Upload
aris3t4354
View
266
Download
0
Embed Size (px)
Citation preview
8/13/2019 Soal Calon UKK
1/21
Connecting to the internet throught an ISP
Which definition describes the term Internet?a group of PCs connected together on a LAN
a group of PCs connected together by an ISP
a network of networks that connects countries around the world a worldwide collection of networks controlled by a single organi!ation
What type of connection point is a point of presence "P#P$?
between a client and a hostbetween two local networks
between a computer and a switch
between an ISP and a home%based LAN
What is the term for the group of high%speed data links that interconnect ISPs?Internet LAN
ISP backbone
Internet gateways
Internet pro&idersInternet backbone
Which de&ice can act as a router' switch' and wireless access point in one package?hubbridge
modem
repeaterIS(
What are three characteristics of business class ISP service? (Choose three.)
fast connections x
extra web space xfree Windows upgrade
cheapest cost available to all users
additional e-ail accounts xreplaceent hardware at no cost
What is a a!or characteristic of as"etric Internet service?
#ownload speeds and upload speeds are e$ual.
8/13/2019 Soal Calon UKK
2/21
#ownload speeds are slower than upload speeds.
%pload speeds and download speeds are different. x
%pload speeds and download speeds are irrelevant.
Which three eleents are re$uired to successfull" connect to the Internet? (Choose
three.)an IP address x
file sharing enabled
a networ& connection xserver services enabled
access to an Internet service provider x
an address obtained directl" fro the 'I'
What ter describes each router through which a pac&et travels when oving between
source and destination networ&s?
C
ISPhop x
segent
What does the tracert coand test?
IC functionalit"the ISP bandwidth
the networ& path to a destination x
the destination application functionalit"
What t"pe of end-user connectivit" re$uires that an ISP have a #S*+, device in their
networ&?analog technolog"
cable ode technolog"
digital subscriber line technolog" xwireless technolog"
Wh" would an ISP re$uire a C,S device on their networ&?
to connect end users using cable technolog" xto connect end users using analog technolog"
to connect end users using wireless technolog"
to connect end users using digital subscriber line technolog"
8/13/2019 Soal Calon UKK
3/21
'efer to the graphic. What t"pe of cabling is shown?
SP
%Pcoax
fiber x
'efer to the graphic. What t"pe of cabling is shown?
SP
%P xcoax
fiber
Which two places are ost appropriate to use %P cabling? (Choose two.)
between buildings
in a hoe office networ& xwhere ,I is an issue
in a cable / networ&
inside a school building x
in a anufacturing environent with hundreds of electrical devices
What does adherence to cabling standards ensure?
data securit"
no loss of signalno electroagnetic interference
reliable data counications x
8/13/2019 Soal Calon UKK
4/21
'efer to the graphic. What t"pe of cable is shown?
crossover x
eight coax channels
ultiode fibersingle-ode fiber
straight-through
What connector is used to terinate thernet unshielded twisted pair (%P) cabling?
S0C'1-22
'1-34 x
Which two characteristics describe copper patch panels? (Choose two.)
uses '1-22 !ac&s
uses '1-34 !ac&s xsupports onl" data transissions
allows $uic& rearrangeents of networ& connections x
forwards transissions based on ,+C addresses
What are two advantages of cable anageent? (Choose two.)
re$uires no preplanningaids in isolation of cabling probles x
protects cables fro ph"sical daage x
provides copliance with future standards
provides a short-ter solution for cable installation
What are two coon causes of signal degradation when using %P cabling? (Choose
two.)installing cables in conduit
having iproper terination xlosing light over long distances
installing low $ualit" cable shielding
using low $ualit" cables or connectors x
8/13/2019 Soal Calon UKK
5/21
What are three coonl" followed standards for constructing and installing cabling?
(Choose three.)
pinouts xcable lengths x
connector color
connector t"pes xcost per eter (foot)
tensile strength of plastic insulator
Network Addressing
5ow large are IPv3 addresses?6 bits
27 bits
89 bits x
73 bits296 bits
'efer to the graphic. + user at the wor&station cannot connect to the server. +ll cables
have been tested and are wor&ing and all deviceshave IP addressing. 5owever: the user cannot ping the server. What is causing the
proble?
he router interface does not have a default gatewa".he switch does not have an IP address and default gatewa".
he wor&station and server are on different logical networ&s. xhe wor&station does not &now the ,+C address of the switch.
Which part of an IP address identifies a specific device on a networ&?
first two octetsthird and fourth octets
networ& portion
host portion x
8/13/2019 Soal Calon UKK
6/21
onl" the fourth octet
+ host with the IP address 2;9.89.74.28 and a default as& belongs to what networ&?
2;9.89.74.P to transfer files over the Internet?
CP x
S,P%#P
S,P
8/13/2019 Soal Calon UKK
10/21
Which protocols are CP@IP application la"er protocols? (Choose two.)
%#P
>P xIP
S,P x
CP
Which of the following are la"ers of the CP@IP odel? (Choose three.)
+pplication xPh"sical
Internet x
etwor& +ccess
Presentation x
ou are creating a networ&-based video gae. What influences "our decision about
which transport protocol to use for the application?
%#P will not disrupt the gae to retransit dropped pac&ets. xCP provides extra ac&nowledgeents that will ensure sooth video deliver".
0oth CP and %#P can be used siultaneousl" to ensure speed and guaranteed deliver".0oth CP and %#P a" slow transission and disrupt gae operation: so no transport
protocol should be used.
Whenever e-ail clients send letters: what device is used to translate the doain naes
into their associated IP addresses?
%nifor 'esource *ocator
etwor& redirector serverS,P server
#S server x
Which application is ost li&el" used to translate www.cisco.co to 2=6.288.92=.94?
#5CP
#S x>P
5P
PP
S,P
8/13/2019 Soal Calon UKK
11/21
'efer to the graphic. Which protocol is used to access this website?
I,>P
5P x
S,P/oIP
Which port nuber is used b" S,P?9P.he segent destination port nuber identifies the application that should handle it. x
he source port nuber is associated with one of these well &nown server applications.
What ter is used to describe how CP@IP protocols are la"ered and interact to forat:
address: and transit inforation across a
networ&?protocol hierarch"
protocol odeling
protocol stac& x
protocol la"ering
What inforation is contained in an IP header?
source and destination IP addresses x
source and destination ,+C addressesonl" destination IP and ,+C addresses
both source and destination IP and ,+C addresses
Cabling issues are associated with which SI la"er?
39
2 x
8
+ device receives an thernet frae and recogniAes the ,+C address as its own. What
does the device do to the essage to get to the
encapsulated data?reoves the IP header
reoves the CP header
passes data to the application la"erreoves the thernet header and trailer x
26 + client has decoded a frae and started the de-encapsulation process. In which orderdoes the de-encapsulation process occur?
2) reove IP header
9) reove thernet header and trailer8) reove CP header
3) pass data to the application
2) add CP header to data9) add an IP header
8) add frae header and trailer
3) encode the frae into bits
2) reove thernet header and trailer x
8/13/2019 Soal Calon UKK
13/21
9) reove IP header
8) reove CP header
3) pass data to the application2) add CP header to data
9) add thernet header and trailer
8) add an IP header3) encode the frae into bits
What is an advantage of the use of la"ers in the SI reference odel?It brea&s networ& counications into larger parts.
It increases coplexit". x
It prevents changes in one la"er fro affecting other la"ers.
It re$uires the use of single-vendor e$uipent for hardware and softwarecounications.
What is the correct order of the la"ers of the SI reference odel: starting at the lowestla"er and wor&ing up the odel?
data lin&: ph"sical: transport: networ&: presentation: session: applicationph"sical: data lin&: networ&: session: transport: presentation: application
ph"sical: data lin&: networ&: transport: presentation: session: application
ph"sical: data lin&: networ&: transport: session: presentation: application xapplication: session: presentation: transport: data lin&: networ&: ph"sical
What resolves a website %'* to an IP address?
>P serverweb server
#S server x
#5CP server
What three ites are contained in an thernet header and trailer? (Choose three.)
source IP addresssource ,+C address x
destination IP address
destination ,+C address x
error-chec&ing inforation x
Wireless echnologies
Wh" is I 6
8/13/2019 Soal Calon UKK
14/21
What are three advantages of wireless over wired technolog"? (Choose three.)
ore securelonger range
an"tie: an"where connectivit" x
eas" and inexpensive to install xease of using licensed air space
ease of adding additional devices x
What are two benefits of wireless networ&ing over wired networ&ing? (Choose two.)
speed
securit"
obilit" xreduced installation tie x
allows users to share ore resources
not susceptible to interference fro other devices
+ technician has been as&ed to provide wireless connectivit" to the wired thernet
networ& of a building. Which three factors affect thenuber of access points needed? (Choose three.)
the siAe of the building x
the nuber of solid interior walls in the building xthe presence of icrowave ovens in several offices x
the encr"ption ethod used on the wireless networ&
the use of both Windows and +ppletal& operating s"stes
the use of shortwave or infrared on the +P
Wh" is securit" so iportant in wireless networ&s?
Wireless networ&s are t"picall" slower than wired networ&s.elevisions and other devices can interfere with wireless signals.
Wireless networ&s broadcast data over a ediu that allows eas" access. x
nvironental factors such as thunderstors can affect wireless networ&s.
What does the Wi->i logo indicate about a wireless device?
I has approved the device.
he device is interoperable with all other wireless standards.he device is interoperable with other devices of the sae standard that also displa" the
Wi->i logo. x
he device is bac&wards copatible with all previous wireless standards.
Which stateent is true concerning wireless bridges?
connects two networ&s with a wireless lin& xstationar" device that connects to a wireless *+
allows wireless clients to connect to a wired networ&
increases the strength of a wireless signal
8/13/2019 Soal Calon UKK
15/21
Which W*+ coponent is coonl" referred to as an S+?
cell
antennaaccess point
wireless bridge
wireless client x
Which stateent is true concerning an ad-hoc wireless networ&?
created b" connecting wireless clients in a peer-to-peer networ& xcreated b" connecting wireless clients to a single: centraliAed +P
created b" connecting ultiple wireless basic service sets through a distribution s"ste
created b" connecting wireless clients to a wired networ& using an IS'
'efer to the graphic. In the Wireless enu option of a *in&s"s integrated router: what
does the etwor& ,ode option ,ixed ean?
he router supports encr"ption and authentication.he router supports both wired and wireless connections.
he router supports 6
8/13/2019 Soal Calon UKK
16/21
'efer to the graphic. In the Wireless enu of a *in&s"s integrated router: what
configuration option allows the presence of the access
point to be &nown to nearb" clients?etwor& ,ode
etwor& ae (SSI#)
'adio 0andWide Channel
Standard Channel
SSI# 0roadcast x
Which two stateents about a service set identifier (SSI#) are true? (Choose two.)
tells a wireless device to which W*+ it belongsx
consists of a 89-character string and is not case sensitiveresponsible for deterining the signal strength
all wireless devices on the sae W*+ ust have the sae SSI# x
used to encr"pt data sent across the wireless networ&
Which two stateents characteriAe wireless networ& securit"? (Choose two.)
Wireless networ&s offer the sae securit" features as wired networ&s.Wardriving enhances securit" of wireless networ&s.
With SSI# broadcast disabled: an attac&er ust &now the SSI# to connect. x
%sing the default IP address on an access point a&es hac&ing easier. x+n attac&er needs ph"sical access to at least one networ& device to launch an attac&.
What t"pe of authentication does an access point use b" default?
pen xPSB
WP
+P
Which stateent is true about open authentication when it is enabled on an access point?
re$uires no authentication xuses a 73-bit encr"ption algorith
re$uires the use of an authentication server
re$uires a utuall" agreed upon password
What are two authentication ethods that an access point could use? (Choose two.)
WP
WP++P x
+SCII
pre-shared &e"s x
What is the difference between using open authentication and pre-shared &e"s?
pen authentication re$uires a password. Pre-shared &e"s do not re$uire a password.
8/13/2019 Soal Calon UKK
17/21
pen authentication is used with wireless networ&s. Pre-shared &e"s are used with wired
networ&s.
Pre-shared &e"s re$uire an encr"pted secret word. pen authentication does not re$uire asecret word. x
Pre-shared &e"s re$uire a ,+C address prograed into the access point. pen
authentication does not re$uire this prograing.
What ter describes the encoding of wireless data to prevent intercepted data fro being
read b" a hac&er?address filtering
authentication
broadcasting
encr"ption xpassphrase encoding
What access-point feature allows a networ& adinistrator to define what t"pe of data can
enter the wireless networ&?encr"ption
hac&ing bloc&traffic filtering x
,+C address filtering
authentication
What are the two WP &e" lengths? (Choose two.)
6 bit
27 bit89 bit
73 bit x
296 bit x
Coplete the following sentence WP is used to DDDDDD : and +P is used to DDDDD
wireless networ&s.encr"ptE authenticate users on x
filter trafficE select the operating fre$uenc" for
identif" the wireless networ&E copress data on
create the sallest wireless networ&E liit the nuber of users on
Basic Security
Identif" three techni$ues used in social engineering. (Choose three.)fishing
vishing x
phishing xspaing
pretexting x
!un& ailing
8/13/2019 Soal Calon UKK
18/21
#uring a pretexting event: how is a target t"picall" contacted?
b" e-ail
b" phone xin person
through another person
While surfing the Internet: a user notices a box claiing a priAe has been won. he user
opens the box unaware that a progra is being
installed. +n intruder now accesses the coputer and retrieves personal inforation.What t"pe of attac& occurred?
wor
virus
ro!an horse xdenial of service
What is a a!or characteristic of a Wor?
alicious software that copies itself into other executable prograstric&s users into running the infected software
a set of coputer instructions that lies dorant until triggered b" a specific eventexploits vulnerabilities with the intent of propagating itself across a networ& x
+ flood of pac&ets with invalid source-IP addresses re$uests a connection on the networ&.
he server busil" tries to respond: resulting in
valid re$uests being ignored. What t"pe of attac& occurred?
ro!an horsebrute force
ping of death
S flooding x
What t"pe of advertising is t"picall" anno"ing and associated with a specific website that
is being visited?adware
popups x
sp"ware
trac&ing coo&ies
What is a widel" distributed approach to ar&eting on the Internet that advertises to as
an" individual users as possible via I, ore-ail?
brute force
spa xsp"ware
trac&ing coo&ies
8/13/2019 Soal Calon UKK
19/21
What part of the securit" polic" states what applications and usages are peritted or
denied?
identification and authenticationreote access
acceptable use x
incident handling
Which stateent is true regarding anti-virus software?
nl" e-ail progras need to be protected.nl" hard drives can be protected.
nl" after a virus is &nown can an anti-virus update be created for it. x
nl" coputers with a direct Internet connection need it.
Which two stateents are true concerning anti-spa software? (Choose two.)
+nti-spa software can be loaded on either the end-user PC or the ISP server: but not
both.
When anti-spa software is loaded: legitiate e-ail a" be classified as spa b"ista&e. x
Installing anti-spa software should be a low priorit" on the networ&.ven with anti-spa software installed: users should be careful when opening e-ail
attachents. x
/irus warning e-ails that are not identified as spa via anti-spa software should beforwarded to other users iediatel".
What ter is used to describe a dedicated hardware device that provides firewallservices?
server-based
integratedpersonal
appliance-based x
Which abbreviation refers to an area of the networ& that is accessible b" both internal: or
trusted: as well as external: or untrusted: host
devices?SPI
#,F x
IS'ISP
Which stateent is true about port forwarding within a *in&s"s integrated router?nl" external traffic that is destined for specific internal ports is peritted. +ll other
traffic is denied. x
nl" external traffic that is destined for specific internal ports is denied. +ll other traffic
is peritted.
8/13/2019 Soal Calon UKK
20/21
nl" internal traffic that is destined for specific external ports is peritted. +ll other
traffic is denied.
nl" internal traffic that is destined for specific external ports is denied. +ll other trafficis peritted.
o which part of the networ& does the wireless access point part of a *in&s"s integrated
router connect?#,F
external
internal x
a networ& other than the wired networ&
What stateent is true about securit" configuration on a *in&s"s integrated router?
+ #,F is not supported.
he router is an exaple of a server-based firewall.he router is an exaple of an application-based firewall.
Internet access can be denied for specific da"s and ties. x
What environent would be best suited for a two-firewall networ& design?
a large corporate environent xa hoe environent with 2< or fewer hosts
a hoe environent which re$uires secure /P access
a sall business environent which is experiencing continuing ##oS attac&s
What is one function that is provided b" a vulnerabilit" anal"sis tool?
It provides various views of possible attac& paths.It identifies issing securit" updates on a coputer. x
It identifies wireless wea& points such as rogue access points.
It identifies all networ& devices on the networ& that do not have a firewall installed.It identifies ,+C and IP addresses that have not been authenticated on the networ&.
,an" best practices exist for wired and wireless networ& securit". he list below has one
ite that is not a best practice. Identif" therecoendation that is not a best practice for wired and wireless securit".
Periodicall" update anti-virus software.
0e aware of noral networ& traffic patterns.Periodicall" update the host operating s"ste.
+ctivate the firewall on a *in&s"s integrated router.
Configure login perissions on the integrated router.#isable the wireless networ& when a vulnerabilit" anal"sis is being perfored. x
What best practice relates to wireless access point securit"?
activation of a popup stopper
8/13/2019 Soal Calon UKK
21/21
a change of the default IP address x
an update in the antivirus software definitions
ph"sicall" securing the cable between the access point and client
'efer to the graphic. In the *in&s"s Securit" enu: what does the SPI >irewall Protectionoption nabled provide?It prevents pac&ets based on the application that a&es the re$uest.
It allows pac&ets based on approved internal ,+C or IP addresses.
It re$uires that pac&ets coing into the router be responses to internal host re$uests. xIt translates an internal address or group of addresses into an outside: public address.
roubleshooting our etwor&