Online Book Reader

Home Category

CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [94]

By Root 3123 0

d. Router

4. As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You’re preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency?

a. Hub

b. Switch

c. Router

d. PBX

5. Which device is used to connect voice, data, pagers, networks, and almost any other conceivable application into a single telecommunications system?

a. Router

b. PBX

c. HUB

d. Server

6. Most of the sales force have been told that they should no longer report to the office on a daily basis. From now on, they’re to spend the majority of their time on the road calling on customers. Each member of the sales force has been issued a laptop computer and told to connect to the network nightly through a dial-up connection. Which of the following protocols is widely used today as a transport protocol for Internet dial-up connections?

a. SMTP

b. PPP

c. PPTP

d. L2TP

7. Which protocol is unsuitable for WAN VPN connections?

a. PPP

b. PPTP

c. L2TP

d. IPSec

8. You’ve been given notice that you’ll soon be transferred to another site. Before you leave, you’re to audit the network and document everything in use and the reason why it’s in use. The next administrator will use this documentation to keep the network running. Which of the following protocols isn’t a tunneling protocol but is probably used at your site by tunneling protocols for network security?

a. IPSec

b. PPTP

c. L2TP

d. L2F

9. A socket is a combination of which components?

a. TCP and port number

b. UDP and port number

c. IP and session number

d. IP and port number

10. You’re explaining protocols to a junior administrator shortly before you leave for vacation. The topic of Internet mail applications comes up, and you explain how communications are done now as well as how you expect them to be done in the future. Which of the following protocols is becoming the newest standard for Internet mail applications?

a. SMTP

b. POP

c. IMAP

d. IGMP

11. Which protocol is primarily used for network maintenance and destination information?

a. ICMP

b. SMTP

c. IGMP

d. Router

12. You’re the administrator for Mercury Technical. A check of protocols in use on your server brings up one that you weren’t aware was in use; you suspect that someone in HR is using it to send messages to multiple recipients. Which of the following protocols is used for group messages or multicast messaging?

a. SMTP

b. SNMP

c. IGMP

d. L2TP

13. Which device monitors network traffic in a passive manner?

a. Sniffer

b. IDS

c. Firewall

d. Web browser

14. Security has become the utmost priority at your organization. You’re no longer content to act reactively to incidents when they occur—you want to start acting more proactively. Which system performs active network monitoring and analysis and can take proactive steps to protect a network?

a. IDS

b. Sniffer

c. Router

d. Switch

15. Which media is broken down into seven categories depending on capability?

a. Coax

b. UTP

c. Infrared

d. Fiber-optic cable

16. You’re the network administrator for MTS. Within five months, your company will leave its rented office space and move into a larger facility. As the company has grown, so too has the value of its data. You’re in a unique position to create a network layout at the new facility from scratch and incorporate needed security precautions. Which media is the least susceptible to interception or tapping?

a. Coax

b. UTP

c. STP

d. Fiber

17. Which media offers line-of-sight broadband and baseband capabilities?

a. Coax

b. Infrared

c. Microwave

d. UTP

18. An evaluation is under way of the current forms of removable media allowed within the company. Once the evaluation has been completed, the policies

Return Main Page Previous Page Next Page

®Online Book Reader