An intruder tries a large number of possibilities in rapid succession to guess a password

Grátis

29 pág.

An intruder tries a large number of possibilities in rapid succession to guess a password

  • Denunciar


Pré-visualização | Página 3 de 6

router will perform Network Address Translation (NAT) whenever a private (local) source IPv4 address is translated to a public (global) address.
28 - Which network migration technique encapsulates IPv6 packets inside IPv4 packets to carry them over IPv4 network infrastructures?
· encapsulation
· translation
· dual-stack
· tunneling
	Answers Explanation & Hints:
The tunneling migration technique encapsulates an IPv6 packet inside an IPv4 packet. Encapsulation assembles a message and adds information to each layer in order to transmit the data over the network. Translation is a migration technique that allows IPv6-enabled devices to communicate with IPv4-enabled devices using a translation technique similar to NAT for IPv4. The dual-stack migration technique allows IPv4 and IPv6 protocol stacks to coexist on the same network simultaneously.
29 - A student is uploading files from a phone to a server on another network. Which layer of the TCP/IP model is responsible for providing an addressing scheme to transmit the data between the devices?
· application
· transport
· internet
· network access
	Answers Explanation & Hints:
The internet layer provides addresses for the purpose of connecting end devices on different networks.
30 - Which statement correctly describes data transmission at the transport layer?
· Retransmission of lost packets is provided by both TCP and UDP.
· Segmentation is provided by the window size field when the TCP protocol is used.
· A single datagram can include both a TCP and a UDP header.
· Both UDP and TCP use port numbers.
· Segmentation is provided by sequence numbers when UDP is used.
	Answers Explanation & Hints:
Segmentation is handled at Layer 4 by TCP sequence numbers. UDP does not have sequence numbers in the header, but instead, lets the application handle reordering if it is necessary. Only TCP provides reliable deliver and retransmits data. Each segment has either a TCP header or a UDP header; it cannot contain both.
31 - What are two features of protocols used within the TCP/IP protocol stack? (Choose two.)
· The Internet Layer IP protocol has built in mechanisms for ensuring the reliable transmission and receipt of data.
· UDP is used when an application must be delivered as quickly as possible and some loss of data can be tolerated.
· TCP and UDP destination port numbers are dynamically generated by the sending device in order to track the responses to requests.
· TCP mechanisms retransmit data when an acknowledgment is not received from the destination system within a set period of time.
· The same Transport Layer source port is used for all of the tabs opened at the same time within a web browser.
	Answers Explanation & Hints:
Application programmers make decisions about which protocols to use to transport the data to and from their applications based on whether the application can tolerate any lost data. Live streaming and voice transmissions can use UDP because if a few data packets are lost, the quality of the video and audio is not seriously impacted. TCP is used when all data must be complete and accurate.
32 - Match the protocol with the function. (Not all options are used.)
33 - While a network security product is being deployed, a customizable list of allowable protocols is shown. Which three protocols should be allowed to provide for the use of email on a network? (Choose three.)
· IMAP4
· TFTP
· Telnet
· HTTP
· SMTP
· DNS
· POP3
	Answers Explanation & Hints:
The email protocols used on a network are SMTP, POP3, and IMAP4. SMTP is used to send messages to a local email server, whereas POP and IMAP are used to receive email.
34 - What type of technology converts analog voice signals into digital data?
· SMTP
· VoIP
· SNMP
· POP3
	Answers Explanation & Hints:
Voice over IP (VoIP) is a technology that is used with making telephone calls across a network or internet and it converts analog voice signals into digital data.
35 - Refer to the exhibit. Which router port connects to the modem provided by the service provider?
· A
· B
· C
· D
	Answers Explanation & Hints:
The ports shown in the diagram are used as follows: The LAN ports, A and B, are used to connect wired devices on the home network. The Internet port, C, is connected to the modem. The port, labeled D, is the 5V DC power port that supplies power to the router.
36 - Which wireless RF band do IEEE 802.11b/g devices use?
· 900 MHz
· 2.4 GHz
· 5 GHz
· 60 GHz
	Answers Explanation & Hints:
900 MHz is an FCC wireless technology that was used before development of the 802.11 standards. 900 MHz devices have a larger coverage range than the higher frequencies have and do not require line of sight between devices. 802.11b/g/n/ad devices all operate at 2.4 GHz. 802.11a/n/ac/ad devices operate at 5 GHz, and 802.11ad devices operate at 60 GHz.
37 - Which type of device filtering can be enabled on some wireless access points or wireless routers?
· authentication
· IP address
· user ID
· MAC address
	Answers Explanation & Hints:
On wireless access points, MAC addresses can be manually entered to filter which devices are allowed on the wireless network.
38 - A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
· BYOD
· virtualization
· maintaining communication integrity
· online collaboration
	Answers Explanation & Hints:
Virtualization technology can run several different operating systems in parallel on a single CPU.
39 - In software defined network architecture, what function is removed from network devices and performed by an SDN controller?
· control plane
· data plane
· security
· application policies
	Answers Explanation & Hints:
In network virtualization, the control plane function of each network device is removed and is performed by a centralized controller. The controller then can communicate control plane functions to each of the network devices. This allows the network devices to focus all resources on forwarding plane functions.
40 - A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take?
· Disable SSID broadcast.
· Enable WPA encryption.
· Configure DMZ settings.
· Configure a DNS server.
	Answers Explanation & Hints:
Disabling SSID broadcast prevents the access point from announcing the name of the network. Enabling WPA encryption, configuring DMZ settings, and configuring a DNS server will accomplish different tasks, but the name of the network will still be announced.
41 - Which three attacks exploit human behavior? (Choose three.)
· pretexting
· brute force
· phishing
· zombies
· vishing
· malware
	Answers Explanation & Hints:
Attacks aimed at exploiting human behavior such as pretexting, phishing, and vishing are commonly used by hackers to obtain information directly from authorized users.​​
42 - Match the type of malware with the definition.
43 - An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the network are locked out. What type of attack has occurred?
· DDoS
· brute force
· ping of death
· SYN flooding
	Answers Explanation & Hints:
In a brute force attack, an unauthorized person will try to gain access to a system by sending as many passwords as possible as rapidly as possible.
44 - What is the effect of setting the security mode to WEP on a small wireless router?
· It identifies the wireless LAN.
· It allows the access point to inform clients of its presence.
· It translates IP addresses into easy-to-remember domain names.
· It encrypts data between the wireless client and the access point.
· It translates an internal address or group

Which type of device filtering can be enabled on some wireless access?

Use MAC address filtering Most wireless routers offer some sort of MAC address filtering, which will limit access to your wireless network to specifically allowed devices.

Which device filtering can be enabled on some wireless access points or wireless routers IP address ID MAC address authentication navigation bar?

Most broadband routers and other wireless access points include an optional feature called MAC address filtering, or hardware address filtering. It improves security by limiting the devices that can join a network.

What identifies the source and destination of data packets?

Each IP packet contains both a header (20 or 24 bytes long) and data (variable length). The header includes the IP addresses of the source and destination, plus other fields that help to route the packet.

Which three items should be documented after troubleshooting?

Proper documentation should include the type of error encountered, the steps taken to determine the cause of the problem, and the steps taken to correct the problem.