100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Chapter 13 Network Pro practice exams questions and answers CA$20.27   Add to cart

Exam (elaborations)

Chapter 13 Network Pro practice exams questions and answers

 7 views  0 purchase
  • Course
  • Institution

Chapter 13 Network Pro practice exams questions and answers

Preview 3 out of 17  pages

  • February 2, 2024
  • 17
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Chapter 13 Network Pro practice exams
questions and answers

You have just purchased a new network device and are getting ready to connect it to
your network. Which of the following should you do to increase its security? select two -
Answer- Apply all patches and updates

Change default account password

As a victim of a Smurf attack, what protection measure is the most effective during the
attack? - Answer- Communication with our upstream provider

Which of the following attacks tries to associate an incorrect MAC address with a know
IP address? - Answer- ARP poisoning

Which of the following best describes the Ping of Death exploit? - Answer- An ICMP
packet larger than 65,536 bytes?

Which exploit seeks to maliciously re-associate the IP address of a legitimate network
host with the MAC address of the attacker's computer? - Answer- ARP poisoning

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

You have a group of salesmen who would like to access your private network through
the Internet while they are traveling. You want to control access to the private network
through a single server.
Which solution should you implement? - Answer- VPN concentrator

A salesperson in your organization spent most of her time traveling between customers
sites. After a customer visit, she must complete various managerial tasks, such as
updating your organizations order database.
Because she rarely...
many of the things...
Which key step should you take when implementing this configurations? select two -
Answer- Configure the VPN connection to us IPsec

,Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose? - Answer- Support secured communications
over an untrusted network.

You want to use a protocol that can encapsulate other LAN protocols and carry the data
securely over an IP network. Which of the following protocols is suitable for this task? -
Answer- PPTP

Which of the following protocols can your portable computer use to connect to your
company's network via a virtual tunnel through the internet? select two - Answer- L2TP
PPTP

IPsec is implemented through two separate protocols. What are these protocols called?
select two - Answer- AH
ESP

Which of the following network layer protocols provides authentications and encryptions
services for IP based network traffic? - Answer- IPsec

Which of the following statements about SSL VPN are true? select two - Answer- Uses
port 443
Encrypts the entire communication session

Which of the following can route layer 3 protocols across an IP network? - Answer- GRE

You have just downloaded a file. You created a hash of the file and compare it to the
hash posted on the website. The two hashes match. What do you know about the file? -
Answer- Your copy is the same as the copy posted on the website

Which of the following network devices or services prevents the use of IPsec in most
cases? - Answer- NAT

• The office manager informs you that her desktop system will no longer boot and asks
you to repair or replace it, recovering as much data as possible in the process. You
carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client? - Answer-
Implement a hardware checkout policy

What is a secure doorway that can be used in coordination with a mantrap to allow easy
egress from a secured environment but which actively prevents re-entrance through the
exit portal? - Answer- Turnstiles

Which of the following are solutions that address physical security?(Select two) -
Answer- Require identification and name badges for all employees //Escort visitors at all
times

, Which of the following can be used to stop piggybacking that has been occurring at the
front entrance where employees should swipe their smart cards to gain entry? - Answer-
Deploy a mantrap

You want to use CCTV to increase the physical security of your building. Which of the
following camera types would offer the sharpest image at the greatest distance under
the lowest lighting conditions? - Answer- 500 resolution, 50mm, .05 LUX

You want to use CCTV to increase your physical security. You want to be able to
remotely control the camera position. Which type of camera should you choose? -
Answer- PTZ

You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer- Security guards

Which of the following CCTV types would you use in areas with little or no lights? -
Answer- Infrared

Which of the following CCTV camera types lets you adjust the distance that the camera
can see? - Answer- Varifocal

Which of the following controls is an example of a physical access control method? -
Answer- Locks on doors

You have 5 salesmen who work out of your office and who frequently leave their laptops
laying on their desk in their cubicles. You are concerned that someone might walk by
and take one of these laptops.
Which of the following is the best protection to implement to address your concerns? -
Answer- Use cable locks to chain the laptops to the desks

Match each physical security control on the left with an appropriate example of that
control on
the right. Each security control may be used once, more than once, or not at all. -
Answer- Hardened carrier
Protected cable distribution
Biometric authentication
Door locks
Barricades
Perimeter barrier
Emergency escape plans
Safety
Alarmed carrier
Protected cable distribution
Antipassback system
Physical access control

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller millyphilip. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$20.27. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77764 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$20.27
  • (0)
  Add to cart