You are on page 1of 8

Evaluation 1 : Réseau et Télécom

Module : Réseaux Locaux Approfondis


Date Nom et prénoms Note
1. Which of the following constitutes a risk?

Asset + Method + Vulnerability

Asset + Threat + Vulnerability

Motive (Goal) + Threat + Vulnerability

Motive (Goal) + Method + Vulnerability

2. Which of the following term refers to the existence of a weakness, design, or implementation error
that, when exploited, leads to an unexpected and undesired event compromising the security of
the system?

Threat

Vulnerability

Attack

Risk

3. Action taken towards breaching an IT system’s security through vulnerabilities is called?

Threat

Attack

Risk

Vulnerability

4. Identify the configuration vulnerability that exists due to the misconfiguration of computing and
network devices.

Lack of continuity

Operating system Vulnerabilities

Network device vulnerabilities

Default password and settings


5. Improper password management vulnerability comes under which type of network security
vulnerability?

Security policy vulnerabilities

Configuration vulnerabilities

Technological vulnerabilities

Injection vulnerabilities

6. Which of the following represents a reactive approach for network security?

Security monitoring methods such as IDS, IPS, and TRS

Access control mechanisms such as a firewall

Biometric techniques such as speech or facial recognition

Fault-finding mechanisms such as protocol analyzers and traffic monitors

7. Which of the following types of wireless technology uses radio-frequency electromagnetic waves to
transfer data for automatic identification and tracking tags attached to objects?

Wi-Fi

Wi-Max

Bluetooth

RFID
8. Wireless networks provide which of the following?

Low error rates

Low delay

Disconnected operation

High bandwidth

9. Which of the following IEEE standards defines the quality of service (QoS) for wireless
applications?

802.11i

802.16

802.15

802.11e

10. Which of the following networks uses wireless infrastructure or optical-fiber connections to link
sites and covers an entire city or suburb?

Wireless personal-area network (WPAN)

Wireless wide-area network (WWAN)

Wireless metropolitan-area network (WMAN)

Wireless local-area network (WLAN)

11. Which of the following wireless network components connects multiple LANs at the MAC layer,
increases the wireless coverage area, and is separated either logically or physically?

Wireless card (NIC)

Wireless bridge

Wireless repeater

Wireless modem
12. Which of the following wireless network components allows Internet-enabled devices to access the
network, combines the functions of wireless access points and routers, and provides a network
address translation feature?

Wireless repeater

Wireless bridge

Wireless modem

Wireless gateway

13. Which of the following types of antennas is used by radio stations for effective radio signal
transmission?

Yagi antenna

Parabolic grid antenna

Reflector antenna

Omnidirectional antenna

14. Which of the following types of antennas can achieve very-long-distance Wi-Fi transmissions by
utilizing the principle of a highly focused radio beam?

Parabolic grid antenna

Yagi antenna

Reflector antenna

Dipole antenna
15. In which type of wireless topology, devices exchange information with each other as in peer-to-
peer communication, without the need of an access point for communication?

Standalone Architecture (Ad-Hoc mode)

None of the above

BSS (Basic Service Set)

Centrally Coordinated Architecture (Infrastructure mode)

16. Which of the following points is true about shared-key authentication in wireless networks?

Is a null authentication algorithm

Not suitable for large networks

Provides centralized authentication

Involves the use of a RADIUS server

17. Which of the following is an access point (AP) deployment guideline that should be followed by
organizations to improve performance and prevent misuse?

Install APs on the ceiling

Use a metal cage for enclosing APs

Avoid placing APs in central locations

Install APs in corridors


18. Which of the following best describes how a network admin can make a wireless router display
“unnamed network” within its range to prevent unauthorized association requests?

By disabling SSID broadcasting

By selecting a strong encryption mode

By defending against WPA cracking

By enabling MAC address filtering

19. Which of the following can help in finding abnormalities in a wireless network, such as policy
violations, unencrypted traffic, rouge wireless APs, and unauthorized network activity?

RF spectrum analyzing tools

Wi-Fi security assessment tools

Wireless IDS/IPS

Wireless discovery tools

20. Which among the following helps minimize wireless attacks and improves performance and
security?

Configuring quality of service (QoS) settings

Using the default IP ranges

Enabling SSID Broadcasting

Enabling remote router access

21. Which of the following is a virtualization-based security feature that separates business data and
the underlying process?

IPAM

SMB

IUM

NFV
22. Which of the following features of a virtual box can be used by a network defender to prevent a
guest from inserting anything suspicious in the page tables and thereby secure the virtual box?

Enabling nested paging

Disabling Server Message Block

Disabling nested paging

Enabling hyperthreading

23. Which of the following avoids the accidental connection of switch ports with PortFast enabled and
prevents Layer 2 loops or topology changes?

Loopguard and UDLD

Root Guard

BPDU Filter

BPDU Guard

24. Which option for the deployment of NIDS sensors is ideal for securing a perimeter network and
identifying attacks that bypass the external firewall?

Location 3

Location 1

Location 4

Location 2

You might also like