Udemy Network + 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following technologies is not commonly used by a captive portal to perform user redirection?

DHCP redirect

After an employee connected one of the switchports on a SOHO router to the wall jack in their office, other employees in the building started to receive "duplicate IP address" errors and experiencing intermittent network connectivity. You check the configuration on one of the affected clients and see it has been assigned an IP address of 192.168.1.54. Which of the following could be enabled on the company's network to prevent this from occurring?

DHCP snooping

Johnny is trying to download a file from a remote FTP server but keeps receiving an error that a connection cannot be opened. Which of the following should you do FIRST to resolve the problem?

Ensure that port 20 is open

Which of the following policies or plans would describe the process for a new user to request an account on the enterprise network?

Onboarding policy

You are working as a cybersecurity analyst intern at Dion Training. You have been asked to create a file that contains any data transmitted as part of a malware beacon from a client in a sandboxed wireless network. Which of the following tools should you utilize to create this file?

Packet Capture tool is used to collect data packets being transmitted on a network and save them to a packet capture file (pcap) for later analysis. Packet capture tools are useful when attempting to capture traffic for malware analysis as a cybersecurity analyst.

Which of the following would NOT be useful in defending against a zero-day threat?

Patching

A network technician is asked to redesign an Ethernet network before some new monitoring software is added to each network's workstation. The new software will broadcast statistics from each host to a monitoring server for each of the company's five departments. The added network traffic is a concern of management that must be addressed. How should the technician design the new network?

Place each department in a separate VLAM to increase broadcast domains

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?

Radius

You are working as a wireless networking technician and running a wireless controller to aid in network administration. Your supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users?

Radius Server

You are working as part of the server team for an online retail store. Due to the upcoming holidays, your boss is worried that the current servers may not be able to handle the increased demand during a big sale. Which of the following cloud computing concepts can quickly allow services to scale upward during busy periods and scale down during slower periods based on the changing user demand?

Rapid Elasticity

Which of the following network devices would be used to receive a signal on one port and then retransmit the same signal out another port to extend the distance covered by a network?

Repeater

A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which describes what the network administrator should do next?

Return the system back to the original state before the change

Susan wants to be able to use her iPad on the corporate network, but there is no wireless network available in her office. She decides to buy a wireless router at the local store and plug it into the network wall jack in her office. Within a few hours, her coworkers begin to complain that they are getting "duplicate IP address errors" on their Windows 10 workstations. Which of the following types of attacks did Susan inadvertently perform?

Rogue DHCP

Which of the following errors would be received if an ethernet frame less than 64 bytes is received by a switch?

Runt is an ethernet frame that is less than 64 bytes in size.

A small office has an Internet connection that drops out at least two times per week. It often takes until the next day for the service provider to come out and fix the issue. What should you create with the service provider to reduce this downtime in the future?

SLA

Which of the following network protocols is used to send email from one server to another server?

SMTP

Dion Training wants to create a DNS record to specify a host and port to use for a new instant messaging service. Which type of DNS record should be created?

SRV

What benefit does network segmentation provide?

Security through isolation

Which type of personnel control is being implemented if Kirsten must receive and inventory any items that her coworker, Bob, orders?

Separation of duties

When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge. This resulted in the copper conductors on several of the wire strands being exposed. If these exposed conductors come into contact with each other, they can form an electrical connection. Which of the following conditions would result in this scenario?

Short

You just started work as a network technician at Dion Training. You have been asked to determine if Ethernet0/0 is currently connected using OSPF or EIGRP on one of the network devices. Which of the following commands should you enter within the command line interface?

Show route

Sahra connects a pair of switches using redundant links. When she checks the link status of the two ports, one of them is not active. She changes the inactive link to another switchport, but the second link still remains inactive. What MOST likely is causing the second link to become disabled?

Spanning Tree

A technician installs a new WAP, and users in the area begin to report poor performance. The technician uses ping, and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?

Spectrum analyzer tool

What is the first flag used in the establishment of a TCP connection or during the initiation of a three-way handshake between two hosts?

Syn

Dion Training is configuring a new branch office in Florida and wants to assign it a portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. The new branch office in Florida will require 23 devices that will need IP addresses assigned. What is the correct CIDR notation for the new subnet in order to accommodate the 23 devices while allocating the minimum number of addresses?

/27

Which of the following ethernet standards is used with a single-mode fiber optic cable?

10GBase-LR

What port number does IMAP utilize?

143

What is the broadcast address associated with the host located at 189.76.60.164/26?

189.76.60.191

A small real estate office has about 15 workstations and would like to use DHCP to assign classful IP addresses to each workstation. The subnet only has one octet for the host portion of each device. Which of the following IP addresses could be assigned as the default gateway?

192.168.0.1

Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up an on-path attack against Mary's computer by redirecting any layer 2 traffic destined for the gateway to his computer first. Rick is careful only to affect the traffic associated with Mary's computer and not the entire network. Which type of on-path attack is Rick conducting against Mary?

ARP Poisoning

Workers in a company branch office must visit an initial web page and click the "I agree" button before being able to surf the web. Which of the following is this an example of?

AUP

A company-wide audit revealed employees are using company laptops and desktops for personal use. To prevent this from occurring, in which document should the company incorporate the phrase "Company-owned IT assets are to be used to perform authorized company business only"?

AUP. Acceptable Use Policy dictates what types of actions an employee can or cannot do with company-issued IT equipment.

Which of the following types of telecommunication links is used to provide high-speed internet service over a system of coaxial or HFC cables?

Cable

Jason is flying home from a conference and attempts to connect to the airplane's onboard wireless network to check his email. He selects the InflightWiFi from the list of network names, his web browser opens, and then a 404 "page not found" error is displayed. Which of the following issues is likely the source of this error?

Captive portal issue

Dion Training has just moved into a new office building and the previous owners never documented which port on the patch panel was connected to the network jacks located in each office. You have been hired to create a wiring diagram to document where all of the cables are connected. Which of the following tools should you use to perform this task?

Tone Generator

You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?

Traceroute

A small law office has a network with three switches (8 ports), one hub (4 ports), and one router (2 ports). Switch 1 (switch port 8) is connected to an interface port (FastEthernet0/0) on the router. Switch 2 (switch port 8) and switch 3 (switch port 8) are connected to Switch 1 (switch ports 1 and 2). The hub has three computers plugged into it on ports 1, 2, and 3. The fourth port on the hub is connected to the router's other interface port (FastEthernet0/1). Based on the configuration described here, how many broadcast domains are there within this network?

2

A small law office has a network with three switches (8 ports), one hub (4 ports), and one router (2 ports). Switch 1 (switch port 8) is connected to an interface port (FastEthernet0/0) on the router. Switch 2 (switch port 8) and switch 3 (switch port 8) are connected to Switch 1 (switch ports 1 and 2). The hub has three computers plugged into it on ports 1, 2, and 3. The fourth port on the hub is connected to the router's other interface port (FastEthernet0/1). Based on the configuration described here, how many collision domains are there within this network?

4

What port number does HTTPS utilize?

443 is an application layer protocol for distributed, collaborative, hypermedia information systems using either SSL or TLS encrypted data transfer.

What ports do HTTPS and RDP utilize?

443, 3389

Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?

4g

Which of the following ports should be allowed to enable access to certain VoIP applications?

5060

Which of the following wireless technologies use MU-MIMO on non-overlapping channels to increase the wireless network's bandwidth?

802.11ac

Your boss has asked you to select the technology for a new wireless network for the office. She stated that the new network must allow users to connect their laptops, smartphones, and tablets wirelessly. The technology selected should utilize the longest range possible without signal loss. Which of the following wireless technologies should be selected to meet these requirements?

802.11ac

Which of the following wireless technologies use MIMO on non-overlapping channels to increase the wireless network's bandwidth?

802.11n introduced MIMO support on non-overlapping channels to increase the bandwidth available for the wireless network.

Which of the following IEEE specifications describes the use of the link aggregation control protocol (LACP)?

802.3ad provides guidance on the practice of link aggregation for data connections.

You are installing a Small Office/Home Office (SOHO) network consisting of a router with 2 ports, a switch with 8 ports, and a hub with 4 ports. The router has one port connected to a cable modem and one port connected to switch port #1. The other 6 ports on the switch each have a desktop computer connected to them. The hub's first port is connected to switch port #2. Based on the description provided, how many collision domains exist in this network?

9

What port number does POP3 over SSL utilize?

995

A firewall technician at Dion Training configures a firewall to allow HTTP traffic as follows: Dion Training is afraid that an attacker might try to send other types of network traffic over port 80 to bypass their security policies. Which of the following should they implement to prevent unauthorized traffic from entering through the firewall?

Application-aware firewall

A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?

Application-aware firewall

What is the term for exploiting a weakness in a user's wireless headset to compromise their smartphone?

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, or laptop computers, sending a vCard which typically contains a message in the name field to another Bluetooth-enabled device via the OBEX protocol.

Which of the following BEST describes how a DHCP reservation works?

By matching a MAC address to an IP address with the DHCP scope

(see diagram)Dion Training's network is using OSPF for the internal routing protocol. One of the interfaces connected to the internet is congested. The data is going out to the internet slowly, but is frequently queued by the router prior to sending due to the congestion and lower than normal speeds. You entered the "show interface" command and received the following output: Which of the following actions would best resolve this issue?

Change the duplex setting from half to full

You are troubleshooting an older wireless network that is running Wireless G (802.11g). This network appears to have a lot of collisions and interference. You look up the configuration on two of the three access points in the areas and see they are using Channel 1 and Channel 11. To prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?

Channel 6

Which of the following is likely to occur if twenty ethernet clients are connected to a hub in a local area network?

Collisions

An employee at Dion Training reports that half of the marketing department is currently unable to access any network resources. A network technician determines that the switch has failed and needs replacement. Which of the following is required so that the technician can replace the switch and regain connectivity quickly?

Configuration backup

Which communication technology would MOST likely be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths?

DWDM

You are using an 802.11ac wireless network at your office which uses WPA2-PSK for encryption. Every few minutes, your wireless connection appears to disconnect and then quickly reconnect to the network. What type of attack might you be the victim of?

Deauthentication

A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to identify the switches connected to each port quickly?

Enable a discovery protocol on the network devices

(see diagram)An administrator's router with multiple interfaces uses OSPF as its routing protocol. You have discovered that one of the router's interfaces is not passing traffic. You enter the "show interface eth 0/0" command at the CLI and receive the following output: Which TWO of the following actions should you perform to allow the interface to pass traffic again?

Enable the switchport for eth 0/0 & Verify the cable is connected to eth 0/0.

What network device uses ACLs to prevent unauthorized access into company systems?

Firewall

A technician needs to add new features to an existing router on the network. Which of the following should be performed to add the new features?

Firmware update

A malicious user is blocking cellular devices from connecting to the Internet whenever they enter the coffee shop. If they get their coffee to go and walk at least a block away from the coffee shop, their smartphones will connect to the Internet again. What type of network attack is the malicious user performing?

Frequency Jamming

Which of the following is used to provide emergency electrical power during a long duration outage until the local power grid can be restored?

Generator

Which of the following is designed to keep the system's uptime running in the event of a disaster?

High availability

You are trying to select the best device to install to detect an outside attacker trying to reach into your internal network. The device should log the event, but it should not take any action to stop it. Which of the following devices would be the BEST for you to select?

IDS (Intrusion Detection System) is a device or software application that monitors a network or system for malicious activity or policy violation. Any malicious activity or violation is typically reported to an administrator or collected centrally using a security information and event management system.

An analyst reviews the logs from the network and notices that there have been multiple attempts from the open wireless network to access the networked HVAC control system. The open wireless network must remain openly available so that visitors can access the internet. How can this type of attack be prevented from occurring in the future?

Implement a VLAN to separate the HVAC control system from the open wireless network

Students at Dion Training are working on a networking lab that requires a single switch to be remotely accessed by many students simultaneously. The instructor verifies that the switch can be accessed using the console, but the switch is only letting one student log in to the device at a time. Which of the following configurations should the instructor implement to fix this issue?

Increase the number of virtual terminals available

Which of the following layers within software-defined networking consists of the physical networking devices, such as switches and routers?

Infrastructure Layer contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements.

Mallory is unhappy with her job at a large beverage company. She decides to steal sensitive information about the company's proprietary formula for a new energy drink. She installs a keylogger onto some of the product team's workstations, which then emails out the information to her personal email account each evening so that she can post the information to WikiLeaks. How would you best classify Mallory and her actions?

Insider threat

An organization wants to choose an authentication protocol that can be used over an insecure network without implementing additional encryption services. Which of the following protocols should they choose?

Kerberos

According to the OSI model, at which of the following layers is data encapsulated into bits?

Layer 1

Which of the following types of network documentation would be used to illustrate the data flow across the network and include the IP addresses and subnets used by the different network devices?

Logical Network Diagram

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?

MIB. Management Information Base is used for managing all entities on a network using Simple Network Management Protocol. It would allow the tool to interpret the information received correctly.

Which of the following types of agreements is a non-legally binding document used to detail what common actions each party intends to perform?

MOU (memorandum of understanding) is a non-binding agreement between 2 or more organization to detail what common action they intend to take

A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network. The FTP server must be accessible from the Internet. The security team is concerned that the FTP server could be compromised and used to attack the domain controller hosted within the company's internal network. What is the BEST way to mitigate this risk?

Migrate the FTP server from the internal network to a screened subet

What tool would a network technician use to troubleshoot a span of single-mode fiber cable?

OTDR (optical time-domain reflectometer) is an optoelectronic instrument used to characterize an optical fiber. An OTDR is the optical equivalent of an electronic time-domain reflectometer.

Dion's Burgers and Fries is a fast-food restaurant that recently installed a new network-connected electronic signboard to display their menu items to customers. The signboard came preconfigured with a public IP address so that the central office can remotely connect to it and update the menu items and prices displayed. The installer unboxed the new device, hung it on the wall, plugged it into the network, and the menu appeared. The next day, the manager sees that the menu items have all been changed to include vulgar names and prices like $6.66. It appears the signboard has been digitally vandalized by an attacker. What is the MOST likely reason the attackers were able to access and modify the signboard's display?

The default credentials were never changed during it installation

You are scanning a target as part of a penetration test. You discovered that the network uses Snort configured as a network-based IDS. Which of the following occurs when an alert rule has been matched in Snort during your scan?

The entire packet will be evaluated until all the IDS alert rules have been checked and the packet is allowed to continue its journey

A technician installs three new switches to a company's infrastructure. The network technician notices that all the switchport lights at the front of each switch flash rapidly when powered on and connected. After about a minute, the switches return to normal operation. Additionally, there are rapidly flashing amber lights on the switches when they started up the next day. What is happening to the switches?

The switches are running through their spanning tree process

Which of the following is used to provide emergency electrical power during a short outage or until a long-term solution can begin operations?

UPS

When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network?

Virtual NIC is a type of virtual adapter that can be configured on logical partitions to provide a network interface. This virtual NIC can be paired and mapped to a physical NIC to get the VM onto the network.

Which type of network geography is used to connect various circuits between remote locations?

WAN

Which of the following tools is used to identify why an 802.11g network is intermittently dropping network traffic?

Wifi analyzer

You just arrived at school today, pulled your laptop out of your backpack, and tried to connect your laptop to the Wi-Fi network. It worked fine yesterday, but today it won't connect automatically or display any available networks. You haven't done anything to the laptop since you left class yesterday. You ask your classmates if they can connect to the Wi-Fi, and every one of them is connected without any issues. What should you check FIRST in your attempt to connect your laptop to the Wi-Fi?

Wireless switch on your laptop

Which of the following types of network documentation would include labels to indicate which cables are connected to which switchports on an edge switch?

Wiring Diagram

You are configuring a new machine with a hypervisor and several operating systems hosted within it to develop some new applications. You want to ensure that the hypervisor's various virtual machines can communicate with each other over a network, but you don't want this network traffic to leave the hypervisor itself. What is the BEST solution to meet these requirements?

install and configure a virtual switch

Which of the following tools would allow you to detect running services, applications, or operating systems on the network's clients, servers, or devices by sending specifically crafted packets to them and analyzing their responses?

nmap

Which of the following type of sites might contain a datacenter with equipment, but it is not configured and doesn't contain any user or customer data yet?

warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes down. A warm site features an equipped data center but no customer data.

What is the correct color scheme for Pin 1 to Pin 8 for a T-568A connector?

white/green, green, orange/white, blue, white/blue, orange, white/brown


Conjuntos de estudio relacionados

Health 1-Chapter 12: Weight Managment

View Set

21 CFR 12 - Investigational New Drug Application

View Set

Hematologic System Disorders and Drugs

View Set

Lippincotts Illustrated Q&A Anatomy & Embryology MD2

View Set

Real Estate Finance: Chapter 4 Noninstitutional Lenders

View Set

Chp 19: Documenting and Reporting (PrepU)

View Set

International bissiness quiz 2, ch 3-5

View Set