1. A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?
A) WPS
B) 802.1x
C) WPA2-PSK
D) TKIP
2. A network administrator is brute forcing accounts through a web interface. Which of the following would provide the BEST defense from an account password being discovered?
A) Password history
B) Account lockout
C) Account expiration
D) Password complexity
3. A network administrator is creating a new network for an office. For security purposes,each department should have its resources isolated from every other department but be able to communicate back to central servers. Which of the following architecture concepts would BEST accomplish this?
A) Air gapped network
B) Load balanced network
C) Network address translation
D) Network segmentation
4. A network administrator needs to allocate a new network for the R&D group. The network must not be accessible from the Internet regardless of the network firewall or other external misconfigurations. Which of the following settings should the network administrator implement to accomplish this?
A) Configure the OS default TTL to 1
B) Use NAT on the R&D network
C) Implement a router ACL
D) Enable protected ports on the switch
5. A network administrator wants to ensure that users do not connect any unauthorized devices to the company network. Each desk needs to connect a VoIP phone and computer. Which of the following is the BEST way to accomplish this?
A) Enforce authentication for network devices
B) Configure the phones on one VLAN,and computers on another
C) Enable and configure port channels
D) Make users sign an Acceptable use Agreement
Write a public review