Questions & Answers (Grade A+)
7.1.3 Practice Exam -
You manage a network with a single switch. All hosts connect to the
network through the switch. You want to increase the security of
devices that are part of the accounting department. You want to
make sure that broadcast traffic sent by an accounting computer is
only received by other accounting computers, and you want to
implement ACLs to control traffic sent to accounting computers
through network. What should you do? -
correct answer ✅Use a router to configure a subnet for the
accounting computers.
You want to reduce collisions by creating separate collision domains
and virtual LANs. Which of the following devices should you
choose? -
correct answer ✅Switch
Which of the following is an average of using switches to create
virtual LANs? -
correct answer ✅Broadcast traffic travels to a subset of devices
rather than to all devices on the network.
,Chapter 7 Network Defense Exam
Questions & Answers (Grade A+)
Which characteristic of a switch can improve bandwidth utilization
and reduce the risk of sniffing attacks on the network? -
correct answer ✅A switch filters port traffic based on MAC
address.
Which of the following devices does "NOT" examine the MAC
address in a frame before processing or forwarding the frame? -
correct answer ✅Hub
What characteristic of hubs poses a security threat? -
correct answer ✅Hubs transmit frames to all hosts on all ports.
Which of the following describes how a router can be used to
implement security on your network? -
correct answer ✅Use an access control list to deny traffic from
specific IP addresses.
7.2.6 Practice Exams -
correct answer ✅
A relative new employee in the data entry cubical farm was
assigned a user account similar to that of all of the other data entry
, Chapter 7 Network Defense Exam
Questions & Answers (Grade A+)
employees. However, audit logs have shown that this user account
has been used to change ACLs on several confidential files and has
accessed data in restricted areas. This situation indicates which of
the following has occurred? -
correct answer ✅Privilege escalation
An attacker has obtained the logon credentials for a regular user on
your network. Which type of security threat exists if this user
account is used to perform administrative functions? -
correct answer ✅Privilege escalation
You've just deployed a new Cisco router that a connects several
network segments in your Org. What should you do to increase the
security of this device? -
correct answer ✅Use a stronger administrative password
While deploying a network application, a programmer adds
functionally that allows her to access the running program,
whithout authentication, to capture debugging data. what type of
security weakness does this represent? -
correct answer ✅Backdoor