Ensurepass

QUESTION 511

Administrators are performing a war drive around their company’s complex. Which of the following are they attempting to detect?

 

A.      Worms

B.      Rogue access points

C.      DDoS attacks

D.      Bluesnarfing attacks

 

Correct Answer: B

 

 

QUESTION 512

Which of the following is an interior routing protocol that is used to provide routing within autonomous systems?

 

A.      ARP

B.      IGP

C.      BGP

D.      EGP

 

Correct Answer: B

 

 

QUESTION 513

On a network switch, which of the following is the default native VLAN?

 

A.      0

B.      1

C.      1024

D.      4096

 

Correct Answer: B

 

 

QUESTION 514

When setting up a wireless network to cover a large area, which of the following needs to be considered FIRST?

 

A.      Device placement

B.      Encryption methods

C.      Wireless channels

D.      SSID name

 

Correct Answer: A

 

 

QUESTION 515

Which of the following security threats involves making phone calls?

 

A.      Phishing

B.      Vishing

C.      DDoS

D.      Xmas attack

 

Correct Answer: B

 

 

QUESTION 516

Which of the following LAN technologies is defined as fast Ethernet?

 

A.      10BaseT

B.      100BaseT

C.      100BaseFX

D.      1000BaseT

 

Correct Answer: B

 

 

QUESTION 517

A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? (Select TWO).

 

A.      The length of the house.

B.      How many rooms are in the house?

C.      How many users will be using the wireless network?

D.      The building material of the house.

E.       The cost of the house.

 

Correct Answer: AD

 

 

QUESTION 518

A user plugged a cable between two network jacks that attach to the same switch and caused a broadcast storm. Which of the following would have prevented the broadcast storm?

 

A.      Spanning tree

B.      VLAN tagging

C.      802.1x

D.      Port mirroring

 

Correct Answer: A

 

 

QUESTION 519

Which of the following protocols is used to encrypt data between web servers and web browsers?

 

A.      SMTP

B.      SIP

C.      HTTP

D.      SSL

 

Correct Answer: D

 

 

QUESTION 520

Which of the following devices separates a LAN segment into two collision domains, without affecting the broadcast domain?

 

A.      Firewall

B.      Bridge

C.      Repeater

D.      Router

 

Correct Answer: B

 

 

Comments are closed.