    The NIDS reaction option (Network Intrusion Detection System) where the NIDS sends a TCP packet to the victim host which terminates all sessions and haults the attack in progress.
    • A. 

      TCP reset (an active reaction)

    • B. 

      IP session logging (a passive reaction)

    • C. 

      Shunning (an active reaction)

    • D. 

      Alerts (a passive reaction)

    • E. 

      Antivirus scanning and cleaning (an active reaction)

  • 12. 
    What port is used by SSH (Secure Shell)?
    • A. 

      UDP 67 / UDP68

    • B. 

      TCP161 / UDP161

    • C. 

      TCP143 / UDP143

    • D. 

      TCP22 / UDP22

    • E. 

      NTP123

  • 13. 
    Which Command Line Utility is shown?
    • A. 

      TracerT

    • B. 

      Ping

    • C. 

      IPconfig

    • D. 

      NetStat

    • E. 

      Nbstat

  • 14. 
    Which protocol is responsible for the logical addressing of each packet created by the Transport Layer?
    • A. 

      IP

    • B. 

      RIP

    • C. 

      TCP

    • D. 

      UDP

    • E. 

      IDP

  • 15. 
    To which TCP/IP architecture layer do the media access methods belong?
    • A. 

      Application

    • B. 

      Internet

    • C. 

      Network Interface

    • D. 

      Transport

  • 16. 
    124.6.102.87 is a Class _____ IP Address.
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

    • E. 

      E

  • 17. 
    What port is used by TFTP (Trivial File Transfer Protocol)?
    • A. 

      UDP 67 / UDP68

    • B. 

      TCP161 / UDP161

    • C. 

      UDP69

    • D. 

      TCP119

    • E. 

      TCP110

  • 18. 
    An IPv6 subnet ID is how many bits long?
    • A. 

      8

    • B. 

      16

    • C. 

      32

    • D. 

      64

    • E. 

      128

  • 19. 
    This NIDS reaction option (Network Intrusion Detection System) logs some or all of the traffic between the attacker and the victim for later forensic investigations.
    • A. 

      TCP reset (an active reaction)

    • B. 

      IP session logging (a passive reaction)

    • C. 

      Shunning (an active reaction)

    • D. 

      Alerts (a passive reaction)

    • E. 

      Antivirus scanning and cleaning (an active reaction)

  • 20. 
    Which type of attack overwhelms a host by flooding it with ICMP packets?
    • A. 

      DOS

    • B. 

      Synflood

    • C. 

      Ping of Death

    • D. 

      Smurf Attack

    • E. 

      DDOS

  • 21. 
    Of the four components to security on a wireless network, to which one does a RADIUS server belong?
    • A. 

      Access Controll

    • B. 

      Authentication

    • C. 

      Encryption

    • D. 

      Isolation

  • 22. 
    This Kerbos item  is a record that usually lasts for 5 minutes and can not be reused. It contains information to prove the session key was recently created and is known only to the client and server.
    • A. 

      Credentials

    • B. 

      Session Key

    • C. 

      Authenticator

    • D. 

      Ticket

    • E. 

      Ticket-Granting Ticket (TGT)

  • 23. 
    What port is used by SNMP (Simple Network Management Protocol)?
    • A. 

      UDP 67 / UDP68

    • B. 

      TCP22 / UDP22

    • C. 

      TCP161 / UDP161

    • D. 

      UDP123

    • E. 

      TCP110

  • 24. 
    During a certificates 10 stage life cycle which of these are the first stage?
    • A. 

      Matching public and private keys are created.

    • B. 

      The user approaches the CA with a specific request for authority.

    • C. 

      The CA (Certificate Authority) binds the requestors identifying attributes to its public key.

    • D. 

      A certificate is cancelled before its expiration date.

  • 25. 
    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Ensures authentisity by signing packet data with MD5 or SHA-1 hashes and a shared secret key.
    • A. 

      Authentication Header (AH)

    • B. 

      Encapsulating Security Payload (ESP)

    • C. 

      IP Payload Compression Protocol (IPComp)

    • D. 

      Internet Key Exchange (IKE)

  • 26. 
    To which TCP/IP architecture layer do email and web browser protocols belong to?
    • A. 

      Application

    • B. 

      Internet

    • C. 

      Network Interface

    • D. 

      Transport

  • 27. 
    243.16.2.117 is a Class _____ IP Address.
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

    • E. 

      E

  • 28. 
    Which IEEE standard defines the communication protocol for Token Ring?
    • A. 

      802.3

    • B. 

      802.5

    • C. 

      802.11

    • D. 

      802.15

    • E. 

      802.16

  • 29. 
    This NIDS reaction option (Network Intrusion Detection System) is also called blocking, it involes automatically stopping packets from the attacker. Typically NIDS will connect to the firewall and create a temporary rule stopping all packets comming from the attacker.
    • A. 

      TCP reset (an active reaction)

    • B. 

      IP session logging (a passive reaction)

    • C. 

      Shunning (an active reaction)

    • D. 

      Alerts (a passive reaction)

    • E. 

      Antivirus scanning and cleaning (an active reaction)

  • 30. 
    What was introduced to make IPv4 Internet routing more efficient.
    • A. 

      Subnet masks

    • B. 

      Switches

    • C. 

      DHCP

    • D. 

      CIDR

  • 31. 
    _________ is when an attacker passivly records data passing between hosts to gather sensitive information usernames and passwords.
    • A. 

      Information Theft

    • B. 

      Man In The Middle Attack

    • C. 

      Smurf Attack

    • D. 

      Web Spoofing

    • E. 

      DDOS

  • 32. 
    Which of the following are client options that can be set at the scope level? (Choose all that apply)
    • A. 

      WINS

    • B. 

      MAC Address

    • C. 

      Router

    • D. 

      Switches

    • E. 

      DNS

  • 33. 
    After installing the DHCP server on a domain member server, what must be done in active directory before it begins delivering leased IP addresses?
    • A. 

      Authorize it

    • B. 

      Reinstal Active Directory

    • C. 

      Activate it

    • D. 

      Modify the Firewall

  • 34. 
    This Kerbos component service provides an authorized service or user with temporary session keys and tickets.
    • A. 

      Principal

    • B. 

      Authentication Server (AS)

    • C. 

      Ticket-Granting Server (TGS)

    • D. 

      Key Distribution Center (KDC)

    • E. 

      Realm

  • 35. 
    Which Command Line Utility is shown?
    • A. 

      IPconfig

    • B. 

      TracerT

    • C. 

      NSlookup

    • D. 

      Ping

    • E. 

      Nbstat

  • 36. 
    A standardized network protocol that encrypts data at the Network (OSI Layer 3) Layer of the protocol stack. Can supply security for both TCP and UDP traffic.
    • A. 

      PPTP (Perr to Peer Tunneling Protocol)

    • B. 

      LT2P (Layer 2 Tunneling Protocol)

    • C. 

      IPsec (IP security)

    • D. 

      SSL/TLS (Secure Socket Layer / Transport Layer Security)

  • 37. 
    What port is used by NTP (Network Time Protocol)?
    • A. 

      TCP22

    • B. 

      UDP123

    • C. 

      TCP119

    • D. 

      TCP110

    • E. 

      TCP161 / UDP161

  • 38. 
    This authentication method requires both the client and the server to authenticate to each other instead of just the client authenticating to the server. Also known as two way authentication.
    • A. 

      CHAP (Challenge Handshake Protocol)

    • B. 

      EAP (Extensible Authentication Protocol)

    • C. 

      PPPoE (Point to Point over Eithernet Protocol)

    • D. 

      Mutual Authentication

  • 39. 
    To which TCP/IP architecture layer do routing protocols belong?
    • A. 

      Application

    • B. 

      Internet

    • C. 

      Network Interface

    • D. 

      Transport

  • 40. 
    Of the NIDS (Network intrusion detection system) reaction options listed which TWO are considered Passive reaction options?
    • A. 

      Shunning

    • B. 

      Antivirus scanning and cleaning

    • C. 

      Alerts

    • D. 

      TCP reset

    • E. 

      IP session logging

  • 41. 
    Which type of attack sent an oversized fragmented packet that when reassembled would cause the buffer to overflow and the system to crash?
    • A. 

      DOS

    • B. 

      Man In The Middle Attack

    • C. 

      Ping of Death

    • D. 

      Smurf Attack

    • E. 

      DDOS

  • 42. 
    This Kerbos item is a ticket for the resource server along with the session key.
    • A. 

      Credentials

    • B. 

      Session Key

    • C. 

      Authenticator

    • D. 

      Ticket

    • E. 

      Ticket-Granting Ticket (TGT)

  • 43. 
    ______ contains performance statistics for computers and other devices in the network, you record a devices ______ performance when adding it to the network to hev the data for copairison purposes later. 
    • A. 

      Logical Network Diagram

    • B. 

      Baseline

    • C. 

      Regulations

    • D. 

      Physical Network Diagram

  • 44. 
    Which of the 3 main VPN security models are 3rd party private networks protected by various means. Clients and servers connect to this network rather than connect to an LAN via a public network.
    • A. 

      Authentication before connection

    • B. 

      Trusted delivery network

    • C. 

      Secure VPN's

  • 45. 
    Which IEEE standard defines the communication protocol for Air Cards?
    • A. 

      802.3

    • B. 

      802.5

    • C. 

      802.11

    • D. 

      802.15

    • E. 

      802.16

  • 46. 
    What port is used by NNTP (Network NewsTransfer Protocol)?
    • A. 

      UDP69

    • B. 

      TCP161 / UDP161

    • C. 

      TCP110

    • D. 

      TCP22

    • E. 

      TCP119

  • 47. 
    In a ______ attack the attacker places himself between the two hosts and listens in on the session, yet the hosts are unaware they are communicating to the hacker.
    • A. 

      DOS

    • B. 

      Man In The Middle Attack

    • C. 

      Ping of Death

    • D. 

      Smurf Attack

    • E. 

      DDOS

  • 48. 
    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Negotiates the shared secret keys.
    • A. 

      Authentication Header (AH)

    • B. 

      Encapsulating Security Payload (ESP)

    • C. 

      IP Payload Compression Protocol (IPComp)

    • D. 

      Internet Key Exchange (IKE)

  • 49. 
    This component is the server or client that Kerbos can assign tickets to.
    • A. 

      Principal

    • B. 

      Authentication Server (AS)

    • C. 

      Ticket-Granting Server (TGS)

    • D. 

      Key Distribution Center (KDC)

    • E. 

      Realm

  • 50. 
     Which command line utility is shown?
    • A. 

      IPconfig

    • B. 

      TracerT

    • C. 

      Netstat

    • D. 

      Nslookup

    • E. 

      Nbstat

  • 51. 
    The target systems in a ______ attack use Zombies, Bots or Agents which are woken up to launch the attack/
    • A. 

      DOS

    • B. 

      Synflood

    • C. 

      Ping of Death

    • D. 

      Smurf Attack

    • E. 

      DDOS

  • 52. 
    Rather than destroying or stealing data a ______ attack is designed to disrupt daily standard operations.
    • A. 

      DOS

    • B. 

      Synflood

    • C. 

      Ping of Death

    • D. 

      Smurf Attack

    • E. 

      DDOS

  • 53. 
    Which NIDS reaction option (Network Intrusion Detection System) sent warnings with console messages, emails, pager messages and so forth to request human intervention?
    • A. 

      TCP reset (an active reaction)

    • B. 

      IP session logging (a passive reaction)

    • C. 

      Shunning (an active reaction)

    • D. 

      Alerts (a passive reaction)

    • E. 

      Antivirus scanning and cleaning (an active reaction)

  • 54. 
    When the attacker between two hosts takes over the role of one of the hosts and resumes full controll of the TCP session is what kind of attack?
    • A. 

      Information Theft

    • B. 

      Man In The Middle Attack

    • C. 

      TCP Session Hijacking

    • D. 

      Web Spoofing

    • E. 

      ARP Poisoning

  • 55. 
    Is done through the use of algorithm which is a mathmatical or physical means to transform a message.
    • A. 

      Encryption

    • B. 

      Decryption

    • C. 

      Cryptography

    • D. 

      Asymetric keys

    • E. 

      Asymetric Cryptography

  • 56. 
    Which Command Line Utility is shown?
    • A. 

      TracerT

    • B. 

      Ping

    • C. 

      Nslookup

    • D. 

      Netstat

    • E. 

      Nbstat

  • 57. 
    In this type of intrusion prevention, IDS compares the current state of your system to a baseline looking for differences that would signal an attack or compromise in the system.
    • A. 

      Signature - based

    • B. 

      Behavior - based

    • C. 

      Anomaly - based

    • D. 

      Kerbos - based

  • 58. 
    Contains the locations of client computers, servers, network printers, routers, switches, firewalls wireless access points and other devices and hardware on the network.
    • A. 

      Logical Network Diagram

    • B. 

      Baseline

    • C. 

      Regulations

    • D. 

      Physical Network Diagram

  • 59. 
    Contains IP Addressing and subnet information along with other information to ensure that all devices have the correct addressing information.
    • A. 

      Logical Network Diagram

    • B. 

      Baseline

    • C. 

      Regulations

    • D. 

      Physical Network Diagram

  • 60. 
    This authentication method validates the remote client's identity Is used by PPP at the communication session start or any time during the session.
    • A. 

      CHAP (Challenge Handshake Protocol)

    • B. 

      EAP (Extensible Authentication Protocol)

    • C. 

      PPPoE (Point to Point over Eithernet Protocol)

    • D. 

      Mutual Authentication

  • 61. 
    • A. 

      IPconfig

    • B. 

      Nslookup

    • C. 

      Netstat

    • D. 

      Ping

    • E. 

      Nbstat

  • 62. 
    This Kerbos component is a service that gives ticket-granting tickets to an authroized service or user.
    • A. 

      Principal

    • B. 

      Authentication Server (AS)

    • C. 

      Ticket-Granting Server (TGS)

    • D. 

      Key Distribution Center (KDC)

    • E. 

      Realm

  • 63. 
    __________ are designed to fix security vulnerabilities.
    • A. 

      Hotfixes

    • B. 

      Patches

    • C. 

      Updates

    • D. 

      BIOS Updates

  • 64. 
    Which IEEE standard defines the communication protocol for Eithernet?
    • A. 

      802.3

    • B. 

      802.5

    • C. 

      802.11

    • D. 

      802.15

    • E. 

      802.16

  • 65. 
    Using certain programs this type of attack allows the attacker to monitor and modify a TCP session.  The attacker does need to be on the same Eithernet segment as the victim or the host.
    • A. 

      Information Theft

    • B. 

      Man In The Middle Attack

    • C. 

      TCP Session Hijacking

    • D. 

      Web Spoofing

    • E. 

      ARP Poisoning

  • 66. 
    This is a VPN protocol were once a link has been established, the client is added as a vertual node on the LAN and packets between the two are encrypted using Microsoft Point to Point Encryption (MPPE) as a rule.
    • A. 

      PPTP (Perr to Peer Tunneling Protocol)

    • B. 

      LT2P (Layer 2 Tunneling Protocol)

    • C. 

      IPsec (IP security)

    • D. 

      SSL/TLS (Secure Socket Layer / Transport Layer Security)

  • 67. 
    When traffic is redirected by an attacker by modifiying the victims DNS cache with the wrong hostname to IP address mappings it is called ______.
    • A. 

      ICMP Redirect

    • B. 

      ARP Poisoning

    • C. 

      TCP Session Hijacking

    • D. 

      DNS Poisoning

    • E. 

      Web Spoofing

  • 68. 
    What port is used by BootP & DHCP (Boot Protocl/Bootstrap Protocol & Dynamic Host Configuration Protocol)?
    • A. 

      UDP 67 / UDP68

    • B. 

      TCP161 / UDP161

    • C. 

      TCP143 / UDP143

    • D. 

      TCP22 / UDP22

    • E. 

      NTP123

  • 69. 
    ______ is when an attacker puts a Web server between the victim's Web Browser and a legitimate server. The attacker monitors & records the victim's activity and can control what they see.
    • A. 

      Information Theft

    • B. 

      Man In The Middle Attack

    • C. 

      Smurf Attack

    • D. 

      Web Spoofing

    • E. 

      DDOS

  • 70. 
    This item is granted during the Kerbos authentication process. It is used to aquire additional tickets from the TGS.
    • A. 

      Credentials

    • B. 

      Session Key

    • C. 

      Authenticator

    • D. 

      Ticket

    • E. 

      Ticket-Granting Ticket (TGT)

  • 71. 
    A 3rd party authorized to generate keys and send them would define which?
    • A. 

      Public key management systems

    • B. 

      Bastion host

    • C. 

      Client Network

    • D. 

      Centralized key management

  • 72. 
    Which IEEE standard defines the communication protocol for Blue Tooth?
    • A. 

      802.3

    • B. 

      802.5

    • C. 

      802.11

    • D. 

      802.15

    • E. 

      802.16

  • 73. 
    Which of the following protocols are considered unsecure? (Choose all that apply)
    • A. 

      RSH

    • B. 

      HTTPS

    • C. 

      SSH

    • D. 

      SNMP

    • E. 

      SCP

  • 74. 
    • A. 

      Registration (PKT stage 1)

    • B. 

      Key pair generation (PKT stage 2)

    • C. 

      Certificate generation (PKT stage 3)

    • D. 

      Certificate Dissemination (PKT stage )

  • 75. 
    Involves creating matching private and public keys by using the same passphrase and different algorithms. The owner of the private key is entrusted with generating and storing such keys. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKT)?
    • A. 

      Registration (PKT stage 1)

    • B. 

      Key pair generation (PKT stage 2)

    • C. 

      Certificate generation (PKT stage 3)

    • D. 

      Certificate Dissemination (PKT stage )

  • 76. 
    Which of the 3 main VPN security models does not typically use tunneling and clients, network devices and servers must authenticate before gaining access?
    • A. 

      Authentication before connection

    • B. 

      Trusted delivery network

    • C. 

      Secure VPN's

  • 77. 
    In this type of intrusion prevention, IDS monitors your system based on signatures, much like anti-virus scanners use use virus definitions to look for infected files. 
    • A. 

      Signature - based

    • B. 

      Behavior - based

    • C. 

      Anomaly - based

    • D. 

      Kerbos - based

  • 78. 
    When public and private keys are related matmatically, the RSA cypher starts with two large random prime numbers that essentially make up the private key and the two nubers are then multiplied together to make the public key.
    • A. 

      Encryption

    • B. 

      Decryption

    • C. 

      Cryptography

    • D. 

      Asymetric keys

    • E. 

      Asymetric Cryptography

  • 79. 
    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Compresses packet data before transmission.
    • A. 

      Authentication Header (AH)

    • B. 

      Encapsulating Security Payload (ESP)

    • C. 

      IP Payload Compression Protocol (IPComp)

    • D. 

      Internet Key Exchange (IKE)

  • 80. 
    A standarsized tunneling protocol that generally combines the best features of PPTP and L2F to provide tunneling over IP, X.25, Frame Relay and ATM networks.
    • A. 

      PPTP (Perr to Peer Tunneling Protocol)

    • B. 

      LT2P (Layer 2 Tunneling Protocol)

    • C. 

      IPsec (IP security)

    • D. 

      SSL/TLS (Secure Socket Layer / Transport Layer Security)

  • 81. 
    Which NIDS reaction option (Network Intrusion Detection System) examines a packets contents, detecst infections and attempts removing infections from infected payloads?
    • A. 

      TCP reset (an active reaction)

    • B. 

      IP session logging (a passive reaction)

    • C. 

      Shunning (an active reaction)

    • D. 

      Alerts (a passive reaction)

    • E. 

      Antivirus scanning and cleaning (an active reaction)

  • 82. 
     This starts when a user approaches the Certificate Authority (CA) with a specific request for a certificate. After verifying the identity & credentials of the user CA registers the user. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKT)?
    • A. 

      Registration (PKT stage 1)

    • B. 

      Key pair generation (PKT stage 2)

    • C. 

      Certificate generation (PKT stage 3)

    • D. 

      Certificate Dissemination (PKI stage 4)

  • 83. 
    Which TCP / IP architecture layer makes use of ports?
    • A. 

      Application

    • B. 

      Internet

    • C. 

      Network Interface

    • D. 

      Transport

  • 84. 
    This uses two keys to avoid the troubles associated with sharing the encryption key. What is encryted by one key can only be decryted by the other.
    • A. 

      Encryption

    • B. 

      Decryption

    • C. 

      Cryptography

    • D. 

      Asymetric keys

    • E. 

      Asymetric Cryptography

  • 85. 
    A realm is also known as a __________?
    • A. 

      Scope of authority

    • B. 

      Domain

    • C. 

      Name Space

    • D. 

      MDS hash key

  • 86. 
    This authentication method encapsulates PPP inside Eithernet frames and allows users to establish a secure connection from one computer to another. Is used to connect multiple users to the internet via high speed modems.
    • A. 

      CHAP (Challenge Handshake Protocol)

    • B. 

      EAP (Extensible Authentication Protocol)

    • C. 

      PPPoE (Point to Point over Eithernet Protocol)

    • D. 

      Mutual Authentication

  • 87. 
    When an attacker instructs a router to forward packets with a destination of the victim to instead go through the attackers system it is called _________.
    • A. 

      ARP Poisoning

    • B. 

      ICMP Redirect

    • C. 

      TCP Session Hijacking

    • D. 

      Information Theft

    • E. 

      Web Spoofing

  • 88. 
    Which is the correct order for the 3 AAA Phases?
    • A. 

      1:Authentication 2: Authorization 3:Access

    • B. 

      1:Authentication 2: Authorization 3: Accounting

    • C. 

      1:Authentication 2: Access 3: Accounting

    • D. 

      1:Authentication 2: Accounting 3: Authorization

  • 89. 
    Of the NIDS (Network intrusion detection system) reaction options listed which Three are considered Active reaction options?
    • A. 

      TCP reset

    • B. 

      IP session logging

    • C. 

      Antivirus scanning and cleaning

    • D. 

      Shunning

    • E. 

      Alerts

  • 90. 
    This is a server component of Kerbos that runs AG and TGS services to provide initial ticket and ticket-Granting ticket requests.
    • A. 

      Principal

    • B. 

      Authentication Server (AS)

    • C. 

      Ticket-Granting Server (TGS)

    • D. 

      Key Distribution Center (KDC)

    • E. 

      Realm

  • 91. 
    This Kerbos item is used in communication between client and resource server and only lasts the length of a single log in.
    • A. 

      Credentials

    • B. 

      Session Key

    • C. 

      Authenticator

    • D. 

      Ticket

    • E. 

      Ticket-Granting Ticket (TGT)

  • 92. 
    It involves securely making the certificate information available to a requester without too much difficulty. Some teqnuques include out-of- and in hand distribution, publication, and so on. This describes which of the 4 set up and initialization stages for Public key infrestructure (PKI)?
    • A. 

      Registration (PKT stage 1)

    • B. 

      Key pair generation (PKT stage 2)

    • C. 

      Certificate generation (PKT stage 3)

    • D. 

      Certificate Dissemination (PKT stage )

  • 93. 
    During a certificates 10 stage life cycle which of these are the last stage?
    • A. 

      The CA (Certificate Authority) binds the requestors identifying attributes to its public key.

    • B. 

      The user approaches the CA with a specific request for authority.

    • C. 

      Matching public and private keys are created.

    • D. 

      A certificate is cancelled before its expiration date.

  • 94. 
    Which of the 3 main VPN security models are the typical sort of network, enabled secure connections over insecure public networks.
    • A. 

      Authentication before connection

    • B. 

      Trusted delivery network

    • C. 

      Secure VPN's

  • 95. 
    This is the science of encrypting and decrypting data. It is a technique in which source information is converted into a form which cannot be read by anyone other than intended recipient.
    • A. 

      Encryption

    • B. 

      Decryption

    • C. 

      Cryptography

    • D. 

      Asymetric keys

    • E. 

      Asymetric Cryptography

  • 96. 
    The IPsec protocol suite is made up of 4 separate protocols, which is discribed here:Ensures confidentiality by signing packet by encryting the packet using DES or Triple-DES (3DES) cipher.
    • A. 

      Authentication Header (AH)

    • B. 

      Encapsulating Security Payload (ESP)

    • C. 

      IP Payload Compression Protocol (IPComp)

    • D. 

      Internet Key Exchange (IKE)

  • 97. 
    Which is the correct hexidecimal subnet chain?
    • A. 

      128,64,32,16,8,4,2,0

    • B. 

      64,128,192,224,240,248,252,254

    • C. 

      128,192,224,240,248,252,254,256

    • D. 

      128,64,32,16,8,4,2,1

    • E. 

      128,192,224,240,248,252,254,255

  • 98. 
    Which is NOT a valid subnet mask?
    • A. 

      255.0.0.0

    • B. 

      255.248.0.0

    • C. 

      255.255.234.0

    • D. 

      255.255.0.0

  • 99. 
    MAC & LLC (logical Linc Control) are sublayers of which OSI Layer?
    • A. 

      Physical

    • B. 

      Data Link

    • C. 

      Network

    • D. 

      Session

    • E. 

      Transport

  • 100. 
    Which Command Line Utility is shown?
    • A. 

      TracerT

    • B. 

      Ping

    • C. 

      Nbstat

    • D. 

      IPconfig

    • E. 

      Nslookup