On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?
 
 
 
a. 

 
b. 

 
c. 

 
d. 

a. SS7

 

At what layer of the OSI model does the IPsec encryption protocol operate?
 
 
 
a. 

 
b. 

 
c. 

 
d. 

d. Network Layer

What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?

a. ePBX

b. digital PBX

c. ATA PBX

d. IP PBX

b. digital PBX and d. IP PBX

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
 
a. 

 
b. 

 
c. 

 
d. 

d. SSTP

 

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?

 
a. 

Authentication

 
b. 

Authorization

 
c. 

Access control

 
d. 

Accounting

c. Access Control

What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
   
 
a. 

 
b. 

 
c. 

 
d. 

b. PPP and d. SLIP

 

The key management phase of IPSec is reliant on which two services below?
 
a. 

 
b. 

 
c. 

 
d. 

b. IKE and d. ISAKMP

What feature of Windows Server allows for agentless authentication?

 
 
 
a. 

IDS (intrusion detection system)

 
b. 

Network-based firewall

 
c. 

ACL (access control list)

 
d. 

Active Directory

d. Active Directory

 

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
 
 
 
a. 

 
b. 

 
c. 

 
d. 

d. expedited forwarding

RTP and RTCP operate at which layer of the OSI model?

   
 
a. 

Transport layer

 
b. 

Application layer

 
c. 

Network layer

 
d. 

Data Link layer

b. Application Layer

What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?
 
 
 
a. 

 
b. 

 
c. 

 
d. 

b. PCI DSS

 

Networks that use ________________, such as T-1 or DSL connections to the Internet, are vulnerable to eavesdropping at a building s demarc (demarcation point), at a remote switching facility, or in a central office.

leased public lines

What two log files are used by older versions of Unix and newer version of Linux to store log information?
   
 
a. 

 
b. 

 
c. 

 
d. 

c. /var/log/messages and d. /var/log/syslog

 

At what layer of the OSI model do proxy servers operate?

   
 
a. 

Layer 2

 
b. 

Layer 3

 
c. 

Layer 4

 
d. 

Layer 7

d. Layer 7

 

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
   
 
a. 

 
b. 

 
c. 

 
d. 

a. TKIP

 

Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. H.323 gateway

 

Which cloud computing service model gives software developers access to multiple operating systems for testing?

   
 
a. 

PaaS

 
b. 

IaaS

 
c. 

SaaS

 
d. 

XaaS

a. PaaS

Which tunneling protocol is accepted and used by multiple vendors?

   
 
a. 

L2TP

 
b. 

SSL

 
c. 

SSL VPN

 
d. 

SSH

a. L2TP

 

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
   
 
a. 

 
b. 

 
c. 

 
d. 

d. EAP

 

What two terms below describe a network device with three ports, two of which send and receive all traffic, and the third port mirrors the traffic?
 
a. 

 
b. 

 
c. 

 
d. 

a. packet sniffer and b. network tap
SNMP messages can be secured with ________, in which case agents receive requests on port UDP 10161, and the NMS receives responses and traps on UDP 10162.
TLS

 

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire?
   
 
a. 

 
b. 

 
c. 

 
d. 

virtual wire mode

 

CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities. (T/F)

True

What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
   
 
a. 

 
b. 

 
c. 

 
d. 

c. MPLS

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
 
a. 

 
b. 

 
c. 

 
d. 

a. EAP

 

What component of SIP is a server that responds to user agent clients’ requests for session initiation and termination?
 
a. 

 
b. 

 
c. 

 
d. 

user agent server

 

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

 
a. 

DirectAccess

 
b. 

Group Policy

 
c. 

Active Directory

 
d. 

RAS (Remote Access Service)

Direct Access

 

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
   
 
a. 

 
b. 

 
c. 

 
d. 

a. VPN gateway

Which tunneling protocol is accepted and used by multiple vendors?

   
 
a. 

SSL

 
b. 

SSH

 
c. 

L2TP

 
d. 

SSL VPN

c. L2TP

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel. (T/F)
 

False

 

One of your coworkers downloaded several, very large video files for a special project she’s working on for a new client. When you run your network monitor later this afternoon, what list will your coworker’s computer likely show up on?

   
 
a. 

Top listeners

 
b. 

Top talkers

 
c. 

Discarded packets

 
d. 

Event Viewer

a. Top Listeners
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
Platform as a Service (PaaS)

 

What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
   
 
a. 

 
b. 

 
c. 

 
d. 

SLIP and PPP

 

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
   
:
a. 

 
b. 

 
c. 

 
d. 

SaaS

 

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel. (T/F)
 

False

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?
   
 
a. 

 
b. 

 
c. 

 
d. 

metasploit
The ________________ utility is a Windows console that is used to control what users do and how the system can be used.
gpedit.msc
The _____________ proxy server software is available for use on the UNIX / Linux platform.
SQUID

 

One aspect of the __________________ regulation addresses the security and privacy of medical records, including those stored or transmitted electronically.

HIPAA (Health Insurance Portability and Accountability Act)

What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?
 
a. 

 
b. 

 
c. 

 
d. 

digital PBX and IP PBX

 

What component of SIP is a server that responds to user agent clients’ requests for session initiation and termination?
   
 
a. 

 
b. 

 
c. 

 
d. 

user agent server

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>