CompTIA JK0-022 E2C Security+ Network Security Practice Exam Set 2

A security administrator has configured FTP in passive mode. Which of the following ports should the security administrator allow on the firewall by default?


Options are :

  • 20
  • 22
  • 23
  • 21 (Correct)

Answer : 21

Which of the following ports and protocol types must be opened on a host with a hostbased firewall to allow incoming SFTP connections?


Options are :

  • 22/TCP (Correct)
  • 21/UDP
  • 22/UDP
  • 21/TCP

Answer : 22/TCP

A technician is unable to manage a remote server. Which of the following ports should be opened on the firewall for remote server management? (Select TWO).


Options are :

  • 443
  • 137
  • 22 (Correct)
  • 3389 (Correct)
  • 135
  • 143

Answer : 22 3389

A security team has identified that the wireless signal is broadcasting into the parking lot. To reduce the risk of an attack against the wireless network from the parking lot, which of the following controls should be used? (Select TWO).


Options are :

  • Power levels (Correct)
  • Use WEP
  • Interference
  • Single Sign on
  • Antenna placement (Correct)
  • Disable the SSID

Answer : Power levels Antenna placement

Which of the following ports should be used by a system administrator to securely manage a remote server?


Options are :

  • 137
  • 22 (Correct)
  • 445
  • 69

Answer : 22

Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites?


Options are :

  • 21
  • 3389
  • 80 (Correct)
  • 25

Answer : 80

A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to connect to it. Only after an authorized client has connected and the hacker was able to capture the client handshake with the AP can the hacker begin a brute force attack to discover the encryption key. Which of the following attacks is taking place?


Options are :

  • WPA cracking (Correct)
  • IV attack
  • Rogue AP
  • WEP cracking

Answer : WPA cracking

An information bank has been established to store contacts, phone numbers and other records. A UNIX application needs to connect to the index server using port 389. Which of the following authentication services should be used on this port by default?


Options are :

  • Kerberos
  • RADIUS
  • TACACS+
  • LDAP (Correct)

Answer : LDAP

Which of the following secure file transfer methods uses port 22 by default?


Options are :

  • S/MIME
  • SSL
  • FTPS
  • SFTP (Correct)

Answer : SFTP

Which of the following is a difference between TFTP and FTP?


Options are :

  • TFTP utilizes UDP and FTP uses TCP. (Correct)
  • TFTP is slower than FTP.
  • TFTP utilizes TCP and FTP uses UDP.
  • TFTP is more secure than FTP.

Answer : TFTP utilizes UDP and FTP uses TCP.

A network administrator is asked to send a large file containing PII to a business associate. Which of the following protocols is the BEST choice to use?


Options are :

  • SMTP
  • SSH
  • FTP
  • SFTP (Correct)

Answer : SFTP

A technician has just installed a new firewall onto the network. Users are reporting that they cannot reach any website. Upon further investigation, the technician determines that websites can be reached by entering their IP addresses. Which of the following ports may have been closed to cause this issue?


Options are :

  • NetBIOS
  • DHCP
  • HTTP
  • DNS (Correct)

Answer : DNS

Which of the following protocols operates at the HIGHEST level of the OSI model?


Options are :

  • SCP (Correct)
  • ICMP
  • IPSec
  • TCP

Answer : SCP

Pete needs to open ports on the firewall to allow for secure transmission of files. Which of the following ports should be opened on the firewall?


Options are :

  • UDP 69
  • TCP 23
  • TCP 21
  • TCP 22 (Correct)

Answer : TCP 22

During the analysis of a PCAP file, a security analyst noticed several communications with a remote server on port 53. Which of the following protocol types is observed in this traffic?


Options are :

  • NetBIOS
  • FTP
  • DNS (Correct)
  • Email

Answer : DNS

After a new firewall has been installed, devices cannot obtain a new IP address. Which of the following ports should Matt, the security administrator, open on the firewall?


Options are :

  • 68 (Correct)
  • 25
  • 80
  • 443

Answer : 68

Which of the following ports is used for SSH, by default?


Options are :

  • 22 (Correct)
  • 23
  • 32
  • 12

Answer : 22

Ann, a technician, is attempting to establish a remote terminal session to an end users computer using Kerberos authentication, but she cannot connect to the destination machine. Which of the following default ports should Ann ensure is open?


Options are :

  • 443
  • 22
  • 139
  • 3389 (Correct)

Answer : 3389

A malicious program modified entries in the LMHOSTS file of an infected system. Which of the following protocols would have been affected by this?


Options are :

  • BGP
  • ICMP
  • NetBIOS (Correct)
  • DNS

Answer : NetBIOS

A firewall technician has been instructed to disable all non-secure ports on a corporate firewall. The technician has blocked traffic on port 21, 69, 80, and 137-139. The technician has allowed traffic on ports 22 and 443. Which of the following correctly lists the protocols blocked and allowed?


Options are :

  • Blocked: SFTP, TFTP, HTTP, NetBIOS; Allowed: SSH, SCP, HTTPS
  • Blocked: FTP, HTTP, HTTPS; Allowed: SFTP, SSH, SCP, NetBIOS
  • Blocked: TFTP, HTTP, NetBIOS; Allowed: HTTPS, FTP
  • Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS (Correct)

Answer : Blocked: FTP, TFTP, HTTP, NetBIOS; Allowed: SFTP, SSH, SCP, HTTPS

By default, which of the following uses TCP port 22? (Select THREE).


Options are :

  • FTPS
  • STELNET
  • TLS
  • SFTP (Correct)
  • SSH (Correct)
  • SCP (Correct)

Answer : SFTP SSH SCP

A security analyst noticed a colleague typing the following command: `Telnet some-host 443Which of the following was the colleague performing?


Options are :

  • Trying to establish an insecure remote management session. The colleague should be using SSH or terminal services instead.
  • A mistaken port being entered because telnet servers typically do not listen on port 443
  • A quick test to see if there is a service running on some-host TCP/443, which is being routed correctly and not blocked by a firewall. (Correct)
  • A hacking attempt to the some-host web server with the purpose of achieving a distributed denial of service attack.

Answer : A quick test to see if there is a service running on some-host TCP/443, which is being routed correctly and not blocked by a firewall.

A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened on the firewall in order for this VPN to function properly? (Select TWO).


Options are :

  • UDP 1723
  • UDP 47 (Correct)
  • TCP 1723 (Correct)
  • TCP 500

Answer : UDP 47 TCP 1723

Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?


Options are :

  • /27
  • /24
  • /29 (Correct)
  • /28

Answer : /29

The server administrator has noted that most servers have a lot of free disk space and low memory utilization. Which of the following statements will be correct if the server administrator migrates to a virtual server environment?


Options are :

  • The administrator will not be able to add a test virtual environment in the data center.
  • The administrator may spend more on licensing but less on hardware and equipment. (Correct)
  • The administrator will need to deploy load balancing and clustering.
  • Servers will encounter latency and lowered throughput issues.

Answer : The administrator may spend more on licensing but less on hardware and equipment.

A corporation is looking to expand their data center but has run out of physical space in which to store hardware. Which of the following would offer the ability to expand while keeping their current data center operated by internal staff?


Options are :

  • Subnetting
  • SaaS
  • IaaS
  • Virtualization (Correct)

Answer : Virtualization

Which of the following offers the LEAST amount of protection against data theft by USB drives?


Options are :

  • TPM
  • Cloud computing (Correct)
  • Database encryption
  • DLP

Answer : Cloud computing

Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?


Options are :

  • NAC
  • NAT
  • Virtualization
  • Subnetting (Correct)

Answer : Subnetting

Pete, a security engineer, is trying to inventory all servers in a rack. The engineer launches RDP sessions to five different PCs and notices that the hardware properties are similar. Additionally, the MAC addresses of all five servers appear on the same switch port. Which of the following is MOST likely the cause?


Options are :

  • The system is virtualized. (Correct)
  • The system is in active-standby mode.
  • The system is running 802.1x.
  • The system is using NAC.

Answer : The system is virtualized.

A companys business model was changed to provide more web presence and now its ERM software is no longer able to support the security needs of the company. The current data center will continue to provide network and security services. Which of the following network elements would be used to support the new business model?


Options are :

  • Infrastructure as a Service
  • Software as a Service (Correct)
  • DMZ
  • Remote access support

Answer : Software as a Service

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions