1.
Identify the potential area of security concern with this network
2.
What Port does Microsoft RDP use
Correct Answer
3389
Explanation
Microsoft RDP (Remote Desktop Protocol) uses port number 3389. This port is the default port for RDP communication and is commonly used for remote desktop connections to Windows-based systems. By using this port, users can remotely access and control a computer or server running a Windows operating system. It allows users to interact with the remote system as if they were physically present, enabling tasks such as file transfers, software installations, and troubleshooting.
3.
What Port does SMTP use
Correct Answer
25
Explanation
SMTP (Simple Mail Transfer Protocol) is a communication protocol used for sending email messages between servers. It operates on port 25, which is the designated port for SMTP. This port is used by mail transfer agents to establish a connection and transfer email data. By using port 25, SMTP ensures that email messages are properly routed and delivered to the intended recipients.
4.
The Internet does not work but you can ping external IP addresses, what might be causing this?
Correct Answer
C. DNS server issue
Explanation
If the Internet is not working but you can still ping external IP addresses, it suggests that there might be a problem with the DNS server. DNS (Domain Name System) is responsible for translating domain names into IP addresses. If the DNS server is not functioning properly, it would prevent your device from resolving domain names, resulting in the inability to access websites or services through their domain names. However, you can still ping external IP addresses directly as it bypasses the need for DNS resolution.
5.
Select 3 OSI Layer 2 Components
Correct Answer(s)
A. SWITCH
C. ETHERNET
F. BRIDGE
Explanation
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Layer 2 of the OSI model is the Data Link Layer, responsible for the reliable transmission of data between adjacent network nodes. In this context, the correct answer options are SWITCH, ETHERNET, and BRIDGE. These components operate at Layer 2, facilitating the connection and communication between devices within a local area network (LAN). HUBS, FIBRE, and IP are not Layer 2 components, as hubs operate at Layer 1 (Physical Layer), fiber refers to the physical medium used for transmission, and IP is a Layer 3 (Network Layer) protocol.
6.
Which OSI Layer deals with TCP and UDP protocols
Correct Answer
C. Transport Layer
Explanation
The Transport Layer is responsible for handling TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in the OSI model. TCP provides reliable, connection-oriented communication between devices, ensuring data integrity and flow control. UDP, on the other hand, offers connectionless, unreliable communication, suitable for applications that prioritize speed over reliability, such as streaming or gaming. Therefore, the Transport Layer is the correct answer as it specifically deals with these protocols.
7.
Select 3 Authentication Algorithms used in VPN Tunnel Phases
Correct Answer(s)
A. SHA1
C. SHA2
E. MD5
Explanation
The three authentication algorithms used in VPN tunnel phases are SHA1, SHA2, and MD5. SHA1 is a widely used algorithm that generates a 160-bit hash value. SHA2 is a family of cryptographic hash functions that includes SHA-224, SHA-256, SHA-384, and SHA-512. MD5 is a commonly used algorithm that produces a 128-bit hash value. These algorithms ensure the integrity and authenticity of the data transmitted over the VPN tunnel by generating unique hash values that can be used for verification purposes.
8.
Which is the most secure encryption Algorithm
Correct Answer
C. AES
Explanation
AES (Advanced Encryption Standard) is considered the most secure encryption algorithm among the given options. It is widely used and trusted by organizations and governments worldwide. AES supports key sizes of 128, 192, and 256 bits, which makes it highly resistant to brute-force attacks. It has been extensively studied and analyzed by experts, and no significant vulnerabilities have been found. AES is also efficient and provides fast encryption and decryption processes. Overall, AES is the preferred choice for ensuring data confidentiality and security in various applications and industries.
9.
VPN negotiations typically consist of two phases
Correct Answer
A. True
Explanation
VPN negotiations typically consist of two phases: the establishment phase and the authentication phase. In the establishment phase, the VPN client and server negotiate the parameters for the VPN connection, such as encryption algorithms and key exchange methods. Once the parameters are agreed upon, the authentication phase begins, where the client and server authenticate each other's identities using digital certificates or pre-shared keys. These two phases ensure a secure and reliable VPN connection.
10.
What port is used for snmp
Correct Answer
161
Explanation
SNMP (Simple Network Management Protocol) uses port number 161 for communication. It is a protocol used to manage and monitor network devices. SNMP allows network administrators to collect and organize information about devices on a network, such as routers, switches, and servers. By using port 161, SNMP can send and receive data packets between the management system and the managed devices, enabling monitoring, configuration, and troubleshooting of network devices.
11.
Protect your File Servers from Hackers by
Correct Answer(s)
A. Blocking unused Ports
C. Regularly patching OS and applications
E. Use SSH Shared Keys instead of Passwords
Explanation
To protect file servers from hackers, it is important to block unused ports to prevent unauthorized access. Regularly patching the operating system and applications is necessary to fix any security vulnerabilities. Using SSH shared keys instead of passwords adds an extra layer of security as it eliminates the risk of password-based attacks. Deleting large files may help in managing storage space but it is not directly related to protecting file servers from hackers. Running regular backups is important for data recovery but it does not directly protect against hackers.
12.
In SAN storage disk provisioning tick the benefits of Thin Provisioning
Correct Answer(s)
B. Allows overallocation of available disk space
D. Optimizes the utilisation of shared storage
E. Is more cost effective than Thick provisioning
Explanation
Thin provisioning in SAN storage allows for overallocation of available disk space, meaning that more virtual disks can be created than there is physical storage capacity. This helps to optimize the utilization of shared storage resources, as it allows for better allocation of available disk space. Additionally, thin provisioning is more cost-effective than thick provisioning, as it allows for more efficient use of storage resources without the need for upfront allocation of physical disk space.
13.
Connecting to a SQL System DSN or a MySQL Database can be achieved by
Correct Answer(s)
A. Using pHpMyAdmin to connect to the DB
B. Using the ODBC Data Source Administrator
14.
A Fileserver has a disk failure (DISK 00) indicated by a flashing amber light. The server is running and the failed disk is on the 2 disk OS system array configured as RAID 1. What is the best course of action?
Correct Answer
D. Remove disk 00 as soon as possible and replace with any suitable disk regardless of the size
Explanation
The best course of action is to remove disk 00 as soon as possible and replace it with any suitable disk regardless of the size. This is because the disk failure is indicated by a flashing amber light, indicating that the disk is not functioning properly. By removing and replacing the failed disk, the system can continue running without any interruptions. It is not necessary to determine the disk size and spindle speed or wait for the RAID controller to rebuild the array in this scenario.