Ccna certification Practice Tests


  Appendix  ■   Answers to Practice Test Questions  16



Download 8,04 Mb.
Pdf ko'rish
bet496/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   492   493   494   495   496   497   498   499   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

358

 

Appendix 



  Answers to Practice Test Questions



 16.  A.  The command 

ip dhcp snooping trust will configure the interface as a trusted 

port. The command 

dhcp snooping trust is incorrect. The command ip dhcp 

snooping trust interface gi 2/3 is incorrect. The command ip dhcp trust is 

incorrect.



 17.  C.  The native VLAN is the default configuration on all switches. It is very possible 

that a user could be configured by accident for the native VLAN of 1. This would allow 

management access to switching and routing. The native VLAN will not contain frames 

from all VLANs. The native VLAN will only contain frames that are placed onto a trunk 

that have not been tagged. The native VLAN is not configured on all switches for logging; 

logging can be transmitted over any VLAN. All VLANs provide no encryption, regardless 

of whether they are the native VLAN.

 18.  A.  End user training and vigilance is the best way to protect users from phishing attacks. 

A phishing attack is an email or site that looks legitimate and baits the user to enter 

their credentials. If a user can identify a phishing attempt that looks like a legitimate 

request, they can protect themselves by ignoring the phishing attempt or deleting it. Anti-

malware and antivirus software will not protect you from phishing attacks since they are 

engineered to protect you from malware or viruses. Certificates can be used internally to 

sign emails, but external vendors do not normally use certificates to sign emails.

 19.  A.  A hardware or software token creates a numeric password that is only valid only for 

a specific amount of time before a new one is displayed. Certificate authentication is not 

time-limited for a session. Smart card authentication is not time-limited for a session. 

License is a term used with the licensing of software and therefore an incorrect answer.

 20.  C.  This is most likely a phishing attack aimed at the user. Spam would not have links to a 

bank website for login. Password cracking is the act of trying several different passwords 

in an attempt to gain access. A worm is malware that replicates itself and infects other 

systems.


 21.  B.  Privacy filters are either film or glass add-ons that are placed over a monitor. They 

prevent the data on the screen from being readable when viewed from the sides. Security is 

the overall goal and not the correct answer. Degaussing is associated with magnetic media 

erasure. Tempered describes a type of glass that does not prevent side viewing.



 22.  A.  Shoulder surfing involves looking over someone’s shoulder as they enter information. 

Phishing is the act of attempting to steal credentials by sending an email that takes you to 

a fraudulent login. Tailgating is the act of following a person through an access control 

point and using their credentials. Whaling is a form of phishing that targets high-profile 

individuals.

 23.  D.  By implementing least privilege and removing the administrative privileges from the 

office workers, you can easily secure the network. Biometric authentication will secure 

the network, but it is not easily implemented. Hardware tokens will secure the network, 

but they are not easily implemented. Active Directory will not add security to the network 

anymore because it is only a centralized authentication system.



Chapter 5: Security Fundamentals (Domain 5) 


Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   492   493   494   495   496   497   498   499   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish