Practice Exam - 2
A network technician must utilize multimode fiber to uplink a new networking device. What Ethernet standard could the technician utilize?
10GBase-SR
Which of the following is an example of a valid IPv4 address? 00:AB:FA:B1:07:34 192.168.1.254 192.168.0.256 192:168:1:55 ::1
192.164.1.254 00:AB:FA:B1:07:34- IP6 address 192.168.0.256-Link Local IP address 192:168:1:55- IPv6 ::1- means 00.00.1- partial IPv6
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this? 23 22 25 21
21- FTP is an internet protocol that allows computers within the network to exchange files in bulk. In order to work correctly, FTP must use two ports — port 21 for command and control, and port 20 for data transport. 23- Telnet-send and receive text data over the network 22- SSH- Secure Shell- cryptographic network protocol for operating network services securely over an unsecured network- eg remote command line 25- SMTP- Simple Mail Transfer Protocol- default point for mail server
What port is used to provide secure sessions over the Internet?
22
A switch technician is being tasked to centrally manage the switches and to segment the switches by broadcast domains. The corporate network is currently using VLAN1 for all of its devices and is using a single private IP address range with a 24-bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. What options would work BEST to accomplish these requirements?
801.2q is the networking standard that supports VLANs and VLAN tagging. VTP is the VLAN Trunk Protocol and carries all VLAN information to all switches in a VTP domain.
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? 802.11n 802.11a 802.11b 802.11g
802.11a- operates between 5.75 and 5.8 GHz
A network technician has been tasked to provide a local office with wireless Internet access. The network technician had determined the users will need a wireless router that provides a maximum of 54Mbps of bandwidth while operating in the 2.4Ghz band. What type of wireless network should they utilize?
802.11g provides transmission over short distances at up to 54Mbps in the 2.4GHz band. It's also backwards compatible with 802.11b.
The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. What would BEST handle the rerouting caused by the disruption of service?
A layer 3 switch is the best option because in addition to its capability of broadcast traffic reduction, it provides fault isolation and simplified security management. This is achieved through the use of IP address information to make routing decisions when managing traffic between LANs.
A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would the network administrator need to create?
A mesh topology connects every endpoint to every other endpoint, creating a fully redundant network.
Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor's support technician to properly set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician?
A network diagram is a visual representation of network architecture. It maps out the structure of a network with a variety of different symbols and line connections. This information will be important when deploying a Storage Area Network (SAN).
A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost effective manner. What devices would be MOST appropriate?
A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gigabit Layer 2 switch
A company-wide audit revealed employees are using company laptops and desktops for personal gain. As a result, the company has incorporated the phrase "Company-owned IT assets are to be used to perform authorized company business only" in what document?
Acceptable Use Policy dictates what things an employee can or cannot do on company-issued IT equipment.
An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result to what?
BGP Routing Issues BGP (Border Gateway Protocol) is used to route data between autonomous systems (AS's). A collection of networks that fall within the same administrative domain is called an autonomous system (AS). The routers within an AS use an interior gateway protocol, such as the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information among themselves.
A technician would like to track the improvement of the network infrastructure after upgrades. What should the technician implement to have an accurate comparison?
Baseline
A network technician is assisting the company with developing a new business continuity plan. What would be an appropriate suggestion to add to the plan?
Build redundant links between core devices The business continuity plan focuses on the tasks carried out by an organization to ensure that critical business functions continue to operate during and after a disaster. By keeping redundant links between core devices, critical business services can be kept running if one link is unavailable during a disaster.
What should be considered when determining the coverage for a new implementation of 802.11n WLAN?
Building Material - Some building materials are more dense than others. The denser the object, the more you will have a degradation of signal. For optimal signal, a LoS (Line of sight) of 25 feet or less is advised as well.
A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator is able to ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. What should the technician do next?
By checking the link lights on the ports, the administrator can verify if there is any activity on the network, if the ports are enabled, and if the Layer 1 components are working correctly
A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to quickly identify the switches connected to each port?
By enabling a discovery protocol on the network devices, the technician will be able to get detailed information such as the IP addresses, system version, and the type of device information from supporting devices directly connected to the discovery protocol, therefore providing information about the specific routers.
Which of the following network geographies refer to a network that spans several buildings that are within walking distance of each other, such as at a business park? WAN- Wide Area Network PAN- Personal Area Network MAN- Metropolitan Area Network CAN- Campus Area Network
CAN- A campus area network (CAN) is a network of multiple interconnected local area networks (LAN) in a limited geographical area. A CAN is smaller than a wide area network (WAN) or metropolitan area network (MAN). A CAN is also known as a corporate area network - eg College Campus
Which of the following DNS records would allow for a website to have more than one FQDN? MX TXT PTR CNAME
CNAME- A Canonical Name record (abbreviated as CNAME record) is a type of resource record in the Domain Name System (DNS) which maps one domain name (an alias) to another (the canonical name). This can prove convenient when running multiple services (like an FTP server and a web server, each running on different ports) from a single IP address. One can, for example, point ftp.example.com and www.example.com to the DNS entry for example.com, which in turn has an A record which points to the IP address. Then, if the IP address ever changes, one only has to record the change in one place within the network: in the DNS A record for example.com.
What media type would employ the DOCSIS standard in a residential Internet installation?
Cable
A user was moved from one cubicle in the office to a new one a few desks over. Now, they are reporting that their VoIP phone is randomly rebooting. When the network technician takes the VoIP phone and reconnects it in the old cubicle, it works without any issues. What is the cause of the problem?
Cable Short
Internet access for users within a company is very slow during peak usage times. Employees commonly visit the same web sites. What can improve the performance of Internet access? DNS Caching engine VPN concentrator DHCP
Caching engine
What BEST describes the process of documenting everyone who has physical access or possession of evidence?
Chain of Custody
A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution? You Answered MIMO Correct Answer Channel bonding Increase the signal Disable SSID
Channel Bonding-
A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs replacement. What would be the MOST helpful in regaining connectivity?
Configuration Backup If you have a configuration backup of the switch, a new piece of hardware (new switch) can be installed quickly and the configuration can be restored to the new switch.
A network administrator is configuring a VLAN across multiple switches. The administrator wants to configure the VLAN once and have that configuration propagate to all of the switches in the network. What should the administrator do?
Configure the switches to utilize VTP VLAN Trunking Protocol (VTP) shares VLAN information to all switches in a network.
Which wireless characteristic does channel bonding improve?
Connection Speed Channel Bonding is used to reduce redundancy or increase throughput, directly affecting the connection speed of a wireless connection. Signal strength only refers to the maximum transmitted power by an antenna.
What type of connector would an RS-232 cable use? DB-9 None of these answers are correct RJ-45 F RJ-11
DB-9 - cable allows you to connect a device with an RS-232 (DB9) serial port to a USB hub or USB-equipped PC or Mac and supports data transfer rates of more than 115 Kbps for rapid performance
A company utilizes a patching server to regularly update its PCs. After the latest round of patching, all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. What could be done to prevent this problem next time?
Disable automatic driver updates to PCs on the patching server
An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. What is the MOST likely mitigation for this reported item?
Ensure patches are deployed
A network technician discovers an issue with spanning tree on the core switch. Which step should the network technician perform NEXT when troubleshooting to resolve the issue?
Establish a theory of probable cause
Which of the following preventative measures would BEST secure a web server from being port scanned by attackers publicly? ACL implicit allow Proxy server Content filter Firewall
Firewall
What network device uses ACLs to prevent unauthorized access into company systems?
Firewalls
A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features? A. Firmware updates B. Changing to IPv6 C. Vulnerability patching D. Cloning
Firmware Update
A technician needs to add new features to existing hardware devices. What should be performed to add the new features?
Firmware updates
What is a logical host on the network where unauthorized users are placed in which they still believe they're on the production network?
Honeypot
Carl is studying for his CCNA exam. he wants to practice firewall administration in the CLI of his Linux machine. Which option below will allow Carl to adjust the default settings used by the built-in firewall? Dig ifconfig None of these answers are correct iptables
IP tables
What protocol utilizes 3DES encryption by default?
IPSec
A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. What could mitigate production outages before the enhancements are deployed to the environment?
Implement an environment to test the enhancements
A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. What is the cause of this issue?
Interference
What provides origin authenticity through source authentication, data integrity through hash functions, and confidentiality through encryption protection for IP packets?
Internet Protocol Security (IPSec) is a network protocol that encrypts and authenticates data sent over a network. All other choices offer encryption or authentication.
What device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?
Intrusion Protection Systems (IPS) can reconfigure themselves based on the threats experienced. Firewalls maintain a static configuration.
After installing some new switches on the network, a looping problem is occurring. The switch vendor suggested the use of 802.1d. What is the MOST likely reason that the vendor suggested this?
It is a version of spanning tree that uses BPDU to detect problems.
As part of unified communications services, QoS must be implemented. DSCP and CoS map to which OSI layer?
Layer 2
The networking concept of split horizon is designed to prevent which of the following?
Loops
Which item listed below would you find in a network map? System logs Firewall rules MDF/IDFs QoS standards
MDF- main distribution frame- a cable rack that interconnects and manages the telecommunications wiring between itself and any number of IDFs IDF- Intermediate Dist Frame- Physical frame which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables
A technician needs to use SNMP to manage several legacy devices. The technician wants to ask a vendor for the specification that will provide SNMP monitoring of the devices. What will allow SNMP monitoring of the devices?
MIB
A software company is meeting with a car manufacturer to finalize discussions. In the signed document, the software company will provide the latest versions of its mapping application suite for the car manufacturer's next generation of cars. In return, the car manufacturer will provide three specific vehicle analytics to the software company to enhance the software company's mapping application suite. The software company can offer its enhanced mapping application to other car manufacturer but must pay the car manufacturer a royalty. What BEST describes this document?
MOU is a memorandum of understanding. This is the most accurate description based on the choices given.
When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. What was MOST likely installed that required an MX record to function properly?
Mail server
Which of the following network topologies would be the BEST choice in providing network redundancy for an organization? A. Point to Point B. Star C. Hybrid D. Mesh
Mesh Topology
A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the Internet. Security personnel are concerned that the FTP server is compromised and is possibly being used as a platform to attack other company servers. What is the BEST way to mitigate this risk?
Move the server to the company's DMZ
What protocol uses label-switching routers and label-edge routers to forward traffic?
Multi-protocol label switching (MPLS) is a mechanism used within computer network infrastructures to speed up the time it takes a data packet to flow from one node to another. The label-based switching mechanism enables the network packets to flow on any protocol.
What communication technology is used by video conferencing systems to synchronize video streams and reduce bandwidth being sent by a central location to subscribed devices?
Multicasting
A NAC service has discovered a virus on a client laptop. What location should the NAC service put the laptop?
On the quarantine network
A home user is pairing a bluetooth gaming controller with their video game console. What type of network is implemented between the console and the controller?
PAN
A technician has punched down only the middle two pins (pins 4 and 5) on an Ethernet patch panel. The technician has cabled this port to be used with which of the following?
POTS is short for plain old telephone service. The technician was making a cable for a telephone to use, since it only requires two pins (send and receive).
What broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?
POTS is the Plain Old Telephone System, and is connected to almost every facility in the United States. DSL and dial-up services can be received over POTS.
Patches have just been released by a third-party vendor to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?
Patches should always be tested first. Once successfully tested, deployment to the production environment can then be accomplished.
A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization's internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indicating weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of:
Pen Testing
A network technician is troubleshooting a network connection error. When they ping the default gateway, they receive no reply. The default gateway is found to be functioning properly, but cannot connect to any of the workstations on the network. Which layer of the OSI model would the issue reside?
Ping requests occur at layer 3 (Network layer). Therefore, the problem could exist in layer 1 (physical), layer 2 (data link), or layer 3 (network). Since Physical (layer 1) is the only choice from layers 1-3 given, it must be the correct answer.
A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment? VLAN Layer 3 switching STP PoE
PoE- power over ethernet
Ted, the Chief Information Officer (CIO) wants to improve the security of the firm's data in transit. Which management control should be implemented to ensure employees are using encryption to transmit any sensitive information over the network? HTTPS Policies Standards VPN
Policies Policies are plans that describe the goal of an established procedure (Acceptable use, Physical Security or VPN access), while the standards are the mechanisms implemented to achieve that goal. VPN and HTTPS are examples of standards.
Johnny installed an SFTP server behind a load-balancing router. He opened port 21 but was unable to establish a connection. What port should he have opened?
Port 22
A technician is configuring a managed switch and needs to enable 802.3af. What should the technician enable?
Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards.
Andy is a network technician who is preparing to configure a company's network. He has installed a firewall to allow for an internal DMZ and an external network. No hosts on the internal network should be directly accessible by their IP address from the Internet, but they should be able to reach remote networks after receiving a proper IP address. What addressing solution would work for this network?
Private
A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. What is this an example of?
Private SaaS
Which of the following connector types is MOST commonly used for serial connections? MTRJ RS-232 RJ-45 RJ-11
RS-232 RS- 232 is a cable defines signals connecting between a DTE (data terminal equipment) such as a computer terminal, and a DCE (data circuit-terminating equipment or data communication equipment), such as a modem.
A technician is looking at an issue with a computer connecting to the network. The technician determines wire 3 of a UTP Ethernet cable run has a break in it. This computer was previously connected to the switch at 1 Gbps throughput. This PC is a kiosk and doesn't need anything faster than 55 Mbps of connection speed. What could the technician do to resolve this issue quickly?
Rewire both ends to have the wire on pin 7 remapped to pin 3. Force the duplex and speed to 100 Mbps full duplex.
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestion. What topology would the engineer implement?
Ring
Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router is capable of recognizing drives up to 4TB in size, but she cannot get her 3TB drive to show up on the network. What should Lynne do to fix this problem?
Routers can be updated by conducting a firmware flash. This is similar to upgrading or patching your computer's operating system, or even updating a device driver. By flashing the firmware, it can provide the ability to communicate with newer devices.
A network's design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. The IP is connecting the technician workstation with what type of network?
SCADA/ICS
What protocol is used to send email from one server to another server?
SMTP
A network engineer is conducting an assessment for a customer who wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference the _______________.
Site Survey
Jack receives a call at his home office from someone claiming to be from the firm's support desk. The support agent would like to use Jack's username and password to confirm that his global company account has not been compromised. What type of attack is this? Man in the middle Phishing None of these answers are correct. Social engineering Evil twin
Social Engineering
While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. What server is MOST likely offline?
The DNS Server translates Fully Qualified Domain Names (FQDN) to IP addresses.
A technician is setting up a new network and wants to create redundant paths through the network. What should be implemented to prevent performance degradation?
The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them.
What protocol must be implemented in order for two switches to share VLAN information?
The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to other switches in a group of switches (that is, a VTP domain).
A home user reports that a speed test website shows the following information: Download speed: 33.3Mbps Upload speed: 10.2Mbps You are being asked to interpret these results.
The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps
What CLI (command line interface)tool can Ariana use to determine the number of hops to a remote destination? dig A.nslookup B. tracert C. None of these answers are correct. D. netstat
Tracert- a command that's used to show several details about the path that a packet takes from the computer or device you're on to whatever destination you specify.
What allows network traffic to travel across several switches on several VLANs?
Trunking
Aisha is trying to add another managed Cisco switch to an office with multiple VLANs. What should Aisha configure on the managed switch's interface to allow multiple VLAN tagged frames to pass? Authenticating Trunking Bonding Mirroring
Trunking- trunking is a way to provide network access to many clients by sharing a set of VLAN lines or frequencies instead of providing them individually.
A technician has installed an 802.11n network and most users are able to see speeds of up to 300Mbps. There are few users who have an 802.11n network card but are unable to get speeds higher than 108Mbps. What should the technician do to fix the issue?
Upgrade the WLAN card driver
A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire. What is the best choice for their new fire suppression system?
Using a clean gas fire suppression system in datacenters is the best, since it minimizes the IT system recovery costs and prevents damage to the equipment. The clean gas extinguishes the fire faster and is more common in datacenter environments.
A user reports intermittent network connectivity from their desktop PC. A technician determines the cause to be a bad wall jack and fixes the jack. Which of the following should the technician do NEXT? Question the user Test the theory Verify functionality Document the outcome
Verify functionality- the jack has been fixed so he/she must verify that it is working
Various hypervisor guests are configured to use different VLANs in the same virtualization environment through what device?
Virtual Switches
What is the scope label that describes a connection composed of various circuits between remote locations? WLAN LAN WAN PAN
WAN- Wide Area Network
What should be implemented to allow wireless network access for clients in the lobby using a password key?
WPA2 WPA2 allows the use of a preshared key for wireless network access.
A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. What must the technician configure on the switch port of both switches to create this setup properly?
We should use trunk ports to set up a VLAN for the laptops that will be used in the auditorium. A trunk port is assigned to carry traffic for all the VLANs that are accessible by a specific switch, a process known as trunking.
Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. What should be done to fix this issue?
You can set a limit of how many virtual terminals can simultaneously connect to a switch. Here, the limit is set to one and we should increase it to solve the issue.
You are working at the service desk as a network security technician and just received the following email from an end user who believes a phishing campaign is being attempted. *********************** From: [email protected] To: [email protected] Subject: You won a free iPhone! Dear Susan, You have won a brand new iPhone! Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freephone.io:8080/winner.php) *********************** What should you do to prevent any other employees from accessing the link in the email above, while still allowing them access to any other webpages at the domain freephone.io? A. Add DENY IP ANY ANY EQ 8080 to the IPS filter B. Add http://www.freephone.io:8080/winner.php to the browser's group policy block list C. Add http://www.freephone.io:8080/winner.php to the load balancer D. Add DENY TCP http://www.freephone.io ANY EQ 8080 to the firewall ACL
Add http://www.freephone.io:8080/winner.php to the browser's group policy block list There are two ways to approach this question. First, you can consider which is the right answer (if you know it). By adding the full URL of the phishing link to the browser's group policy block list (or black hole list), the specific webpage will be blocked from being accessed by the employees while allowing the rest of the freephone.io domain to be access. Now, why not just block the entire domain? Well, maybe the rest of the domain isn't suspect but just this one page is. (For example, maybe someone is using a legitimate site like GitHub to host their phishing campaign, therefore you only want to block their portion of GitHub.) The second approach to answering this question would be to rule out the incorrect answers. If you used DENY TCP to the firewall ACL answer, you would block all access to the domain, blocking legitimate traffic as well as the possible malicious activity. If you used the DENY IP ANY ANY to filter traffic at the IPS, you would block any IP traffic to ANY website over port 8080. If you added the link to the load balancer, this would not block it either. Therefore, we are only left with the correct answer of using a group policy in this case.
A network technician has designed a network consisting of an external Internet connection, a DMZ, an internal private network, and an administrative network. From which network segment should all routers and switches be configured to accept SSH connections?
Administrative network allowing only admin access
What attack utilizes a wireless access point which has been made to look as if it belongs to the network in order to eavesdrop on the wireless traffic?
An Evil Twin is meant to mimic a legitimate hotspot provided by a nearby business, such as a coffee shop that provides free Wi-Fi access to its patrons.
You have installed and configured a new wireless router. The clients and hosts can ping each other. The WAN is a 10Gbp/s cable connection. The wired clients have fast connections, but the wireless clients are slow to ping and browse the Internet. Which of the following is MOST likely the cause of the slow speeds experienced by the wireless clients? An access point experiencing RFI from fluorescent light bulbs A high signal-to-noise ratio on the wireless network A cable connection does not support wireless A router is on the incorrect LAN
An access point experiencing RFI from fluorescent light bulbs- If interference in the wireless spectrum is occurring, more retransmissions will be needed (and thereby slowing speeds experienced). All the other answers will not cause a slow down of only the wireless network. And a high signal to noise ratio is a good thing on wireless networks.
A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. What rule should the technician verify FIRST?
An implicit deny is , which only allows certain traffic through that is specified by certain ports.
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? Analog modem Access point Multilayer switch DOCSIS modem
Analog Modem- An analog modem is a device that converts the computer's digital pulses to tones that can be carried over analog telephone lines, and vice versa. The other type of Internet connection that occurs over an RJ-11 (phone line) is DSL.
Your company has several small branch offices around the country, but you work as a network administrator at the centralized headquarters building. You need the capability of being able to remotely access any of the remote site's routers to configure the without having to fly to each location in person. Your company's CIO is worried that allowing remote access could allow an attacker to gain administrative access to the company's network devices. Which of the following is the MOST secure way to prevent this from occurring, while still allowing you to access the devices remotely? Configure the remote router's ACLs to only permit HTTP traffic Create an out-of-band management network Configure the remote router's ACLs to only permit Telnet traffic Install an out-of-band modem
Create an out-of-band management network You should create an out-of-band management network using a SSH (console) connection to the router. Telnet and HTTP are not encrypted channels and should not be used for remote connections. Using a modem is also a bad security practice, since these are subject to war dialing and provide very slow connectivity speeds.
A common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network is:
Creating an evil twin
A technician receives a report that a user's workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user's VoIP phone is routed directly under the rolling chair and has been repeatedly smashed. What is the likely cause of the problem?
Cross Talk Cross-talk and EMI occur when signals experience interference. Since the cable has been repeatedly run over, its shielding could be damaged since the cable is no longer made up of the same consistency and cross-talk could occur between the pairs.
A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near the connector. What might be the issue?
Cross-talk can occur if the twisted pairs are not twisted sufficiently. The cable should be trimmed down and reterminated to prevent this issue.