358
Appendix
■
Answers to Practice Test Questions
16. A. The command
ip dhcp snooping trust will configure the interface as a trusted
port. The command
dhcp snooping trust is incorrect. The command ip dhcp
snooping trust interface gi 2/3 is incorrect. The command ip dhcp trust is
incorrect.
17. C. The native VLAN is the default configuration on all switches. It is very possible
that a user could be configured by accident for the native VLAN of 1. This would allow
management access to switching and routing. The native VLAN will not contain frames
from all VLANs. The native VLAN will only contain frames that are placed onto a trunk
that have not been tagged. The native VLAN is not configured on all switches for logging;
logging can be transmitted over any VLAN. All VLANs provide no encryption, regardless
of whether they are the native VLAN.
18. A. End user training and vigilance is the best way to protect users from phishing attacks.
A phishing attack is an email or site that looks legitimate and baits the user to enter
their credentials. If a user can identify a phishing attempt that looks like a legitimate
request, they can protect themselves by ignoring the phishing attempt or deleting it. Anti-
malware and antivirus software will not protect you from phishing attacks since they are
engineered to protect you from malware or viruses. Certificates can be used internally to
sign emails, but external vendors do not normally use certificates to sign emails.
19. A. A hardware or software token creates a numeric password that is only valid only for
a specific amount of time before a new one is displayed. Certificate authentication is not
time-limited for a session. Smart card authentication is not time-limited for a session.
License is a term used with the licensing of software and therefore an incorrect answer.
20. C. This is most likely a phishing attack aimed at the user. Spam would not have links to a
bank website for login. Password cracking is the act of trying several different passwords
in an attempt to gain access. A worm is malware that replicates itself and infects other
systems.
21. B. Privacy filters are either film or glass add-ons that are placed over a monitor. They
prevent the data on the screen from being readable when viewed from the sides. Security is
the overall goal and not the correct answer. Degaussing is associated with magnetic media
erasure. Tempered describes a type of glass that does not prevent side viewing.
22. A. Shoulder surfing involves looking over someone’s shoulder as they enter information.
Phishing is the act of attempting to steal credentials by sending an email that takes you to
a fraudulent login. Tailgating is the act of following a person through an access control
point and using their credentials. Whaling is a form of phishing that targets high-profile
individuals.
23. D. By implementing least privilege and removing the administrative privileges from the
office workers, you can easily secure the network. Biometric authentication will secure
the network, but it is not easily implemented. Hardware tokens will secure the network,
but they are not easily implemented. Active Directory will not add security to the network
anymore because it is only a centralized authentication system.
Chapter 5: Security Fundamentals (Domain 5)
Do'stlaringiz bilan baham: |