Home
11.
Juan is configuring a new device that will join his organization’s wireless network. The wireless network uses 802.1x authentication. What type of agent must be running on the device for it to join this network?
  • A.
    Supplicant
  • B.
    Authenticator
  • C.
    Authentication server
  • D.
    Command and control
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Any device that wishes to join an 802.1x network must be running an 802.1x supplicant that can communicate with the authenticator before joining the network.
Report
Name Email  
12.
Rick is preparing a firewall rule that will allow network traffic from external systems to a web server running the HTTPS protocol. What TCP port must he allow to pass through the firewall?
  • A.
    25
  • B.
    80
  • C.
    143
  • D.
    443
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
The Secure HTTP (HTTPS) protocol uses TCP port 443 for communications between web browsers and the web server.
Report
Name Email  
13.
What type of firewall provides the greatest degree of contextual information and can include information about users and applications in its decision-making process?
  • A.
    NGFW
  • B.
    WAF
  • C.
    Packet filter
  • D.
    Stateful inspection
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Next-generation firewalls (NGFWs) incorporate contextual information about users, applications, and business processes in their decision-making process.
Report
Name Email  
14.
Wayne is configuring a jump box server that system administrators will connect to from their laptops. Which one of the following ports should definitely not be open on the jump box?
  • A.
    22
  • B.
    23
  • C.
    443
  • D.
    3389
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Port 23, used by the Telnet protocol, is unencrypted and insecure. Connections should not be permitted to the jump box on unencrypted ports. The services running on ports 22 (SSH), 443 (HTTPS), and 3389 (RDP) all use encryption.
Report
Name Email  
15.
Tom would like to deploy consistent security settings to all of his Windows systems simultaneously. What technology can he use to achieve this goal?
  • A.
    GPO
  • B.
    HIPS
  • C.
    IPS
  • D.
    DNS
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Administrators may use Group Policy Objects (GPOs) to control a wide variety of Windows settings and create different policies that apply to different classes of system.
Report
Name Email