Network+ practice test questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

A strong password that meets the password complexity requirement should contain: (Select best answer) Uppercase letters (A-Z) Digits (0-9) Non-alphanumeric characters if permitted (e.g. !, @, #, $) Lowercase letters (a-z) A combination of characters from at least 3 character groups

A combination of characters from at least 3 character groups

Which of the answers listed below refers to a technology designed to provide connectivity between servers and data storage devices over fiber-optic or copper cable links? FCoE Frame relay DMVPN Fibre Channel

Fibre Channel

A type of attack that relies on intercepting and altering data sent between two networked hosts is known as: Zero-day attack MITM attack Watering hole attack Replay attack

MITM attack

The arp command can be used to perform what kind of resolution? IP to FQDN MAC to IP IP to MAC FQDN to IP

IP to MAC

A type of layer 2 network switch with configuration features that can be modified through a user interface is referred to as: Virtual switch Multilayer switch PoE switch Managed switch

Managed switch

A network link consisting of two dissimilar transmission medium types requires an intermediary device known as: -Coupler -Patch panel -Content filter -Media converter

Media converter

Which type of network topology provides the highest level of redundancy? Ring Mesh Bus Star

Mesh

Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? AES PSK RC4 IKE

PSK

VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers) T1/T3 lines Site-to-site VPN PSTN E1/E3 lines Remote-access VPN POTS

PSTN POTS

Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network? PUA NDA SOW AUP

PUA

A dedicated software tool used for monitoring and examining contents of a network traffic is called: (Select 2 answers) Port scanner Packet sniffer Vulnerability scanner Protocol analyzer Network mapper

Packet sniffer Protocol analyzer

Which of the following examples meets the requirement of multi-factor authentication? Password and biometric scan Username and PIN Smart card and ID badge Iris and fingerprint scan

Password and biometric scan

The two factors that are considered important for creating strong passwords are: (Select 2 answers) Password length Minimum password age Password history Password complexity Maximum password age

Password length Password complexity

An Ethernet straight-through cable is also commonly referred to as: Rollover cable Crossover cable Patch cable Yost cable

Patch cable

Which of the following answers refers to an SSL/TLS-based directory access protocol? -H.323(IP signaling with ITUnion, same as SIP) -PPTP(Point to point tunneling, uses MSCHAP) -Kerberos(uses secret-key cryptography) -LDAPS(Secure light directory access)

LDAPS(port 636)

Examples of technologies used for SAN connectivity include: FCoE InfiniBand iSCSI Fibre Channel All of the above

All of the above

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP(Transmissioncontrol protocol) DNS(Domain name service) SQL(Structured querylanguage) DHCP(Dyna host config protocol)

DNS, tcp and udp port 53

A wireless disassociation attack is a type of: Downgrade attack Brute-force attack Denial of Service (DoS) attack Cryptographic attack

Denial of Service (DoS) attack

Which of the following EAP methods offers the highest level of security? PEAP EAP-FAST EAP-TLS EAP-TTLS

EAP-TLS

POP3 is used for: Name resolution Sending email messages File exchange Email retrieval

Email retrieval

Domain information groper (dig) and nslookup are command-line tools used for DNS queries. Both utilities are available on Windows and Linux. Of the two, nslookup is the preferred tool on UNIX-like systems; dig is the default DNS query tool for MS Windows. True False

False

Which of the tools listed below is used for attaching wires to a patch panel? Cable crimper Punchdown tool Cable stripper Needle-nose pliers

Punchdown tool

A type of protocol used in network management systems for monitoring network-attached devices is called: SMB(Server message block) NTP(Network time protocol) SNMP(Simple network management) RDP(Remote desktop proto)

SNMP(UDP 161 manager, UDP 162 clients)

A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: BRI SNR RFI SVC

SNR

Which of the answers listed below refers to a secure replacement for Telnet? CHAP(Chal handshake auth protocol) FTP (File transfer protocol) SNMP(Simp network manage protocol) SSH(Secure shell)

SSH, tcp and udp port 22)

A unique WLAN identifier (a.k.a. wireless network name) is commonly referred to as: EUI SSID OUI CNAME

SSID

Examples of copper cabling types used in Ethernet networks include: (Select all that apply) STP Multimode UTP Single-mode Coax

STP UTP Coax

Secure Shell (SSH) protocol runs on: TCP port 21 UDP port 22 TCP port 20 TCP port 22

TCP port 22

A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? TCP port 1720 TCP port 636 TCP port 3389 TCP port 445

TCP port 3389

Which of the following ports is used by HTTPS? TCP port 80 TCP port 443 UDP port 53 TCP port 143

TCP port 443

Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) UDP port 67 TCP port 5060 TCP port 389 UDP port 68 TCP port 5061 TCP port 3389

TCP port 5060 TCP port 5061

A single non-standard Ethernet frame that allows for much larger maximum payload size is commonly referred to as jumbo frame. True False

True

For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). True False

True

Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling. True False

True

Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers) UDP port 53 UDP port 67 UDP port 68 UDP port 69 UDP port 161

UDP port 67 UDP port 68

Which of the following answers refers to a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface? VTP VRF VTC VNC

VNC

Which of the terms listed below refers to a solution that allows multiple operating systems to work simultaneously on the same hardware? Virtualization Clustering Hyperthreading Multitasking

Virtualization

Which network device enables centralized management of WAPs? VPN concentrator Load balancer Multilayer switch Wireless LAN controller

Wireless LAN controller

A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called: tracert traceroute netstat nslookup

netstat

Which of the tools listed below can provide information on network latency problems? (Select 3 answers) ping Packet analyzer Network mapper tracert/traceroute netstat

ping Packet analyzer tracert/traceroute

A type of computer security solution that allows to define and enforce network access policies is referred to as: NAC NIDS NFC NAT

NAC

A cold site is the most expensive type of backup site for an organization to operate. True False

False

A forward DNS lookup zone returns a domain name for a given IP address. True False

False

A reverse DNS lookup zone is used for finding an IP address associated with a given domain name. True False

False

High MTBF value indicates that a component or system provides low reliability and is more likely to fail. True False

False

The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP network server. True False

False

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. True False

False

What is the function of a Time-Domain Reflectometer (TDR)? -Finding breaks in copper network cables -Locating the beginning and the end of a cable in a cabling bundle -Checking network installation for compliance with TIA or ISO standards -Finding breaks in fiber-optic network cables

Finding breaks in copper network cables

Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask? /25 /26 /27 /28

-/27 -/28

A network connecting computers within a small geographical area such as a building or group of buildings is known as: PAN(Personal area) LAN(Local Area) MAN(Metro area) WAN(Wide area)

-LAN

A type of cloud infrastructure available solely for a single organization is known as: Public cloud Community cloud Hybrid cloud Private cloud

-Private cloud

Network Time Protocol (NTP) runs on UDP port: 123 110 161 137

123

Which of the following answers refers to the maximum data transfer rate of E3 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

34.368 Mbps

QSFP offers data transfer rates of up to: 1 Gbps 1.6 Gbps 2 Gbps 4 Gbps

4 Gbps

21 28 36 45

45

Which part of the AAA security architecture deals with the verification of the identity of a person or process? Authentication Authorization Accounting

Authentication

Which of the answers listed below refers to the process of granting or denying access to resources? Authentication Authorization Accounting

Authorization

Which of the answers listed below refers to a special type of frame used by STPs? MTU Jumbo frame BPDU ATM cell

BPDU

Which of the following answers refers to a security policy enforcement software tool or service placed between cloud service users and cloud applications? UTM CASB NGFW DMVPN

CASB

What is the name of an AES-based encryption mode implemented in WPA2? CCMP ECB CBC TKIP

CCMP

Which of the following answers refers to the minimum requirement for twisted-pair copper cabling in modern Ethernet networks? Cat 3 Cat 5 Cat 5e Cat 6 Cat 6A

Cat 5e

A disaster recovery facility that provides only the physical space for recovery operations is called: Hot site Warm site Cold site Mirror site

Cold site

An application software used to selectively block access to certain websites is an example of: Captive portal Firewall Content filter Proxy server

Content filter

A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: Geofencing Quarantine network Geolocation GPS tagging

Geofencing

Which of the tools listed below would be used for attaching RJ-45 connectors to a twisted-pair Ethernet cable? Cable tester Needle-nose pliers Punchdown tool Crimper

Crimper

What type of Ethernet cable would be used for establishing a direct communication link between two PCs? Patch cable Crossover cable Rollover cable Straight-through cable

Crossover cable

A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the actual corporate network is known as: Captive portal Honeynet UTM appliance Honeypot

Honeypot

Which alternate site allows for fastest disaster recovery? Cold site Hot site Warm site

Hot site

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance. Router Switch Bridge Hub

Hub

In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is called: Hypervisor Distributed switch ICS server Virtual router

Hypervisor

Which network protocol enables detection of packet loss? SMB ICMP ARP SNTP

ICMP

Which of the answers listed below refers to a means for executing reflective DOS attack? Phishing Logic bomb IP spoofing Man-in-the-middle

IP spoofing

Which of the following answers refers to a method for managing a network's IP address space? WMS SIEM UTM IPAM

IPAM

Which of the following actions should be the first step in the troubleshooting process? -Establishing a theory of probable cause of the problem -Conducting external or internal research based on problem symptoms -Identifying the problem -Establishing a plan of action to resolve the problem

Identifying the problem

Which term best describes disgruntled employees abusing legitimate access to company's internal resources? Script kiddies Insider threat Hacktivists Organized crime

Insider threat

Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of: SAML TOTP RADIUS Kerberos

Kerberos

While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested with the use of: POST card Cable tester Multimeter Loopback plug

Loopback plug

A network access method whereby the 48-bit physical address assigned to each NIC is used to grant/deny network access is known as: MAC filtering Network Address Translation (NAT) Static IP addressing Network Access Control (NAC)

MAC filtering

Which of the following are hashing algorithms? (Select 2 answers) MD5 CCMP AES RC4 SHA

MD5 SHA

An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as: MIB DCS NMS SIEM

MIB

Which of the following is an example of active eavesdropping? Spoofing Zero-day attack Spear phishing MITM

MITM

What is the fastest way for validating a digital certificate? CRL Key escrow OCSP CSR

OCSP

EMI shielding protects the transferred data signals from: (Select 2 answers) Decryption Signal refraction Outside interference Eavesdropping Signal attenuation

Outside interference Eavesdropping

Which of the tools listed below would be used to identify running services on a networked host? Packet sniffer Loopback interface Protocol analyzer Port scanner

Port scanner

Which VPN type is used for connecting computers to a network? (Select all that apply) Remote-access Client-to-site Site-to-site Point-to-point

Remote-access Client-to-site

A device designed to filter and transfer data packets between dissimilar types of computer networks is called: Hub Load balancer Router Switch

Router

A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: TFTP(Trivial FTP) SFTP(Secure FTP) Telnet FTPS (File transfer secure)

SFTP (port 22)

Which of the following protocols runs on TCP port 445? HTTPS(Secure hypertext translation) SMB/CIFS(Server message block IMAP(Internet message access) H.323

SMB/CIFS(CIFS uses UDP ports 137 and 138, and TCP ports 139 and 445.)

TCP port 25 is used by: SNMP(Simple network management) Telnet FTP(FIle transfer) SMTP(Simple mail transfer)

SMTP

Which type of VPN enables connectivity between two networks? Point-to-point Site-to-site Remote-access Client-to-site

Site-to-site

What type of backups are commonly used with virtual machines? Tape Incremental Snapshot Differential

Snapshot

Which of the answers listed below refers to a data link layer (layer 2) device designed to forward frames between network segments? Hub Switch Firewall Router

Switch

What kind of tool would be used for troubleshooting short/open circuits inside a copper cable? TDR Loopback adapter OTDR Spectrum analyzer

TDR

UDP port 69 is assigned to: TFTP(Trivial file transfer) SNMP(Siple net management) DHCP(Dynamic host config) LDAP(Light directory access)

TFTP

Which of the answers listed below refer to copper cabling termination specifications? (Select 2 answers) TIA/EIA 568a IEEE 802.3ab TIA/EIA 568b IEEE 802.3af

TIA/EIA 568a TIA/EIA 568b

A security protocol designed to strengthen WEP implementations is known as: PEAP TKIP CCMP WPA2

TKIP

Changing the native VLAN on all trunk ports to an unused VLAN ID is one of the countermeasures against VLAN hopping. True False

True

In computer security, the term "Exploit" refers to a any method that allows malicious users to take advantage of a vulnerability found in computer systems. True False

True

The general feature of all twisted-pair cabling types is that wires inside the cable are grouped into pairs and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk). True False

True

Switch spoofing and double tagging are attack methods used in: DDoS attacks Downgrade attacks VLAN hopping attacks Wireless disassociation attacks

VLAN hopping attacks

Which of the following answers lists an example of a modern network bridging device? -WAP -Active hub -VoIP endpoint -Wireless range extender

WAP

Which of the following would be the best solution for securing a small network lacking an authentication server? WPA-PSK WPA2-Enterprise WPA2-PSK WPA-Enterprise

WPA2-PSK

Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices? WAP WWAN Satellite WLAN

WWAN

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: War chalking Spoofing War driving Insider threat

War driving

A type of network device used for improving wireless signal strength within homes and small offices is called: -Wireless hotspot -Distributed switch -Wireless range extender -Intermediate Distribution Frame (IDF)

Wireless range extender

Which of the answers listed below refer(s) to reversed TX/RX? (Select 2 answers) -Far end crosstalk -Wrong TIA/EIA cable standard type used -Frequency mismatch -Wrong pin/pair assignments on cable ends -Near end crosstalk

Wrong TIA/EIA cable standard type used Wrong pin/pair assignments on cable ends

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? arp -e netstat -n nslookup arp -a

arp -a

Which of the following answers refers to a lower-cost alternative to Fibre Channel technology? ATM iSCSI InfiniBand MPLS

iSCSI

Which of the following answers refers to a command-line packet capturing utility? netcat Zenmap tcpdump Nmap

tcpdump

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called: ping traceroute nslookup tracert

tracert

Which of the answers listed below refer to the -10GBaseT Ethernet standard? (Select 3 answers) -Single-mode fiber-optic cable -10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 cable) -Multimode fiber-optic cable -10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6A and Cat 7 cable) -Twisted-pair copper cabling

-10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 cable) -10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6A and Cat 7 cable) ( Missed) -Twisted-pair copper cabling

What is the first valid host address that can be assigned to a node residing in the 10.119.136.143/20 network? 10.119.96.1 10.119.128.1 10.119.132.1 10.119.136.1

-10.119.128.1

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply) -Coaxial cabling -100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) -F-type connector -55-meter cable segment length -1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) -BNC connector -100-meter cable segment length -10 Gbps transfer rate over all 4 pairs of cables (10GBaseT networks) -Twisted-pair copper cabling -RJ-45 connector -Fiber-optic cabling

-100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) -1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) -100-meter cable segment length -Twisted-pair copper cabling -RJ-45 connector

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5e (Cat 5e) cabling? (Select all that apply) -BNC connector -100-meter cable segment length -Coaxial cabling -Twisted-pair copper cabling -Fiber-optic cabling -1 Gbps transfer rate over 2 pairs of cables (1000BaseT networks) -RJ-45 connector -55-meter cable segment length -1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks) -F-type connector

-100-meter cable segment length -Twisted-pair copper cabling -RJ-45 connector -1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks)

Which of the following answers refers to an IPv4 address range used for loopback addresses? 0.0.0.0 - 0.255.255.255 (0.0.0.0/8) 127.0.0.0 - 127.255.255.255 (127.0.0.0/8) 169.254.0.0 - 169.254.255.255 (169.254.0.0/16) 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

-127.0.0.0 - 127.255.255.255 (127.0.0.0/8)

What is the leading octet value range for an IPv4 address belonging to a class B network? 128 - 191 1 - 126 192 - 223 224 - 239

-128 - 191

What is the network address for a 154.24.67.147/22 host? 154.24.48.0 154.24.60.0 154.24.62.0 154.24.64.0

-154.24.64.0

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network? 192.168.31.255 192.168.47.255 192.168.63.255 192.168.79.255

-192.168.63.255

Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) -Maximum data signaling rate of 54 Mbps -5.0 GHz frequency range -Carrier Sense Multiple Access / Collision -Detection (CSMA/CD) network access method -2.4 GHz frequency range -Maximum data signaling rate of 11 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

-2.4 GHz frequency range -Maximum data signaling rate of 11 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method

The IEEE 802.11a standard specifies a channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz

-20 MHz

The IEEE 802.11g standard specifies a channel bandwidth of 20 MHz 22 MHz 40 MHz 80 MHz

-20 MHz

The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz

-20 MHz -40 MHz

Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) 128 - 191 Class B range 192 - 223 Class C range 224 - 239 Class D range

-224 - 239 -Class D range

Which of the answers listed below refers to an IPv4 address range reserved for future use? 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

-240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

Which of the following answers lists the default (classful) subnet mask for a class A network? 255.0.0.0 255.128.0.0 224.0.0.0 255.224.0.0

-255.0.0.0

Which of the following answers lists the default (classful) subnet mask for a class B network? 255.252.0.0 255.255.0.0 255.248.0.0 255.224.0.0

-255.255.0.0

Which of the answers listed below refers to the default (classful) subnet mask for a class C network? 255.255.192.0 255.255.224.0 255.255.255.0 255.255.252.0

-255.255.255.0

Frequency bands used by 802.11 networks include: (Select 2 answers) 5.0 GHz 5.4 GHz 2.0 GHz 2.4 GHz

-5.0 GHz -2.4 GHz

What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) Suitable for large corporate networks Does not require an authentication server Suitable for all types of wireless LANs Requires RADIUS authentication server

-Suitable for large corporate networks -Requires RADIUS authentication server

Which of the answers listed below refers to a channel access method used in 2G GSM networks? CSMA/CA TDMA CSMA/CD CDMA

-TDMA

Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? SSID broadcast Power level controls Maximum Transmission Unit (MTU) Quality of Service (QoS)

-Power level controls

What are the characteristic features of RADIUS? (Select 3 answers) -Primarily used for network access -Encrypts the entire payload of the access-request packet -Combines authentication and authorization -Encrypts only the password in the access-request packet -Primarily used for device administration -Separates authentication and authorization

-Primarily used for network access -Combines authentication and authorization -Encrypts only the password in the access-request packet

What are the characteristic features of RADIUS? (Select 3 answers) Primarily used for network access Encrypts the entire payload of the access-request packet Combines authentication and authorization Encrypts only the password in the access-request packet Primarily used for device administration Separates authentication and authorization

-Primarily used for network access -Combines authentication and authorization -Encrypts only the password in the access-request packet

The IEEE 802.11ac standard specifies a maximum channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz

160 MHz

Which of the following allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask

-Subnet mask

SNMP runs on UDP port: 123 137 143 161

161

Which of the answers listed below refers to a rule-based network access control mechanism implemented on routers, switches, and firewalls that allows to filter network traffic by IP address or port number? ACL NAC WAF NAT

ACL

What is the most common type of a DSL Internet access? VDSL ADSL SDSL UDSL

ADSL

Which of the answers listed below refers to a possible symptom of exhausted DHCP scope? Duplicate IP addresses APIPA address Duplicate MAC addresses Loopback address

APIPA address

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? ARP poisoning Replay attack Cross-site request forgery DNS poisoning

ARP poisoning

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as: SLA EULA AUP BPA

AUP

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called: Authentication Authorization Accounting

Accounting

A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called: IEEE 802.3af Star topology Ad hoc mode IEEE 802.3at Infrastructure mode

Ad hoc mode

Which of the following can be the source of RFI and cause disruptions in network connectivity? Cordless phones Fluorescent lights Microwave ovens Bluetooth devices All of the above

All of the above

A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as: GBIC Basic-Rate Interface (BRI) UC gateway Auto MDI-X

Auto MDI-X

Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers) Jitter Signal attenuation Crosstalk EMI Signal latency

Crosstalk EMI

Which of the following attack types relies on amplification effect? Zero-day attack DDoS attack Brute-force attack MITM attack

DDoS attack

An expired IP address indicates a problem with: HTTP DNS DHCP ICMP

DHCP

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called: DHCP scope DHCP reservation DHCP snooping DHCP relay agent

DHCP snooping

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS(Domain name service,53) SNMP(Simple net managemnt UDP161&UDP162) NAT(Network address translation,5351) DHCP(Dyna host config protocol)

DHCP(UDP 67 server, UDP 68 client.)

Which VPN type enables direct communication links between remote hosts on a WAN? Site-to-site VPN DMVPN Remote-access VPN Client-to-site VPN

DMVPN

A network admin can ping remote host by its IP address, but not by FQDN. Which of the following is the most probable source of the problem? ICMP DNS NetBIOS DHCP

DNS

Remapping a domain name to a rogue IP address is an example of what kind of exploit? DNS poisoning Domain hijacking ARP poisoning URL hijacking

DNS poisoning

Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers) DTLS bcrypt SCP IPsec SSL/TLS

DTLS IPsec SSL/TLS

Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive? Quick format Overwriting data Degaussing Low-level format

Degaussing

Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP(Cipher block chaining msg auth) RSTP(rapid spanning tree) ICMP(Internet control message) SNMP(simple network management)

ICMP

Which of the following answers refers to a cable rack that interconnects wiring between an MDF and workstation devices? ICS MDI IDF MTU

IDF

Which of the answers listed below illustrates the difference between passive and active security breach response? HIPS vs. NIPS UTM vs. Firewall NIPS vs UTM IDS vs. IPS

IDS vs. IPS

Which of the answers listed below applies to a situation where an Ethernet switch acts as an authenticator for devices connecting to a network through one of its ports? IEEE 802.1X IEEE 802.11ac IEEE 802.1D IEEE 802.11x

IEEE 802.1X

Which of the solutions listed below would be used to provide redundant power source for datacenter server racks? Offline UPS Independent power circuits Backup generator Standby UPS

Independent power circuits

What is the function of archive bit? -Search indexing -Indicating whether a file has been modified since the last backup -Setting file attribute to read-only -Creating an additional copy of a file

Indicating whether a file has been modified since the last backup

Which of the answers listed below refers to a high-speed alternative to Fibre Channel technology? FCoE InfiniBand iSCSI PPPoE

InfiniBand

The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as: Option Reservation Scope Lease

Lease

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is known as: Spoofing MITM attack Phishing DoS attack

DoS attack

Which of the terms listed below refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure? Repair installation Drive imaging Incremental backup Differential backup

Drive imaging

The term "Brownout" refers to what kind of situation? Power spike EMI Drop in voltage Power outage

Drop in voltage

Which of the following would add power redundancy on a server box? Standby UPS Backup generator Offline UPS Dual-power supply

Dual-power supply

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? EAP-TLS PEAP EAP-TTLS EAP-FAST

EAP-TLS

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? SFTP(Secure file transfer) HTTPS(Secure hypertext transfer) FTPS SNMP(Simple network manage proto)

HTTPS(tcp 443)

Which of the following terms refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data? Hot site Warm site Cold site

Hot site

TCP port 80 is assigned to: Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol over TLS/SSL (HTTPS) Internet Message Access Protocol (IMAP) Lightweight Directory Access Protocol (LDAP)

Hypertext Transfer Protocol (HTTP)

Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused? Password history setting Maximum password age setting Account lockout threshold setting Minimum password age setting

Password history setting

Which of the following answers refer to common cabling type used for connecting workstations to network devices? (Select 2 answers) Patch cable RG-59 cable Crossover cable RG-6 cable Straight-through cable

Patch cable Straight-through cable

A simple device consisting of multiple connector blocks and ports used for cable management is known as: Media converter Demarc Main Distribution Frame (MDF) Patch panel

Patch panel

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as: Phishing Privilege escalation Backdoor access Shoulder surfing

Phishing

A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers) Phishing Watering hole attack Social engineering Bluejacking Vishing

Phishing Social engineering

A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as: -Plenum -Main Distribution Frame (MDF) -HVAC system -Intermediate Distribution Frame (IDF)

Plenum

What does the term "Blackout" refer to? Power outage Drop in voltage EMI Power spike

Power outage

A type of server used for collecting diagnostic and monitoring data from networked devices is known as: Proxy server UC server Syslog server ICS server

Syslog server

Which of the solutions listed below add(s) redundancy in areas identified as single points of failure? (Select all that apply) RAID Dual-power supply Virtualization Failover clustering Load balancing

RAID Dual-power supply Failover clustering Load balancing

Which type of RAID does not offer fault tolerance? RAID 5 Disk duplexing RAID 0 Disk mirroring RAID 1

RAID 0

Which of the answers listed below refers to an encryption algorithm used in TKIP? DES 3DES AES RC4

RC4

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? RDP SSH VNC Telnet

RDP

Which of the following answers refer(s) to authentication protocol(s) providing the AAA functionality? (Select all that apply) CHAP TACACS+ PAP RADIUS MS-CHAP

TACACS+ RADIUS

Which port enables the FTP's Data Connection for sending file data? UDP port 20 TCP port 20 UDP port 21 TCP port 21

TCP port 20

The File Transfer Protocol (FTP) Control Connection for administering a session is established through: TCP port 20 UDP port 20 TCP port 21 UDP port 21

TCP port 21

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as: RDP(Remote desktop proto) SSH(Secure shell) Telnet rsh(Remote shell)

RDP(TCP and UDP port 3389)

Which type of network documentation would be of help in determining the physical location of a network server? Network diagram IDF documentation Rack diagram MDF documentation

Rack diagram

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called: Grayware Adware Ransomware Spyware

Ransomware

In computer networking, the term "Attenuation" refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path. The problem of attenuating circuit on the network can be solved by adding a device that boosts the signal strength. This type of device is known as: Repeater Media converter Inverter Load balancer

Repeater

In the Kerberos-based authentication process, the purpose of the client's timestamp is to provide countermeasure against: Replay attacks Dictionary attacks Birthday attacks Downgrade attacks

Replay attacks

Which of the protocols listed below enables secure remote access to another computer on the network via command line? VNC Telnet SSH RDP

SSH

Unblocking TCP port 22 enables what type of traffic? (Select 2 answers) FTPS(File transfer secure) SSH(secure Shell) SFTP(Secure file transfer) FTP(File transfer) HTTP(Hypertext translation)

SSH SFTP

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: TFTP (Trivial File Transfer Protocol) SSH (Secure Shell) Telnet (Terminal emulation program) RDP (Remote desktop protocol)

SSH tcp and udp port 22

An authentication subsystem in which a single set of authentication credentials provides access to multiple systems within a single organization is referred to as: NAC SSO RBAC DAC

SSO

A special type of cabling with fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling. True False

True

Which of the following destruction tools/methods allows for secure disposal of physical documents? Shredder Hard drive sanitization Low-level formatting Degaussing

Shredder

Which preventive physical security control would provide basic means for securing door access? Motion detection Warning signs Video surveillance Smart card reader

Smart card reader

Which of the answers listed below refer to implementations of certificate-based authentication? (Select 2 answers) CHAP 802.3at Smart cards 802.3af PAP 802.1X

Smart cards 802.1X

A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as: OTDR Line tester Loopback adapter Smart jack

Smart jack

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as: Shoulder surfing Privilege escalation Social engineering Penetration testing

Social engineering

A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS. True False

True

Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper). True False

True

Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps. True False

True

NTP enables: Allocation of IP addresses Synchronization of clocks over a computer network Retrieving contents of an Internet page from a web server Monitoring of network-attached devices

Synchronization of clocks over a computer network

A range of IP addresses that a DHCP server can lease out to DHCP clients is known as: Lease Reservation Pool Scope

You left the correct answer unselected. Scope

A DHCP server's IP exclusion configuration option allows network administrators to remove a single IP address or a range of IP addresses from the pool of addresses being assigned automatically to the requesting DHCP client computers. IP exclusion prevents other DHCP clients from requesting an IP address statically assigned to other essential network hosts (e.g. servers, or a wireless printers) via DHCP reservation. True False

You left the correct answer unselected. True

Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? 1 5 6 9 11

1 6 11

What is the typical cable segment length for a copper twisted-pair Ethernet cable? 33 meters 55 meters 100 meters 250 meters

100 meters

An OC-3 line supports transmission rates of up to: 1.544 Mbps 44.736 Mbps 51.84 Mbps 155.52 Mbps

155.52 Mbps

Compared to SFP, SFP+ offers enhanced data transfer rates of up to: 10 Gbps 16 Gbps 20 Gbps 40 Gbps

16 Gbps

Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection? 622.08 Mbps 1244.16 Mbps (1.24 Gbps) 2488.32 Mbps (2.49 Gbps) 9953.28 Mbps (9.95 Gbps)

9953.28 Mbps (9.95 Gbps)

Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech. True False

False

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. True False

False

Plenum-rated cabling features a fire-retardant jacket made of polyvinyl chloride (PVC). True False

False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False

False

Which type of cabling provides the best protection against EMI/RFI? Fiber-optic cabling STP cabling Coaxial cabling UTP cabling

Fiber-optic cabling

What is the function of FTP? Mail services Serving of web pages Directory access File exchange

File exchange

Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? HIDS Firewall Packet filter Vulnerability scanner

Firewall

Which of the answers listed below refers to a type of software embedded into a hardware chip? Adware Background app Device driver Firmware

Firmware

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses? BPDU guard UTM Flood guard Root guard

Flood guard

Which of the following passwords is the most complex? T$7C52WL4SU GdL3tU8wxYz @TxBL$nW@Xt G$L3tU8wY@z

G$L3tU8wY@z

Which of the following would require troubleshooting if a network connectivity problem originates from mismatched transceiver types? (Select 2 answers) SPF GBIC ASIC SFP MDI-X

GBIC SFP

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? SMB(Server message block) H.323(IP Signaling standard for ITUnion) SCP(Secure copy protocol) IGP(Interior gateway)

H.323(port 1720)

Which protocol allows for retrieving contents of an Internet page from a web server? SNMP(Simple net management protocol) HTTP(Hypertext transfer protocol) SMTP(Simple mail transfer protocol) IMAP(Internet message access proto)

HTTP(tcp 80)

Which of the protocols listed below enables remote access to another computer on the network via web browser? RDP HTTPS SSH VNC

HTTPS

Which of the following authentication protocols can be used to enable SSO? PAP LDAP MS-CHAP Kerberos

Kerberos

Which of the following solutions enables combining several physical ports of a switching device into a single logical channel? RSTP VRRP LACP HSRP

LACP

A dedicated storage appliance that can be added to a local network is known as: SPS NAS SAN NFS

NAS

A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as: ISA NDA BPA SLA

NDA

A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers) Packet filter Layer 4 firewall NGFW Second-generation firewall Layer 7 firewall

NGFW Layer 7 firewall

The process of combining multiple physical network adapters into a single logical interface for increased throughput and redundancy is known as: Route aggregation Virtualization NIC teaming Device pairing

NIC teaming

DNS record that specifies a list of additional name servers on a domain is called: SPF NS PTR SRV

NS (Name Server)

Which protocol ensures the reliability of the Kerberos authentication process? EAP NTP IPsec RTP

NTP

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? NTP(Network time protocol) VTP(VLAN Trunk protocol) NNTP(Network news transfer proto) RTP(Real time transport proto)

NTP(servers use TCP 123, clients use random ports above 1023)

Which of the following command-line tools is used for discovering hosts and services on a network? Nmap netcat Zenmap tcpdump

Nmap

Which of the answers listed below refers to a permanent assignment of an IP address? Static IP address Private IP address Dynamic IP address Public IP address

Static IP address

Spanning Tree Protocol (STP) provides protection against: DNS poisoning Switching loops VLAN hopping Replay attacks

Switching loops

A network device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. True False

True

A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is referred to as demarcation point, or demarc. True False

True

The process of securing networking devices should include the practice of disabling unused physical ports. True False

True

The shape and angle of the tip of a fiber-optic connector can have an impact on the performance of a fiber-optic communication link. The two basic types of fiber end are Ultra Physical Contact (UPC) and Angled Physical Contact (APC). In the UPC-type connector, the connector end is polished with no angle, while APC connectors feature a fiber end polished at an 8-degree angle. Besides additional labeling (UPC or APC) that helps in identifying further details about a given connector type, fiber-optic connectors can also have different colors. The rule of thumb is that a UPC-type connector typically would be blue while APC connector would have a green color. True False

True

The term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. True False

True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts. True False

True

The term "Intrusion Detection System" (IDS) refers to a device or software application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as Network Intrusion Detection System (NIDS). A type of IDS installed on a host monitoring only that host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs. True False

True

The term "Metropolitan Ethernet" refers to an Ethernet-based Metropolitan Area Network (MAN). True False

True

Which of the cabling types listed below is the most susceptible to EMI/RFI? UTP cabling Coaxial cabling STP cabling Fiber-optic cabling

UTP cabling

Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address? MX CNAME AAAA PTR

CNAME

Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) Data signaling rate of up to 600 Mbps -5.0 GHz frequency band -Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method -Maximum data signaling rate of up to 6.77 Gbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -Multi-User Multiple Input / Multiple Output (MU-MIMO) -2.4 GHz frequency band

-5.0 GHz frequency band -Maximum data signaling rate of up to 6.77 Gbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -Multi-User Multiple Input / Multiple Output (MU-MIMO)

Which of the DNS database records listed below returns a 32-bit IP address? MX AAAA CNAME A PTR

-A

What are the characteristic features of ATM? (Select all that apply) -A network technology used for connecting devices on a WAN -Data transfer rates of up to 45 Mbps -Used in SONET networks -53-byte data transfer unit (a.k.a. ATM cell) -A network technology used for connecting devices on a LAN -Data transfer rates of up to 10 Gbps

-A network technology used for connecting devices on a WAN -Used in SONET networks -53-byte data transfer unit (a.k.a. ATM cell) -Data transfer rates of up to 10 Gbps

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as: ACL(access control list) CSR(Certificate signing request) DLP(Data loss prevention) AUP(Authorized use policy)

-ACL

Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? CAN(control area network, cars) WTLS(wireless transport layer security) UAV(unmanned aerial vehicles) ANT+(health tracking)

-ANT+

According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed: -After documenting findings, actions and outcomes -As the first step of the troubleshooting process -After implementing the solution -As the last step of the troubleshooting process

-After implementing the solution

Restoring data from an incremental backup requires: (Select 2 answers) Copy of the last incremental backup All copies of differential backups made since the last full backup Copy of the last differential backup All copies of incremental backups made since the last full backup Copy of the last full backup

-All copies of incremental backups made since the last full backup -Copy of the last full backup

A network device hardening process should include: -Changing default credentials / Avoiding common passwords -Firmware upgrades / Patching and updates -File hashing -Disabling unnecessary services and unused ports (physical and virtual) -Implementation of secure protocols -Cryptographic key renewal -All of the above

-All of the above

A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called: 802.11 NFC(near field comms) Bluetooth Z-Wave

-Bluetooth

Star Full mesh Bus Partial mesh

-Bus

Penetration testing: (Select all that apply) -Bypasses security controls -Only identifies lack of security controls -Actively tests security controls -Exploits vulnerabilities -Passively tests security controls

-Bypasses security controls -Actively tests security controls -Exploits vulnerabilities

Which of the following answers refers to a bus topology network first developed for use in vehicles? CAN PAN VNC SAN

-CAN

Which of the following answers refers to a channel access method used in 3G cellular networks? CDMA CSMA/CD TDMA CSMA/CA

-CDMA

Which of the answers listed below refers to a solution that replaces the classful network design? VLAN(Virtual LAN) RSTP(Rapid spanning tree) SNAT(Source network address translation) CIDR(Classless inter domain routing)

-CIDR

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space

-Class A address space

Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range

-Class A range -Non-routable (private) IP address range

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space

-Class C address space

What are the characteristic features of the 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range

-Class C range -Non-routable (private) IP address range

Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers) -Twisted-pair copper cabling -Suitable for short-distance cable runs -Used for analog video and CCTV installations -Coaxial cabling -Suitable for long-distance cable runs -Used for cable television, satellite television and cable modems

-Coaxial cabling -Suitable for long-distance cable runs -Used for cable television, satellite television and cable modems

Which of the following devices would be used for connecting a router to a T1 line? CSU/DSU Media converter IDF F-type connector

CSU/DSU

What are the characteristics of the RG-59 cabling specification? (Select 3 answers) -Coaxial cabling -Suitable for short-distance cable runs -Used for analog video and CCTV installations -Twisted-pair copper cabling -Suitable for long-distance cable runs -Used for cable television, satellite television and cable modems

-Coaxial cabling -Suitable for short-distance cable runs -Used for analog video and CCTV installations

Bayonet Neill-Concelman (BNC) connector is used with: -Twisted-pair copper cabling -Single-mode fiber-optic cabling -Coaxial copper cabling -Multimode fiber-optic cabling

-Coaxial copper cabling

Which of the answers listed below refer to the characteristic features of a modem? (Select 3 answers) -Converts digital data into analog signal -Allows a computer to send and receive information over telephone lines -Forwards frames between network segments -Converts analog signal into digital data -Filters and transfers data packets between dissimilar types of computer networks

-Converts digital data into analog signal -Allows a computer to send and receive information over telephone lines -Converts analog signal into digital data

Which of the following connector types are used for RS-232 serial communications? (Select 2 answers) DE-9 RG-59 RJ-45 DB-25 RG-6 RJ-11

-DE-9 -DB-25

APIPA addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to: SNMP(Simple network management) DNS(Domain name system) SMTP(Simple mail transfer) DHCP(Dyna host config)

-DHCP

Which DNS records are commonly used with the DNS TXT record? (Select 2 answers) PTR CNAME -SPF MX -DKIM

-DKIM -SPF

Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam? (Select 2 answers) NS SPF CNAME DKIM SRV

-DKIM -SPF

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? ICS server Web server DNS server DHCP server

-DNS server

Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) Unidirectional antenna Dipole antenna Yagi antenna Omnidirectional antenna Dish antenna

-Dipole antenna -Omnidirectional antenna

Which of the following enables automatic configuration of an IPv6 address? EUI-64(Extended Unique Identifier-64) UEFI(Unified Extensible Firmware Interface) APIPA(Auto private IP addressing) MAC-48(Replaced by EUI 48)

-EUI-64

Which of the answers listed below refer(s) to MPLS? (Select all that apply) -Circuit-switching method -Used for connecting devices on a LAN -Enables delivery of various data packet types over the same network link -Packet-switching method -Used for connecting devices on a WAN -Designed to simplify and improve the performance of routing process

-Enables delivery of various data packet types over the same network link -Packet-switching method -Used for connecting devices on a WAN -Designed to simplify and improve the performance of routing process

What are the characteristics of TACACS+? (Select 3 answers) -Encrypts only the password in the access-request packet -Combines authentication and authorization -Encrypts the entire payload of the access-request packet -Primarily used for device administration -Separates authentication and authorization -Primarily used for network access

-Encrypts the entire payload of the access-request packet -Primarily used for device administration -Separates authentication and authorization

A dedicated communication channel used exclusively between two connected hosts is a characteristic feature of packet-switching networks. True -False

-False

Circuit-switching networks move data divided into small blocks over a shared connection. True False

-False

A network topology in which each node has a direct physical connection to every other node is known as: Star Partial mesh Bus Full mesh Ring

-Full mesh

What are the characteristic features of satellite Internet connections? (Select 3 answers) -High signal latency -Lack of signal interference -Cheaper in comparison to terrestrial links -Interference (weather dependent) -Low signal latency -Relatively high cost in comparison to terrestrial links

-High signal latency -Interference (weather dependent) -Relatively high cost in comparison to terrestrial links

Which IEEE standard provides the implementation basis for most modern WLANs? IEEE 802.11 IEEE 802.1x IEEE 802.3 IEEE 802.1q

-IEEE 802.11

The DNS database AAAA record creates a pointer that maps a hostname to: IPv4 address Mail server IPv6 address Canonical name

-IPv6 address

Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls? NFC 802.3 IR Z-Wave

-IR

Which of the answers listed below refers to a cloud computing delivery model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software? SaaS MaaS PaaS IaaS

-IaaS

Vulnerability scanning: (Select 3 answers) Identifies lack of security controls Actively tests security controls Identifies common misconfigurations Exploits vulnerabilities Passively tests security controls

-Identifies lack of security controls -Identifies common misconfigurations -Passively tests security controls

Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to: -Conduct research based on symptoms -Test the theory to determine problem cause -Implement the solution -Establish a theory of probable cause of the problem

-Implement the solution

Which of the following typically applies to a request that doesn't match the criteria defined in an ACL? Group policy Implicit deny rule Transitive trust Context-aware authentication

-Implicit deny rule

A wireless networking topology consisting of at least one Access Point (AP) is referred to as: IEEE 802.3at Infrastructure mode IEEE 802.3af Ad hoc mode Peer-to-peer mode

-Infrastructure mode

An emerging field of new technologies, such as wearable tech or home automation is known as: SoC(security ops center) NFC(near field comms) IoT(internet of things) ESN(enterprise social networking)

-IoT

Which of the answers listed below refer(s) to example(s) of fiber-optic connectors (Select all that apply) LC DB-25 ST SC MT-RJ RG-6

-LC -ST -SC -MT-RJ

A computer network connecting multiple LANs over an area of a city or campus is referred to as: PAN LAN -MAN WAN

-MAN

What are the characteristic traits of a network switch? (Select all that apply) -Makes forwarding decisions in hardware (ASIC) -Typically capable of connecting more network segments than bridge (more physical ports) -Older and less effective type of network device in comparison to network bridge -Makes forwarding decisions in software -Sometimes referred to as multiport bridge -Newer and more effective type of network device in comparison to network bridge -Typically capable of connecting fewer network segments than bridge (fewer physical ports)

-Makes forwarding decisions in hardware (ASIC) -Typically capable of connecting more network segments than bridge (more physical ports) -Sometimes referred to as multiport bridge -Newer and more effective type of network device in comparison to network bridge

Which of the following answers describe the features of a network bridge? (Select 3 answers) -Makes forwarding decisions in hardware (ASIC) -Newer and more effective type of network device in comparison to network switch -Typically capable of connecting more network segments than switch (more physical ports) -Makes forwarding decisions in software -Typically capable of connecting fewer network segments than switch (fewer physical ports) -Older and less effective type of network device in comparison to network switch

-Makes forwarding decisions in software ( Missed) -Typically capable of connecting fewer network segments than switch (fewer physical ports) ( Missed) -Older and less effective type of network device in comparison to network switch

Which of the following answers refer to the 1000BaseSX Ethernet standard? (Select 2 answers) -Single-mode fiber-optic cabling -Maximum cable segment length between 220 and 500 meters -Multimode fiber-optic cabling -Maximum cable segment length of 185 meters -Twisted-pair copper cabling

-Maximum cable segment length between 220 and 500 meters ( Missed) -Multimode fiber-optic cabling

What are the characteristic features of the 100BaseTX Ethernet standard? (Select 3 answers) -Twisted-pair copper cabling (Category 3 or higher) -Maximum cable segment length of 100 meters -Transfer rate of 100 Mbps over two-pair Cat 5 or better cable -Maximum cable segment length of 55 meters -Twisted-pair copper cabling (Category 5 or higher) -Transfer rate of 1000 Mbps (1 Gbps) over four-pair Cat 5 or better cable

-Maximum cable segment length of 100 meters -Transfer rate of 100 Mbps over two-pair Cat 5 or better cable -Twisted-pair copper cabling (Category 5 or higher)

What are the characteristic features of the 1000BaseT Ethernet standard? (Select 3 answers) -Maximum cable segment length of 185 meters -Single-mode fiber-optic cabling -Maximum cable segment length of 100 meters -Twisted-pair copper cabling (Cat 5 or higher) -Uses two pairs of wires in a cable for data transmission -Multimode fiber-optic cabling -Uses all four pairs of wires in a cable for data transmission

-Maximum cable segment length of 100 meters -Twisted-pair copper cabling (Cat 5 or higher) -Uses all four pairs of wires in a cable for data transmission

Which of the answers listed below refer to the 1000BaseLX Ethernet standard? (Select 3 answers) -Twisted-pair copper cabling -Transfer rate of 1 Gbps over two-pair Cat 5e or better cable -Maximum cable segment length of up to 5 km over single-mode fiber -Fiber-optic cabling -Maximum cable segment length of 100 meters -Transfer rate of 1 Gbps over four-pair Cat 5e or better cable -Maximum cable segment length of up to 500 m over multimode mode fiber

-Maximum cable segment length of up to 5 km over single-mode fiber ( Missed) -Fiber-optic cabling -Maximum cable segment length of up to 500 m over multimode mode fiber

What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) -Carrier Sense Multiple Access / Collision -Detection (CSMA/CD) network access method -Maximum data signaling rate of 54 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -2.4 GHz frequency range -Maximum data signaling rate of 11 Mbps -5.0 GHz frequency range

-Maximum data signaling rate of 54 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -2.4 GHz frequency range

What are the characteristic traits of GBIC? (Select all that apply) Data transfer of 10 Gbps Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Converts electrical signals to optical signals Data transfer of 1 Gbps

-Modular (hot swappable) interface -Converts optical signals to electrical signals -Converts electrical signals to optical signals -Data transfer of 1 Gbps

What are the characteristic traits of single-mode fiber optics? (Select 3 answers) -Transmission distances of up to 2 km -More expensive than multimode fiber optics -Uses LED as the source of light -Transmission distances of up to 100 km -Uses laser as the source of light -Less expensive than multimode fiber optics

-More expensive than multimode fiber optics -Transmission distances of up to 100 km -Uses laser as the source of light

Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? Multiple Input / Multiple Output (MIMO) 40 MHz channel width Multi-User MIMO (MU-MIMO) Maximum data signaling rate of up to 600 Mbps

-Multi-User MIMO (MU-MIMO)

Which type of technology enables contactless payment transactions? NFC SDN PED WAP

-NFC

Which of the answers listed below refer(s) to PPP? (Select all that apply) -Network protocol used for connecting devices on a WAN -Transport layer (layer 4) protocol -Enables encapsulation of IP traffic -Used for establishing a direct connection between two networked devices -Application layer (layer 7 protocol)

-Network protocol used for connecting devices on a WAN -Enables encapsulation of IP traffic -Used for establishing a direct connection between two networked devices

Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range

-Non-routable (private) IP address range -Class B range

What is the function a DNS TXT record? (Select 2 answers) -Resolves an IP address to a hostname for reverse lookups -Maps a domain name to a list of mail servers for that domain -Provides outside services with additional information about a domain -Not used to direct any traffic -Allows multiple domain names to resolve to the same IP address

-Not used to direct any traffic -Provides outside services with additional information about a domain

Which of the answers listed below refer to IMAP4? (Select 2 answers) -Offers improved functionality in comparison to POP3 -Serves the same function as POP3 Enables sending email messages from client devices Offers less functions than POP3 Enables email exchange between mail servers

-Offers improved functionality in comparison to POP3 -Serves the same function as POP3

Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? Omnidirectional antenna Dish antenna Unidirectional antenna Yagi antenna

-Omnidirectional antenna -Unidirectional antenna

A type of limited-range computer network used for data transmission among various types of personal devices is generally referred to as: PAN LAN SAN MAN

-PAN

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) -PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. -The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. -PTR record resolves an IP address to a hostname for reverse lookups. -The functionality provided by a PTR record is the opposite of A and AAAA DNS records. -PTR record maps a domain name to a list of mail servers for that domain.

-PTR record resolves an IP address to a hostname for reverse lookups. -The functionality provided by a PTR record is the opposite of A and AAAA DNS records.

Which of the following cloud service types would provide the best solution for a web developer intending to create a web app? MaaS SaaS PaaS IaaS

-PaaS

Which of the following answers refer(s) to frame relay? (Select 3 answers) -A network technology used for connecting devices on a LAN -Data transfer rates of up to 10 Gbps -Packet-switching method -Data transfer rates of up to 45 Mbps -A network technology used for connecting devices on a WAN -Circuit-switching method

-Packet-switching method -Data transfer rates of up to 45 Mbps -A network technology used for connecting devices on a WAN

Which of the following network topologies is most commonly used in contemporary Ethernet LANs? Bus topology Star topology Ring topology Mesh topology

-Star topology

What are the characteristics of SMB/CIFS? (Select 2 answers) -Used mainly by computers running Linux distributions -Provides shared access to files, directories, and devices -Used mainly by computers running Microsoft Windows operating systems -Enables voice and multimedia communications over IP networks

-Provides shared access to files, directories, and devices -Used mainly by computers running Microsoft Windows operating systems

Telnet: (Select 3 answers) -Encrypts network connection -Provides username & password authentication -Transmits data in an unencrypted form -Does not provide authentication -Enables remote login and command execution

-Provides username & password authentication -Transmits data in an unencrypted form -Enables remote login and command execution

Setting up a wireless connection in Network and Sharing Center Control Panel applet in MS Windows requires: (Select 3 answers) Typing in the network's subnet mask Providing the wireless network name Selecting security/encryption type Providing IP address of the Wireless Access Point (WAP) Typing in the network security key (Wi-Fi password)

-Providing the wireless network name -Selecting security/encryption type -Typing in the network security key (Wi-Fi password)

Which of the following answers refers to a cloud computing delivery model in which the cloud infrastructure is provisioned for open use by the general public? Hybrid cloud Private cloud Community cloud Public cloud

-Public cloud

Which of the following wireless technologies enables identification and tracking of tags attached to objects? WAF RFID GPS WTLS

-RFID

Which of the terms listed below refers to permanent IP address assignment from a DHCP server? Scope Reservation DHCP relay Lease

-Reservation

A network topology in which each node connects to exactly two other nodes is referred to as Partial mesh topology Ring topology Full mesh topology Star topology

-Ring topology

A dedicated local network consisting of devices providing data access is called: SDN NAS iSCSI SAN

-SAN

Which of the answers listed below refers to a technology designed to simplify network infrastructure management? SAN(Storage area network) SDN(Software defined networking) SSP(Service switching point) SEH(Structured encryption handling)

-SDN(Software-defined networking (SDN) technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring,)

Which DNS record specifies a host and port information that allow to find specific services on a network? SRV NS PTR DKIM

-SRV

Which of the answers listed below refer to methods for creating secure connections between clients and cloud service providers? (Select 3 answers) Telnet IPsec PAP SSL/TLS encryption VPN

-SSL/TLS encryption -VPN -IPsec

Which of the protocols listed below provide protection against switching loops? (Select 2 answers) RTP (Real time transport protocol) SRTP(Secure real time transport protocol) RDP(Remote dektop protocol) STP(Spanning tree protocol) RSTP(Rapid spanning tree protocol)

-STP(Spanning tree protocol) -RSTP(Rapid spanning tree protocol)

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called: PaaS SaaS IaaS MaaS

-SaaS

Which of the answers listed below refer(s) to the feature(s) of SFP? (Select all that apply) -Small form factor transceiver -Converts electrical signals to optical signals -Data transfer of 10 Gbps -Newer transceiver type that replaces GBIC -Modular (hot swappable) interface -Converts optical signals to electrical signals -Fixed physical interface -Data transfer of 1 Gbps

-Small form factor transceiver -Converts electrical signals to optical signals -Newer transceiver type that replaces GBIC -Modular (hot swappable) interface -Converts optical signals to electrical signals -Data transfer of 1 Gbps

A network topology in which each node connects to a central switching device is called: Bus topology Ring topology Star topology Mesh topology

-Star topology

What are the characteristic features of FCoE? (Select all that apply) -Requires separate cabling infrastructure -Takes advantage of copper cabling -Enables connectivity between servers and data storage devices -Does not require any specialized hardware -Takes advantage of fiber-optic cabling -Requires specialized hardware -Does not require separate cabling infrastructure

-Takes advantage of copper cabling -Enables connectivity between servers and data storage devices -Does not require any specialized hardware -Does not require separate cabling infrastructure

Once the theory of probable cause of the problem has been established, the next troubleshooting step should be: -Verifying full system functionality -Testing the theory to determine the problem cause -Implementing the solution -Establishing a plan of action to resolve the problem

-Testing the theory to determine the problem cause

Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) -Uses laser as the source of light -Transmission distances of up to 2 km -More expensive than single-mode fiber optics -Transmission distances of up to 100 km -Less expensive than single-mode fiber optics -Uses LED as the source of light

-Transmission distances of up to 2 km -Less expensive than single-mode fiber optics -Uses LED as the source of light

A cloud delivery model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud. True False

-True

A logical network diagram is a document that describes the detailed layout of the building and the way devices are connected to the network through the actual cabling that transmits data. True False

-True

An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). True False

-True

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. True False

-True

In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets. True False

-True

In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network). True False

-True

Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards. True False

-True

Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. True False

-True

One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping. True False

-True

Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. True False

-True

The Internet is an example of a large public WAN. True False

-True

Which of the answers listed below refer(s) to UTP cabling? (Select all that apply) -Twisted-pair copper cabling -Used in Ethernet networks and telephone systems -Low cost and ease of installation -Takes advantage of additional protective cover reducing signal interference from outside sources -Coaxial cabling -Not surrounded by any shielding that would provide protection against interference from outside sources -Fiber-optic cabling -In Ethernet networks, installed with RJ-45 connector type

-Twisted-pair copper cabling -Used in Ethernet networks and telephone systems -Low cost and ease of installation -Not surrounded by any shielding that would provide protection against interference from outside sources -In Ethernet networks, installed with RJ-45 connector type

Which of the following answers refer to the characteristics of copper-based networks? (Select 3 answers) -More expensive in comparison to optical fiber -Used for last-mile cable runs -Higher bandwidth and maximum cable segment length in comparison to fiber-optic links -Used for network backbone cabling -Less expensive in comparison to optical fiber -Limited bandwidth and maximum cable segment length in comparison to fiber-optic links

-Used for last-mile cable runs -Less expensive in comparison to optical fiber -Limited bandwidth and maximum cable segment length in comparison to fiber-optic links

What are the characteristics of fiber-optic cabling? (Select all that apply) -High signal attenuation -Used for network backbone cabling -Immunity to electromagnetic interference -Less suitable for carrying digital information than copper cabling -Limited bandwidth and maximum cable segment length in comparison to copper cabling -Used for last-mile cable runs -Provides higher level of security than copper cabling (difficult to tap into) -More suitable for carrying digital information than copper cabling

-Used for network backbone cabling -Immunity to electromagnetic interference -Provides higher level of security than copper cabling (difficult to tap into) -More suitable for carrying digital information than copper cabling

What are the characteristic features of the RJ-45 connector? (Select 2 answers) -Used with telephone cabling -Coaxial cabling connector -Used with Ethernet network cabling -Copper cabling connector -Fiber-optic cabling connector

-Used with Ethernet network cabling -Copper cabling connector

Which of the answers listed below refer to the RJ-11 connector? (Select 2 answers) -Used with telephone cabling -Copper cabling connector -Used with Ethernet network cabling -Fiber-optic cabling connector -Coaxial cabling connector

-Used with telephone cabling -Copper cabling connector

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes? DNAT( Destination network address translation) VLSM (Variable length subnet masks) MPLS (muliprotocol label switching) VLAN(Virtual LAN)

-VLSM

A computer network connecting multiple smaller networks over very large geographical areas is known as: PAN LAN MAN WAN

-WAN

Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? -Protocol analyzer -WAP power level controls -Logical network diagram -Network mapper

-WAP power level controls

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called: MAN WLAN LAN VLAN

-WLAN

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: Penetration testing Wireless site survey Vulnerability scanning End user awareness and training

-Wireless site survey

Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) Yagi antenna Omnidirectional antenna Dish antenna Non-directional antenna Parabolic antenna Dipole antenna

-Yagi antenna

Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? FCoE(Fiber channel over Ethernet) SDN(software defined networking) Z-Wave(wireless comm protocol) SIEM(security info and event management)

-Z-Wave

Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening? -a -p -e -r

-a

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network? -a -n -b -p

-b

Which of the netstat utility parameters listed below allows to display the contents of an IP routing table? -a -p -e -r

-r

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)? -S srcaddr /all -i address eth_addr

/all

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? -a /? /all /-a

/all

T1 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

1.544 Mbps

Which of the answers listed below refers to the maximum data transfer rate of E1 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

2.048 Mbps

Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? 20 MHz 22 MHz 40 MHz 80 MHz

22 MHz

Which of the TCP ports listed below is used by Telnet? 20 21 22 23

23

The answers below have been arranged to represent the DNS hierarchy, from the highest level of the DNS tree (1), to the lowest level (5). Which of these answers are out of order? (Select all that apply) 1. Root domain (".", e.g. the optional trailing dot in "example.com.") 2. Top level domain (e.g. ".com", ".org", or ".edu") 3. Subdomain (e.g. "department" in "department.example.com") 4. Second level domain (e.g. "example.com") 5. Host or resource name (e.g. "a" in "a.department.example.com")

3. Subdomain (e.g. "department" in "department.example.com") 4. Second level domain (e.g. "example.com")

T3 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps

44.736 Mbps

Which of the following UDP ports is assigned to the Domain Name System (DNS)? 53 67 110 389

53

The IEEE 802.11g standard is backwards compatible with: 802.11n 802.11a 802.11b 802.11ac

802.11b

The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) 802.11g 802.11ac 802.11b 802.11a

802.11g 802.11b 802.11a

Which of the acronyms listed below refers to a policy of permitting employees to bring personal mobile devices and to use those devices for accessing privileged company information and applications? BSOD BYOD JBOD BYOB

BYOD

A type of historical network data kept as a reference for resolving future performance issues is referred to as: Audit log Baseline Change management documentation Template

Baseline

Which of the following answers refers to a fiber transceiver equipped with the capability to transmit and receive signals over a single fiber strand? Simplex Bidirectional Half duplex Unidirectional

Bidirectional

Which of the following terms does not fall into the category of detective physical security controls? Motion sensors CCTV Biometrics Asset tracking tags

Biometrics

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is referred to as: Replay attack Brute-force attack Dictionary attack Birthday attack

Brute-force attack

The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as: Dial-up Cable broadband Frame relay Metro-Ethernet

Cable broadband

A type of tool used for verifying correct electrical connections of wires in a cable is known as: Loopback plug Tone generator Cable tester Multimeter

Cable tester

Which tool would be used for detecting incorrect cabling pin-out assignments? Multimeter Cable tester Tone generator Fiber termination kit

Cable tester

Which of the following answers refers to a solution allowing administrators to block network access for users until they perform required action? Honeypot Quarantine network Captive portal Firewall

Captive portal

Which of the following Internet access types takes advantage of the traditional analog telephone lines? WiMAX Ethernet Mobile broadband Dial-up

Dial-up

LDAP(Lightweight directory access) is an example of: Authentication protocol Address resolution protocol Directory access protocol File exchange protocol

Directory access protocol

Which type of switch simplifies virtual network configuration by enabling an option to configure switching for the entire network from a single interface? Managed switch Distributed switch Stackable switch Aggregation switch

Distributed switch

CRC allows for collecting metrics that provide information on: Error rates Network utilization Packet drops Bandwidth/throughput

Error rates

A type of wiring closet that interconnects WAN links coming into the building with the internal network is known as Intermediate Distribution Frame (IDF). True False

False

type of coaxial connector commonly used for cable television and cable modems is called: RG-6 F-type DB-9 MT-RJ

F-type

Which of the following remote file-access protocols do not offer encryption? (Select 2 answers) FTP FTPS SCP SFTP TFTP

FTP TFTP

A network protocol that allows for secure file transfer over SSL is called: TFTP SCP SFTP FTPS

FTPS

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP(User data gram) IP TCP(Transport control) NetBIOS(Net basic I/O, port 137)

IP

Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN? WiMAX PoE ISDN HSPA+

ISDN

A type of diagnostic tool that allows to measure signal strength in fiber-optic cabling is called: Light meter Tone generator Multimeter Loopback adapter

Light meter

Which of the answers listed below refer to iptables? (Select 2 answers) Packet capturing utility MS Windows command-line tool Packet tracing utility Linux command-line tool Packet filtering utility

Linux command-line tool Packet filtering utility

A network device designed for managing the optimal distribution of workloads across multiple computing resources is referred to as: Content filter Network Attached Storage (NAS) Load balancer Domain controller

Load balancer

Which of the actions listed below can be taken by an IDS? (Select 2 answers) Firewall reconfiguration Closing down connection Logging Terminating process Sending an alert

Logging Sending an alert

Malicious code activated by a specific event is known as: Backdoor Logic bomb Rootkit Trojan horse

Logic bomb

A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called: AUP MSTSC MAU MSDS

MSDS

Which of the following answers refers to a connector type not used with copper cabling? -RJ-11/RJ-45 -BNC -MT-RJ -DB-9/DB-25 -F-type

MT-RJ

Which of the following terms is used to describe an average time required to repair a failed component or device? MTBF RPO MTTR SLA

MTTR

Disabling SSID broadcast: -Is one of the measures used in the process of securing wireless networks -Makes a WLAN harder to discover -Blocks access to a WAP -Prevents wireless clients from accessing the network

Makes a WLAN harder to discover

Which of the password policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation? Login time restrictions Password complexity setting Account lockout threshold setting Maximum password age setting

Maximum password age setting

Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password? Minimum password age setting Password complexity setting Account lockout threshold setting Login time restrictions

Minimum password age setting

Which of the tools listed below would be used for testing power supply voltage output? Torx screwdriver Toner and probe kit Loopback plug Multimeter

Multimeter

Which of the answers listed below refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers) Offline Standby Line-interactive Online Double-conversion

Offline Standby

Which type of UPS provides the best power outage protection? (Select 2 answers) Online Double-conversion Standby Line-interactive Offline

Online Double-conversion

Which network protocol enables encapsulation of PPP frames within 802.3 frames? FCoE PPPoE EAP IPsec

PPPoE

Which of the answers listed below refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems? BRI N-ISDN PRI B-ISDN

PRI

What are the characteristic features of TFTP? (Select 2 answers) -Provides no security features -Typically used for exchanging files over the Internet -A very basic form of file sharing protocol -Provides authentication and encryption -Directory access protocol

Provides no security features A very basic form of file sharing protocol

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as: Bridge Active hub Server Proxy

Proxy

Which of the following answers refers to a dedicated local network consisting of devices that provide data access? SDN NAS iSCSI SAN

SAN

Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications? LACP DSCP SIEM HIDS

SIEM

Which of the following enables VoIP calls between PBXs? VTP PSTN SIP trunk PPPoE

SIP trunk

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? L2TP(layer two tunneling) BGP(Border gateway) RSTP(Rapid spanning tree, update of STP) SIP(Session initiation)

SIP(tcp or UDP port 5060 or 5061)

An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is referred to as: SOW MSA SLA MOU

SLA

Which of the following terms refers to an agreement that specifies performance requirements for a vendor? MSA SLA MOU SOW

SLA

Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks? SMTP RDP SNMP Telnet

SMTP

Which of the following answers refers to a set of bug fixes or code enhancements available in the form of a single installable package? Hotfix Service pack Software distribution System update

Service pack

A type of diagnostic tool used for measuring the strength of a wireless signal is referred to as: Tone generator Multimeter Spectrum analyzer Network mapper

Spectrum analyzer

An email sent from unknown source disguised as the source known to the message receiver is an example of: (Select 2 answers) Spoofing Dictionary attack Trojan horse Brute forcing Social engineering Tailgating

Spoofing

An IPv4 packet header field that specifies how many more hops a packet can travel before being discarded is called: SPB TTL MTU DSCP

TTL (Time to live)

Which unencrypted remote-access method enables control over another computer on the network via command line? Telnet RDP VNC SSH

Telnet

Which of the following tools would be used for locating a cable in a cabling bundle or tracing individual wires in a cable? Spectrum analyzer Toner and probe kit Time Domain Reflectometer (TDR) Multimeter

Toner and probe kit

Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces (e.g. copper and fiber, or vice versa)? Bridge Transceiver Active hub Managed switch

Transceiver

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet. True False

True

Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or user names and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns, such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories. True False

True

Category 3 (Cat 3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring and older Ethernet (10BaseT) networks. True False

True

Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6A, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBaseT networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling hasn't seen a widespread market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6A standard which offers similar performance and takes advantage of the traditional RJ-45 connector. True False

True

Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature). Coupled with a hardware sensor mounted inside the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot. True False

True

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. True False

True

Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the main content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash. In computer forensics procedures, comparing hashes taken at different stages of evidence handling process ensures that the evidence hasn't been tampered with and retains its integrity. True False

True

In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. True False

True

In STP network topology, the term "Root guard" refers to a security mechanism designed to protect integrity of the designated main switch. True False

True

In computer networking, the term "Out-of-band management" refers to a network device management technique that enables device access through a dedicated communication channel separate from the network where a given device operates. Managing access can be established either locally by installing an out-of-band management card on the device, or remotely by establishing a dedicated connection to the device with the use of a modem or console router. True False

True

In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes. True False

True

In the patch management process, an unwanted change introduced by an update can typically be reverted via rollback feature which allows for restoring an application or system to a state prior to the update. True False

True

Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles or protocols that are in use on the network. True False

True

Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service. A Voice over Internet Protocol (VoIP) PBX, which takes advantage of existing LAN cables, can further reduce costs by removing the need for separate telephone cabling infrastructure in a building or office. True False

True

Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs by default on TCP port 22. True False

True

The 66 block (older type/primarily used in analog telephone systems) and the 110 block (newer type/used in computer networks) are examples of punch-down blocks used for connecting sets of wires. True False

True

The importance of changing default user names and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web. True False

True

The main difference between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources. True False

True

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection. True False

True

The term "VoIP endpoint" refers to a dedicated hardware device or an application program that enables Voice over Internet Protocol (VoIP) telephone calls from computing devices. True False

True

The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures. True False

True

Transmission carried out in one direction only is described as simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes. True False

True

Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. True False

True

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. True False

True

Which of the following answers refers to a dedicated device designed to manage encrypted connections established over an untrusted network, such as the Internet? VPN concentrator Proxy server Distributed switch UTM appliance

VPN concentrator

Which of the terms listed below does not fall into the category of preventive physical security controls? ID badges Biometrics Video surveillance Smart cards Key fobs Hardware locks

Video surveillance

NS SPF -MX PTR

Which of the following DNS database records maps a domain name to a list of mail servers for that domain?

Which of the following tools would be of help in determining the optimal placement of a WAP? War driving Optical power meter Network mapper Wi-Fi analyzer

Wi-Fi analyzer

Which of the tools listed below enable troubleshooting of problems related to name resolution? (Select 2 answers) ipconfig dig netstat ifconfig nslookup

dig

What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings? ifconfig netstat nslookup ipconfig

ifconfig

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings? ifconfig nslookup ipconfig netstat

ipconfig

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) ifconfig eth0 down ipconfig /release ifconfig eth0 up ipconfig /renew

ipconfig /release ipconfig /renew

A command-line utility used for checking the reachability of a remote network host is called: ping tracert dig netstat

ping

Which of the following network administration command-line utilities can be used for DNS queries? tracert nslookup ping pathping

nslookup

Which of the software tools listed below allows for obtaining a domain name to IP address mapping? netstat nslookup tracert pathping

nslookup

Which network command-line utility in MS Windows combines the features of ping and tracert? nbtstat pathping nslookup netstat

pathping

Which command-line command in MS Windows is used to display the contents of a routing table? netstat -a route print ipconfig /all print route

route print

A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as: nbtstat traceroute netstat tracert

traceroute


Conjuntos de estudio relacionados

Ch 1 Classification of Motor Skills

View Set

Physics Circuit and Circuit Elements

View Set

ch 2: linux installation and usage

View Set

Application In Information Security Chapter 4

View Set