Home > Articles > CompTIA > Network+

  • Print
  • + Share This
This chapter is from the book

Exam Prep Questions

  1. Your company is in the process of setting up a DMZ segment. You have to allow email traffic in the DMZ segment. Which TCP ports do you have to open? (Choose two correct answers.)

    circle.gif

    A.

    110

    circle.gif

    B.

    139

    circle.gif

    C.

    25

    circle.gif

    D.

    443

  2. Your company is in the process of setting up a management system on your network, and you want to use SNMP. You have to allow this traffic through the router. Which UDP ports do you have to open? (Choose two correct answers.)

    circle.gif

    A.

    161

    circle.gif

    B.

    139

    circle.gif

    C.

    138

    circle.gif

    D.

    162

  3. You want to implement a proxy firewall technology that can distinguish between FTP commands. Which of the following types of firewall should you choose?

    circle.gif

    A.

    Proxy gateway

    circle.gif

    B.

    Circuit-level gateway

    circle.gif

    C.

    Application-level gateway

    circle.gif

    D.

    SOCKS proxy

  4. You want to use NAT on your network, and you have received a Class C address from your ISP. What range of addresses should you use on the internal network?

    circle.gif

    A.

    10.x.x.x

    circle.gif

    B.

    172.16.x.x

    circle.gif

    C.

    172.31.x.x

    circle.gif

    D.

    192.168.x.x

  5. You are setting up a switched network and want to group users by department. Which technology would you implement?

    circle.gif

    A.

    DMZ

    circle.gif

    B.

    VPN

    circle.gif

    C.

    VLAN

    circle.gif

    D.

    NAT

  6. You are setting up a web server that needs to be accessed by both the employees and by external customers. What type of architecture should you implement?

    circle.gif

    A.

    VLAN

    circle.gif

    B.

    DMZ

    circle.gif

    C.

    NAT

    circle.gif

    D.

    VPN

  7. You have recently had some security breaches in the network. You suspect it may be a small group of employees. You want to implement a solution that will monitor the internal network activity and incoming external traffic. Which of the following devices would you use? (Choose two correct answers.)

    circle.gif

    A.

    A router

    circle.gif

    B.

    A network-based IDS

    circle.gif

    C.

    A firewall

    circle.gif

    D.

    A host-based IDS

  8. Services using an interprocess communication share such as network file and print sharing services leave the network susceptible to which of the following attacks?

    circle.gif

    A.

    Spoofing

    circle.gif

    B.

    Null sessions

    circle.gif

    C.

    DNS kiting

    circle.gif

    D.

    ARP poisoning

  9. You’re the security administrator for a bank. The users are complaining about the network being slow. However, it is not a particularly busy time of the day. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?

    circle.gif

    A.

    Spoofing

    circle.gif

    B.

    Man-in-the-middle

    circle.gif

    C.

    DNS kiting

    circle.gif

    D.

    Denial of service

  10. Your network is under attack. Traffic patterns indicate that an unauthorized service is relaying information to a source outside the network. What type of attack is being executed against you?

    circle.gif

    A.

    Spoofing

    circle.gif

    B.

    Man-in-the-middle

    circle.gif

    C.

    Replay

    circle.gif

    D.

    Denial of service

  • + Share This
  • 🔖 Save To Your Account