1. A vulnerability that would allow an unauthenticated, remote attacker to originate a DoS attack was found in a DHCP client implementation of a switch. Which of the following would BEST resolve the issue?
A) A. Verify the default passwords have been changed. B) B. Upgrade to the latest firmware C) C. Generate new SSH keys. D) D. Review and modify the firewall rules.
2. Which of the following is the physical location where the customer-premise equipment comes together with the ISP or third-party telecommunications equipment?
A) A. Server room B) B. Equipment closet C) C. Demarcation point D) D. Intermediate distribution frame
3. When deploying UTP cables in a networking environment, which of the following are acceptable standards? (Choose two.)(Select 2answers)
A) A. 10Base2 B) B. 10Base5 C) C. 10GBaseT D) D. 1000BaseLX E) E. 1000BaseSX F) F. 1000BaseT
4. Which of the following protocols is used by Active Directory for authentication?
A) A. SSH B) B. SFTP C) C. LDAP D) D. TLS
5. A zero-day vulnerability is discoverd that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?
A) A. Because secure protocols would reject malicious packets B) B. Because SCP is not a secure service C) C. Because FTP is not a secure service D) D. Because a secure firewall will protect the device
Leave a comment