Correct Answer
verified
View Answer
Multiple Choice
A) The client sends a pre-shared key along with the access point's SSID.
B) The client requests an encrypted tunnel, after which, the client's MAC serves as the authentication.
C) The access point forces the client to authenticate via a captive portal, after which all communication is encrypted.
D) The client "authenticates" using only the SSID name. In other words, no real authentication occurs.
Correct Answer
verified
Multiple Choice
A) It is the name for a Kerberos client or user.
B) It is a key used by the client to gain access to services that are protected by the key on the network.
C) It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
D) It is the event that is generated when auditing a resource and unauthorized access is attempted.
Correct Answer
verified
Multiple Choice
A) file integrity monitoring (FIM)
B) file change management (FCM)
C) file access auditing (FAA)
D) file checksum watching (FCW)
Correct Answer
verified
Multiple Choice
A) A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.
B) A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
C) A stateless firewall blocks designated types of traffic based on application data contained within packets.
D) A stateless firewall filters packets based on source and destination IP addresses.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Google Authenticator
B) RADIUS
C) TACACS+
D) Kerberos
Correct Answer
verified
Multiple Choice
A) Use the switchport port-security command to enable MAC filtering.
B) Use the mac-limit command to prevent more than one MAC from being accepted.
C) Use the allowed-mac command to filter by MAC address.
D) Use the secure port mac-address command to limit the port to learned addresses only.
Correct Answer
verified
Multiple Choice
A) port supertrunking
B) port mirroring
C) port shadowing
D) port lurking
Correct Answer
verified
Multiple Choice
A) You wish to block BPDUs on an access port serving network hosts.
B) You wish to disable STP on a port connected to a partnered company's switch.
C) You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
D) You wish to prevent a rogue switch or computer from hijacking the network's STP paths.
Correct Answer
verified
Showing 41 - 50 of 50
Related Exams