Ensurepass

QUESTION 61

Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

 

A.      Protocol analyzer

B.      Toner probe

C.      Cable certifier

D.      Cable stripper

 

Correct Answer: C

 

 

QUESTION 62

Which of the following tools would Kurt, an administrator, use to identify opens and shorts?

 

A.      Ohmmeter

B.      Protocol analyzer

C.      Cable tester

D.      Multimeter

 

Correct Answer: C

 

 

QUESTION 63

Which of the following could Karen, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server?

 

A.      nbtstat command

B.      dig command

C.      ipconfig command

D.      Protocol analyzer

 

Correct Answer: D

 

 

QUESTION 64

A new business’ web server has seen a huge spike of legitimate traffic in the last week. The owners want to ensure the site has no problems as the business continues to grow. For Karen, a network administrator, which of the following is the MOST important concern for this company?

 

A.      Caching

B.      Asset management

C.      Traffic shaping

D.      High availability

 

Correct Answer: D

 

 

QUESTION 65

Kurt, a customer, has been using a combination of SSID disable and WEP encryption for wireless security. Lately there have been many unauthorized devices on Kurt’s wireless network. Which of the following should also be implemented to prevent unauthorized devices from connecting? (Select TWO).

 

A.      SSID should be changed daily and enabled.

B.      WEP should be replaced with WPA encryption.

C.      MAC filtering should be enabled and configured.

D.      A different WAP manufacturer should be used to prevent commonly used security cracking techniques

E.       Omni-directional antennas should be used to limit signal strength

 

Correct Answer: BC

 

 

QUESTION 66

Joe, a technician, is setting up an IDS security device. Which of the following should be configured on the switch to utilize the IDS?

A.      PoE

B.      Port mirroring

C.      Convergence

D.      Port speed

 

Correct Answer: B

 

 

QUESTION 67

Joe, a client, has observed non-employees sitting in his parking lot and surfing on his unsecured wireless connection. Which of the following could be employed to potentially prevent this? (Select TWO).

 

A.      PoE

B.      VLANs

C.      MTU black hole

D.      GBIC installation

E.       WPA

F.       Reduction of signal gain

 

Correct Answer: EF

 

 

QUESTION 68

Joe, a network technician, blocks access to ports 25,110, and 143 on the firewall. Which of the following application services will be blocked due to this?

 

A.      Email sending and receiving

B.      Domain Name Service

C.      FTP access to external servers

D.      Remote desktop access

 

Correct Answer: A

 

 

QUESTION 69

Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

 

A.      Transport services without error recovery

B.      Large data size manageability using segmentation

C.      Secure Kerberos password encryption on data

D.      Delivery through error recovery

E.       Proxy server authentication

 

Correct Answer: BD

 

 

QUESTION 70

Which of the following cable mediums is NOT susceptible to EMI?

 

A.      Wireless

B.      Fiber

C.      Coaxial

D.      UTP

 

Correct Answer: B

 

 

Comments are closed.