Networking final

¡Supera tus tareas y exámenes ahora con Quizwiz!

If a server has a subnet mask of 255.255.255.224, how many bits in its IP address identify the host?

5 bits

You have been contracted to install a wireless network connection at Vice City Public School. The school management has requested you to install the latest available Wi-Fi technology for the students. Which of the following frequencies will you use to establish the connection in this scenario?

5.1 GHZ-5.8 GHZ

Calculate the total number of subnets in the network ID 192.168.1.0 255.255.255.224.

8

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?

8 bits

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11AX

The head office of Vojks Telecommunications runs on a standard WLAN network, and it has hired Jim as a network administrator to upgrade its network to faster standards. On inspection, Jim realizes that a throughput of 50 Mbps should be sufficient for the smooth functioning of the office. The only request Vojks has made to Jim is to ensure that the older computers still have wireless access during the upgrade. Analyze which of the following standards Jim should use in this scenario.

802.11G

Which SAN connection technology can run over ordinary Ethernet NICs without any special equipment needed?

Internet SCSI (ISCSI)

Which of the following connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single organization's network?

LAN

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

Which of these cellular technologies offers the fastest speeds?

LTE-A

Which of the following are also known as content switches or application switches?

Layer 4 switches

Which of these WAN services is backed by an SLA?

Leased Line

Which protocol balances traffic across multiple links?

Link Aggregation Control Protocol (LACP)

What is the first step of inventory management?

List all components on the network

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

What information does the switchport port-security command use to restrict access to a switch's interface?

MAC address

Which of the following documents defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

MSA

Which fiber connector contains two strands of fiber in each ferrule?

MT-RJ

Which type of DNS record identifies an email server?

Mail Exchanger (MX)

What is an example of an open source DBMS?

MySQL

With which network connection type does the VM obtain IP addressing information from its host?

NAT (network address translation) Mode

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which security device relies on a TAP or port mirroring?

NIDs

Which network architecture technique are you using when you run a virtual router on a network?

Network Function Virtualization (NFV)

Which network diagram shows a logical topology?

Network Map

Neon Printers has set up a full network of laptops for the purpose of running multiple printing projects simultaneously. It has contracted Theo Solutions to provide network security solutions while protecting its network from certain traffic. Analyze which of the following is best applicable in this scenario.

Network based firewall

Which of the following occurs when there is fluctuation in voltage levels caused by other devices on the network or EMI?

Noise

Kevin Mills is a network technician who has been hired by Globcom Telecommunications to fix an error related to emails and messages. The error primarily did not allow the messages sent out by the HR department to arrive intact at the receiving applications on the employees' workstations. Kevin plans to follow the OSI model for troubleshooting. Analyze the statements and suggest which layer of the OSI model Kevin should inspect to understand and resolve the issue.

One should troubleshoot the issue using the session layer.

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

Online UPS

Which of the following monitors traffic at a specific interface between a server or client and the network?

Protocol Analyzer

Which of the following technologies act as an intermediary between the external and internal networks, screening all incoming and outgoing traffic?

Proxy Server

Which two features on a switch or router are integrated into CoPP?

Qos and ACLs

Which of the following defenses addresses a weakness of IPv6?

RA guard

Which authorization method will allow Nancy, a custodian, to access the company's email application but not its accounting system?

RBAC

Which network types can your smartphone use?

Wan, Lan, and Pan

In the formula 2h - 2 = Z, what does h represent?

h equals the number of bits remaining in the host portion.

You sent a coworker a .exe file to install an app on their computer. What information should you send your coworker so they can ensure the file has not been tampered with in transit?

hash of the file

Area You, as a network analyst, are running scans on a few of your organization's computers. You suspect that few of these computers might be affected by a certain virus because there has been an unexplainable increase in some of the file sizes. You have decided to implement anti-malware software on these devices. Where will you install the software to ensure that there is no compromise on the network's performance?

host based

Which of these commands has no parameters in Windows?

hostname

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?

hypervisor

What is the first step in improving network security?

identify risks

Which of the following utilities uses ICMP echo requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes?

tracert

Which log type would most likely be used first to investigate the cause of high numbers of dropped packets?

traffic log

Which layer holds the address of the target application running on the destination computer?

transport layer

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

trunk

You are the network administrator for Jungle Technologies, and you have to create a data stream within an application that will mark a certain section of the data stream to be more urgent than the normal stream. In which of the following fields of TCP segment will you specify this information?

urgent pointer

Which of the following would an environmental monitoring system not track?

user authentication

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?

virtual switch

The ability to insert code into a database field labeled "Name" is an example of a(n) _________.

vulnerabiltity

Which backup site includes a running server that does not have access to the latest backups?

warm site

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

white/green

Which device on the network will require the greatest throughput capacity?

wireless bridge

Which of the following is the most secure password?

yellowMonthMagnificent

Which of the following IPv4 addresses is a public IP address?

64.233.177.189

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

Client-Server

Which protocol's header includes the source MAC address?

Ethernet

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?

FE::/64

In the event of a fire, the most appropriate failure policy is a _______ policy.

Fail-Open

An ARP table maps MAC addresses to what information?

IPV4 addresses

Which of these protocols does not include some kind of integrity check field in its header?

IPV6

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

IPconfig release

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

According to structured cabling standards, there must be at least one _______ on each floor.

Intermediate Distribution Frame (IDF)

Which two protocols manage neighbor discovery processes on IPv4 networks?

Internet Control Message Protocol (ICMP) and Address Resoultion Protocol (ARP)

what protocol does ping use

Internet control Message Protocol (ICMP)

What protocol must be allowed through a firewall for tracert to work correctly?

Internet control message protocol (ICMP)

While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?

Knowledge Base

Which of the following applications could be used to run a website from a server?

NGNIX

What problem will ping google.com check for that ping 8.8.8.8 will not?

Name resolution issues

At which OSI layer does IP operate?

Network Layer

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.

Nmap, command prompt, and powershell

What is one advantage offered by VDI over RDS and VNC?

Offers access to multiple OSs in VMs

You need to remote into a Linux server in another building on your network. Which of the following protocols should you use?

Secure shell (SSH)

When an Internet connection goes down, what business document defines a customer's options for paying a reduced rate?

Service Level Agreement (SLA)

Which networking device is best for connecting your network printer to three computers

Switch

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

all devices on your local network

At what OSI layer does your browser's web page request begin its journey through the OSI layers?

application layer

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

arp-a

Which transmission characteristic is never fully achieved?

bandwidth

Which two components of the CIA triad are ensured by adequate encryption methods?

confidentiality and integrity

Which tool could you use to test a twisted-pair cable's pinout?

continuity tester

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

default gateway

Which change management principle must you apply to all changes regardless of scope or impact?

document the change

What group must clients join to access network resources in a client-server network?

domain

Pin 1 on one end of a cable is orange and white striped. What color should Pin 1 be on the other end of the cable to create a crossover cable?

green and white striped

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

identify the problem

Which of the following is an advantage of P2P file sharing?

inexpensive

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

integrity

What command shows you a computer's TCP/IP configuration?

ipconfig

Which command disables a computer's connection to the network?

ipconfig/release

Which tool could you use to determine if a laptop's power cable is working properly?

multimeter

Which of the following improves overall network performance?

multiplexing

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

passive twinaxial cable

Which of these is considered a secure place to store a list of documented network passwords?

password manager

Which change is designed to close a security vulnerability without affecting other components of an application?

patch

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

patch cable

Which DNS record type is used to find an FQDN from a given IP address?

pointer (PTR)

Which DNS server offers the most current resolution to a DNS query?

primary DNS server

What is the earliest transceiver type to support four channels on a single transceiver to increase throughput?

qual small form-factor protocol (QSFP)

You're working from home and need to access a file server at the office while working in an application from your work desktop. At the same time, you often stream music in your browser. Which VPN type will be most efficient while still meeting your needs?

split tunnel VPN

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?

star topology

Which fiber connector does not support full-duplex transmissions?

straight tip (ST)

Which of the following devices are you likely to find in the MDF? Choose all that apply.

switches, KVM switch, and routers

You need to determine which device on your network is sending excessive messages to your Ubuntu Server. Which utility will give you this information?

tcpdump

When you measure the amount of data coming into your home network, what metric are you identifying?

throughput

What should you do after making a plan to solve a problem and carrying out your plan?

verify functionality

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

voice gateway

What Windows command outputs a computer's MAC address?

ipconfig / all

Which of the following is also known as telecommunications room?

Data Room

Which VLAN on a switch cannot be renamed or deleted?

Default VLAN

At what point does the ISP hand over responsibility to the customer?

Demarc

Which of the following will act as the point where the WAN ends and the LAN begins?

Demarc

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

DiffServ

You just moved into a rural office space that has telephone service but no cable. Which WAN service could you use without needing to install new wiring to your location?

Digital subscriber line (DSL)

Jeff Green has been hired as a systems analyst by an online retail company. The company is expecting a huge network traffic triggered by the Christmas sale, which will begin from the midnight of December 23. There is an urgent need to adopt a congestion control technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop congestion control technique to prevent this congestion before it occurs. Which of the following techniques should Jeff ideally choose to ensure that important traffic can survive the congestion while less sensitive frames are discarded?

Discarding policy

When repairing a coworker's computer, you find some illegal files. What should you do next?

Disconnect the computer from the network and leave it running.

Which assignment technique requires a RADIUS server?

Dynamic VLAN assignment

Which of the following statements is false?

Each Wi-Fi channel contains multiple frequency bands.

Which of the following causes physical layer failures?

ElectroMagnetic Interference (EMI)

Which IPsec encryption type encrypts the IP header?

Encapsulating security payload (ESP)

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?

Entrance Facility (EF)

Which type of identifier allows wireless clients to roam freely from AP to AP?

Extender service set identifier (ESSID)

Which of the following protocols is used to transfer files between two computers?

FTP

Which of the following cables transmits data via pulsing light?

Fiber Optic Cable

Whale Telecommunications has hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per day cannot be more than 4 minutes and 22 seconds. Which of the following will you use in this scenario?

Four 9s

Which Carrier Sense technology is used on wireless networks to reduce collisions?

(Carrier Sense Multiple Access with Collision Avoidance) (CSMA/CA)

A client has complained to you about low signal strength in his office. You want to ensure that the issue is resolved, and for that purpose, you plan to place the Wi-Fi client very close to the AP (access point). What level of RSSI (received signal strength indicator) rating will you check to fix this issue?

-30 dBm with an excellent rating

What is the Internet standard MTU?

1,500 bytes.

What is the minimum amount of ESD required to damage sensitive electronic equipment?

10 volts

You have recently been hired to complete a pending networking project where the cabling procedure providing Fast Ethernet has already been completed. On inspection, you realize that TIA/EIA-568 Category 5 twisted pair has been used for the cabling procedure. What is the maximum bandwidth that you will allot with such a pair of wires in this scenario?

100 mbps

What is the typical maximum segment length for Ethernet networks?

100 meters

The following ports were listed as open during a recent port scan. Which one is no longer used except by legacy software and should be closed?

139

The network administrator has tasked you, a network engineer, with providing him the number of IP addresses that will be available for hosts on the network when a network device has a mask of /28. Which of the following do you think will be available in such a scenario?

14

What is the frequency range for cellular communication?

1850 MHz-1990 MHz

What is the network ID of the IP address 192.168.72.149/16?

192.168.0.0

Suppose you're calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.42.128, what is the targeted subnet's broadcast address?

192.168.42.127

Which IPv6 prefix can be routed on the Internet?

2000::/3

How many bits of a class A IP address are used for host information?

24 bits

What decimal number corresponds to the binary number 11111111?

255

What is the binary number 1111 1111 in decimal?

255

John has requested Jane to set up a home router so that he and his family can access the Internet. Analyze what is the subnet mask that Jane should set.

255.255.255.0

What is the formula for determining the number of possible hosts on a network?

2h -2 =z

Which formulas can be used to calculate the magic number? Choose two.

2h and 256-interesting octet

What is the minimum number of bits that should be borrowed to create 14 subnets?

4 bits

Which cellular generation was the first to offer speeds up to 1 Gbps?

4G

Dwight is a fresher who has been hired as an assistant to the head network administrator. Which of the following 802.11 wireless standards should Dwight have an understanding of so that he can assist his senior in setting up a wireless standard that has a theoretical throughput of 600 Mbps?

802.11b

What was the first 802.11 standard to implement channel bonding?

802.11n

You are working as a network engineer, and you have to use VLAN tagging to appear in Ethernet frames, which will later be used in the switches in handling such frames. Which of the following IEEE standards will you adhere to in this scenario?

802.1Q

Which standard adapted EAP to WLANs?

802.1X

Which IEEE standard determines how VLANs work on a network?

802.1q

Tyler has plans of setting up a cellular network distribution plant for which he has contacted you to act as a service manager. Your first job as a service manager is to document the necessary frequency range under which this 800 band will be operational. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

824 MHz-896 MHz

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). He wants you to disable the STP (Spanning Tree Protocol) in the demarc port of one of the clients in order to prevent the ISP's WAN topology from mixing with the corporate network's topology. Which of the following will you use in this scenario to complete the task at hand?

A BPDU filter

As a network administrator, you have to arrange a platform where the company's developers can load any kind of software on the servers, test it from afar, and share this content with distant members of the team. Which of the following will you use in this scenario?

A CSP

Which of the following statements is true?

A Wi-Fi client connects to a range extender which connects to an AP.

Whistle Blowers, a talent management company, wants to set up a network connection for its branch office in Los Angeles. It has contracted Vince Cabling Solutions for this. The administration department of Whistle Blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology Vince Cabling Solutions should use in such a scenario.

A bus topoplogy

Robert has been working as a network analyst for IVB Solutions. The IT department has approached him to troubleshoot an error where they can successfully ping a host but are unable to connect with the same host using Telnet. Analyze what might be the problem in this scenario.

A misconfigured ACL could be the reason for this error.

Which of the following is part of a network's physical topology?

A printer plugged into a nearby desktop computer

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

AC adapter

You are a senior programmer for Mercantile Timber Ltd., and you have been tasked to develop a database that would contain all the user account information and security for the entire group of computers operating within Mercantile Timber Ltd. Can you apply any of the options provided?

AD

Which of the following is used to validate a client initially?

AS

A routing protocol's reliability and priority are rated by what measurement?

Active Directory (AD)

Which of the following techniques does not break up a large broadcast domain into smaller broadcast domains?

Adding more two layer switches to a network

Your client has multiple LAN connections for his business. He wants you to install a device so that the traffic between two networks can be efficiently managed by finding the best path for traffic to get from one network to another. Which of the following will you use in this case?

An industrial grade router

You have been hired by an ISP to extend the WAN connection to a housing society in Manhattan. Your primary job is to ensure that the fiber cable connection is appropriately connected to the LAN in the society after which a network engineer will be sent by the ISP for further proceedings. At what point does your job end in this situation?

At the demarcation point

Which log type is used to prove who did what and when?

Audit Log

Globe Communications is a well-known ISP that has hired Michelle as a network administrator. Recently, the administration department at Move Makers Ltd. sent an enquiry to Globe Communications if it could set up a connection using either a fiber cable or a wireless link that connects the main distribution frame (MDF) and the entrance facility at Move Makers' newly established Manhattan branch. Michelle has been appointed for this project. Analyze which of the following cabling methods would be an ideal option for this assignment.

Backbone cabling should be used as it will provide a vertical cross connect.

Which routing protocol runs between your network's edge router and your ISP's edge router?

Border Gateway Protocol (BGP)

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?

Border Gateway protocol (BGP)

You are working as a guest lecturer in one of the most prestigious universities of your state. In one of your classes, you want to focus solely on a category of malware that runs automatically without requiring a person to start or stop it. Which of the following categories of malware would be best suited to demonstrate such an example?

Bot

An attacker guesses an executive's password ("M@nd@lori@n") to a sensitive database after chatting for a while at a club. What kind of password attack did the hacker use?

Brute-Force attack

What specifications define the standards for cable broadband?

Data Over Cable Service Interface Specifications (DOCSIS)

Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue.

By checking if the connection has any jitter

The annual audit is being conducted in the organization where you are working as a network administrator. The internal auditor has requested you to provide him with the details of the assets that have been disposed of in this quarter. Which of the following documents will you provide him?

CEED

Which problem is most likely caused by a damaged cable?

CRC error

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, cat 6a, cat 7

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

Cat6a

What is the minimum twisted-pair category required for 10-Gigabit Ethernet at 100 meters?

Cat6a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold Site

You have been hired by Zebra Infotainment as a network administrator. Your first task on the job is to document the list of all the vendors. Under which category would you put the list of vendors while creating a network document?

Contacts

Which protocol replaced TKIP for WPA2?

Counter mode with CBC MAC protocol (CCMP)

A client of yours has complained of no Internet connection since the past 12 hours. On inspection, you notice that the carrier's endpoint device is not responding as a result of which signals are not being transmitted to the client's end. Which of the following will you purchase to solve this issue?

DCE

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

DDROS attack

Which device would allow an attacker to make network clients use an illegitimate default gateway?

DHCP Server

Which of the following will be the customer's endpoint device on a WAN?

DTE

Which of the following terms identifies the unauthorized access or use of sensitive data?

Data Breach

At what OSI layer do VLANs function?

Data Link Layer

Which OSI layer adds both a header and a trailer?

Data Link Layer

You have been appointed as the network administrator of an ISP. Your first project requires you to develop a protocol that can transmit IP and other kinds of messages through a tunnel so that you can connect two VPN endpoints. Which of the following will you choose in this scenario?

GRE

Which flow control method resends a lost frame along with all frames sent with it?

Go-back-n sliding window

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

Howard has recently installed a network connection for a workstation where he has made network connections accessible through both wired and wireless connections. Before finishing the installation, he wants to check whether the computer is making conflicting attempts to communicate with the network through both types of connections. After inspection, he realizes that the computer is indeed making conflicting attempts. Which of the following steps will help Howard in resolving the issue?

He can resolve the issue by disabling the Wi-Fi adapter or by unplugging the Ethernet cable.

What numbering system do humans use to write MAC addresses?

Hexadecimal

You, as a network analyst, are running scans on a few of your organization's computers. You suspect that few of these computers might be affected by a certain virus because there has been an unexplainable increase in some of the file sizes. You have decided to implement anti-malware software on these devices. Where will you install the software to ensure that there is no compromise on the network's performance?

Host Based

When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

The Jaypeg Group of Institutions has come up with a new department for sociology. It has hired you to complete the network setup for this department. On inspection, you get to know that you just need to extend the connection provided by an existing ISP. Where will you, as a network engineer, extend the connection to in such a case?

IDF

Which of the following manages a refrigeration system or a gas pipeline?

ISC

When you set private IP address ranges for servers in your cloud, what service model are you using?

IaaS

Your client has hired you to troubleshoot a network error. The client is complaining of an extremely limited network connection on most days and a failed network connection on certain days. Which of the following network configuration issues do you think is at play in this case?

Incorrect subnet Mask

Which one of the following wireless transmission types requires a clear LOS to function?

Infrared (IR)

Which problem would a low RSSI level indicate?

Insufficient wireless coverage

Which cloud management technique executes a series of tasks in a workflow?

Orchestration

Which part of a MAC address is unique to each manufacturer?

Organizationally Unique Identifier (OUI)

Which of the following represents a network of personal devices?

PAN

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management?

PRTG dashboard by Paessler

Jasmine has been working as the chief accountant for Basil Ltd., which sells basil leaves in Datona. Henry, who is the network administrator, has recently discovered that Jasmine is actually the same person who creates as well as authorizes the vendor account payments. Analyze if any of the following agreements has been violated in this scenario.

PUA

Which cloud service model gives software developers access to multiple platforms for testing code?

PaaS

You are hired as a network administrator to monitor the organization's network status on an ongoing basis to make changes to meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that there is a lot of delay in network communications because some of the devices used in the network are resending transmissions. Which of the following KPIs will help you in getting a better understanding of the situation?

Packet Drops

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-Peer

What port do SNMP agents listen on?

Port 161

When your computer requests a DNS lookup, which DNS server holds the most reliable information for that DNS record?

Primary DNS server

You are the network administrator of Virve Mobile Services. You as a network administrator must create user groups associated with the roles of a user as specified to you by the user's supervisor and assign privileges and permissions to each user group. Each user is assigned to a user group that matches a requirement for their job. Which of the following will you use in this scenario?

RBAC

Which fire suppression level provides the most targeted protection?

Rack Level

JK Fabrics has contracted you to set up a unit for storing the routers and various switches that are to be used in setting up the network connection. Which of the following do you think is ideally suited in this scenario?

Racks

Which authentication protocol is optimized for wireless clients?

Radius

Which cloud characteristic allows resources to be changed quickly and dynamically, even automatically in response to changing demands?

Rapid elasticity

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

Received signal strength indicators (RSSI)

Which team might ask a user for a password?

Red Team

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.

Red team and blue team exercise and pen testing

Which of the following is an application layer protocol?

Remote Desktop Protocol (RDP)

Rodriguez has been hired as a network administrator by MJF Tires to create an IPsec suite wherein a definitive set of rules are laid down for encryption, authentication, and key management of TCP/IP transmissions. After accessing the basic network traffic, Rodriguez wants to create a secure channel so that the IP packet's data payload can be authenticated through public key techniques. Analyze which of the following steps Rodriguez must complete after establishing a secure channel.

Renegotiate and reestablish the connection before the current session gets timed out

A client has contracted you to fix an error arising from an employee's workstation. You try to fix the error by doing a system upgrade. Post the upgrade, you notice that the system is not booting up. Which of the following processes will help you to revert the system to the previous version?

RollBack

Which STP bridge serves as the basis for all path calculations?

Root bridge

Joseph has been working for a client as a network engineer. He needs to access the global configuration mode to configure a Cisco router and make certain changes. Analyze which of the following commands will be set as a default prompt in this scenario.

Router (config) #

Which of the following is not a benefit of subnetting?

Routers more easily manage IP address spaces that overlap.

What do well-chosen subnets accomplish?

Routing efficiency is decreased by ensuring IP address spaces are not mathematically related.

Where is a router's hostname stored when you first change the name?

Running-Config file

As a network administrator, a client has approached you to set up the network for a bank. The bank will require sufficient amounts of data for both uploading and downloading purposes. Which of the following DSL varieties do you think is best suited for such requirements?

SDLS

Which of the following explains how to properly handle substances such as chemical solvents?

SDS

Which of the following statements is not true?

SMF supports lower bandwidths than MMF.

What command requests the next record in an SNMP log?

SNMP Get Next

You are a network manager who wants to distribute sensitive privileges and responsibilities to different persons so that no single person can singlehandedly compromise the security of data and resources. Which authorization method will you apply in this scenario?

SOD

Which of the following protocols keeps all potential paths active while managing the flow of data across the paths to prevent loops?

SPB

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

SSH

Which of the following is a form of authentication in which a client signs on one time to access multiple systems or resources?

SSO

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

Which remote file access protocol is an extension of SSH?

Secure File Transfer Protocol (SFTP)

which of the following is a secure protocol

Secure Shell (SSH)

Which two encryption protocols might be used to provide secure transmissions for email services?

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

Which remote file access protocol uses port 22

Secure file transfer protocol (SFTP)

Which of the following is considered a secure protocol?

Secure shell (SSH)

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?

Selective repeat sliding window

Mr. Yoda is a network engineer who has been working on setting up a data delivery service. While creating the TCP segment for this purpose, the network administrator has requested Mr. Yoda to set up a command requesting a synchronization of the sequence numbers between two nodes so that it can indicate to the receiving node that there is no payload attached to the data packet. Analyze which of the following statements will best fit the situation for Mr. Yoda.

Set the SYN to 1 byte in the flag segment of the TCP segment

Which WAN service offers active-active load balancing?

Software defined WAN (SD-WAN)

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

Which DNS record type is listed first in a zone file?

Start Of Security (SOA)

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

Structured Query Language (SQL)

You as a network administrator plan on using an NIDS (network-based intrusion detection system) to protect your network. You plan on doing this by capturing all the traffic that will traverse your network. Which of the following will you use in such a scenario?

TAP

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into six subnets to correspond to the organization's six different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

Three

What method does a GSM network use to separate data on a channel?

Time division multiple access (TDMA)

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top Listeners

Which type of switch connects all devices in a rack to the rest of the network?

Top Of Rack (TOR) Switch

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic Shaping

Suppose you have a small network with one router, one switch, and a few computers that are grouped into three VLANs. Which of the following statements is false?

Traffic between computers on the same VLAN must go through the router.

Which protocol's header would a layer 4 device read and process?

Transmission control protocol (TCP)

Which of these protocols could not be used to access a server in a nearby building?

Transport Layer Security (TLS)

Which of the following is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage?

UPS

Which power device prevents a critical server from losing power, even for an instant?

UPS

Lifecare Insurance has plans to upgrade its enterprise grade network for better performance and to protect the network from problems whenever one or more network devices fail because of higher volumes of traffic. Rose is hired as a network administrator to oversee the change and to ensure that every device can function at its best without being swamped with too many kinds of tasks. After having a close look at the process, Rose is of the opinion that some of the devices are overburdened by heavy traffic, as a result of which they are unable to perform at full capacity. Analyze which step Rose should take to fix the issue at hand.

Use a load balancer to fix the issue.

Which of the following KPIs (key performance indicators) refers to the actual throughput used as a percentage of available bandwidth?

Utilization

Which of the following uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation?

VNC

Mojaro Bank at Datona has contacted Vincent, a network provider, to provide Mojaro with a network connection that will enable it to securely conduct financial transactions with the other branches situated across various states in the United States as well as with the International Monetary Fund. Analyze which of the following connections would be best suited in this scenario.

WAN

Which network type supports long-haul connections between ISPs?

WAN

You are the proprietor of an export business. Currently, the wireless network in your office is using the WEP (Wired Equivalent Privacy) standard. It offers two forms of authentication: OSA (Open System Authentication) and SKA (Shared Key Authentication). However, neither of them is secure. Your requirement is of an authorization service that provides a central authentication point for wireless, mobile, and remote users. Which of the following will you use in such a scenario?

WPA-Enterprise or WPA2-Enterprise

Which Wi-Fi encryption standard was designed to use AES encryption?

WPA2

Which of the following security threats requires a PIN (personal identification number) to access an AP's settings or to associate a new device with a network?

WPS attacking

Which of the following statements is true? Choose two.

When sending an email, the transmission is sensitive to loss and tolerant of delays and When streaming a movie, the transmission is sensitive to delays and tolerant of loss

cloud backup

Which of the following backups is managed by third-party vendors?

RAID

Which of the following terms would you use when a server uses a hard disk as a backup in case a hard drive fails?

While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server?

WireShark

What type of diagram shows a graphical representation of a network's wired infrastructure?

Wiring diagram

Which of the following wireless technologies does not use the 2.4 GHz band?

Z-Wave

Which ACL rule will prevent pings from a host at 192.168.2.100?

access-list acl_2 deny icmp host 192.168.2.100 any

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit https any any

Which access control technique is responsible for detection of an intruder who succeeds in accessing a network?

accounting

Which of the following is not one of the AAA services provided by RADIUS and TACACS+?

administration

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?

app data

Which firewall type can protect a home network from adult content not suitable for the family's children?

application layer firewall

In which of the following forms of attack can security flaws allow unauthorized users to gain access to the system?

back doors

Which physical security device works through wireless transmission?

badge reader

Which virtual network connection type assigns a VM its IP address from the physical network?

bridged

Which cloud characteristic ensures you can manage cloud resources from an iPad?

broad network access

Which wired WAN service offers speeds most comparable to the highest satellite Internet speeds in a similar price range?

cable broadband

Which of the following commands is used to pair the class map to the policy map in CoPP (control plane policing)?

class

As a network administrator, Michelle has been contracted to set up the entire network for Billmain Publications. The entire network is running through three different LANs. However, after connecting the network, Michelle notices that the connection received from the ISP is not transmitted to the workstations connected through the LANs. Analyze which of the following routers Michelle should examine to fix the error.

core routers

What type of attack relies on spoofing?

deauth attack

You're playing a game on your Xbox when you suddenly get bumped off your Wi-Fi network. You reconnect and start playing, then get bumped off again. What type of attack is most likely the cause?

deauth attack

A workstation issues a print command to a network printer that is associated with a different LAN than the workstation but is placed within the same organization. The transmission will be covered via router as the IP address of the printer is on a different LAN. Analyze which of the following routes the router will take to deliver this message as there are no matching entries detected in the routing table.

default route

Probiotic is a company that sells packaged milk through online portals. Recently, the company received a generous funding with which it plans on establishing a separate floor for the Finance department within the building. The network administrator requests you to submit a network document after subdividing the smaller network for Finance into a separate network segment so that the transmissions in broadcast domains are limited to each network and there is less possibility of hackers or malware reaching remote, protected networks in the enterprise domain. Identify under which of the following groupings will you place this network segment in this scenario?

department boundaries

Which type of switch is best used for connections to web servers?

edge switch

Which function of WPA/WPA2 security ensures data cannot be read in transit?

encryption

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

evil twin

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

fiber type mismatch

Which bandwidth management technique limits traffic specifically between a single sender and a single receiver?

flow control

When a router can't determine a path to a message's destination, where does it send the message?

gateway of last resort

You have been working as a network security expert for Grem Associates. Grem allows its clients to view their securities investments online. You have recently received an anonymous email that points out a possible data breach and the necessary steps that are required to fix this issue. Who among the following do you think is behind this?

gray hat hacker

In which of the following cloud models is service provided over public transmission lines?

public cloud

In which life cycle phase is an old device removed from the network?

implementation

Which policy ensures messages are discarded when they don't match a specific firewall rule?

implicit deny

Which SDN plane moves traffic from switch port to switch port?

infrastructure plane

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

insider threat

A client has complained of losing Internet connectivity. You as a network engineer troubleshoot the error, and you find that the source of the error is the computer's wired connection. You decide to solve the issue by replacing the wired connection with a wireless one. What kind of an issue are you resolving in this scenario?

interface errors

What is the combination of a public key and a private key known as?

key pair

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

layer 3

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

layer 3

At what layer of the OSI model do proxy servers operate?

layer 7

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?

load balancer

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

logic bomb

As a network administrator at Mineball Gaming Corporation, you want to change the default VLAN to a different type as there are security threats involved with them. Which of the following types will you not apply in this scenario as it will almost serve the same purpose as a default VLAN?

management VLAN

Which is longer for a reliable device?

mean time between failures (MTBF)

In order to ensure better security measures for the computers used in your organization, you, as a network administrator, have decided to configure the software to remove corporate data from all devices while leaving personal data untouched. Which of the following software will you use in this scenario?

meraki systems manger

Which of the following is not defined by syslog?

message security

What kind of software can be used to secure employee-owned devices?

mobile device management (MDM)

Which OSI layer is responsible for directing data from one LAN to another

network layer

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

non-disclosure agreement (NDA)

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

phishing

Which of the following social engineering attack types most likely requires that the attacker have existing knowledge about the victim?

phising

You, as a network administrator, want to open up a port that will allow you to send data using the file transfer protocol. However, the files you wish to transfer are boot files. Which of the following ports will you open up to carry out this operation?

port 69

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

posture assessment

Which assessment type would most likely discover a security risk related to employee onboarding?

process assessment

Which device can be used to increase network performance by caching websites?

proxy server

As a network engineer, you have installed a wireless connection in a newly constructed office floor for Black & White Communications. The CEO's office files a complaint about slow data transmission with the IT department. The IT department gets in touch with you to fix this error. On inspection, you realize that the problem is primarily because of large obstacles like walls and ceilings because of which the wave bounces back to its source. What of the following phenomena will you state as a cause of this error while reporting to the IT department?

reflection

Which off-boarding policy can protect proprietary corporate information if a smartphone is lost?

remote wipe

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?

rogue AP

Which command will output your Windows computer's routing table?

route print

Which routing protocol is limited to 15 hops?

routing information protocol (RIPv2)

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

separation of duties

Which of the following fields in a TCP segment identifies the data segment's position in the stream of data segments being sent?

sequence number

You are working as a network engineer at Shell Info. The organization uses Cisco's IOS on all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario?

show IP route

What information in a transmitted message might an IDS use to identify network threats?

signature

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

smart locker

What kind of device can monitor a connection at the demarc but cannot interpret data?

smartjack

Which device will let you determine all frequencies within a scanned range that are present in a specific environment, not just Wi-Fi?

spectrum analyzer

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

tone locator

You are working as a network engineer for Maywire Cables. The network administrator informs you to install a firewall that will manage each packet as a fresh connection irrespective of any connections that might be active at that moment. Which of the following will you choose?

stateless firewall

JV Steels has established its manufacturing plant in Alabama. Reports of a huge thunderstorm have surfaced in the media. As a network analyst at JV Steels, what kind of a power flaw should you be prepared for?

surge

Which of the following would be assigned an OID?

switches interface

You have been tasked with ensuring that the switches used in your organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you plan on enabling a MAC filtering function that will protect the Arista devices against MAC flooding. Which of the following commands will you use to bring your plan to action?

switchport port-security

You want to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

switchport trunk native vlan

Which of the following identifies physical penetration, temperature extremes, input voltage variations, input frequency variations, or certain kinds of radiation?

tamper detection

You have been hired as a security professional for a firm, and you would like to analyze the traffic that crosses the computer's network interface. Which of the following command-line interfaces will help you in achieving this?

tcpdump

You have been called to troubleshoot a problem, and you have successfully managed to establish a theory of probable cause. You have managed to reach this layer after considering multiple approaches through the OSI model. Which recommended step should you perform next if you follow the OSI model of troubleshooting?

test your theory to determine the cause

Which of the following layers will be used by an SDN controller to communicate with network applications using APIs (application programming interfaces)?

the application plane

Who is responsible for the security of hardware on which a public cloud runs?

the cloud provider

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

the fourth one

What does a client present to a network server to access a resource on that server?

ticket


Conjuntos de estudio relacionados

Chapter 37: Caring for Clients with Central and Peripheral Nervous System Disorders

View Set

EBIO Midterm #2 Practice Questions & Clickers

View Set

Nervous System Study Guide Plus Vocab and notes

View Set

SY0-401: Glossary, GSEC, SEC + 401 Study Guide COMBINED

View Set

Kin 236 Exam #2 Learning Objectives and Study Guide

View Set

PNC 1- Exam 3: Collaboration, Leadership, and Health Promotion

View Set