CompTIA Network+ Practice Tests. Craig Zacker

Чтение книги онлайн.

Читать онлайн книгу CompTIA Network+ Practice Tests - Craig Zacker страница 24

CompTIA Network+ Practice Tests - Craig Zacker

Скачать книгу

a wireless network from the Wired Equivalent Privacy (WEP) security protocol to WiFi Protected Access (WPA) enables it to use the Temporal Key Integrity Protocol (TKIP) for encryption, which generates a unique key for each packet. Which of the following types of attacks does this capability prevent?Denial-of-Service (DoS) attacksBrute-force attacksReplay attacksDeauthentication attacks

      166 Which of the following wireless security protocols uses CCMP-AES for encryption?WEPWPAWPA2TKIP

      167 Which of the following was the first wireless LAN security protocol to come into common usage?WEPWPAWPA2TKIP

      168 Which of the following did the second version of the WiFi Protected Access (WPA) protocol add to the standard?CCMP-AESMIMOWEPTKIP

      169 You are setting up a wireless LAN in a friend's home, using devices that conform to the IEEE 802.11g standard. You have installed and successfully tested the devices on an open network, and now you are ready to add security. Which of the following protocols should you choose to provide maximum security for the wireless network?WEPWPA2IPsecTLSL2TP

      170 CCMP-AES is an encryption protocol used with which of the following wireless network security standards?WEPWPAWPA2EAP

      171 Which of the following encryption protocols was introduced in the WiFi Protected Access II (WPA2) wireless security standard?CCMP-AESTKIP-RC4EAP-TLSTACACS+

      172 Which of the following wireless security protocols can enable network users to authenticate using smartcards?WEPWPA2EAPAES

      173 Which of the following forms of the WiFi Protected Access (WPA) and WPA2 protocols require a RADIUS server? (Choose all that apply.)WPA-PersonalWPA-PSKWPA-EnterpriseWPA-802.1X

      174 Which of the following forms of the WiFi Protected Access (WPA) and WPA2 protocols call for the use of a Pre-Shared Key (PSK)?WPA-PersonalWPA-EnterpriseWPA-EAPWPA-802.1X

      175 Which of the following stream ciphers does the Temporal Key Integrity Protocol (TKIP) use for encryption on a wireless network?RC4AESCCMPSHA

      176 Which of the following wireless security protocols uses CCMP for encryption?WEPWPAWPA2802.1X

      177 CCMP is based on which of the following encryption standards?TKIPRC4AES802.1X

      178 You have installed a new Wireless Access Point (WAP) on your network and configured it to use an SSID that is not broadcasted and WPA2 for security. Which of the following describes what you must do to configure your wireless clients?Select the SSID from a list and allow the client to automatically detect the security protocol.Select the SSID from a list and then select WPA2 from the security protocol options provided.Type the SSID manually and allow the client to automatically detect the security protocol.Type the SSID manually and then select WPA2 from the security protocol options provided.

      179 Which of the following wireless LAN security protocols was rendered obsolete after it was found to be extremely easy to penetrate?WEPWPAWPA2EAP

      180 Which of the following protocols does the WiFi Protected Access (WPA) security protocol use for encryption?AESTKIPMD5SHA

      181 Which of the following wireless network security protocols provides open and shared key authentication options?WPAWEPWPA2EAP

      182 Which of the following wireless security protocols uses TKIP for encryption?WEPWPAWPA2AES

      183 Which of the following is not a factor that weakens the security of the Wired Equivalent Privacy (WEP) protocol used on early IEEE 802.11 wireless LANs?40-bit encryption keys24-bit initialization vectorsStatic shared secretsOpen System Authentication

      184 Which of the following encryption ciphers was replaced by CCMP-AES when the WPA2 wireless security protocol was introduced?EAPWEPTKIPCCMP

      185 Which of the following wireless security protocols was substantially weakened by its initialization vector?WPAWEPWPA2PEAP

      186 Ralph is installing a wireless LAN that includes three Access Points (APs) to provide coverage for a large building. Which of the following must Ralph do to ensure that users are able to roam without interruption from one AP to another using their portable devices? (Choose all that apply.)Configure each AP with the same IP address.Configure each AP with the same security passphrase.Configure each AP to use the same security protocol.Configure each AP with the same SSID.

      187 Which of the following is the maximum theoretical download speed for a 5G cellular network?42 megabits per second150 megabits per second1 gigabit per second10 gigabits per second100 gigabits per second

      188 Which of the following statements about 5G cellular networks are true? (Choose all that apply.)5G networks can operate on three frequency bands.5G networks with the highest speeds also have a more limited range.4G devices can connect to 5G networks at reduced speeds.On a 5G network, the lower frequency bands provide the highest speeds.

      189 Which of the following IEEE standards describes an implementation of port-based access control for wireless networks?802.11ac802.11n802.1X802.3x

      190 Unauthorized users are connecting to your Wireless Access Point (WAP) and gaining access to the network. Which of the following are steps you can take to prevent this from happening? (Choose all that apply.)Disable SSID broadcasting.Use Kerberos for authentication.Place the Access Point (AP) in a DMZ.Implement MAC address filtering.

      191 On a Wireless Access Point (WAP) that uses an Access Control List (ACL) to specify which devices are permitted to connect to the network, which of the following is used to identify the authorized devices?UsernamesIP addressesDevice namesMAC addresses

      192 On a network carrying both voice and data traffic, separate Virtual Local Area Networks (VLANs) enable the voice traffic to be assigned a higher priority than the data traffic. Which of the following are methods for identifying the packets carrying voice traffic, so the switches can assign them to the voice VLAN? (Choose all that apply.)MAC addressesVLAN tagsIP addressesDNS names

       THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

       3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability.Performance metrics/sensorsDevice/chassisTemperatureCentral processing unit (CPU) usageMemoryNetwork metricsBandwidthLatencyJitterSNMPTrapsObject identifiers (OIDs)Management information bases (MIBs)Network device logsLog reviewsTraffic logsAudit logsSyslogLogging levels/severity levelsInterface statistics/statusLink state (up/down)Speed/duplexSend/receive trafficCyclic redundancy checks (CRCs)Protocol packet and byte countsInterface errors or alertsCRC errorsGiantsRuntsEncapsulation errorsEnvironmental factors and sensorsTemperatureHumidityElectricalFloodingBaselinesNetFlow dataUptime/downtime

       3.2 Explain the purpose of organizational documents and policies.Plans and proceduresChange managementIncident response planDisaster recovery planBusiness continuity planSystem life cycleStandard operating proceduresHardening and security policiesPassword policyAcceptable use policyBring your own device (BYOD) policyRemote access policyOnboarding and offboarding policySecurity policyData loss preventionCommon documentationPhysical network diagramFloor planRack diagramIntermediate distribution frame (IDF)/main distribution frame (MDF) documentationLogical network diagramWiring diagramSite survey reportAudit and assessment reportBaseline configurationsCommon agreementsNon-disclosure agreement (NDA)Service-level agreement (SLA)Memorandum of understanding (MOU)

       3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution.Load

Скачать книгу