Networking Cumulative Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

What standards are most wireless LANs based on?

- 802.11

A security administrator is studying the relationship between vulnerabilities, threats, and risks. Which of the following is a true statement regarding these categories?

- A threat is a potential for an entity to breach security

An administrator is testing the signal strength in a concrete building and measures a 12 dB loss between the office where the access point is located and the office next door. What is the cause of the decibel loss?

- Absorption

An administrator is uploading configuration files to a web server using an FTP client. The client sent a PORT command to the server that contained the connection port number. Then the server opened the connection using that port number on the client and port 20 on the server. What type of FTP connection is the administrator using?

- Active FTP

A wireless administrator is troubleshooting dead zones in a building. Although the administrator used a heat map to determine the optimum position for access points (APs), some areas that should have coverage have very low signal strength which is unusable to clients. What should the administrator check?

- Antenna placement - Antenna cable attenuation - EIRP

An organization has ten employees in the finance department that all use the accounting system for different purposes. An administrator is reviewing logs and has discovered that all of the finance employees are using the same login to access the accounting system. Which log was the administrator reviewing?

- Audit Log

Which of the following processes of an identity and access management (IAM) system proves that the user is who they say they are?

- Authentication

A security company is working with a new customer and is describing different kinds of attacks they have discovered through research. What form of threat research does this represent?

- Behavioral threat research

An administrator is evaluating the wireless coverage in a conference hall. There are enough access points to provide for 25 clients per access point, but many users are finding the wireless network to be unresponsive and timing out requests. What could be causing this issue?

- CCI - ACI - Bandwidth saturation

802.11 relies on a shared physical bus running at half-duplex. How does this standard manage contention?

- CSMA/CA

An administrator can ping a server by IP address but cannot ping the server by its name. What are some areas the administrator should check to find out why the name isn't resolving to the IP address?

- Check the local cache - Check the HOST file - Query DNS

An administrator received a Syslog alert, code 2. What level does this indicate the issue is?

- Critical

An organization has multiple subnets but is only using one DHCP server. How is this possible?

- DHCP relay - UDP forwarding

An administrator wants to ensure that nothing intercepts or modifies the communications between clients and the DNS servers. What can the administrator implement to prevent this from happening?

- DNS over TLS - DNS over HTTPS

An administrator updated an A (address) record, but it took the client computers approximately five minutes to recognize the change. What update can the administrator make on the resource record to allow changes to propagate through the network more quickly?

- Decrease the TTL

A sysadmin is looking into bandwidth management. Which kind of bandwidth management technology uses a header field to indicate a priority value for a layer 3 (IP) packet?

- DiffServ

An organization tasks a network consultant with comparing costs for the business to acquire a technology that allows data to transfer over voice-grade telephone lines. What is this technology?

- Digital Subscriber Lane

A network engineer installs a new Virtual Private Network (VPN) set up dynamically according to traffic requirements and demand. What is the type of VPN installed

- Dynamic Multipoint VPN

An administrator is configuring a wireless LAN (WLAN) extended service area. Which of the following will the administrator need to configure the same on each access point?

- ESSID - Security information

A network engineer is assigned to locate and acquire a data communications network controlled by a single organization. What is the name for this type of network?

- Enterprise WAN

An organization tasks a network consultant with comparing the costs and requirements for the various types of Carrier Ethernet. The consultant selects a carrier ethernet that uses digital subscriber line (DSL) variants such as single-pair high-speed DSL (SHDSL) and very high-speed DSL (VDSL) to overcome the usual distance limitations of copper Ethernet. What type of carrier ethernet was selected by the consultant?

- Ethernet over Copper

A Windows user is trying to remote desktop into an application server. Although the user can ping the FQDN, they are unable to establish a connection. What is most likely the cause?

- Firewall Blocking TCP 3389

Which of the following are formats for 2G cellular communications?

- GSM - CDMA

ICANN is a non-profit organization that's dedicated to keeping the Internet secure. What does ICANN manage?

- Generic TLDs - DNS

A small organization is securing their wireless network with Wi-Fi Protected Access 3 (WPA3) personal. What are some of the issues with this method of authentication?

- Group authentication - No accountability

What protocol can an administrator configure in a wireless mesh network (WMN) to allow the stations to perform path discovery and forwarding between peers?

- HWMP (Hybrid Wireless Mesh Protocol)

An administrator wants the ability to centrally configure and manage access points (APs). What are some solutions the administrator could use for this?

- Hardware - Software

A wireless administrator is receiving reports that users cannot connect to the wireless network in certain areas of the building. What can the administrator use to locate dead zones?

- Heat Map

A network architect creates a site-to-site VPN involving multiple remotes to a headquarters site by using static tunnels configured between the remote sites and the headquarters site. What is the name of this VPN configuration?

- Hub and Spoke VPN

An administrator received an alert regarding suspicious activity on the network. The system is logging the activity and the administrator must determine how to handle the situation. What kind of system most likely sent the alert?

- IDS

An organization needs to use shared mailboxes for managing customer inquiries. What mailbox access protocol should the clients utilize to retrieve the mail over secured connections?

- IMAPS

An organization that issues public keys should obtain a digital certificate. What does the digital certificate contain?

- Information on the certificate's guarantor - Information about the subject - The subject's public key

An administrator is attempting to update a zone record on a name server but is unable to edit it. Why can't the administrator edit the record?

- It is a secondary name server

An organization is using the Simple Network Management Protocol (SNMP) for remote management and monitoring of servers and network appliances and must deploy an agent to each device. Where are the statistics relating to the activity of each device kept?

- MIB (Management Base Information)

An organization deployed components so that they could use NetFlow to measure network traffic statistics. Which of the deployed components needs a high bandwidth network link and substantial storage capacity?

- NetFlow collector

A user is attempting to access a government network, but the network will not allow the user's device to connect until the user updates the operating system. What kind of defense mechanism is this?

- Network access control

An administrator is configuring wireless coverage for a public library. What type of authentication should the administrator implement?

- Open authentication

Which service maps ports and documents the mappings for new web-server connections and then substitutes the private IP address for a public IP address before sending the request to the public Internet?

- PAT - NAPT

Network users are reporting issues with videos constantly buffering. What kinds of issues should the administrator test for?

- Packet Loss - Latency - Jitter

An organization hired a security firm to hack into its systems in order to determine what type of exploitable weaknesses the organization was vulnerable to. What kind of testing is thi

- Penetration testing

An organization has identified that they must be able to continually process customer payments and pay employee salaries to keep the business running even in the event of a service disruption as mission essential functions. What kind of assessment did the organization use to make these determinations?

- Process Assessment

An administrator is configuring a new network from the ground up. Which servers would the administrator configure as bastion hosts?

- Proxy servers - Web servers

A Windows administrator needs to perform administrative tasks on servers at a different location and prefers to use a graphical user interface. What is the best tool for the administrator to use?

- RDP

An organization is using video conferencing to conduct meetings between different locations. Which of the following protocols provides information that allows the network stacks to adjust the quality of service parameters?

- RTCP

There is no mechanism for a client to choose between multiple servers. Therefore, if multiple DHCP servers are deployed—for fault tolerance, for instance—they must be configured with nonoverlapping or split scopes. DHCP for multiple subnets is usually handled by configuring _________ __________ to forward requests to a central DHCP server.

- Relay agents

An organization tasks a network engineer with purchasing an access/gateway that extends the local network access over an intermediate public network so a remote computer can join the local network. What access/gateway will the engineer acquire?

- Remote Access VPN

An administrator has plugged in a new security camera, but when accessing the camera's web management interface, the administrator encounters a self-signed certificate error. What should the administrator do?

- Replace the default certificate

A reverse DNS query returns the host name associated with a given IP address. This information is stored in a ____________ lookup zone as a __________record.

- Reverse, pointer (PTR)

An organization hires a new Marketing department head from outside the company. The new employee is surprised to learn that they cannot assign permissions to the Marketing folders to employees that work in other areas of the company. What kind of access management is the organization using?

- Role-based access

An organization is working to secure email traffic. What are some methods the organization could use to do this?

- STARTTLS - SMTPS

An administrator is investigating issues with intermittent connectivity to the wireless network. The administrator has verified that the access point configurations are correct. However, the administrator suspects that there may be other issues causing the problem. What are some areas the administrator should investigate?

- Signal Strength - Interference

An organization is using Lightweight Directory Access Protocol (LDAP) to update the directory database. The administrator insists that steps to ensure access to the directory has already been completed and is secure. What authentication methods will the administrator disable?

- Simple bind - No authentication

An administrator is configuring a firewall at the Session layer of the OSI model. What kind of firewall is the administrator implementing?

- Stateful inspection firewall

An administrator needs to perform maintenance on routers and switches and is authenticating to them over TCP port 49. What protocol is the administrator using?

- TACACS+

A server is running Microsoft SQL Server and is replicating the data to other Microsoft SQL servers on the network. The application service is using which principal port?

- TCP 1433

An administrator has blocked access to port 23 to prevent users from using an unsecure terminal emulation software and protocol. What is the administrator blocking the use of?

- Telnet

An organization is designing a new data center. What types of environmental issues should the organization implement sensors for?

- Temperate - Humidity - Flooding

The IEEE 802.11 standards use two frequency bands. Which of the following statements regarding the frequency bands are true?

- The 2.4 GHz band is ideal fo providing th longest signal range - The 5 GHz band supports a high number of individual channels

An organization purchased a new router with built-in firewall features. The administrator configured the new appliance and it worked as expected. However, after 90 days the firewall stopped working. What is the most likely cause?

- The license trial period ended

A mail administrator configured the DNS server to allow connections on TCP port 53. Why would the administrator make this kind of configuration?

- The network is using IPv6

An organization is using Dynamic Host Configuration Protocol (DHCP) to centrally manage IP addressing. All clients on the network are receiving IP address autoconfiguration except the clients on a new subnet. What is the most likely reason?

- The router doesn't support BOOTP forwarding

An administrator is configuring a DHCP server. What configurations must the administrator apply to the server?

- The server must receive a static IP address - The administrator must configure a scope

A file server on the network is receiving synchronized time so that it can communicate properly, however it cannot provide synchronized time for other devices on the network. Why is this?

- The server supports only SNTP

An administrator is monitoring the performance metrics for a server and notices that the system memory utilization is very high. What does this indicate?

- The system needs an upgrade

A security professional is working to identify all the ways a threat agent can breach security. What security concept does the threat actor represent?

- Threat

n administrator responsible for implementing network coverage in a historical monument cannot install cabling in many areas of the building. What are some ways the administrator can take advantage of wireless distribution systems (WDS) to help?

- To create an ESA - To create a bridge

Wi-Fi 6 uses complex modulation and signal encoding. Why did Wi-Fi 6 reinstate operation in the 2.4 GHz band?

- To support IoT

A server is using its host key to establish a secure channel for clients to authenticate to the secure shell (SSH) server. Which of the following methods can establish the channel?

- Username/password - Public key authentication - Kerberos

A library user connected their tablet to the library's open access point. Which of the following items will NOT secure the open connection and protect the user's communications?

- Using a screen protector

The amount of data traffic both sent and received or calculated as a percentage of the available bandwidth is known as which interface monitoring metric?

- Utilization

A company tasks a network specialist to purchase an access solution that uses internet access infrastructure and a secure tunnel to connect private communications through the internet. What is this access solution?

- VPN (Virtual Private Network)

A company tasks a network technician with installing a VPN router onto one of the company's larger machines capable of aggregating high traffic volumes. What is the name of this router?

- VPN headend

A wireless installer is networking a conference room with 9' ceilings. What is the best type of antenna for wireless devices?

- Vertical Rod

An organization is converting from landline telephones to VoIP handsets, but still needs to use fax machines in many of the offices. What can the organization use to allow the fax machines to operate on the new VoIP system?

- VoIP Gateway

A network engineer wants to establish data communications over a greater distance than a Local Area Network (LAN). What can the engineer use to gain the desired distance?

- WAN (Wide Area Network)

Which of the following remote print protocols allows secure connections to a print device and allows it to advertise service capabilities over the network, provide plug-and-play installation for Windows and iOS devices, and use bidirectional status messaging?

- Web services for Devices (WSD) / AirPrint

What tools can a Windows administrator use to troubleshoot DNS issues without installing additional software?

- nslookup - ipconfig /all

An administrator needs to access servers using a key pair. What command can the administrator use to create the key pair?

- ssh-keygen

A range of addresses and options configured for a single subnet is referred to as a _________.

-Scope

An organization is using IPv4 addresses. Which of the following records will resolve a hostname to the IP address?

A

A client is attempting to renew its lease with the DHCP server so that it can keep the same IP addressing information. How much of the lease duration has lapsed?

At Least 50%

When configuring multiple DHCP servers for redundancy, what should you take care to do?

Configure the servers with nonoverlapping address scopes

An administrator is using DHCP and wants to retain centralized management of IP addressing but needs to ensure that specific devices that supply always-on functionality have static IP address assignments. What is the best solution?

Create reservations

An administrator is configuring the TCP/IP settings in workstations and wants to use the solution with the least amount of overhead. What setting will the administrator select?

DHCP

The DHCP lease process is called the DORA process:

Discover, Offer, Request, and Acknowledge

True or False? DHCP Server Configuration DHCP is normally deployed as a service of a network operating system or through an appliance such as a switch or router. A DHCP server must be allocated a dynamic IP address and configured with a range (or pool) of IP addresses and subnet masks plus option values to allocate.

False DHCP server must be allocated a static IP address and configured with a range (or pool) of IP addresses and subnet masks plus option values to allocate.

An administrator ran a command and determined that the FQDN of a client is forbes.sales.realty.com. What is the hostname of the client?

Forbes

A client's browser has requested a web page. What protocol, at the Application layer of the OSI model, makes the request?

HTTP

What is address is used to contact a DHCPv6 server?

IPv6 does not support broadcasts, so clients use the multicast address ff:02::1:2 to discover a DHCP server.

In a stateless environment, what sort of information does DHCPv6 provides?

In a stateless environment, the host autoconfigures an address using a network prefix provided by the router (typically).DHCPv6 is then used to provide the IPv6 addresses used to access network services , such as DNS (domain name system) or addresses used to access network services, such as DNS or SIP ( ) gateways.

A user has typed www.network.com into a web browser. The domain name server cannot resolve the name, so it is querying other name servers to try to find it. What kind of lookup is the domain name server performing?

Recursive

An employee logs into their computer when they arrive at work and, regardless of what network resources they access throughout the day, they do not have to log in to anything else. What type of authentication is this?

Single Sign-on

True or False? DHCP options can be configured on a per-scope basis.

True

True or False? While the client doesn't have an IP address yet, the DHCPOFFER is usually deliveredas unicast because the server knows the client's MAC address.

True

True or False? Some hosts cannotreceive unicast without an IP address. They should set a broadcast bit in theDHCPDISCOVER packet.

True

True or False?If a client accepts a DHCPOFFER, the DHCPREQUEST packet is broadcast on the network.

True

An administrator is implementing encryption on the wireless network. What standard should the administrator implement?

WPA2


Conjuntos de estudio relacionados

Spanish 2, ¿Qué? and ¿cuál?, Lesson 9.3

View Set

para practicar su pronunciación de "r" y "rr" en español

View Set

A Beka 4th Grade History Quiz 27

View Set

Environmental Science Chapter 13

View Set

Web Design - Unit 1: The History of the Internet

View Set