Net 12.2

¡Supera tus tareas y exámenes ahora con Quizwiz!

A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double.The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses? A. 164.10.12.0/24 B. 164.10.12.64/29 C. 164.10.12.128/26 D. 164.10.12.191/28

164.10.12.128/26

A network technician is adding a 10/100 switch with RJ45 connectors to the company network to accommodate new computers being added to a network segment. There is no auto-MDIX port on the switch that needs to be connected to the existing switch on the segment. Which of the following should the technician use to make the connection? A. An RG-59 cable with BNC connectors B. A multi-mode fiber cable C. A straight-through Cat5 UTP cable D. A cable with TIA/EIA 568a and 568b on each end

A cable with TIA/EIA 568a and 568b on each end

Which of the following BEST describes the RADIUS authentication service protocol? A. A protocol that sends passwords to the authentication server B. A protocol that sends encrypted tickets from the authentication server C. A protocol that sends X.500 service requests to the authentication server D. A protocol that sends configuration information from the authentication server

A protocol that sends configuration information from the authentication server

A technician must install and configure a network device in a building with 20 classrooms. Each room must be on a separate subnet and should not be able to see traffic from other subnets. Which of the following is the MOST cost-effective solution? A. A switch with VLANs created for each segment B. A router with interfaces connected to a switch in each room C. A VoIP endpoint connected to a hub for each network D. A firewall with DHCP pools for each subnet

A switch with VLANs created for each segment

SIMULATION -You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:-> The SSIDs need to be configured as CorpNet with a key of S3cr3t!-> The wireless signals should not interfere with each other.-> The subnet the Access Points and switch are on should only support 30 devices maximum.-> The Access Points should be configured to only support TKIP clients at a maximum speed.INSTRUCTIONS -Click on the devices to review their information and adjust the settings of the APs to meet the given requirements.If any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Access Point Name AP1 -IP Address 192.168.1.3 -Gateway 192.168.1.2 -SSID corpnet -SSID Broadcast yes -Mode G -Channel 1 -Speed Auto -Duplex Auto -WPA -Passphrase S3cr3t!Exhibit 2 as follows -Access Point Name AP2 -IP Address 192.168.1.4 -Gateway 192.168.1.2 -SSID corpnet -SSID Broadcast yes -Mode G -Channel 6 -Speed Auto -Duplex Auto -WPA -Passphrase S3cr3t!Exhibit 3 as follows -Access Point Name AP3 -IP Address 192.168.1.5 -Gateway 192.168.1.2 -SSID corpnet -SSID Broadcast yes -Mode G -Channel 11 -Speed Auto -Duplex Auto -WPA -Passphrase S3cr3t!

Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.) A. An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network. B. An IDS will detect traffic anomalies, alert and log them, and block the traffic. C. An IDS will detect previously unknown traffic anomalies, alert and log them, and block the traffic. D. An IPS will detect traffic anomalies, alert and log them, and allow them through the network. E. An IPS will detect previously unknown traffic signatures, and alert and log them. F. An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network. An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access? A. Avoiding common passwords B. File hashing C. Disabling unused IP ports D. Using secure protocols

Avoiding common passwords

A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner needs to initiate a secure connection to the company's router. Which of the following would BEST meet the requirements? (Choose two.) A. Site-to-site VPN B. Client-to-site VPN C. RDP D. SSH E. SFTP F. Captive portal

Client-to-site VPN SFTP

A network technician needs to install the latest firmware on the switch to address a recently discovered vulnerability. Which of the following should the technician do to have a rollback plan in case of issues with the new firmware? (Choose two.) A. Label the switch with IP address and firmware version B. Draw the switchport diagram C. Create a change management document D. Draw the network rack logical diagram E. Confirm standard operating procedures documentation F. Create a performance baseline of the switch

Create a change management document Create a performance baseline of the switch

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment? A. DMZ network B. Server network C. External network D. Internal network

DMZ network

Which of the following OSI layers contains the LLC function? A. Network B. Data link C. Session D. Transport

Data link

A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.) A. Add a login banner. B. Disable unused services. C. Upgrade the firmware. D. Disable Telnet. E. Implement AAA. F. Disable SSH.

Disable Telnet Implement AAA

Which of the following storage connection types should be used to allow the consolidation of the physical connections for SAN and LAN in just one Layer 2 protocol? A. Fibre Channel B. SCSI C. T1/E1 D. FCoE

FCoE

Which of the following WAN transmission mediums is the fastest and can travel the longest distance? A. Satellite B. Copper C. Wireless D. Fiber

Fiber

A network technician is coordinating the upgrade of the companys WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications? A. File hash B. Encryption C. FCS D. Compression

File hash

A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement? A. MAC filtering B. WPA-PSK C. 802.1X D. Geofencing

Geofencing

A company deploys many workers in the field who remotely access files from a server at headquarters. Leadership is concerned about the risks posed when field workers update these files from unsecured networks. Which of the following policy changes can the company make to MOST improve the confidentiality of connections when connecting remotely? (Choose two.) A. Implement SSL VPN connections from the remote devices to headquarters. B. Change file access protocols from SFTP to FTP on the remote devices. C. Utilize HTTPS to access the company intranet from remote devices. D. Configure WPA2 on the wireless networks at headquarters. E. Configure IMAP over port 143 for email access on remote devices.

Implement SSL VPN connections from the remote devices to headquarters. Utilize HTTPS to access the company intranet from remote devices.

A security administrator wants to implement the ability to prevent an unauthorized user from tailgating into the office building. Which of the following should be implemented? A. Badge reader B. Bluetooth reader C. Cipher lock D. Mantrap

Mantrap

A company is contracting a new third-party organization that will handle storage of the companys critical data. Which of the following policies would ensure the data remains confidential? A. SLA B. NDA C. MOU D. BYOD

NDA

Which of the following routing conventions is known as a link-state protocol? A. RIP B. BGP C. EIGRP D. OSPF

OSPF

SIMULATION -After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.INSTRUCTIONS -Verify the settings by using the command prompt, after making any system changes.Next, restore connectivity by making the appropriate changes to the infrastructure.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

On PC3, change the subnet mask to 255.255.255.0. When it is set to 255.255.255.128, then the PC with a .129 address will not be on the same subnet as the default gateway which is .1 On PC4, change the default gateway to 10.0.2.1. It has been incorrectly set as 10.1.2.1.

Which of the following is used to purposely attack a system to exploit vulnerabilities? A. Honeypot B. Vulnerability scan C. Device hardening D. Penetration testing

Penetration testing

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use? A. Cat6a B. RG-6 C. UTP D. Multimode E. Single mode

RG-6

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue? A. Replace the omnidirectional antennas with unidirectional antennas. B. Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls. C. Replace the 802.11 wireless standard and use GSM instead. D. Replace the wireless bridges with wireless routers.

Replace the omnidirectional antennas with unidirectional antennas.

A network technician is reviewing the company phone system to make the necessary changes to a firewall configuration. Which of the following protocols are used in VoIP communication? (Choose two.) A. SIP B. NTP C. H.323 D. SNMP E. IMAP F. SMB G. CSMA

SIP H.323

A company must create a way for partners to access a web portal to update documents for a project. This should be done only via web browser in a transparent way for the users. Which of the following should be used? A. Site-to-site connection B. SSL VPN C. GRE tunnel D. VNC

SSL VPN

HOTSPOT -Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.Range Given: 172.30.232.0/24 --> Sales 57 devices-> HR 23 devices-> IT 12 devices-> Finance 32 devices-> Marketing 9 devices INSTRUCTIONS -Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic.All drop downs must be filled.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Sales network - /26 Finance network - /26 Which of the following would represent the LARGEST possible contagious block of remaining addresses - /26 HR network - /27 IT network - /28 Marketing network - /28

A manufacturing company has signed an agreement with another company to collaborate on an upcoming project. Both companies require secure and persistent access to resources on each others' networks. Which of the following remote access technologies should the companies implement to satisfy their requirements? A. Out-of-band management B. Site-to-site VPN C. DMZ networks D. SFTP site

Site-to-site VPN

Which of the following would block access to an untagged port when connected to a Layer 2 device? A. BPDU guard B. Spanning tree C. Flood guard D. Root guard

Spanning Tree

A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely explanation? A. The address provided by the ISP has a mask that is too small to be used and needs a larger mask. B. The address provided by the ISP is a private IP address space and is not routable on the Internet. C. The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30. D. The address provided by the ISP is part of the reserved loopback address space and cannot be used.

The address provided by the ISP is a private IP address space and is not routable on the Internet.

Which of the following statements about the OSI model is true? A. The application layer does not need to know what type of network is being used because that is dealt with by a layer below it. B. The network layer deals with the network cabling and network device interface compatibility. C. The transport layer deals with how the data is transported from one router to another based on the IP header. D. The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight- through patch cable. Joe then unsuccessfully tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this? A. The customer's laptop does not support auto-MDIX. B. Joe's laptop does not support auto-MDIX. C. Straight-through patch cables are prone to crosstalk. D. The customer's laptop NIC does not support full duplex.

The customer's laptop does not support auto-MDIX.

A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased? A. Deploy two APs to the gymnasium with the maximum power level transmitting to cover the adjacent offices. B. Deploy a single AP to each adjacent office set to transmit at maximum power. C. Use a high-gain antenna on the AP in the gymnasium and install an AP in every other adjacent office. D. Use a spectrum analyzer to generate a heat map of the gymnasium to pinpoint AP placement.

Use a spectrum analyzer to generate a heat map of the gymnasium to pinpoint AP placement.

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect? A. WPA2 B. EAP-FAST C. MAC filtering D. 802.1X

WPA2

A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to: A. use a configuration management server B. configure a multilayer switch C. install a wireless controller D. use a proxy server

install a wireless controller

The process of grouping network interfaces together to increase throughput is called: A. VLAN tagging B. load balancing C. port aggregation D. fault tolerance

port aggregation


Conjuntos de estudio relacionados

CWTS-6-Radio Frequency Fundamentals for Wireless LAN Technology

View Set

International Business 375 Chapter 9

View Set

RN Comprehensive Predictor Nursing -Study Guide

View Set

byzantine art (500-1453 and beyond)

View Set

Corresponding, alternate, and consecutive angles

View Set