Computer Networks And Security Exams Prep Test

100 Questions

SettingsSettingsSettings
Please wait...
Computer Network Quizzes & Trivia

.


Questions and Answers
  • 1. 
    What important factor listed below differentiates Frame Relay from X.25?
    • A. 

      Frame Relay supports multiple PVCs over a single WAN carrier connection.

    • B. 

      Frame Relay is a cell-switching technology instead of a packet-switching technology like X.25.

    • C. 

      Frame Relay does not provide a Committed Information Rate (CIR).

    • D. 

      Frame Relay only requires a DTE on the provider side.

  • 2. 
    During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using WPA. What recommendation should Jim make?
    • A. 

      Continue to use LEAP. It provides better security than TKIP for WPA networks.

    • B. 

      Use an alternate protocol like PEAP or EAP-TLS and implement WPA2 if supported.

    • C. 

      Continue to use LEAP to avoid authentication issues, but move to WPA2.

    • D. 

      Use an alternate protocol like PEAP or EAP-TLS, and implement Wired Equivalent Privacy to avoid wireless security issues.

  • 3. 
    Ben has connected his laptop to his tablet PC using an 802.11g connection. What wireless network mode has he used to connect these devices?
    • A. 

      Infrastructure mode

    • B. 

      Wired extension mode

    • C. 

      Ad hoc mode

    • D. 

      Stand-alone mode

  • 4. 
    Lauren’s and Nick’s PCs simultaneously send traffic by transmitting at the same time. What network term describes the range of systems on a network that could be affected by this same issue?
    • A. 

      The subnet

    • B. 

      The supernet

    • C. 

      The supernet

    • D. 

      A broadcast domain

  • 5. 
    Sarah is manually reviewing a packet capture of TCP traffic and finds that a system is setting the RST flag in the TCP packets it sends repeatedly during a short period of time. What does this flag mean in the TCP packet header?
    • A. 

      RST flags mean “Rest.” The server needs traffic to briefly pause.

    • B. 

      RST flags mean “Relay-set.” The packets will be forwarded to the address set in the packet.

    • C. 

      RST flags mean “Resume Standard.” Communications will resume in their normal format

    • D. 

      RST means “Reset.” The TCP session will be disconnected.

  • 6. 
    Gary is deploying a wireless network and wants to deploy the fastest possible wireless technology. Of the 802.11 standards listed below, which is the fastest 2.4 GHz option he has?
    • A. 

      802.11a

    • B. 

      802.11g

    • C. 

      802.11n

    • D. 

      802.11ac

  • 7. 
    What common applications are associated with each of the following TCP ports: 23, 25, 143, and 515?
    • A. 

      Telnet, SFTP, NetBIOS, and LPD

    • B. 

      SSH, SMTP, POP3, and ICMP

    • C. 

      Telnet, SMTP, IMAP, and LPD

    • D. 

      Telnet, SMTP, POP3, and X Windows

  • 8. 
    Chris is configuring an IDS to monitor for unencrypted FTP traffic. What ports should Chris use in his configuration?
    • A. 

      TCP 20 and 21

    • B. 

      TCP 21 only

    • C. 

      UDP port 69

    • D. 

      TCP port 21 and UDP port 21

  • 9. 
    FHSS, DSSS, and OFDM all use what wireless communication method that occurs over multiple frequencies simultaneously?
    • A. 

      Wi-Fi

    • B. 

      Spread Spectrum

    • C. 

      Multiplexing

    • D. 

      Orthogonal modulation

  • 10. 
    Which authentication protocol commonly used for PPP links encrypts both the username and password and uses a challenge/response dialog that cannot be replayed and periodically reauthenticates remote systems throughout its use in a session?
    • A. 

      PAP

    • B. 

      CHAP

    • C. 

      EAP

    • D. 

      LEAP

  • 11. 
    Which of the following options is not a common best practice for securing a wireless network?
    • A. 

      Turn on WPA2.

    • B. 

      Enable MAC filtering if used for a relatively small group of clients.

    • C. 

      Enable SSID broadcast.

    • D. 

      Separate the access point from the wired network using a firewall, thus treating it as external access.

  • 12. 
    What network topology is shown in the image below?
    • A. 

      A ring

    • B. 

      A bus

    • C. 

      A star

    • D. 

      A mesh

  • 13. 
    What type of firewall design is shown in the diagram?
    • A. 

      A single-tier firewall

    • B. 

      A two-tier firewall

    • C. 

      A three-tier firewall

    • D. 

      A four-tier firewall

  • 14. 
    If the VPN grants remote users the same access to network and system resources as local workstations have, what security issue should Chris raise?
    • A. 

      VPN users will not be able to access the web server

    • B. 

      There is no additional security issue; the VPN concentrator’s logical network location matches the logical network location of the workstations.

    • C. 

      VPN bypasses the firewall, creating additional risks.

    • D. 

      VPN users should only connect from managed PCs.

  • 15. 
    If Chris wants to stop cross-site scripting attacks against the web server, what is the best device for this purpose, and where should he put it?
    • A. 

      A firewall, location A

    • B. 

      An IDS, location A

    • C. 

      An IPS, location B

    • D. 

      A WAF, location C

  • 16. 
    Susan is deploying a routing protocol that maintains a list of destination networks with metrics that include the distance in hops to them and the direction traffic should be sent to them. What type of protocol is she using?
    • A. 

      A link-state protocol

    • B. 

      A link-distance protocol

    • C. 

      A destination metric protocol

    • D. 

      A distance-vector protocol

  • 17. 
    Ben has configured his network to not broadcast a SSID. Why might Ben disable SSID broadcast, and how could his SSID be discovered?
    • A. 

      Disabling SSID broadcast prevents attackers from discovering the encryption key. The SSID can be recovered from decrypted packets.

    • B. 

      Disabling SSID broadcast hides networks from unauthorized personnel. The SSID can be discovered using a wireless sniffer.

    • C. 

      Disabling SSID broadcast prevents issues with beacon frames. The SSID can be recovered by reconstructing the BSSID.

    • D. 

      Disabling SSID broadcast helps avoid SSID conflicts. The SSID can be discovered by attempting to connect to the network.

  • 18. 
    What network tool can be used to protect the identity of clients while providing Internet access by accepting client requests, altering the source addresses of the requests, mapping requests to clients, and sending the modified requests out to their destination?
    • A. 

      A gateway

    • B. 

      A proxy

    • C. 

      A router

    • D. 

      A firewall

  • 19. 
    During troubleshooting, Chris uses the nslookup command to check the IP address of a host he is attempting to connect to. The IP he sees in the response is not the IP that should resolve when the lookup is done. What type of attack has likely been conducted?
    • A. 

      DNS spoofing

    • B. 

      DNS poisoning

    • C. 

      ARP spoofing

    • D. 

      A Cain attack

  • 20. 
    A remote access tool that copies what is displayed on a desktop PC to a remote computer is an example of what type of technology?
    • A. 

      Remote node operation

    • B. 

      Screen scraping

    • C. 

      Remote control

    • D. 

      RDP

  • 21. 
    Which email security solution provides two major usage modes: (1) signed messages that provide integrity, sender authentication, and nonrepudiation; and (2) an enveloped message mode that provides integrity, sender authentication, and confidentiality?
    • A. 

      S/MIME

    • B. 

      MOSS

    • C. 

      PEM

    • D. 

      DKIM

  • 22. 
    During a security assessment, Jim discovers that the organization he is working with uses a multilayer protocol to handle SCADA systems and recently connected the SCADA network to the rest of the organization’s production network. What concern should he raise about serial data transfers carried via TCP/IP?
    • A. 

      SCADA devices that are now connected to the network can now be attacked over the network.

    • B. 

      Serial data over TCP/IP cannot be encrypted.

    • C. 

      Serial data cannot be carried in TCP packets.

    • D. 

      TCP/IP’s throughput can allow for easy denial of service attacks against serial devices.

  • 23. 
    What type of key does WEP use to encrypt wireless communications?
    • A. 

      An asymmetric key

    • B. 

      Unique key sets for each host

    • C. 

      A predefined shared static key

    • D. 

      Unique asymmetric keys for each host

  • 24. 
    An attack that causes a service to fail by exhausting all of a system’s resources is what type of attack?
    • A. 

      A worm

    • B. 

      A denial of service attack

    • C. 

      A virus

    • D. 

      A smurf attack

  • 25. 
    What speed and frequency range is used by 802.11n?
    • A. 

      54 Mbps, 5 GHz

    • B. 

      200+ Mbps, 5GHz

    • C. 

      200+ Mbps, 2.4 and 5 GHz

    • D. 

      1 Gbps, 5 GHz4