Computer Science > EXAM > Network Security Test Questions with Answers 2022 (All)

Network Security Test Questions with Answers 2022

Document Content and Description Below

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? A. WEP, WPA Personal, and WPÁ Personal B. WEP C. WPA ... Enterprise and WPÁ Enterprise D. WEP, WPA Personal, WPA Enterprise, WPÁ Personal, and WPÁ Enterprise E. WPA Personal and WPÁ Personal - ANSWER A Which security protocols use RSA encryption to secure communications over an untrusted network? (2) A. Internet Security Association and Key Management Protocol B. Point-to-Point Tunneling Protocol C. Secure Sockets Layer D. Transport Layer Security - ANSWER C D You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who p lug into those same jacks should be able to connect to the network. What feature should you configure? A. VLANS B. Bonding C. Spanning Tree D. Mirroring E. Port authentication - ANSWER E Which of the following is a mechanism for granting and validating certificates? A. PKI B. RADIUS C. AAA D. Kerberos - ANSWER A Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network? A. Session hijacking B. Fingerprinting C. Fraggle D. Smurf - ANSWER D Which of the following is the best countermeasure against man-in-the middle attacks? A. MIME e-mail B. IPsec C. PPP D. UDP - ANSWER B You want to implement an autehnticiation method that uses public and private key pairs. Which authentication method should you use? A. EAP B. IPsec C. PKI D. MS-CHAP v2 - ANSWER A Which of the following do switches and wireless access points use to control access through the device? A. IP Address filtering B. Session filtering C. MAC filtering D. Port number filtering - ANSWER C What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found? A. Windows messenger B. Virus C. Trojan horse D. Java applet - ANSWER B You have just signed up for internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection? A. PPPoE B. L2TP C. ICA D. PPP E. RDP - ANSWER A You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need? A. Internet B. Remote Access C. Virtual Private Network D. Intranet - ANSWER B An attacker is trying to compromise a wireless network that has been secured using WPÁ-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she it trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPÁ passphrase. When they do, she then uses it to connect a wireless client to the real access point. What attack techniques did the attacker use in this Scenario? (2) A. Man in the middle B. Denial of Service C. Smurf D. Evil twin E. Pharming - ANSWER D E You need to configure a wireless network. You want to use WPA Enterprise. Which of the following components will be part of your design? A. 802.1x B. Open authentication C. AES encryption D. Preshared Key E. TKIP encryption D. WEP encryption - ANSWER A E Which of the following applications typically use 802.1x authentication? (2) A. Controlling access through a wireless access point B. Controlling access through a switch C. Authenticating VPN users through the Internet D. Authenticating remote access clients E. Controlling access through a router - ANSWER A B You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement? A. PPP B. ISDN C. RAS D. RIP - ANSWER C You have a small home wireless network that uses WEP. The access point is configured as the DHCP server and a NAT router that connects to the Internet. You do not have a RADIUS server. Which authentication method should you choose? A. TKIP B. Open C. 802.1x D. Shared secret - ANSWER B You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPÁ Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (3) A. Preshared key B. SSID C. TKIP D. Username and password E. AES F. Channel - ANSWER A B E As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement? A. Port scanner B. Network based IDS C. Protocol analyzer D. Host based IDS E. VPN concentrator - ANSWER D You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. you think you have the problem resolved, but you would like to be able to manage the server remotely in case there is a problem. Which of the following protocols would you use for remote management? (2) A. L2TP B. ICA C. VNC D. PPP E. PPPoE F. PPTP - ANSWER B C [Show More]

Last updated: 1 year ago

Preview 1 out of 6 pages

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
51
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 16, 2022

Number of pages

6

Written in

Seller


seller-icon
MARKALLAN

Member since 2 years

55 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 16, 2022

Downloads

 0

Views

 51

Document Keyword Tags

Recommended For You


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·