Chapter 03 – Exploring Network Technologies and Tools

Ref: CompTIA Security Plus Get Certified Get Ahead SY0-701 Study Guide

CompTIA Security+ (SY0-701) – Chapter 3

1 / 131

What distinguishes FTPS from SFTP according to the provided information?

2 / 131

What are some elements involved in creating a secure network?

3 / 131

What functionalities does Spanning Tree Protocol (STP) or Rapid STP (RSTP) provide on a network?

4 / 131

What is the primary purpose of the Domain Name System (DNS)?

5 / 131

Which of the following protocols is used to transfer smaller amounts of data, such as when communicating with network devices, and uses UDP port 69?

6 / 131

What is the key feature of Static NAT?

7 / 131

What is the function of the DDoS mitigator in a unified threat management (UTM) appliance?

8 / 131

What is the function of proxy servers?

9 / 131

Which of the following best defines a unified threat management (UTM)?

10 / 131

What is the primary purpose of a network appliance?

11 / 131

What is a common reason users cannot connect to systems using Remote Desktop Protocol (RDP)?

12 / 131

Which of the following commands should Maggie use to create a public and private key pair?

13 / 131

What is the key difference between a transparent proxy and a non-transparent proxy?

14 / 131

What does a firewall’s implicit deny strategy do?

15 / 131

What is the use of the jump server in a network environment?

16 / 131

Which protocol is commonly blocked at firewalls and routers, disabling a ping response, preventing attackers from discovering devices in a network?

17 / 131

Which of the following statements about File Transfer Protocol (FTP) are correct?

18 / 131

What is the purpose of the ’id_rsa’ file in an OpenSSH system?

19 / 131

Which of the following is not true about network-based firewalls?

20 / 131

Which of the following is the primary purpose of HTTPS?

21 / 131

What command would Maggie use to initiate an SSH connection to the gcga server using the root account of the remote system?

22 / 131

What is the primary purpose of DHCP snooping?

23 / 131

What is the purpose of the malware inspection component in a UTM appliance?

24 / 131

What does a ’Content inspection’ feature in a Unified Threat Management (UTM) system involve?

25 / 131

What are the only three IPv4 address ranges that should be allocated within a private network?

26 / 131

What are the TCP ports used by SMTP, POP3, IMAP4, HTTP and HTTPS common protocols?

27 / 131

What is the function of the Address Resolution Protocol (ARP)?

28 / 131

Which command should Maggie use to create a public/private key pair for passwordless SSH login?

29 / 131

What is the purpose of the ’ssh-keygen -t rsa’ command in OpenSSH?

30 / 131

What is the purpose of the ’route add’ command in a system’s routing table?

31 / 131

Which of these common protocols do Google Mail uses for storing email on an email server?

32 / 131

What is the role of a PTR record in the Domain Name System (DNS)?

33 / 131

What is a key difference between SNMPv1/v2 and SNMPv3?

34 / 131

Which protocol and port number are used by SSH for encrypting traffic in transit?

35 / 131

What is the purpose of executing the command ’ssh-copy-id gcga’ in the context of a Linux system using OpenSSH?

36 / 131

Which of the following best describes port security as described in the passage?

37 / 131

Which protocol is the designated replacement for SSL and should be used instead of SSL for browsers using HTTPS?

38 / 131

What is the purpose of caching content in a proxy server for performance enhancement?

39 / 131

What does the ’Permission’ element in ACLs for firewalls typically indicate?

40 / 131

What happens when the DHCP sends an ’Acknowledge’ packet?

41 / 131

What is the primary purpose of physical isolation and air gaps in a network security context?

42 / 131

Why is TLS recommended over SSL?

43 / 131

What is the primary function of a Zero Trust Network?

44 / 131

Which protocol can be used to transfer encrypted files over a network and uses TCP port 22?

45 / 131

In the context of Stateless Firewall Rules, what does the term ’implicit deny strategy’ refer to?

46 / 131

What is one of the benefits of using Network Address Translation (NAT)?

47 / 131

What function does a firewall serve in a network?

48 / 131

How can Access Control Lists (ACLs) be utilized within a router for security?

49 / 131

What is the function of a Bridge Protocol Data Unit (BPDU) Guard feature in a network?

50 / 131

Secure Shell (SSH) is used for which of the following?

51 / 131

What does the ’Protocol’ element in an Access Control List (ACL) rule typically refer to on a firewall?

52 / 131

What does DHCP snooping prevent on a network?

53 / 131

What is the purpose of the SOA (start of authority) record in DNS?

54 / 131

What does the term ’East-West traffic’ refer to within a network?

55 / 131

What is the main difference between Network Time Protocol (NTP) and Simple NTP (SNTP) in terms of time synchronization?

56 / 131

What does the ’-J’ switch in the ’ssh -J maggie@jump maggie@ca1’ command represent?

57 / 131

What is the fundamental difference between a physical and a logical port in network devices?

58 / 131

What is one of the key features that distinguishes a next-generation firewall (NGFW) from first and second generation firewalls?

59 / 131

Which encryption protocol is designated as the replacement for SSL and should be used instead of SSL for browsers using HTTPS?

60 / 131

What is the main difference between an Intranet and an Extranet?

61 / 131

What is the correct form of a private IP address according to RFC 1918 in the IPv4 protocol?

62 / 131

What is the purpose of an ’air gap’ in relation to network security?

63 / 131

What is the purpose of the DHCP Offer in the DHCP communication process?

64 / 131

What is the primary function of the ’route’ command in both Windows and Linux systems?

65 / 131

What does the Real-time Transport Protocol (RTP) particularly deliver over IP networks?

66 / 131

Based on the passage, how can ACLs on a router be used to filter traffic?

67 / 131

How does the Spanning Tree Protocol (STP) or the Rapid STP (RSTP) protect a network?

68 / 131

What are some common protocols used for Subscription Services Use Cases?

69 / 131

What is the primary purpose of an A-record in the Domain Name System (DNS)?

70 / 131

Which protocol is an implementation of FTP that uses SSH to transmit files in an encrypted format?

71 / 131

What does a DHCP client do to start getting a lease from a DHCP server?

72 / 131

What is the function of the AAAA-record in a Domain Name System (DNS)?

73 / 131

What is the function of the broadcast method in IPv4 addressing of TCP/IP traffic?

74 / 131

What is the primary function of a router in a network?

75 / 131

What is the main purpose of Domain Name System Security Extensions (DNSSEC)?

76 / 131

Why is physical isolation such as an air gap important in a supervisory control and data acquisition (SCADA) system?

77 / 131

In computing, which TCP port does IMAP4 use for unencrypted connections, and which port for encrypted connections?

78 / 131

What does the STARTTLS command allow in relation to SMTP?

79 / 131

What determines which protocols are enabled in a network?

80 / 131

What is the main function of a host-based firewall?

81 / 131

What are the three primary factors used to filter packets by router ACLs?

82 / 131

What is the primary function of the Session Initiation Protocol (SIP) in relation to voice, video, and messaging sessions?

83 / 131

Which of the following protocols is NOT recommended for use when remotely administering systems, due to its lack of security?

84 / 131

What is the purpose of the ’Destination’ in rules within Access Control Lists (ACLs) used by firewalls?

85 / 131

Which of the following statements about nslookup and dig command-line tools is correct?

86 / 131

Which protocol is commonly used for transporting voice and video over a network and provides encryption, message authentication, and integrity for RTP?

87 / 131

Which protocol provides connection-oriented traffic with guaranteed delivery?

88 / 131

Which protocol provides both broadcast storm prevention and loop prevention for switches?

89 / 131

What is the purpose of a poisoning attack?

90 / 131

What does the ’implicit deny’ rule accomplish in an ACL?

91 / 131

What does the ’route print’ command display on a computer system?

92 / 131

Which of the following use cases is NOT supported by switches?

93 / 131

Which of these protocols is used for connectionless sessions without a three-way handshake?

94 / 131

Which of the following best describes how IPv6 addresses are expressed?

95 / 131

What is the role of the Data Link layer in the Open Systems Interconnection (OSI) model?

96 / 131

What is an intranet in terms of networking?

97 / 131

What is the primary use case of Unicast in an IPv4 network?

98 / 131

Which of the following best describes Dynamic NAT?

99 / 131

What happens if a network has too many computers on a single segment?

100 / 131

What is the function of an MX record in a DNS server?

101 / 131

What does the term ’Extranet’ refer to in network security?

102 / 131

Which statement correctly describes the User Datagram Protocol (UDP)?

103 / 131

What can help to prevent switching loop problems and broadcast storms in a network?

104 / 131

What is one of the primary functions of the Rapid Spanning Tree Protocol (RSTP)?

105 / 131

What are the primary functions of the Secure Real-time Transport Protocol (SRTP)?

106 / 131

What does the Quality of Service refer to in relation to network management?

107 / 131

What does MAC filtering in port security do?

108 / 131

What is true about network address allocation using Dynamic Host Configuration Protocol (DHCP)?

109 / 131

What’s one disadvantage of Network Address Translation (NAT)?

110 / 131

Which of the following protocols is used for testing basic connectivity and includes tools such as ping, pathping, and tracert?

111 / 131

What are the methods for achieving logical separation and segmentation in networking?

112 / 131

What is the role of a Web Application Firewall (WAF)?

113 / 131

Which of the following best describes a DoS and a DDoS attack?

114 / 131

What is the purpose of LDAPS (LDAP Secure) in directory services?

115 / 131

How is the ’Source’ defined within rules implemented in ACLs by stateless firewalls?

116 / 131

What is the primary purpose of a screened subnet or DMZ?

117 / 131

What is a sniffing attack in the context of network security?

118 / 131

Which TCP port does the Post Office Protocol v3 (POP3) use for encrypted connections?

119 / 131

What is one major benefit of Network Address Translation (NAT)?

120 / 131

What does a switch do when it turns on with no prior knowledge?

121 / 131

Why do organizations replace hubs with switches, according to the given passage?

122 / 131

What function does URL filtering perform within a unified threat management (UTM) security appliance?

123 / 131

What is the purpose of a CNAME record in a DNS server?

124 / 131

What protocol is the most commonly used for time synchronization?

125 / 131

What is the main role of a ’reverse proxy’ in a network?

126 / 131

What is the primary advantage of using VLANs in a network?

127 / 131

In the example provided, what command could Maggie use to connect to a server named ’gcga’ in the network while also initiating SSH connection using the root account of the remote system?

128 / 131

What is the major difference between a stateful and a stateless firewall?

129 / 131

What is layer 2 of the Open Systems Interconnection (OSI) model responsible for?

130 / 131

What is the protocol number for ICMP?

131 / 131

Based on the information in RFC 7123 about the security implications of using IPv6 on an internal network, which of the following statements is true?

Your score is

Dowload the FREE OFFLINE Version of this Test Bank

Boost your cybersecurity skills! Click to download the CompTIA Security+ Practice Anki deck.

Anki deck of CompTIA A+ Practice Questions images

Boost your IT skills with our free CompTIA Security+ practice test focusing on Chapter 03: Exploring Network Technologies and Tools. Whether you’re entering the IT industry or advancing in cyber security, our resources are here to help you succeed in the CompTIA Exam.

Why Choose Our CompTIA Security+ Practice Test?

  • Skill Enhancement: Covers essential network technologies and tools crucial for the CompTIA Exam.
  • Career Advancement: Passing the CompTIA Security+ exam can open doors to new job opportunities and significant career changes in the IT industry.
  • Vulnerability Management: Master the art of using network tools and technologies, a key skill in cyber security.

Free Anki Deck Download

Download our free Anki Deck, reviewed by industry expert Josh Madakor, who has extensive experience in IT and cyber security, including work with Microsoft and government sectors. Learn more about Anki on the official site.

Get Started with Your IT Career Change Today!

Visit the CompTIA Security+ official site and the CompTIA Network+ official site for more information.Also, check out our other free practice tests: CompTIA A+, CompTIA Network+, CompTIA CySA+, and CompTIA Security+.

Share the Post:

Related Posts

RSS  
  • Switching to IT or Cyber Security from Another Career
    Are you thinking about changing your career to IT or cyber security but worried about losing your current high salary? If yes, this guide is crafted just for you, especially if you have a family to support and don’t want to take a big pay cut. Understanding the Challenge A person reached out with a […]
  • How to Succeed in CySA+ Exam with Free Practice Questions
    Hey there! Are you getting ready for your CompTIA CySA+ exam? I’ve got great news for you! My team and I have created over a thousand practice questions to help you prepare, and they are all free! Keep reading to find out how these questions can help you pass with flying colors. What’s Available? **100% […]
  • From Call Center to IT Architect: Taylor’s Incredible Journey
    Introduction Today, we are going to share an amazing story about Taylor, who dramatically changed her career path from working in call centers to becoming an IT architect specialist. This journey is not just inspiring but also filled with practical tips and advice for anyone dreaming of making a big move in their career, especially […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!