Вы находитесь на странице: 1из 7

Question 1

What TCP port does Telnet use? Select one: a. 23 b. 25 c. 80 d. 21

Question 2
A f re!all operat n" as a ################### f re!all ! ll pass or bloc$ pac$ets based on the r appl cat on or TCP port nu%ber. Select one: a. Pro&' b. Stateful nspect on c. dual(ho%ed d. Pac$et f lter

Question 3
Accord n" to the TCP)*P %odel+ ,TTP funct ons at !h ch la'er? Select one: a. *nternet b. Appl cat on c. -et!or$ Access d. ,ost(to(host

Question 4
Which of the following ports should be open in order for Sara and Pete, users, to identify websites by domain name?

Select one: a. UDP22 b. TCP 2 c. TCP 2! d. UDP "

Question 5
Which of the following is #$ST used to brea% a group of &P addresses into smaller networ% segments or bloc%s?

Select one: a. '(C b. '(T c. )irtuali*ation d. Subnetting

Question 6
*t s est %ated that o.er ##/ of the nco% n" e%a l to %an' or"an 0at ons s spa%. Select one: a. 15 b. 20 c. 30 d. 50

Question 7
Which of the following has a default port of 22?

Select one: a. SS+ b. SC(P c. ,TP d. T$-'$T

Question 8
Which of the following is the #$ST solution to securely administer remote ser.ers?

Select one: a. Telnet b. S,TP c. SS+ d. SCP

Question 9
*f 'ou !anted to connect t!o net!or$s securel' o.er the *nternet+ !hat t'pe of technolo"' could 'ou use? Select one: a. 4Pb. 5epeater c. 6r d"e d. Telnet

Question 10
Ser.ers or co%puters that ha.e t!o -*C cards+ each connected to separate net!or$s+ are $no!n as !hat t'pe of co%puters? Select one: a. 5outed b. 7ual(ho%ed c. Protected d. 8 re!alled

Question 11
( pac%et filtering firewall can protect from which of the following?

Select one: a. D'S poisoning b. #rute force attac% c. Port scan d. S/- in0ection

Question 12
7 . d n" nternal net!or$s nto t!o or %ore subnet!or$s s a co%%on use for ##? Select one: a. s! tches b. pro&' ser.ers c. load balancers d. routers

Question 13
### refers to creat n" a . rtual ded cated connect on bet!een t!o s'ste%s or net!or$s. Select one: a. Pac$et f lter n" b. Tunnel n" c. Subnett n" d. 7ual ho% n"

Question 14
1att, a security administrator, needs to Telnet into a router to change some configurations2 Which of the following ports would need to be open to allow 1att to change the configurations?

Select one: a. !2" b. 2 c. !3 d. 45

Question 15
The TCP protocol funct ons at !h ch la'er of the TCP)*P %odel? Select one: a. *nternet b. ,ost(to(,ost c. -et!or$ Access d. Appl cat on

Question 16
*n TCP)*P parlance+ an' co%puter or de. ce ! th an *P address on a TCP)*P net!or$ s $no!n as a 9 n : : Select one: a. de. ce b. un t c. *P responder d. host

Question 17
What TCP port does ,TTP use? Select one: a. 80 b. 21 c. 25 d. 23

Question 18
Which of the following allows Pete, a security technician, to pre.ent email traffic from entering the company ser.ers?

Select one: a. Spam filter b. )P' concentrators c. &DS d. U6- filtering

Question 19
7ane, a security technician, needs to open ports on a firewall to allow for domain name resolution2 Which of the following ports should 7ane open? 8Select TW/92

Select one or %ore: a. TCP 2! b. TCP 2 c. UDP 2 d. TCP " e. UDP "

Question 20
While tra.eling, users need access to an internal company web ser.er that contains proprietary information2 Pete, the security administrator, should implement a:

Select one: a. '(C b. D1; c. )-(' d. 6(S

Question 21
(fter a new firewall has been installed, de.ices cannot obtain a new &P address2 Which of the following ports should 1att, the security administrator, open on the firewall?

Select one: a. <4 b. 33 c. 2" d. 4=

Question 22
Which of the following ports would be bloc%ed if Pete, a security administrator, wants to deny access to websites?

Select one: a. 2! b. 2" c. 4= d. 45

Question 23
Wh ch of the follo! n" de. ces are the f rst l ne of defense for net!or$s connected to the *nternet? Select one: a. 5outers b. S! tches c. 8 re!alls d. ,ubs

Question 24
&n order to pre.ent users from surfing the web at wor%, 7ane, the administrator, should bloc% which of the following ports? 8Select TW/92

Select one or %ore: a. TCP 33 b. TCP !!= c. UDP 4= d. TCP 4= e. UDP 4=4= f. TCP 2"

Question 25
Which of the following allows a ser.er to re>uest a website on behalf of 7ane, a user?

Select one: a. Pro?ies b. Sniffers c. ,irewall d. -oad balancers

Question 26
Which of the following would 1/ST li%ely be implemented in order to pre.ent employees from accessing certain websites?

Select one: a. 6outer b. Pac%et filtering firewall c. Pro?y ser.er d. )P' gateway

Question 27
Sara, a user, needs to copy a file from a -inu? wor%station to a -inu? ser.er using the 1/ST secure file transfer method a.ailable2 Which of the following protocols would she use?

Select one: a. T,TP b. S'1P c. ,TP d. SCP

Question 28
Pete, a security administrator, wants to secure remote telnet ser.ices and decides to use the ser.ices o.er SS+2 Which of the following ports should Pete allow on the firewall by default?

Select one: a. 2! b. 2 c. 22 d. 2"

Question 29
Which of the following networ% de.ices will pre.ent port scans?

Select one: a. -oad balancers b. '&DS c. ,irewall d. Sniffer

Question 30
Pete, a security engineer, is trying to in.entory all ser.ers in a rac%2 The engineer launches 6DP sessions to fi.e different PCs and notices that the hardware properties are similar2 (dditionally, the 1(C addresses of all fi.e ser.ers appear on the same switch port2 Which of the following is 1/ST li%ely the cause?

Select one: a. The system is using '(C b. The system is .irtuali*ed c. The system is running 4=22! ? d. The system is in acti.e@standby mode

Question 31
Wh ch t'pe of de. ce s used to connect .o ce+ data+ pa"ers+ net!or$s and al%ost an' other conce .able appl cat on nto a s n"le teleco%%un cat ons s'ste%? Select one: a. ;2TP b. P6< c. 4Pd. 5outer

Question 32
Which of the following ports would be bloc%ed if Pete, a security administrator, wants to disable ,TP?

Select one: a. 2! b. 2" c. 2 d. !!=

Question 33
Wh ch of the follo! n" s -=T a rout n" protocol? Select one: Th s %a'be be !ron". ;et %e $no! !hat 'ou f nd out a. 6>P b. =SP8 c. 5*P d. *C?P

Question 34
A ## s a place !here 'ou can place a publ c ser.er for access b' people 'ou % "ht not trust other! se Select one: a. -AT b. 7?@ c. 4;Ad. 7-S

Question 35
#roadcast traffic is ha.ing a negati.e impact on networ% performance2 Which of the following might help minimi*e this issue?

Select one: a. Separate the networ% into a number of different )-('s2 b. Use '(T to hide the &Ps of each of the wor%stations2 c. 6oute all the Unicast traffic through the pro?y ser.er2 d. Separate the networ% onto a number of different switches2

Вам также может понравиться