Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Network Administrator for XYZ CORP. The company has a TCP/IP-based network environment. The network contains Cisco switches and a Cisco router. A user is unable to access the Internet from Host B. You also verify that Host B is not able to connect to other resources on the network. The IP configuration of Host B is shown below:

Which of the following is the most likely cause of the issue?

A.

An incorrect subnet mask is configured on Host B.

B.

The IP address of Host B is not from the correct IP address range of the network.

C.

There is an IP address conflict on the network.

D.

An incorrect default gateway is configured on Host B.

Mike works as a Network Engineer for XYZ CORP. The company has a multi-platform network. Recently, the company faced lots of blended threat issues that lead to several drastic attacks. Mike has been assigned a project to manage the resources and services of the company through both Intranet and Internet to protect the company from these attacks. Mike needs a system that provides auto-discovering and network topology building features to allow him to keep an intuitive view of the IT infrastructure. What will Mike use to meet the requirement of the project?

A.

eBox

B.

dopplerVUe

C.

David system

D.

EM7

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? (Choose two)

A.

Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

B.

Attacker can use the Ping Flood DoS attack if WZC is used.

C.

Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

D.

It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.

Which of the following protocols are used to provide secure communication between a client and a server over the Internet? (Choose two)

A.

TLS

B.

SSL

C.

HTTP

D.

SNMP

Which of the following tools can be used by a user to hide his identity?

A.

War dialer

B.

IPchains

C.

Proxy server

D.

Rootkit

E.

Anonymizer

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

A.

IEEE 802.1X using EAP-TLS

B.

IEEE 802.1X using PEAP-MS-CHAP

C.

Pre-shared key

D.

Open system

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

A.

By setting up a DMZ.

B.

You cannot, you need an IDS.

C.

By examining your domain controller server logs.

D.

By examining your firewall logs.

Choose the benefits of deploying switches over hubs in your infrastructure. (Choose two)

A.

Layer 2 switches allow for the creation of Virtual LANs providing options for further segmentation and security.

B.

Switches lower the number of collisions in the environment.

C.

Switches create an environment best suited for half duplex communications. This improves network performance and the amount of available bandwidth.

D.

Layer 2 switches increase the number of broadcast domains in the environment.

Sam works as a Network Administrator for XYZ CORP. The computers in the company run Windows Vista operating system, and they are continuously connected to the Internet. This makes the network of the company susceptible to attacks from unauthorized users. Which of the following will Sam choose to protect the network of the company from such attacks?

A.

Firewall

B.

Windows Defender

C.

Software Explorer

D.

Quarantined items

Which of the following statements about Secure Sockets Layer (SSL) are true? (Choose two)

A.

It provides connectivity between Web browser and Web server.

B.

It provides mail transfer service.

C.

It provides communication privacy, authentication, and message integrity.

D.

It uses a combination of public key and symmetric encryption for security of data.