Chapter 7 Lab Manual Review Questions and Answers

advertisement
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-1
Chapter 7 Lab Manual Review Questions and Answers
Lab 7.1
1. Dial-in access is enabled for the Administrator account only. True or
False?
2. Which administrative tool is used to allow dial-in access in a
Windows NT environment?
a.
b.
c.
d.
Active Directory Users and Computers
User Manager
Computer Management
Server Manager
3. Which administrative tool is used to allow dial-in access in a
Windows Server 2003 workgroup environment?
a.
b.
c.
d.
Active Directory Users and Computers
User Manager
Computer Management
Server Manager
4. Which administrative tool is used to allow dial-in access in a
Windows Server 2003 domain environment?
a.
b.
c.
d.
Active Directory Users and Computers
User Manager
Computer Management
Server Manager
5. When dial-in access is enabled, Terminal Services access is also
enabled. True or False?
Answers: False, b ,c, a, False
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-2
Lab 7.2
1. Which of the following Windows operating systems support VPN
connections? (Choose all that apply.)
a.
b.
c.
d.
Windows NT
Windows 2000/2003
Windows 98
Windows 3.11
2. Which of the following Windows operating systems supports L2TP?
a.
b.
c.
d.
Windows NT
Windows 2000/2003
Windows 98
Windows 3.11
3. Which of the following Windows operating systems can run RRAS?
a.
b.
c.
d.
Windows NT
Windows 2000/2003
Windows 98
Windows 3.11
4. Which of the following Windows operating systems can run a VPN
server? (Choose all that apply.)
a.
b.
c.
d.
Windows NT
Windows 2000/2003
Windows 98
Windows 3.11
5. Remote access policies can be configured using Windows Server
2003 Group Policy. True or False?
Answers: (a, b, c), b, b, (a, b), False
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-3
Lab 7.3
1. Which of the following is the PPTP control port?
a.
b.
c.
d.
UDP 1723
TCP 1723
TCP 1494
UDP 1494
2. What do the LCP extensions provide for PPTP?
a. They provide error correction for the data link
connection.
b. They provide Data Link layer tunneling.
c. They establish, configure, and test the data link
connection.
d. They link and connect the PPTP connection.
3. Which of the following protocols can be used with PPTP? (Choose all
that apply.)
a.
b.
c.
d.
IPX/SPX
NetBEUI
TCP/IP
AppleTalk
4. Which protocol does PPTP use for encryption?
a.
b.
c.
d.
PPP
IPSec
ESP
PPTP can encrypt without another protocol.
5. Which of the following operating systems support PPTP? (Choose all
that apply.)
a.
b.
c.
d.
Windows Server 2003
Windows NT
Windows 3.11
Windows 9.x
Answers: b, c, (a, b, c, d), a, (a, b, d)
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-4
Lab 7.4
1. The default remote access policy is to allow access if dial-in
permission is enabled. True or False?
2. Which of the following is a remote access policy attribute?
(Choose all that apply.)
a.
b.
c.
d.
Called-Station-ID
Calling-Station-ID
Client-IP-Address
Tunnel-Type
3. Remote access logging can log which of the following events?
a.
b.
c.
d.
accounting requests
authentication requests
periodic status
all of the above
4. Which of the following can remote access servers provide to clients?
(Choose all that apply.)
a.
b.
c.
d.
DHCP
IP spoofing
DHCP relay
DCHP repair
5. The default maximum port limit for each device that supports
multiple ports is _________.
a.
b.
c.
d.
1
0
256
128
Answers: True, (a, b, c, d), d, (a, c), d
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-5
Lab 7.5
1. The wireless network name is case sensitive. True or False?
2. What is the maximum number of characters in a network name?
a.
b.
c.
d.
10
32
64
128
3. The wireless network name is also known as SSID. What does SSID
mean?
a.
b.
c.
d.
secure server identifier
service set identifier
secure shell identifier
service store identifier
4. What is the default encryption strength of the Microsoft MN-700?
a.
b.
c.
d.
64-bit
128-bit
256-bit
none
5. 128-bit WEP is considered _________.
a.
b.
c.
d.
Answers: True, b, b, d, b
weak
strong
very strong
impenetrable
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-6
Lab 7.6
1. Which of the following can you use to access the Cisco Aironet
WAP?
a.
b.
c.
d.
e.
Telnet
serial
Ethernet
HTTP
all of the above
2. Which of the following requires direct access to the Cisco Aironet
WAP?
a.
b.
c.
d.
Telnet
serial
Ethernet
HTTP
3. The default configuration of the Cisco Aironet allows everyone
access to the system configuration. True or False?
4. Which of the following is a setting used for terminal connections?
(Choose all that apply.)
a.
b.
c.
d.
e.
8 data bits
9600 bits per second
1 stop bit
no parity
XON/XOFF flow control
5. The Cisco Aironet can operate at 2.4 GHz and can conflict with
certain cordless phones. True or False?
Answers: e, b, True, (a, b, c, d, e), True
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-7
Lab 7.7
1. Which of the following can you use to configure the Cisco Aironet
in a text-based environment?
a.
b.
c.
d.
Telnet
FTP
TFTP
HTTP
2. Which of the following can you use to configure the Cisco Aironet
in a GUI environment?
a.
b.
c.
d.
Telnet
FTP
TFTP
HTTP
3. Telnet is disabled by default on the Cisco Aironet. True or False?
4. Telnet can be a security risk because it transmits the user name and
password in plaintext. True or False?
5. Which of the following TCP ports does Telnet use?
a.
b.
c.
d.
Answers: a, d, False, True, c
20
21
23
25
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-8
Lab 7.8
1. When limiting access to configuration utilities, which of the
following should be changed, besides adding users? (Choose all that
apply.)
a.
b.
c.
d.
the MAC address
the default account and password
the IP address
the SSID
2. One way to secure a wireless network is to use a __________.
a.
b.
c.
d.
firewall
scrambler
VPN
DMZ
3. One way to secure the wireless administration of a Cisco Aironet is
to __________.
a.
b.
c.
d.
disable access to the WAP
disable a router
disable administrative access to the WAP
disable security settings on the WAP
4. A recommended practice for wireless LANs is to ___________.
a.
b.
c.
d.
e.
disable file and printer sharing
disable NetBEUI
enable WEP protection
use a nonobvious encryption key
all of the above
5. Which of the following can interfere with wireless transmission?
(Choose all that apply.)
a.
b.
c.
d.
Answers: (b, d), c, a, e, (a, c, d)
brick walls
cell phones
cordless phones
distance
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-9
Lab 7.9
1. Administrators should use a separate account because it makes the
system more secure. True or False?
2. Administrators should use a separate account because it makes
auditing easier and more reliable. True or False?
3. The Cisco Aironet application used to administer access is called
_________.
a.
b.
c.
d.
Server Manager
User Manager
Computer Management
WAP Manager
4. Which of the following are capability settings available to user
accounts? (Choose all that apply.)
a.
b.
c.
d.
Write
SNMP
Firmware
Admin
5. To enable User Manager, at least one account must have full power.
True or False?
Answers: False, True, b, (a, b, c, d), True
Security+ Guide to Network Security, Second Edition
Lab Manual Solutions 7-1
0
Lab 7.10
1. The 802.11a standard can use which of the following bands?
a.
b.
c.
d.
2.4 GHz
5 GHz
2.4 MHz
5 MHz
2. The 802.11b standard uses which of the following bands?
a.
b.
c.
d.
2.4 GHz
5 GHz
2.4 MHz
5 MHz
3. The 802.11a standard can transmit data at speeds of up to ______
Mbps.
a.
b.
c.
d.
11
36
48
54
4. The 802.11b standard can transmit data at speeds of up to ______
Mbps.
a.
b.
c.
d.
11
36
48
54
5. Which of the following protocols is used to encrypt wireless
transmission?
a.
b.
c.
d.
Answers: d, c, d, a, b
WAP
WEP
WSP
WDP
Download