Chapter 4 ■ Communication and Network Security (Domain 4) 93
- The Windows ipconfig command displays the following information:
BC-5F-F4-7B-4B-7D
What term describes this, and what information can usually be gathered from it?
A. The IP address, the network location of the system
B. The MAC address, the network interface card’s manufacturer
C. The MAC address, the media type in use
D. The IPv6 client ID, the network interface card’s manufacturer
- Chris has been asked to choose between implementing PEAP and LEAP for wireless
authentication. What should he choose, and why?
A. LEAP, because it fixes problems with TKIP, resulting in stronger security
B. PEAP, because it implements CCMP for security
C. LEAP, because it implements EAP-TLS for end-to-end session encryption
D. PEAP, because it can provide a TLS tunnel that encapsulates EAP methods, protecting
the entire session - Ben is troubleshooting a network and discovers that the NAT router he is connected to
has the 192.168.x.x subnet as its internal network and that its external IP is 192.168.1.40.
What problem is he encountering?
A. 1 92.168.x.x is a nonroutable network and will not be carried to the Internet.
B. 1 92.168.1.40 is not a valid address because it is reserved by RFC 1918.
C. Double NATing is not possible using the same IP range.
D. The upstream system is unable to de-encapsulate his packets and he needs to use PAT
instead. - What is the default subnet mask for a Class B network?
A. 255.0.0.0
B. 255.255.0.0
C. 255.254.0.0
D. 255.255.255.0
- Jim’s organization uses a traditional PBX for voice communication. What is the most com-
mon security issue that its internal communications are likely to face, and what should he
recommend to prevent it?
A. Eavesdropping, encryption
B. Man-in-the-middle attacks, end-to-end encryption
C. Eavesdropping, physical security
D. Wardialing, deploy an IPS