Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication?
A. 
80
B. 
143
C. 
443
D. 
3389
2.
Henry's last firewall rule must allow inbound access to a Windows Terminal Server. What port must he allow?
A. 
143
B. 
443
C. 
989
D. 
3389
3.
Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place?
A. 
Teardrop
B. 
Land
C. 
Smurf
D. 
Cross-site scripting (XSS)
4.
What type of firewall security feature limits the volume of traffic from individual hosts?
A. 
Loop protection
B. 
Network separation
C. 
Stateful inspection
D. 
Flood guard
5.
Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?
A. 
Packet filtering
B. 
Application proxying
C. 
Stateful inspection
D. 
Network address translation
6.
What firewall approach is shown in the figure?
A. 
Border firewall
B. 
Bastion host
C. 
Screened subnet
D. 
Multilayered firewall
7.
What is NOT a service commonly offered by unified threat management (UTM) devices?
A. 
URL filtering
B. 
Wireless network access
C. 
Malware inspection
D. 
Content inspection
8.
Bob has a high-volume virtual private network (VPN). He would like to use a device that would best handle the required processing power. What type of device should he use?
A. 
Firewall
B. 
Unified threat management (UTM)
C. 
Router
D. 
VPN concentrator
9.
What wireless security technology contains significant flaws and should never be used?
A. 
Wired Equivalent Privacy (WEP)
B. 
Wi-Fi Protected Access (WPA)
C. 
WPA2
D. 
Remote Authentication Dial-In User Service (RADIUS)
10.
Karen would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?
You'll find a comprehensive set of practice questions to assess your knowledge of the exam. The questions are similar in format to the exam.
Questions: 10 | Attempts: 2406 | Last updated: Mar 22, 2022
Sample Question
Karl is a network administrator. He's been asked to implement dynamic IP addressing the company's newly installed network, which has two subnets in one Active Directory domain with servers running Windows Server 2003. After Karl installs and configures the DHCP server in SubnetA, client computers in SubnetA are able to obtain DHCP leases and the proper TCP/IP configuration. What is the most likely cause of the problem?
Windows server is a trademark name for a group of server operating systems released by Microsoft. It includes all Windows operating systems called “Windows Server” but not any other Microsoft product, and it is...
Questions: 10 | Attempts: 1823 | Last updated: Mar 21, 2022
Since its conception, the Windows Server 2012 has provided basic improvements to the Windows Server group. The operating system has gone a long way in providing a wider range of improved installation options and advanced level of...
Questions: 10 | Attempts: 635 | Last updated: Mar 21, 2022
Sample Question
What was the main subject for creating the windows server 2003?