Network +
Which type of security camera would you likely see mounted on the ceiling of a bank or other secure location?
Dome
Which email protocol allows an email client to read mail stored on the mail server?
Imap4
Which availability solution is not specifically designed for high availability, but provides it by default?
Load Balancing
The most accurate time sources available by standard network connections reside at which stratum of the network time protocol?
1
Which Ethernet cable category was the first support gigabit transfer rates? -3 -5 -6 -6a -5e
5e
By default, which channel in a 2.4 GHz wireless network do not overlap? -3 -1 -11 -6 -9 -8
-1 -11 -6
If there are 6 bits available to address host systems in a network, how many hosts can you accommodate?
64
If one wireless router is using channel 6 and you want to setup an additional router using a different channel, which would be the best channel to use? -8 -4 -6 -5 -10 -11
11
IPAM is responsible for providing which type of network service? -Resolving host names to IP addresses -Synchronizing the time on network clients and servers -Assigning IP addresses to client systems -Administration and monitoring of DHCP and DNS servers -Statically configuring IP addresses
-Administration and monitoring of DHCP and DNS servers
Virus signatures are identified by anti-virus applications by using which techniques?
-Algorithms -Heuristic engines
What characteristics of a bridge distinguish it from a switch? -Bridges can connect dissimilar types of media? -Switches operate at layer 2 of the OSI model, bridges operate at layer 3 -bridges connect host systems together, switches connect network segments -Switches connect host systems together, bridges connect network segments -Bridges can connect dissimilar architectures
-Bridges can connect dissimilar types of media? -Switches connect host systems together, bridges connect network segments -Bridges can connect dissimilar architectures
Which symptoms might be indicative of an intermittent short in a network environment? -Picking up signals from a different connection -Packets arriving out of sequence -Broadcast storms -Incorrect pin assignments -Periodic connectivity loss
-Broadcast storms -Periodic connectivity loss
Documentation of an issue should include which values? -Your theory -Corrective actions -Your list of probably causes -Outcomes -Initial problem (date, reported by, scope)
-Corrective actions -Outcomes -Initial problem (date, reported by, scope)
ARP poisoning is often used as a part of what types of threats or attacks? -Rogue access points -Denial of service -Man-in-the-middle -Logic bombs -Session hijacking -Social engineering
-Denial of service -Man-in-the-middle
Which of the following types of conversions can be performed by media converters? -Electrical signals (copper wire) to light signals (fiber optic) -Physical address to logical address -Switching to Routing -Protocol X to protocol Y -Multi-mode fiber to single mode fiber
-Electrical signals (copper wire) to light signals (fiber optic) -Multi-mode fiber to single mode fiber
A load balancer can provide which networking features? -Even distribution of traffic across servers performing the same function -Extended connectivity for wireless clients -Converting analog voice signals to IP data packets -Improved performance and availability by ensuring servers do not become overwhelmed -Connecting dissimilar network architectures
-Even distribution of traffic across servers performing the same function -Improved performance a
Permissions to a file system resource can be granted to which types of objects? -Groups -Ports -Addresses -Computers -Protocols -Users
-Groups -Computers -Users
Which statement correctly describes a Native VLAN? -It is the only VLAN to receive a tag -It always receives its tag after all other VLANs -It is the only VLAN to not receive the tag -It always receives its tag before all other VLANs
-It is the only VLAN to not receive the tag
What characteristics distinguish TFTP from FTP and FTPS? -It uses UDP as its transport protocol -It is more secure -It is a simplified version of FTP -It used TDP as its transport protocol -It us more reliable
-It uses UDP as its transport protocol -It is a simplified version of FTP
"Data Pooling" refers to which public cloud risk considerations? -Infrastructure is shared by multiple tenants -Disaster recovery/backup concerns -An attack on one tenant could impact other tenants -Legal trans-boarder requirements -No common concerns or interests for security
-No common concerns or interests for security -Infrastructure is shared by multiple tenants
Rank the following wireless security configurations from least secure to most secure -Open -WPA2+TKIP/AES -WPA2+AES -WEP -WPA+TKIP
-Open -WEP -WPA+TKIP -WPA+TKIP/AES -WPA2+AES
which command line tools can be used to test and troubleshoot DNS? -Ping -Tracert -Nslookup -Ipconfig -Pathping
-Ping -Nslookup
Which objects are typically monitored using SNMP? -Printers -Files -Network Utilization -Servers -Users -Routers
-Printers -Network Utilization -Servers -Routers
The MTBF value of a device is typically derived from which factors? -Product experience/customer feedback -Performance baselines -Product testing -Warranty duration -Purchase history
-Product experience/customer feedback -Product testing
Auto-negotiation can automatically configure which settings on a network adapter?
-Speed -Flow -Duplex mode
Which statements about type 1 hypervisors are correct? -They are generally only used in smaller environments for testing and development -They can be installed directly on top of hardware -They generally perform better as they consume fewer system resources -They require an operating system to be installed -They are always open source
-They can be installed directly on top of hardware -They generally perform better as they consume fewer system resources
Which mitigation methods can be implemented to reduce the effects of network crosstalk? -Use shielded cables -Increase the signal strength -Avoid sources of power when running cables -Run cables closer together -Increase the speed of the connection
-Use shielded cables -Avoid sources of power when running cables
What are the advantages of using virtualization on a network?
-efficient use of resources -cost and energy savings -fault and threat isolation -simple backups, recovery, and replication
Rank the following obstructions(from lowest to highest) according to the amount of attenuation the can cause for wireless communications -wooden door -concrete wall -drywall -cinderblock -brick wall -glass windows
-glass windows -wooden door -drywall -cinderblock -brickwall -concrete wall
State the switch port sequencing method
1.) Blocking 2.)Listening 3.) Learning 4.) Forwarding
What is the range of addresses for the first subnet created by using the subnet mask of 255.255.255.192 in the 192.168.0.0 class C network?
192.168.0.0-192.168.0.63
Which subnetmask is required to create subnets capable of hosting 2000 hosts?
255.255.248.0
Which subnet mask would be used to supernet 2 class C networks together into a single subnet with 512 hosts?
255.255.254.0
Which subnet mask is commonly used in class A networks to make them the size of a class C network?
255.255.255.0
In today's business and computing environment import/export controls generally only apply to which tiers of country? -3 -4 -1 -2
3 4
Which port must be open for RDP traffic to cross a firewall?
3389
What is the port number for DNS?
53
What is the fundamental difference between a MAN and a WAN?
A MAN covers a small geographical area. And WAN covers a large geographical area
Describe black box penetration testing
A form of penetration testing where the tester is not given any information about the target
Which statement best describes CDMA? -A multiplexing method based on time divisions -A multiplexing method based on collision detection and avoidance -A global system for mobile phone service -A multiplexing method based on coded signals
A multiplexing method based on coded signals
The MTTF value of a device refers to which characteristic?
A point after which a device is no longer considered to be reliable
Which fiber cable connector is preferred when the least amount of return loss (reflection) is required? -APC -SC -LC -UPC -MT-RJ
APC
Which type of network can be created with as little as a wireless router and a connection to an ISP?
Ad-Hoc
How many characters are used for the passphrase when you have configured WPA/WPA2 for your wireless security?
Any value between 8 and 63
Which type of transmission would be used if an application needed to send packets to every other host on your network?
Broadcast
A flashing amber light on a network adapter might be indicative of which networking problem?
Collisions
What type of cable is depicted in the graphic? -Rollover -Multimode Fiber -Coaxial -Straight Through -Crossover
Crossover
Which type of cable should be used to make a network connection from one computer directly to another computer?
Crossover
Which term refers to the study of cryptographic systems?
Cryptanalysis
Which mobile device management techniques allows you to selectively wipe only corporate data while leaving personal data intact?
Device partitioning/containerization
A wireless signal having to move around a large object such as a hill or building is known as which type of interference?
Diffraction
Which type of cloud service connectivity method would typically allow for unlimited data transfers once implemented? -Pay as you go -Native VPN -VPN appliance -Remote Desktop -Direct Connection
Direct Connection
Which service in Windows Server 2016 authenticates remote users & computers to the windows domain & its corporate network resources?
DirectAccess
configuring radio balancing in a wireless controller refers to which feature?
Ensuring that all 802.11n clients are connected to 802.11n access points
Lightweight Directory Access Protocol (LDAP) is used for which purpose?
Establishing communication from an application to a network directory service
Marking (QoS)
Evaluates the policies, configuration, and information regarding the action to be taken when a packet is out of profile and decides what to do with the packet
Which types of wireless access points might be used by an attacker to gain access to confidential information? -Evil Twin -WLAN -Hot Spot -SSID -Rogue
Evil twin Rogue
Which type of port scanning method disguises the location of the sender?
FTP bounce
Which encryption protocol does GRE use to increase the security of transmissions?
IPsec
Which type of WAN service uses 2 dedicated phone lines to provide a bandwidth of approximately 128 kbps?
ISDN
Out-of-band management refers to which process?
Implementing redundancy to allow for continued network management in the event of failure.
Which local storage characteristics would be considered to be benefits over cloud storage? -It is more accessible and scalable -It is less expensive -It is faster -It is better protected against disaster -It offers better control of backups and access
It is better protected against disaster It is faster
Why might you choose to implement a wireless network using the 5GHz band as opposed to the 2.4 GHz Band?
It is generally less congested
TKIP (Temporal Key Integrity Protocol) had which primary benefits?
It was compatible with devices that supported WEP It offered better security than WEP
Scrambled or garbled communications when using VoIP or video conferencing applications is an indication of which type of network issue?
Jitter
Which SAN component is responsible for identifying the storage available to any given system?
LUN
Which options should typically be included in a software asset management implementation?
License overages Mobile device operating systems
What does LUN stand for?
Logical Unit Number
Which switch port protection method uses a whitelist of acceptable values to accept traffic?
MAC filtering
Which wireless authentication method involves maintaining a list of authorized addresses?
MAC filtering
Which type of service can route different protocols based on labels?
MPLS
What does MPLS stand for?
Multiprotocol Label Switching
Which routing protocol might send packets over a longer route if there is less traffic on that route?
OSPF
Which tool is used to characterize and find faults with fiber cabling?
OTDR
Port forwarding is commonly used in which types of applications?
Online gaming servers Voice over IP applications Peer to peer downloading
Which tunneling protocol is a component of the IPsec protocol suite?
OpenVPN
Which type of attack is designed to damage a system to the point of it generally needing to be replaced?
PDos
Which email protocol allows an email client to download email messages to the local computer?
POP3
Sharing a common internet connection over DSL is an example of which type of service?
PPPoE
Which termination point uses standard RJ-45 connections?
Patch Panel
A network consists of 5 computers all running windows 10 professional. All the computers are connected to a switch, which is connected to a router, which is connected to the internet. Which networking model does the network use?
Peer-to-peer
A WiFi Analyzer is typically used in which scenario?
Planning, surveying and mapping a new WiFi implementation
Which cloud computing service model gives a software developer access to multiple operating systems for testing?
Platform as a Service (PaaS) *The delivery option
What is the port number for HTTP?
Port 80 TCP
Performance concepts such as traffic shaping, Qos and diffServ are primarily concerned with providing what kind of service?
Prioritization of packets by importance
Which type of documentation outlines how a business collects, uses, shares and stores information?
Privacy Policy
Trusted Platform Modules (TPM) and up-to-date firmware can help to protect against which kind of threats?
Rootkits/bootkits
File integrity refers to which process?
Protecting a file from unauthorized changes
Implementing a rack diagram can assist in which task?
Quickly determine which equipment is necessary when purchasing
Which power management/availability solution might you implement to address isolated outages and offer multiple connectivity paths within your data center?
Redundant Circuits
Which type of WAN service would be most effective for real-time communications such as voice over IP and video conferencing?
SDSL
A man-in-the-middle attack that downgrades a secure connection to an unsecure one is known as which option?
SSL Stripping
Which security functions can be performed by a proxy server? -Shielding internal addresses from the public internet -Connecting dissimilar network architectures -Malware detection -Virus scanning -Packet examination and filtering
Shielding internal addresses from the public internet Packet examination and filtering
A new switch is connected to another switch by way of a network cable, and 3 computers are connected to the new switch. Which network topology is being used?
Star-bus
What does SAN stand for?
Storage Area Network
What is the port number for POP(SSL)?
TCP 995
What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At what layer do the protocols work?
TCP-segment UDP-datagram Transport
Which current protocol is used to create secure transmissions for HTTP browsing sessions?
TLS
Which linux based command line foot can be used to capture packets for future analysis
Tcpdump
How does a vNIC get a MAC address?
Upon creation, each vNIC is automatically assigned a MAC address
Which characteristics distinguishes a logic bomb from other types of threats?
The code remains dormant for a period of time after infection
Which advantages do 2.4 GHz transmission have over 5 GHz transmissions?
The have a wider signal coverage area They are more compatible with older devices They are better at penetrating obstacles and barriers
If a DHCP server is configured properly with a scope and the service is healthy yet still no addresses are being assigned what is the most likely cause?
The scope has not been activated yet
A remote access policy might typically define which connectivity characteristics?
The type of device you can use to connect
Most modern-day bandwidth speed testers are implemented in which manner?
Through browsers
Access control lists are used for which purposes in network communications?
To enable basic security for a network To restrict updates for routers to only specific interfaces
The "T" in 100BaseT stands for which cable characteristic?
Twisted pair cabling
Which type of address duplication conflict is most likely to happen in a network environment?
Two hosts configured with the same statically assigned IP address
Temporal Key Integrity Protocol (TKIP) was the primary encryption method in which wireless security implementation?
WPA
A documented system life cycle can be useful in which situations?
When determining budgets and allocations of resources
A hidden node normally occurs under which circumstances?
When nodes are close enough to the access point but too far away from each other
Which scenario would best warrant the implementation of a RADIUS server? -When you have a single network access server, with multiple authentication policies -When you have multiple network access servers, with multiple authentication policies -When you have multiple network access servers, with a single authentication policy -When you have a single network access server, with a single authentication policy
When you have multiple network access servers, with a single authentication policies
Which type of antenna is the most precise in terms of directional communications? -Semi-directional -Yagi_Uda -Parabolic -Omni-directional
Yagi-uda
Which 802.11 specification supports simultaneous connections of 2.4GHz and 5GHz transmissions? -n -a -b -ac -g
ac
Multiple Input Multiple Output (MIMO) is supported by which 802.11 specifications? -b -g -ac -a -n
ac n
Which 802.11 specification uses 2.4GHz transmissions and offers a speed up to 54 Mbps over a distance of approximately 150 feet? -a -ac -n -g -b
g
Targets and Initiators are components of which SAN protocol?
iSCSI
Incident response policies are generally implemented to respond to which types of incidents?
security breaches