Soal Calon UKK

Embed Size (px)

Citation preview

  • 8/13/2019 Soal Calon UKK

    1/21

    Connecting to the internet throught an ISP

    Which definition describes the term Internet?a group of PCs connected together on a LAN

    a group of PCs connected together by an ISP

    a network of networks that connects countries around the world a worldwide collection of networks controlled by a single organi!ation

    What type of connection point is a point of presence "P#P$?

    between a client and a hostbetween two local networks

    between a computer and a switch

    between an ISP and a home%based LAN

    What is the term for the group of high%speed data links that interconnect ISPs?Internet LAN

    ISP backbone

    Internet gateways

    Internet pro&idersInternet backbone

    Which de&ice can act as a router' switch' and wireless access point in one package?hubbridge

    modem

    repeaterIS(

    What are three characteristics of business class ISP service? (Choose three.)

    fast connections x

    extra web space xfree Windows upgrade

    cheapest cost available to all users

    additional e-ail accounts xreplaceent hardware at no cost

    What is a a!or characteristic of as"etric Internet service?

    #ownload speeds and upload speeds are e$ual.

  • 8/13/2019 Soal Calon UKK

    2/21

    #ownload speeds are slower than upload speeds.

    %pload speeds and download speeds are different. x

    %pload speeds and download speeds are irrelevant.

    Which three eleents are re$uired to successfull" connect to the Internet? (Choose

    three.)an IP address x

    file sharing enabled

    a networ& connection xserver services enabled

    access to an Internet service provider x

    an address obtained directl" fro the 'I'

    What ter describes each router through which a pac&et travels when oving between

    source and destination networ&s?

    C

    ISPhop x

    segent

    What does the tracert coand test?

    IC functionalit"the ISP bandwidth

    the networ& path to a destination x

    the destination application functionalit"

    What t"pe of end-user connectivit" re$uires that an ISP have a #S*+, device in their

    networ&?analog technolog"

    cable ode technolog"

    digital subscriber line technolog" xwireless technolog"

    Wh" would an ISP re$uire a C,S device on their networ&?

    to connect end users using cable technolog" xto connect end users using analog technolog"

    to connect end users using wireless technolog"

    to connect end users using digital subscriber line technolog"

  • 8/13/2019 Soal Calon UKK

    3/21

    'efer to the graphic. What t"pe of cabling is shown?

    SP

    %Pcoax

    fiber x

    'efer to the graphic. What t"pe of cabling is shown?

    SP

    %P xcoax

    fiber

    Which two places are ost appropriate to use %P cabling? (Choose two.)

    between buildings

    in a hoe office networ& xwhere ,I is an issue

    in a cable / networ&

    inside a school building x

    in a anufacturing environent with hundreds of electrical devices

    What does adherence to cabling standards ensure?

    data securit"

    no loss of signalno electroagnetic interference

    reliable data counications x

  • 8/13/2019 Soal Calon UKK

    4/21

    'efer to the graphic. What t"pe of cable is shown?

    crossover x

    eight coax channels

    ultiode fibersingle-ode fiber

    straight-through

    What connector is used to terinate thernet unshielded twisted pair (%P) cabling?

    S0C'1-22

    '1-34 x

    Which two characteristics describe copper patch panels? (Choose two.)

    uses '1-22 !ac&s

    uses '1-34 !ac&s xsupports onl" data transissions

    allows $uic& rearrangeents of networ& connections x

    forwards transissions based on ,+C addresses

    What are two advantages of cable anageent? (Choose two.)

    re$uires no preplanningaids in isolation of cabling probles x

    protects cables fro ph"sical daage x

    provides copliance with future standards

    provides a short-ter solution for cable installation

    What are two coon causes of signal degradation when using %P cabling? (Choose

    two.)installing cables in conduit

    having iproper terination xlosing light over long distances

    installing low $ualit" cable shielding

    using low $ualit" cables or connectors x

  • 8/13/2019 Soal Calon UKK

    5/21

    What are three coonl" followed standards for constructing and installing cabling?

    (Choose three.)

    pinouts xcable lengths x

    connector color

    connector t"pes xcost per eter (foot)

    tensile strength of plastic insulator

    Network Addressing

    5ow large are IPv3 addresses?6 bits

    27 bits

    89 bits x

    73 bits296 bits

    'efer to the graphic. + user at the wor&station cannot connect to the server. +ll cables

    have been tested and are wor&ing and all deviceshave IP addressing. 5owever: the user cannot ping the server. What is causing the

    proble?

    he router interface does not have a default gatewa".he switch does not have an IP address and default gatewa".

    he wor&station and server are on different logical networ&s. xhe wor&station does not &now the ,+C address of the switch.

    Which part of an IP address identifies a specific device on a networ&?

    first two octetsthird and fourth octets

    networ& portion

    host portion x

  • 8/13/2019 Soal Calon UKK

    6/21

    onl" the fourth octet

    + host with the IP address 2;9.89.74.28 and a default as& belongs to what networ&?

    2;9.89.74.P to transfer files over the Internet?

    CP x

    S,P%#P

    S,P

  • 8/13/2019 Soal Calon UKK

    10/21

    Which protocols are CP@IP application la"er protocols? (Choose two.)

    %#P

    >P xIP

    S,P x

    CP

    Which of the following are la"ers of the CP@IP odel? (Choose three.)

    +pplication xPh"sical

    Internet x

    etwor& +ccess

    Presentation x

    ou are creating a networ&-based video gae. What influences "our decision about

    which transport protocol to use for the application?

    %#P will not disrupt the gae to retransit dropped pac&ets. xCP provides extra ac&nowledgeents that will ensure sooth video deliver".

    0oth CP and %#P can be used siultaneousl" to ensure speed and guaranteed deliver".0oth CP and %#P a" slow transission and disrupt gae operation: so no transport

    protocol should be used.

    Whenever e-ail clients send letters: what device is used to translate the doain naes

    into their associated IP addresses?

    %nifor 'esource *ocator

    etwor& redirector serverS,P server

    #S server x

    Which application is ost li&el" used to translate www.cisco.co to 2=6.288.92=.94?

    #5CP

    #S x>P

    5P

    PP

    S,P

  • 8/13/2019 Soal Calon UKK

    11/21

    'efer to the graphic. Which protocol is used to access this website?

    I,>P

    5P x

    S,P/oIP

    Which port nuber is used b" S,P?9P.he segent destination port nuber identifies the application that should handle it. x

    he source port nuber is associated with one of these well &nown server applications.

    What ter is used to describe how CP@IP protocols are la"ered and interact to forat:

    address: and transit inforation across a

    networ&?protocol hierarch"

    protocol odeling

    protocol stac& x

    protocol la"ering

    What inforation is contained in an IP header?

    source and destination IP addresses x

    source and destination ,+C addressesonl" destination IP and ,+C addresses

    both source and destination IP and ,+C addresses

    Cabling issues are associated with which SI la"er?

    39

    2 x

    8

    + device receives an thernet frae and recogniAes the ,+C address as its own. What

    does the device do to the essage to get to the

    encapsulated data?reoves the IP header

    reoves the CP header

    passes data to the application la"erreoves the thernet header and trailer x

    26 + client has decoded a frae and started the de-encapsulation process. In which orderdoes the de-encapsulation process occur?

    2) reove IP header

    9) reove thernet header and trailer8) reove CP header

    3) pass data to the application

    2) add CP header to data9) add an IP header

    8) add frae header and trailer

    3) encode the frae into bits

    2) reove thernet header and trailer x

  • 8/13/2019 Soal Calon UKK

    13/21

    9) reove IP header

    8) reove CP header

    3) pass data to the application2) add CP header to data

    9) add thernet header and trailer

    8) add an IP header3) encode the frae into bits

    What is an advantage of the use of la"ers in the SI reference odel?It brea&s networ& counications into larger parts.

    It increases coplexit". x

    It prevents changes in one la"er fro affecting other la"ers.

    It re$uires the use of single-vendor e$uipent for hardware and softwarecounications.

    What is the correct order of the la"ers of the SI reference odel: starting at the lowestla"er and wor&ing up the odel?

    data lin&: ph"sical: transport: networ&: presentation: session: applicationph"sical: data lin&: networ&: session: transport: presentation: application

    ph"sical: data lin&: networ&: transport: presentation: session: application

    ph"sical: data lin&: networ&: transport: session: presentation: application xapplication: session: presentation: transport: data lin&: networ&: ph"sical

    What resolves a website %'* to an IP address?

    >P serverweb server

    #S server x

    #5CP server

    What three ites are contained in an thernet header and trailer? (Choose three.)

    source IP addresssource ,+C address x

    destination IP address

    destination ,+C address x

    error-chec&ing inforation x

    Wireless echnologies

    Wh" is I 6

  • 8/13/2019 Soal Calon UKK

    14/21

    What are three advantages of wireless over wired technolog"? (Choose three.)

    ore securelonger range

    an"tie: an"where connectivit" x

    eas" and inexpensive to install xease of using licensed air space

    ease of adding additional devices x

    What are two benefits of wireless networ&ing over wired networ&ing? (Choose two.)

    speed

    securit"

    obilit" xreduced installation tie x

    allows users to share ore resources

    not susceptible to interference fro other devices

    + technician has been as&ed to provide wireless connectivit" to the wired thernet

    networ& of a building. Which three factors affect thenuber of access points needed? (Choose three.)

    the siAe of the building x

    the nuber of solid interior walls in the building xthe presence of icrowave ovens in several offices x

    the encr"ption ethod used on the wireless networ&

    the use of both Windows and +ppletal& operating s"stes

    the use of shortwave or infrared on the +P

    Wh" is securit" so iportant in wireless networ&s?

    Wireless networ&s are t"picall" slower than wired networ&s.elevisions and other devices can interfere with wireless signals.

    Wireless networ&s broadcast data over a ediu that allows eas" access. x

    nvironental factors such as thunderstors can affect wireless networ&s.

    What does the Wi->i logo indicate about a wireless device?

    I has approved the device.

    he device is interoperable with all other wireless standards.he device is interoperable with other devices of the sae standard that also displa" the

    Wi->i logo. x

    he device is bac&wards copatible with all previous wireless standards.

    Which stateent is true concerning wireless bridges?

    connects two networ&s with a wireless lin& xstationar" device that connects to a wireless *+

    allows wireless clients to connect to a wired networ&

    increases the strength of a wireless signal

  • 8/13/2019 Soal Calon UKK

    15/21

    Which W*+ coponent is coonl" referred to as an S+?

    cell

    antennaaccess point

    wireless bridge

    wireless client x

    Which stateent is true concerning an ad-hoc wireless networ&?

    created b" connecting wireless clients in a peer-to-peer networ& xcreated b" connecting wireless clients to a single: centraliAed +P

    created b" connecting ultiple wireless basic service sets through a distribution s"ste

    created b" connecting wireless clients to a wired networ& using an IS'

    'efer to the graphic. In the Wireless enu option of a *in&s"s integrated router: what

    does the etwor& ,ode option ,ixed ean?

    he router supports encr"ption and authentication.he router supports both wired and wireless connections.

    he router supports 6

  • 8/13/2019 Soal Calon UKK

    16/21

    'efer to the graphic. In the Wireless enu of a *in&s"s integrated router: what

    configuration option allows the presence of the access

    point to be &nown to nearb" clients?etwor& ,ode

    etwor& ae (SSI#)

    'adio 0andWide Channel

    Standard Channel

    SSI# 0roadcast x

    Which two stateents about a service set identifier (SSI#) are true? (Choose two.)

    tells a wireless device to which W*+ it belongsx

    consists of a 89-character string and is not case sensitiveresponsible for deterining the signal strength

    all wireless devices on the sae W*+ ust have the sae SSI# x

    used to encr"pt data sent across the wireless networ&

    Which two stateents characteriAe wireless networ& securit"? (Choose two.)

    Wireless networ&s offer the sae securit" features as wired networ&s.Wardriving enhances securit" of wireless networ&s.

    With SSI# broadcast disabled: an attac&er ust &now the SSI# to connect. x

    %sing the default IP address on an access point a&es hac&ing easier. x+n attac&er needs ph"sical access to at least one networ& device to launch an attac&.

    What t"pe of authentication does an access point use b" default?

    pen xPSB

    WP

    +P

    Which stateent is true about open authentication when it is enabled on an access point?

    re$uires no authentication xuses a 73-bit encr"ption algorith

    re$uires the use of an authentication server

    re$uires a utuall" agreed upon password

    What are two authentication ethods that an access point could use? (Choose two.)

    WP

    WP++P x

    +SCII

    pre-shared &e"s x

    What is the difference between using open authentication and pre-shared &e"s?

    pen authentication re$uires a password. Pre-shared &e"s do not re$uire a password.

  • 8/13/2019 Soal Calon UKK

    17/21

    pen authentication is used with wireless networ&s. Pre-shared &e"s are used with wired

    networ&s.

    Pre-shared &e"s re$uire an encr"pted secret word. pen authentication does not re$uire asecret word. x

    Pre-shared &e"s re$uire a ,+C address prograed into the access point. pen

    authentication does not re$uire this prograing.

    What ter describes the encoding of wireless data to prevent intercepted data fro being

    read b" a hac&er?address filtering

    authentication

    broadcasting

    encr"ption xpassphrase encoding

    What access-point feature allows a networ& adinistrator to define what t"pe of data can

    enter the wireless networ&?encr"ption

    hac&ing bloc&traffic filtering x

    ,+C address filtering

    authentication

    What are the two WP &e" lengths? (Choose two.)

    6 bit

    27 bit89 bit

    73 bit x

    296 bit x

    Coplete the following sentence WP is used to DDDDDD : and +P is used to DDDDD

    wireless networ&s.encr"ptE authenticate users on x

    filter trafficE select the operating fre$uenc" for

    identif" the wireless networ&E copress data on

    create the sallest wireless networ&E liit the nuber of users on

    Basic Security

    Identif" three techni$ues used in social engineering. (Choose three.)fishing

    vishing x

    phishing xspaing

    pretexting x

    !un& ailing

  • 8/13/2019 Soal Calon UKK

    18/21

    #uring a pretexting event: how is a target t"picall" contacted?

    b" e-ail

    b" phone xin person

    through another person

    While surfing the Internet: a user notices a box claiing a priAe has been won. he user

    opens the box unaware that a progra is being

    installed. +n intruder now accesses the coputer and retrieves personal inforation.What t"pe of attac& occurred?

    wor

    virus

    ro!an horse xdenial of service

    What is a a!or characteristic of a Wor?

    alicious software that copies itself into other executable prograstric&s users into running the infected software

    a set of coputer instructions that lies dorant until triggered b" a specific eventexploits vulnerabilities with the intent of propagating itself across a networ& x

    + flood of pac&ets with invalid source-IP addresses re$uests a connection on the networ&.

    he server busil" tries to respond: resulting in

    valid re$uests being ignored. What t"pe of attac& occurred?

    ro!an horsebrute force

    ping of death

    S flooding x

    What t"pe of advertising is t"picall" anno"ing and associated with a specific website that

    is being visited?adware

    popups x

    sp"ware

    trac&ing coo&ies

    What is a widel" distributed approach to ar&eting on the Internet that advertises to as

    an" individual users as possible via I, ore-ail?

    brute force

    spa xsp"ware

    trac&ing coo&ies

  • 8/13/2019 Soal Calon UKK

    19/21

    What part of the securit" polic" states what applications and usages are peritted or

    denied?

    identification and authenticationreote access

    acceptable use x

    incident handling

    Which stateent is true regarding anti-virus software?

    nl" e-ail progras need to be protected.nl" hard drives can be protected.

    nl" after a virus is &nown can an anti-virus update be created for it. x

    nl" coputers with a direct Internet connection need it.

    Which two stateents are true concerning anti-spa software? (Choose two.)

    +nti-spa software can be loaded on either the end-user PC or the ISP server: but not

    both.

    When anti-spa software is loaded: legitiate e-ail a" be classified as spa b"ista&e. x

    Installing anti-spa software should be a low priorit" on the networ&.ven with anti-spa software installed: users should be careful when opening e-ail

    attachents. x

    /irus warning e-ails that are not identified as spa via anti-spa software should beforwarded to other users iediatel".

    What ter is used to describe a dedicated hardware device that provides firewallservices?

    server-based

    integratedpersonal

    appliance-based x

    Which abbreviation refers to an area of the networ& that is accessible b" both internal: or

    trusted: as well as external: or untrusted: host

    devices?SPI

    #,F x

    IS'ISP

    Which stateent is true about port forwarding within a *in&s"s integrated router?nl" external traffic that is destined for specific internal ports is peritted. +ll other

    traffic is denied. x

    nl" external traffic that is destined for specific internal ports is denied. +ll other traffic

    is peritted.

  • 8/13/2019 Soal Calon UKK

    20/21

    nl" internal traffic that is destined for specific external ports is peritted. +ll other

    traffic is denied.

    nl" internal traffic that is destined for specific external ports is denied. +ll other trafficis peritted.

    o which part of the networ& does the wireless access point part of a *in&s"s integrated

    router connect?#,F

    external

    internal x

    a networ& other than the wired networ&

    What stateent is true about securit" configuration on a *in&s"s integrated router?

    + #,F is not supported.

    he router is an exaple of a server-based firewall.he router is an exaple of an application-based firewall.

    Internet access can be denied for specific da"s and ties. x

    What environent would be best suited for a two-firewall networ& design?

    a large corporate environent xa hoe environent with 2< or fewer hosts

    a hoe environent which re$uires secure /P access

    a sall business environent which is experiencing continuing ##oS attac&s

    What is one function that is provided b" a vulnerabilit" anal"sis tool?

    It provides various views of possible attac& paths.It identifies issing securit" updates on a coputer. x

    It identifies wireless wea& points such as rogue access points.

    It identifies all networ& devices on the networ& that do not have a firewall installed.It identifies ,+C and IP addresses that have not been authenticated on the networ&.

    ,an" best practices exist for wired and wireless networ& securit". he list below has one

    ite that is not a best practice. Identif" therecoendation that is not a best practice for wired and wireless securit".

    Periodicall" update anti-virus software.

    0e aware of noral networ& traffic patterns.Periodicall" update the host operating s"ste.

    +ctivate the firewall on a *in&s"s integrated router.

    Configure login perissions on the integrated router.#isable the wireless networ& when a vulnerabilit" anal"sis is being perfored. x

    What best practice relates to wireless access point securit"?

    activation of a popup stopper

  • 8/13/2019 Soal Calon UKK

    21/21

    a change of the default IP address x

    an update in the antivirus software definitions

    ph"sicall" securing the cable between the access point and client

    'efer to the graphic. In the *in&s"s Securit" enu: what does the SPI >irewall Protectionoption nabled provide?It prevents pac&ets based on the application that a&es the re$uest.

    It allows pac&ets based on approved internal ,+C or IP addresses.

    It re$uires that pac&ets coing into the router be responses to internal host re$uests. xIt translates an internal address or group of addresses into an outside: public address.

    roubleshooting our etwor&