|
Question 1. Which VPN protocol is described by: supports multiple encapsulated protocols, authentication and encryption, and uses a client / server architecture? A. PPTP B. L2TP C. SSH2 D. IPSec Answer: A Explanation: PPTP is based on the point-to-point protocol. PPTP enables users to access wireless networks securely and easily, and is natively supported by most Microsoft desktop and server operating systems. Question 2. Which type of segmentation device is described by: intelligent, but slow, uses security that is equivalent to a strong set of access control lists? A. Firewall B. Router C. Layer 3 switch D. VPN Concentrator Answer: B Question 3. Which type of segmentation device is described by: used to filter between networks, can be designed as all-purpose or for specific filtering functions? A. Router B. Firewall C. VPN Concentrator D. Enterprise Encryption Gateway Answer: B Question 4. Which EAP authentication type is characterized by: one-way authentication, password-based protocol, and does not use WEP keys? A. EAP-TTLS B. LEAP C. EAP-TLS D. EAP-MD5 Answer: D Question 5. Which EAP authentication type is characterized by the creation of an encrypted tunnel between the supplicant and the authentication server? A. EAP-TTLS B. LEAP C. PEAP D. EAP-TLS Answer: A Question 6. An access point using an EAP protocol. A client device sends it an EAP-start message. What is the FIRST action the access point takes? A. AP enables port to authorized state. B. AP detects client. C. AP sends identity request to client. D. AP enables port to unauthorized state. Answer: B Question 7. Which EAP authentication type is characterized by: based on Secure Socket Layer protocol and used both server-side and client-side certificates? A. EAP-MD5 B. LEAP C. EAP-TTLS D. EAP-TLS Answer: D Question 8. Which of the following Layer 2 security solutions provides for unique and changing encryption keys with the addition of a flexible authentication protocol, and adds broadcast key rotation in some implementations? A. 802.1x/EAP B. Dynamic WEP C. Static WEP D. TKIP Answer: A Question 9. Which of the following Layer 2 security solutions provides for unique and changing encryption keys so an intruder will never be able to collect enough data to crack the keys? A. Dynamic WEP B. TKIP C. Static WEP D. 802.1x/EAP Answer: A Question 10. Which EAP authentication type is characterized by: any kind of supplicant credentials can be used; mutual authentication but only server-side digital certificates? A. EAP-TLS B. LEAP C. PEAP D. EAP-TTLS Answer: D Question 11. Concerning RADIUS, what term refers to the design capability that allows multiple servers to run as a single computer, where each shares in the workload of the application? A. Scalability B. Clustering C. Failover D. Distributed Answer: B Question 12. Which of the following statements is false concerning using switches to connect to the wired segment of a network? A. Allows support for security and network management tools like VLANs. B. Create full duplex connectivity at the bridge C. Broadcast each frame entering any port to every other port D. Create full duplex connectivity at the access point Answer: C Question 13. The time required for a brute force attack to find an encryption key is exponentially raised when what is proportionally raised? A. key length B. variable rotation C. number of rounds D. key expansion Answer: C Question 14. Though it has been highly publicized to have been broken, WEP offers a fair level of security, especially when compared with not using any protection at all. What is the shortest estimate of how long a hacker would need to crack WEP? A. Within an hour B. Several days. C. Almost immediately. D. Three to four hours Answer: D Question 15. Which encryption scheme is the most well-known block cipher, and is extremely efficient on processors such as Intel's Pentium series? A. RC4 B. DES/3DES C. RC5 D. AES Answer: C Question 16. Which of the following actions will not help customer support centers prevent social engineering? A. Shred documents prior to throwing them away. B. End-user verifies support center identity before giving password information. C. Positively identify person calling help desk. D. Use established, secure channels for passing security information. Answer: B Question 17. Which of the following Layer 2 security solutions provides for unique and changing encryption keys so an intruder will never be able to collect enough data to crack the keys? A. Dynamic WEP B. TKIP C. Static WEP D. 802.lx/EAP Answer: A Question 18. What purpose does eliminating availability of some services from a wireless segment of a network serve? A. Speeds email communications B. Creates more bandwidth for file sharing C. Reduces security risk to the entire network D. Forces end-users to comply with security program Answer: C Question 19. Your company has not installed an intrusion detection system on your network. Which of the following actions would reduce the effectiveness of your manual network scan for rogue devices? A. Search in the 2.4-2.5 GHz band. B. Use a wireless packet analyzer for the scan. C. Search all physical locations of the company. D. Use an up-to-date listing of the MAC addresses and SSIDs of all authorized devices. Answer: A Question 20. Which encryption mode has been selected for use in IEEE 802.11i? A. RC6 B. 3DES C. PSK D. AES-CCMP Answer: D
|
Question 1. Which processors use hyperthreading? (Select two.) A. Intel single core processors B. AMD dual core processors C. AMD quad core processors D. Inteldual core processors Answer: A, D Question 2. How many memory channels are there in a 2 processor DDR3-based server? A. 2 channels B. 3channels C. 4channels D. 6 channels Answer: D Question 3. On Intel Xeon 5500 Series (Nehalem) based servers, where is the memory controller located? A. processor socket B. processor core C. HyperTransport Bus D. Front Side Bus Answer: B Question 4. Which components are under the control of Dynamic Power Management on Intel Xeon 5500 Series (Nehalem) based servers? (Select two.) A. chipset B. PCI-e cards C. hard drives D. CPU E. fans Answer: A, D Question 5. A server has four disks, each 146GB in size. They are configured as RAID 5. What is the logical drive size presented to the operating system? A. 292GB B. 438GB C. 584GB D. 730GB Answer: B Question 6. Which operating system has support for the ZFS filesystem? A. Sun Solaris B. Windows Server 2008 R2x64 Enterprise Edition C. Novell NetWare 6.5 D. Novell SLES 10 Answer: A Question 7. Which type of internal slot has been added to HP ProLiant G6-based servers for use by hypervisors? A. Extreme Digital (xD) B. Secure Digital (SD) C. Compact Flash (CF) D. PCI-express (PCIe) Answer: B Question 8. For the Intel x5570Series processors in the HP ProLiant SL2x170z G6, what does the letter "x" preceding the processor model number indicate? A. extreme performance B. lowerwattage C. turbo boost performance D. highperformance/wattage Answer: D Question 9. In which log are Array POST errors recorded? A. Windows Event Log B. Integrated Management Log C. IPMI Log D. Onboard Administrator Log Answer: B Question 10. What information does the ADU provide? (Select three.) A. firmwareversion B. OEM hard drive vendor C. RAID stripe size D. HardwareErrorLogs E. SmartArray driver version Answer: A, C, D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.