11.
Juan is configuring a new device that will join his
organization’s wireless network. The wireless network uses 802.1x authentication. What type of agent must be running on
the device for it to join this network?
- A.Supplicant
- B.Authenticator
- C.Authentication server
- D.Command and control
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Any device that wishes to join an 802.1x network must be running an 802.1x supplicant that can communicate with the authenticator before joining the network. |
12.
Rick is preparing a firewall rule that will allow network
traffic from external systems to a web server running the
HTTPS protocol. What TCP port must he allow to pass through
the firewall?
- A.25
- B.80
- C.143
- D.443
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
The Secure HTTP (HTTPS) protocol uses TCP port 443 for communications between web browsers and the web server. |
13.
What type of firewall provides the greatest degree of
contextual information and can include information about
users and applications in its decision-making process?
- A.NGFW
- B.WAF
- C.Packet filter
- D.Stateful inspection
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Next-generation firewalls (NGFWs) incorporate contextual information about users, applications, and business processes in their decision-making process. |
14.
Wayne is configuring a jump box server that system
administrators will connect to from their laptops. Which one of
the following ports should definitely not be open on the jump
box?
- A.22
- B.23
- C.443
- D.3389
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Port 23, used by the Telnet protocol, is unencrypted and insecure. Connections should not be permitted to the jump box on unencrypted ports. The services running on ports 22 (SSH), 443 (HTTPS), and 3389 (RDP) all use encryption. |
15.
Tom would like to deploy consistent security settings to all
of his Windows systems simultaneously. What technology can
he use to achieve this goal?
- A.GPO
- B.HIPS
- C.IPS
- D.DNS
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Administrators may use Group Policy Objects (GPOs) to control a wide variety of Windows settings and create different policies that apply to different classes of system. |