Network + N10-008 practice exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Layer 1

Physical Layer

Layer 6

Presentation Layer

What best describes the function of OSI layer 3

Provides connectionless communication using logical addresses

People living near your business are using your guest Wi-Fi in order to gain free Internet access and to download questionable files. Which of the following can be done to most easily address this issue?

Reduce the wireless power levels - adjusting the power level of anAP can be an easy way to decrease the radius in which people can connect to your Wi-Fi. Leaving your power levels at their default can lead to many unintended individuals seeing your network

Layer 5

Session Layer

Which of the following commands can be used to display the pass that networking traffic takes to reach other networks

Show route

Which of the following is a physical topology for an ethernet LAN?

Star

Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices?

TACACS+

Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices

TACACS+ SSO Is a tempting answer we are asking what can actually manage these accounts not the terminology used to describe having a centrally manage account

After a DNS record was updated some users report being unable to access the website associated with that record which of the following should be changed to fix the issue

TTL — DNS TTL keeps records cached for a certain period of time any cached do you know would point towards the wrong site if the A (IPv4) record was changed

The length of an IPv6 address is?

128 bits

Which of the following is the largest MTU for a standard ethernet frame

1500

A network admin wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?

192.1.0.124/30

Which of the following is most likely to generate sufficient East-West traffic?

A duplication of a hosted virtual server to another physical server for redundancy. East-West traffic is server to server traffic, while north-South traffic is server to client

Which of the following best represents the concept of connecting to a secure server in order to securely access a second server

A jump box A secure system which is used as a single access point for other systems this hardens remote management of the remote system since access is limited

Considering that hubs are vastly outdated in terms of network hardware you've decided to replace all hubs on your network with their devices of the following devices which are you most likely to replace your hubs with

A layer 3 switch Herbs were used to move traffic ( poorly) threw out a network so some form of switch would be the best choice for replacing them

In order to save money, you're trying to make a purchasing decision in order to get a device that provides access ports for edge systems are also allowing routing between networks. Which of the following pieces of hardware would be best for fill this requirement

A layer three switch — We want to connect our clients via access ports (The job of a switch) and also connects to other networks ( The job of a router) this is the perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3 switch has the capabilities of both a switch and a router

Which of the following devices would be used to manage a corporate WLAN?

A wireless controller

Which of the following IP ranges falls between 169.254.0.0 and 169.254.255.255

APIPA

Which of the following controls could be used to allow employees entry into building to be recorded by a card reader?

Access control vestibules - physical or logical list of who entered a room/building. This could be a sign in sheet or even a complex system that reads RFID cards and records who enters/leaves in area electronically

You were troubleshooting a network switch that seem to have stopped responding to request when the login level was set to debugging which of the following should be checked to begin troubleshooting the switch

CPU utilization — If setting logging to debugging the highest level/lease severe level of logging you end up asking the device for all logs which is information on an incredible amount of traffic

A network tech is reviewing the interface counters on a routers interface the tech is attempting to confirm a cabling issue given the information below which of the following metrics confirms that there is a cabling issue? CRC's :170 Giants :0 Runts :0 Multicast:12

CRC's CRC's Measure the number of frame errors detected over an interface which could be caused by corrupt data noise ( interference) on the cable or just plain bad cabling

Which of the following IEEE 802.11 standards Would be best to use for multiple simultaneous client access

CSMA/CA Carrier sense multiple access with collision avoidance allow multiple users to connect to a Wi-Fi network while minimizing collisions/interference on the network

What is used to track and document various types of known vulnerabilities

CVE- Common vulnerability and exposure

the chain of connections from a device to a switch on your network is as follows: Device> LC/LC patch cable> Patch Panel> Cross-connect fiber cable> Patch Panel> LC/LC patch cable> Switch Despite using known working patch cables, the connection isn't working and the device has been tested and was working before being installed. Which of the following if the most likely cause of a problem in this connection?

TX/RX was reversed simply reverse the TX/RX on the connector

Which of the following attacks consists of following closely behind a real employee into a secure building by grabbing the door without their knowledge?

Tailgating — Is the act of following somebody into a secure area without their knowledge Piggybacking is following somebody into a secure area with their knowledge

what is the default mask for the IP address 190.25.250.10?

/16 since the first octet is 190 this is a class B address. Class B addresses use a default of /16 (aka 255.255.0.0)

What port enables telnet access to a device

23 Telnet

the length of a MAC address is?

6 bytes 48 bits, aka 6 bytes (1B=8b)

Layer 7

Application Layer

A use reports being unable to access the network resources after making changes in the office which of the following should be done first

Ask which changes were made Ask for details on the changes made first so that going forward we can make more informed decisions on how to troubleshoot the network

Which of the following would most likely be used to review previous upgrades to a system

Change management

The technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building several APs are mounted in this office that users report that the network connections frequently disconnect and reconnect throughout the day which of the following is the most likely cause of this issue

Channel overlap is occurring A high-rise building is likely to have many AP's set up by various businesses which is likely to cause considerable interference resulting in an unstable connection

What type of cable would likely be used to connect to the WAN Port on a cable modem

Coaxial

An IT director is setting up a new disaster and HA policies for a company limited downtime is critical to operations to meet corporate requirements for the director set up two different data centers across the country that will stay current on data and applications in the event of an outage the company can immediately switch from one data center to another which of the following does this best describe

Hot site According to comp Tia a hot site is a back up site that can fail over almost immediately and is working with a live data set

Which of the following best describes a network appliance that warns of unapproved devices that are accessing the network

IDS - intrusion detection system

Which would be the best use to detect MAC spoofing?

Internet Control Message Protocol

Layer 3

Network Layer

Which of the following OSI layers do TCP and UDP operate within?

Transport

Layer 4

Transport Layer

You are reviewing a network diagram and are looking for the edge router. What is MOST likely symbol used for a router?

a Circle with 4 outward arrows

Which of the following subnet mask's is the equivalent of a CIDR of /20?

255.255.240.0. - /20

Which of the following TCP ports is used by the windows OS for file sharing

445- NetBIOS/SMB ( sharing files/access)

While installing Wi-Fi for a large amount of users, we want to utilize and 802.11 Standard with the maximum amount of channels in order to prioritize reducing interference. While researching which standard we should utilize, we see if you different frequencies that different 802.11 standards utilize. Which of the following frequencies ranges should we utilize given the above requirement?

5 GHz. — 23 non overlapping channels

Which of the following ports is commonly used by VoIP phones?

5060 Sip - VoIP setup Process of elimination can be your best friend

A workstation is configured with the following information IP :172.20.5.25 Mask: 172.20.5.0/27 Gateway: 172.20.5.1 Which of the following addresses would represent the broadcast address of this network

172.20.5.31 A /27 network could contain 32 IP address (5.0-5.31) the first address (5.0) is the network ID the last address (5.31) is the broadcast address and all addresses between those are valid assignable hosts (5.1-5.30)

Which of the following DNS records works as an alias to another record

CNAME Alias record

When a large amount of users are remotely accessing a centralized VM hosting server, which of the following concerns are raised assuming the network can readily support this increase in traffic

CPU usage and. Memory VMs much like physical systems however do you have both CPU and RAM requirements the more systems running on the VM host the hire the requirements

Layer 2

Data Link Layer

Client devices cannot enter network and the network administrator determines the DHCP scope is exhausted the administrator wants to avoid creating a new DH pool which of the following in the administrator perform to resolve the issue

Decrease the number of VLANs — While we would generally increase the scope of the DHCP pool that may cause other problems which is why we see this question states we want to avoid increasing the scope by reducing the least time we will cycle through IP at a quicker rate then we otherwise would allowing us to reuse IP address is much more quickly

A company is implementing IPv6 addressing and wants to ensure there are consistent addresses for printers and servers that will not change. However, the company does not want to use static addresses. Which of the following IPv6 schemes will provide the same address for the devices?

EUI-64

Which of the following step should be done after confirming the cause of a problem

Establish a plan of action to resolve the issue and identify potential effects

Which of the following technologies will allow many WAP's to broadcast the same SSID across a multi story building while providing continuous connectivity?

Extended service set — ESSID allows users to seamlessly reconnect to a different access point when they walk far enough away from their original access point. This is great for a company with a large physical footprint that wants one consistent wireless network

Which of the following technologies provide a failover for mechanisms for the default gateway

FHRP When multiple routers are used on a LAN you need a protocol which manages a single VIP ( virtual IP) The enables clients to connect to redundant routers as FHRP protocols fill this job perfectly

Which system would most likely be found and a screen subnet

FTP — Screen subnets it's also known as DMZ's are areas of the network that are used to separate the Internet from our corporate network devices that need to be directly access from the Internet will be placed here such as websites email server and file sharing servers

Which of the following service models would most likely be used to replace on premises servers with a could solution

IaaS - client moves whole infrastructure to the cloud minus the hardware of course which is always controlled by the CSP in cloud deployments

After trying to set up a port mirror with the following configuration: Switch mirror port details: eth0:10.1.2.3 AA:BB:CC:DD:EE:FF Which of the following commands could be entered on the PC to finish this configuration?

Ifconfig eth0 promisc — Turns on promiscuous mode

After investigating reporter for network performance and network admin finds hundreds of CRC Errors on an interface which of the following is the most likely cause of these errors

A bad wire on the Cat 5e cable CRC Errors can because by a multitude of issues these issues can range from corrupt data to noise (interference) On the cable to just plain bad cabling

While using many unmanaged switches in your home you decided to connect redundant cables between the switches in order to increase redundancy. However, since this change was made you started experiencing extreme amounts of latency. Which of the following problems is most likely occurring?

A broadcast storm — Having redundant connections between switches runs the risk of allowing broadcast storms to propagate through your network. This is especially true of unmanaged switches which would like many of the basic security controls of manage switches, such as STP

Which of the following documents would you help ensure proper versioning is followed and unnecessary upgrades are not made to the equipment

A change management policy

A large amount of expensive equipment is being moved into a company warehouse this equipment needs to be tracked when it leaves or enters the warehouse or when it is taken to be serviced which of the following solutions would best allow us to record these changes

Asset tags— Asset tags are great for tracking inventory of any type. We can scan the tags and usually enter a note during the process to describe the actions we took during this time

Which protocol would be used to exchange information between different Autonomous systems?

BSP - is an EGP (external gateway protocol) and is used to exchange information between autonomous systems. autonomous systems. - A network or a group of networks owned/controlled by a single entity

While troubleshooting a network you notice a connection reporting Late collisions over a half duplex link. You verify that both ends of the device are indeed running half duplex interfaces. Given that information which of the following answers is the most likely cause of this scenario?

The cable length is excessive - whenever you see lake collisions that is a telltale sign that your cable is running past its maximum recommended length for example twisted-pair cables shouldn't be run further than 100 m ( 328ft)

When assigned 196.168.1.0/26 as a network, an admin gave a router the following up configurations Ip address: 192.168.1.30 Subnet mask: 255.255.255.224 Gateway: 192.168.1.1 Users on the network immediately lost connectivity what is the most likely reason as to why?

The incorrect IP address was configured A CIDR of /26 is the equivalent of the subnet mask 255.255.255.192

The network device is configured to send critical events to a syslog server but severity five alerts are not being received from networking devices

The network device is not configured to log that level to the syslog server. Whenever a particular syslog level is configured A system returns all events from that level and more severe

After installing a fiber optic link between routers and using a tool to verify the cable the link does not connect which of the following would explain the issue

They used the wrong type of fiber transceiver Incorrect TX/RX Polarity exists on the link

Which of the following best mitigate a hackers frequent attempts at brute forceing A company's password

Two factor authentication, complex passwords. — passwords are best protected with longer, more complex passwords preferably pass phrases made up of multiple words. Additionally some form of MFA is considered essential today for "password security". Multi factor authentication protects your password by preventing it from being a single point of failure now we should require another factor in addition to our password such as using a biometrics or a smart card

After configuring new firewalls with the correct configuration to be deployed to each remote branch, unneeded services were disabled, and all firewalls rules were applied successfully. Which of the following actions should be performed next to finish hardening the firewalls?

Update the firewalls with current firmware and software — Keeping a device up today is an essential step in hardening any system

After installing and connecting the on premise equipment for a DSL connection you noticed the modem will not sync which of the following processes should be followed first to troubleshoot the issue

Use a toner probe to identify the circuit Checking the hardware issues is common during any installation you just need to know the right tool for the job

While configuring a load balancer between multiple systems which of the following must be configured in order to ensure proper connectivity during a fail over?

VIP - virtual IP an essential part of configuring load balance systems as a single system

Despite confirming that all devices are connected to the network throughout the entirety of the day some of your users are reporting intermittent Internet connectivity some users report connectivity and contemporarily re-establish a connection by disconnecting and reconnecting through the web authentication process which of the following steps and most likely determine the cause of this issue

Verify the session time and configuration on the captive portal settings Despite being connected to a wireless network you may not be allowed to access certain networking resources or the Internet depending on the access granted to you by the network many networks are protected by captive portals which are webpages that may ask for additional credentials or knowledge may have a user agreement before you can access the network

Are use her in a branch office reports that access to all files has been lost after receiving a new PC all other users in the branch can access file shares the IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router but the machine cannot ping the router which of the following is most likely the cause of the incident?

Incorrect subnet mask The machine cannot access files or ping the router which illuminates DNS (which isn't required unless contacting by device name) and TCP port( which would affect a single service) Past that you are more likely to sign the wrong mask which could be a simple typo rather than a different class which would be an entirely different IP range

Which of the following devices could be used to detect which devices exit on a given network?

Ip scanner A simply IP scanning tool could tell you which devices exist on your network and what their IP addresses are a port scanner would be a close second but it would provide more information in the question is asking for making an IP scanner a better answer ( it would should open/close ports as well as services running)

Which of the following tools could be used to detect the exact break point of a fiber optic link

OTDR Optical time domain reflectometer

To comply with an industry regulation all communications Dustin to secure server should be logged in archived on a storage device which of the following can be configured to for fill this requirement

Port mirroring Port mirroring allows all traffic to be copied and sent to another device such as secure secure storage device

A company has an access layer switch in the lobby of their headquarters which of the following security technology should we consider first given the placement of the switch

Port security - Considering physical access is provided to the switch we need to lock it down to the best of our abilities. Portsecurity attempts to do justice by limiting who and how many devices can plug into an individual switch port though in general you need to be careful allowing anybody untrustworthy to have physical access to your network equipment

When configuring redundant network links between switches which of the following should be enable to prevent network stability issues

STP Isn't technology which detect potential loops on the network which would otherwise cause broadcast storms. Broadcast storm which is an infinitely repeating broadcast can bring the network down or at least slow it down considerably

Which of the following features would allow us to condense multiple SSID into a single SSID

Seamless roaming Seamless roaming allows you to dynamically connect to different APs as your room through building all of these APs would have the same SSID in order to signify they are the same network

Our new server farm is being set up somewhere in California that are a higher base business plans to migrate to however there will be a years period of time we're both server firms are in use and the sensitivity of our data is a concern which of the following technologies could alleviate our concern

Site to site VPN When going from one physical location to another without a physical connection between the two locations it is always a good idea to utilize encrypted VPN when security is a concern

A new network was set up in order to facilitate more users in a building near your companies HQ. The new network is connected to the HQ's LAN via a fiber optic cable. However many users on the new network are unable to access the companies Intranet despise being able to access the Internet. Which of the following corrections would most likely resolve this issue?

Correct the external firewall gateway address — Could be a misconfigured firewall

And network is experiencing a number of CRC errors during normal operations which of the following layers of the OSI model will likely need troubleshooting?

Layer 2 CRC errors are contained within an ethernet header ( layer2)

IP headers would be found under which of the following OSI layers?

Layer 3- routers, IPv4 , IPv6, and ICMP

What should be reviewed on a switch in order to review physical network addresses

MAC table— Mac addresses are physical network addresses

A new cabling certification is being requested every time and network technician rebuilds one end of a CAT 6 (vendor-certified) Cable to create a crossover connection that is used to connect switches which of the following will address this issue by allowing the use of the original cable

MDIX— Auto MDIX allows a cable to take the correct connection requirements. (Crossover vs straight through) and that's the opposite end of the cable becomes less important to the tech

After pulling a new stitch and adding it to the existing network monitoring software do you want to determine which metrics can be gathered from a given switch which of the following should be utilized from the switch

MIB Contains a string of possible metrics that the switch contract

Which of the following topologies would have the highest number of connections compared to other topologies

Mesh- A mesh network is designed to allow most devices to have redundant connections with most other devices in order to provide a highly available network

Which of the following solutions would provide redundancy for a server if our main concern is physical port failure

NIC teaming — Utilizing multiple physical network cards/ethernet ports in order to connect to the network. This would allow one to physically fail while keeping network connectivity

Which of the following protocols would be used to resolve an IPv6 address to a MAC address

Neighbor discovery protocol Neighbor discovery serves a purpose the ARP did on IPv4 networks

Which of the following tools would generate this output? Protocol. Local address. Foreign address. State TCP 127.0.0.1:48512 Desktop-Open:64251. Established TCP 127.0.0.1:64251. Desktop-Open:48512. Established

Netstat - displays active/ listening connections

Which of the following types of devices can provide content filtering and threat protection and manage multiple IPSec site to site connection

Next generation firewall Next generation firewall are firewalls with many capabilities beyond that of a regular firewall they are very similar to UTMs ( many controls in one) that mini allow a company to customize their solution while UTMs are generally bundled products

Which of the following command can confirm the name of a Linux server

Nslookup— The OS of the server who's name we are confirming doesn't affect the command we run we determine the command we use based on the OS that we are actively using if we were running commands in order to query in the DNS( name) information of a device we would use nslookup on a Windows system or DIG on a Linux system

Which of the following solutions would allow for high speed, low latency, and globally disperse content distribution?

Public cloud — CDNs or content delivery networks are load balance networks that are geographically separated in order to provide the best connection for local users while also providing normal load balancing services. This is just the idea of having many servers all around the world to serve many people

Which transceiver type can support up to 40 Gbps?

QSFP+ QSFP+ 10 Gbps per channel / 40 Gbps channels

Which of the following techniques will help aid with congestion reported by users on networks was large amounts of video and VoIP traffic

Quality of service QoS gives delay sensitive traffic( such as streaming video and voice) A higher priority you are moving through the network this generally works by delaying other sets of traffic slightly in order to give considerable increases to prioritize traffic

Which of the following protocols would allow you to install and manage a Windows server in a different building than the one you're currently in

RDP

Which of the following factors should be considered when evaluating a firewall to protect a data center is east west traffic

Replication traffic between an on premise server and a remote back up facility East west traffic is server to server traffic while north south traffic is server to client

Which of the following would need to be configured to ensure a device with a specific Mac addresses always assigned the same IP address from DHCP

Reservation — While a static assignment would ensure a device would have a consistent IP address the question states that it Has to be from DHCP making a Mac reservation our best answer

Which of the following records can be used to track the number of changes on a DNS zone

SOA Start of authority ( admninstrative DNS info/ for zone transfers)

You Want to have separate Wi-Fi networks for your employees and your guests. Which of the following features should be configures to allow different wireless access through the same equipment

SSID Most modern WAPs can support multiple frequencies/SSIDs in order to facilitate multiple networks. So here we can simply assign on SSID to the corporate network and another SSID for the guest network

Which of the following types of authentication technologies will allow a single account to be used to access multiple services/applications?

SSO One account that gives access to various/applications


Conjuntos de estudio relacionados

Personal Finance Exam 1 (Ch 1,2,3)

View Set

Organization of Nervous System and the Spinal Cord

View Set