Domain 4: Review Questions Flashcards Preview

CompTIA Network+ N10-007 > Domain 4: Review Questions > Flashcards

Flashcards in Domain 4: Review Questions Deck (25)
Loading flashcards...
1
Q

Which motion detection system has a reflective panel to create zones of detection?

A. Microwave

B. Vibration

C. Passive infrared (PIR)

D. Seismic

A

C. Passive infrared (PIR)

2
Q

You need to deply a surveillance camera in an area that requires you to record the equipment the entire time it has entered you datacenter to the time it is installed. Which type of surveillance camera should you deploy?

A. CCTV

B. PTZ

C. Coaxial

D. POE

A

B. PTZ

3
Q

You work for a library and require an asset tracking system that is inexpensive and will notify you when equipment leaves the building. Which type of system should you purchase and deploy?

A. Bluetooth

B. Passive RFID

C. 802.11 asset tracking

D. Active RFID

A

B. Passive RFID

4
Q

You require a physical security system that authenticates and authorizes employees into an area. Which system should you implement?

A. Key fobs

B. ID badges

C. Biometrics

D. Combination locks

A

C. Biometrics

5
Q

Which is a physical authentication system that requires both a personal identification number (PIN) and physical card?

A. Key fobs

B. Biometrics

C. RFID

D. Smart cards

A

D. Smart cards

6
Q

Which principle describes the process of verification of a user’s identity?

A. Authentication

B. Aurhorization

C. Accounting

D. Auditing

A

A. Authentication

7
Q

Which authentication system is an open standard originally proposed by the Internet Engineer Task Force (IETF)?

A. RADIUS

B. TACACS+

C. Kerberos

D. LDAP

A

A. RADIUS

8
Q

Which authentication system can use Advanced Encryption Standard (AES) encryption for encryption of user credentials?

A. RADIUS

B. TACACS+

C. Kerberos

D. LDAP

A

C. Kerberos

9
Q

Which protocol is often used with single sign-on (SSO) to exchange credentials?

A. LDAP

B. SAML

C. ADFS

D. Kerberos

A

B. SAML

10
Q

Which principle describes the process of verification of a user’s permissions?

A. Authentication

B. Authorization

C. Accounting

D. Auditing

A

B. Authorization

11
Q

What protocol and port number does LDAP use for directory lookups?

A. TCP/389

B. TCP/1812

C. UDP/389

D. UDP/1812

A

A. TCP/389

12
Q

Which authentication factor is an example of personal human characteristic?

A. Typing your password

B. A location you are in

C. A smartcard and you PIN

D. Your voice

A

D. Your voice

13
Q

Which authentication factor is an example of somewhere you are?

A. Your IP address

B. An RFID tag

C. Your MAC address

D. Your picture

A

A. Your IP address

14
Q

Which Cisco proprietary protocol is used to transmit credentials for 802.1x authentication systems?

A. LEAP

B. EAP

C. PEAP

D. NAC

A

A. LEAP

15
Q

What is the proper terminology for a switch or wireless access point (WAP), when 802.1x is implemented?

A. Authenticating server

B. Authenticator

C. Supplicant

D. Authorizer

A

B. Authenticator

16
Q

You need to restrict a switch port to a maximum of two devices. What should you implement to gaurantee only two devices can communicate on the switch port?

A. NAC

B. 802.1x

C. ACLs

D. Port security

A

D. Port security

17
Q

You are implementing a public guest wireless network and require that users accept and aceptable use policy (AUP). What should you implement to accomplish the goal?

A. ACLs

B. MAC filtering

C. Captive portal

D. 802.1x

A

C. Captive portal

18
Q

Which wireless protocol introduced message integrity checks (MIC) and Temporal Key Integrity Protocol (TKIP)?

A. WPA

B. WEP

C. WPA2

D. CBC

A

A. WPA

19
Q

You are implementing a wireless network and need to make sure that only hosts that have up-to-date antivirus protection can join. Which technology should you implement?

A. NAC

B. 802.1x

C. EAP-TLS

D. ACLs

A

A. NAC

20
Q

Which network attack involves malicious code that is dormant until specific conditions are met?

A. Evil twin

B. Logic bomb

C. Spoofing

D. Deauthentication

A

B. Logic bomb

21
Q

Which statement accurately describes an exploit?

A. A known weakness in the operating system

B. A configuration that weakens the security of the operating system

C. A known operating system security flaw

D. A technique to gain unauthorized access

A

D. A technique to gain unauthorized access

22
Q

Which algorithm is commonly used with file hash techniques?

A. RC4

B. MD5

C. HMAC

D. AES

A

B. MD5

23
Q

Which attack involves the attacker impersonating both side of a conversation between two hosts?

A. MitM

B. Deauthentication

C. DoS

D. Spoofing

A

A. MitM

24
Q

Which console-based management protocol has built-in security?

A. SSH

B. SCP

C. HTTPS

D. FTP

A

A. SSH

25
Q

Which mitigation technique is configured on user-facing switch ports to protect the Spanning Tree Protocol (STP)?

A. Flood guard

B. Root Guard

C. DHCP snooping

D. BPDU Guard

A

D. BPDU Guard