This Computer Networks and Security Exams Prep Test assesses knowledge on network protocols, wireless standards, and security measures. It evaluates understanding of Frame Relay, TCP flags, wireless modes, and secure network protocols, crucial for professionals in IT and network security.
WPA2
WPA
WEP
AES
Rate this question:
Per-room VPNs
VLANs
Port security
Firewalls
Rate this question:
A ring
A bus
A star
A mesh
Rate this question:
A ring
A star
A bus
A mesh
Rate this question:
A ring
A bus
A star
A mesh
Rate this question:
Separate virtual machines onto separate physical hardware based on task or data types.
Use VM escape detection tools on the underlying hypervisor.
Restore machines to their original snapshots on a regular basis.
Use a utility like Tripwire to look for changes in the virtual machines.
Rate this question:
PAP
CHAP
EAP
LEAP
Rate this question:
A DoS attack
A Trojan
A replay attack
A man-in-the-middle attack
Rate this question:
A worm
A denial of service attack
A virus
A smurf attack
Rate this question:
UDP
TCP
IP
ICMP
Rate this question:
2 kilometers
500 meters
185 meters
100 meters
Rate this question:
255.0.0.0
255.255.0.0
255.254.0.0
255.255.255.0
Rate this question:
A black box
A red box
A blue box
A white box
Rate this question:
A bridge
A router
A brouter
A modem
Rate this question:
The Application layer
The Session layer
The Physical layer
The Data Link layer
Rate this question:
Their signal is rarely encrypted and thus can be easily monitored.
They use unlicensed frequencies.
They can allow attackers access to wireless networks.
They are rarely patched and are vulnerable to malware.
Rate this question:
Single tier
Two tier
Three tier
Next generation
Rate this question:
Require encryption for all users.
Install a firewall at the network border.
Enable spanning tree loop detection.
Segment the network based on functional requirements.
Rate this question:
EAP, because it provides strong encryption by default
LEAP, because it provides frequent re-authentication and changing of WEP keys
PEAP, because it provides encryption and doesn’t suffer from the same vulnerabilities that LEAP does
None of these options can provide secure authentication, and an alternate solution should be chosen.
Rate this question:
A gateway
A proxy
A router
A firewall
Rate this question:
Data on IBM systems
An outbound phone call via Bluetooth
802.11b networks
Data from a Bluetooth-enabled device
Rate this question:
A single-tier firewall
 A two-tier firewall
A three-tier firewall
A fully protected DMZ firewall
Rate this question:
54 Mbps, 5 GHz
200+ Mbps, 5GHz
200+ Mbps, 2.4 and 5 GHz
1 Gbps, 5 GHz4
Rate this question:
A four-tier firewall design with two firewalls
A two-tier firewall design with three firewalls
A three-tier firewall design with at least one firewall
A single-tier firewall design with three firewalls
Rate this question:
DES
3DES
AES
TLS
Rate this question:
128 kbps
1.544 Mbps
44.736 Mbps
155 Mbps
Rate this question:
Static packet filtering firewalls
Application-level gateway firewalls
Stateful inspection firewalls
Unified Threat Management
Rate this question:
SCADA devices that are now connected to the network can now be attacked over the network.
Serial data over TCP/IP cannot be encrypted.
Serial data cannot be carried in TCP packets.
TCP/IP’s throughput can allow for easy denial of service attacks against serial devices.
Rate this question:
AOL
HTTP
SMTP
HTTPS
Rate this question:
The firewall does not protect system B.
System C can see the broadcast traffic from system A to B.
It is traveling via an unencrypted protocol.
IM does not provide nonrepudation.
Rate this question:
They are outdated and cannot be used on modern PCs.
They may not be able to be filtered by firewall devices.
They may allow Christmas tree attacks.
IPX extends on the IP protocol and may not be supported by all TCP stacks.
Rate this question:
RARP Flooding
ARP cache poisoning
A denial of ARP attack
ARP buffer blasting
Rate this question:
Broadcast domain exploit, address conflict
Spoofing, token loss
Spoofing, address conflict
Sham EUI creation, token loss
Rate this question:
The PBX was not fully patched.
The dial-in modem lines use unpublished numbers.
DISA is set up to only allow local calls.
One or more users’ access codes have been compromised.
Rate this question:
BRI
BPRI
PRI
D channel
Rate this question:
Virtualization platforms
Web services
VoIP systems
Secure Process Internal Transfers
Rate this question:
It can cause a denial of service condition.
It can serve as a covert channel.
It can allow viruses to spread.
It can bypass authentication controls.
Rate this question:
Install a repeater or a concentrator before 100 meters.
Use Category 7 cable, which has better shielding for higher speeds.
Install a gateway to handle the distance.
Use STP cable to handle the longer distance at high speeds.
Rate this question:
Application, Presentation, and Transport
Presentation, Session, and Transport
Application, Presentation, and Session
There is not a direct match. The TCP model was created before the OSI model.
Rate this question:
The Transport layer
The Network layer
The Session layer
The Presentation layer
Rate this question:
LEAP, because it fixes problems with TKIP, resulting in stronger security
PEAP, because it implements CCMP for security
LEAP, because it implements EAP-TLS for end-to-end session encryption
PEAP, because it can provide a TLS tunnel that encapsulates EAP methods, protecting the entire session
Rate this question:
Baseband
Broadband
Digital
Broadcast
Rate this question:
Layer 1
Layer 2
Layer 3
Layer 4
Rate this question:
Presentation, Application, Session, Transport, Network, Data Link, Physical
Application, Presentation, Session, Network, Transport, Data Link, Physical
Presentation, Application, Session, Transport, Data Link, Network, Physical
Application, Presentation, Session, Transport, Network, Data Link, Physical
Rate this question:
L2TP can use IPsec.
L2TP creates a point-to-point tunnel, avoiding multipoint issues.
PPTP doesn’t support EAP.
PPTP doesn’t properly encapsulate PPP packets.
Rate this question:
A ring
A star
A mesh
A bus
Rate this question:
802.11a
802.11g
802.11n
802.11ac
Rate this question:
A firewall, location A
An IDS, location A
An IPS, location B
A WAF, location C
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.