Exam Prep Questions
-
Your company is in the process of setting up a DMZ segment. You have to allow email traffic in the DMZ segment. Which TCP ports do you have to open? (Choose two correct answers.)
A.
110
B.
139
C.
25
D.
443
-
Your company is in the process of setting up a management system on your network, and you want to use SNMP. You have to allow this traffic through the router. Which UDP ports do you have to open? (Choose two correct answers.)
A.
161
B.
139
C.
138
D.
162
-
You want to implement a proxy firewall technology that can distinguish between FTP commands. Which of the following types of firewall should you choose?
A.
Proxy gateway
B.
Circuit-level gateway
C.
Application-level gateway
D.
SOCKS proxy
-
You want to use NAT on your network, and you have received a Class C address from your ISP. What range of addresses should you use on the internal network?
A.
10.x.x.x
B.
172.16.x.x
C.
172.31.x.x
D.
192.168.x.x
-
You are setting up a switched network and want to group users by department. Which technology would you implement?
A.
DMZ
B.
VPN
C.
VLAN
D.
NAT
-
You are setting up a web server that needs to be accessed by both the employees and by external customers. What type of architecture should you implement?
A.
VLAN
B.
DMZ
C.
NAT
D.
VPN
-
You have recently had some security breaches in the network. You suspect it may be a small group of employees. You want to implement a solution that will monitor the internal network activity and incoming external traffic. Which of the following devices would you use? (Choose two correct answers.)
A.
A router
B.
A network-based IDS
C.
A firewall
D.
A host-based IDS
-
Services using an interprocess communication share such as network file and print sharing services leave the network susceptible to which of the following attacks?
A.
Spoofing
B.
Null sessions
C.
DNS kiting
D.
ARP poisoning
-
You’re the security administrator for a bank. The users are complaining about the network being slow. However, it is not a particularly busy time of the day. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?
A.
Spoofing
B.
Man-in-the-middle
C.
DNS kiting
D.
Denial of service
-
Your network is under attack. Traffic patterns indicate that an unauthorized service is relaying information to a source outside the network. What type of attack is being executed against you?
A.
Spoofing
B.
Man-in-the-middle
C.
Replay
D.
Denial of service