Working at a Small-to-Medium Business or ISP
DsmbISP Chapter 8 Exam Answers
1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
• authentication
• accreditation
* accounting
• authorization
2. Which three items are normally included when a log message is generated by a syslog client and forwarded to a syslog server? (Choose three.)
* date and time of message
* ID of sending device
• length of message
* message ID
• checksum field
• community ID
3. What is the advantage of using WPA to secure a wireless network?
* It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
• It uses an advanced encryption key that is never transmitted between host and access point.
• It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.
• It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.
4. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
• packet filtering
• proxy
* stateful packet inspection
• stateless packet inspection
5. A server log includes this entry: User student accessed host server ABC using Telnet yesterday for 10 minutes. What type of log entry is this?
• authentication
• authorization
* accounting
• accessing
6. What two measures help to verify that server backups have been reliably completed? (Choose two.)
* reviewing backup logs
* performing trial restore
• performing full backups only
• replacing tape backup with hard disk-based backup
• using an autoloader when backups