Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the correct CIDR notation for the Marketing department's subnet which requires 11 devices?

/28 The smallest subnet that can fit 13 IPs is a /28 (16 IPs).

Which of the following is an example of a valid IPv4 address? 192:168:1:55 192.168.1.254 00:AB:FA:B1:07:34 ::1

192.168.1.254

What ports do FTP and SFTP utilize? 20, 21 21, 22 22, 23 21, 23

21, 22

Which of the following ports are used to provide secure remote connection sessions over the Internet? 22 25 80 23

22

A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall? 21 22 25 161

22 SFTP

The server administrators have asked you to open the default port on the firewall for their new DNS server. Which of the following ports should you set as ALLOW in the ACL? 53 67 110 3389

53

Which of the following wireless technologies use MIMO on non-overlapping channels to increase the wireless network's bandwidth? 802.11a 802.11b 802.11g 802.11n

802.11n introduced MIMO support on non-overlapping channels to increase the bandwidth available for the wireless network.

A new network administrator is hired to replace a consultant who ran the network for several months and whose contract was just canceled. After a month of working on the network, the new network administrator realized some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem? TACAS+/RADIUS misconfiguration is causing logs to be erased ICMP ping of death is resetting DHCP and DNS on the serrver A backdoor has been installed to access the network The last ACL on the router is set to Deny All

A backdoor has been installed to access the network

A network administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. Which type of firewall should the administrator install? A host-based firewall A stateful network-based firewall A host-based stateful firewall A stateless network-based firewal

A stateful firewall enhances security through packet filtering

A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause of this issue? An evil twin has been implemented A successful WPS attack has occured The user is experiencing ARP poisoning The user is connected to a botnet

A successful WPS attack has occurred

Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up a man-in-the-middle attack against Mary's computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful only to affect the traffic associated with Mary's computer and not the entire network. Which type of man-in-the-middle attack is Rick conducting against Mary? IP spoofing MAC spoofing ARP cache poisoning Evil twin

ARP cache poisoning

You have installed and configured a new wireless router. The clients and hosts can ping each other. The WAN connection is 10Gbp/s. The wired clients have fast connections, but the wireless clients are slow to ping and browse the Internet. Which of the following is MOST likely the cause of the slow speeds experienced by the wireless clients? An access point experiencing from fluorescent light bulbs A router is on the incorrect LAN A cable connection does not support wireless A high signal-to-noise ratio on the wireless network

An access point experiencing from fluorescent light bulbs

A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic? Intrusion detection system Application-aware firewall Stateful packet inspection Stateless packet inspection

Application-aware firewall Application-Aware Firewall would detect both the accessing of random ports

An employee of a highly-secure company needs to use facial recognition in addition to a username/password to establish a VPN successfully. What BEST describes this methodology? PKI Federated identity Two-factor authentication Biometric authentication

Biometric authentication

Which of the following network geographies refers to a network that spans several buildings within walking distance of each other, such as at a business park? CAN WAN PAN MAN

CAN

What is a common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network? ARP cache poisoning Amplified DNS attacks Session hijacking Creating an evil twin

Creating an evil twin

Your network is currently under attack from multiple hosts outside of the network. Which type of attack is most likely occurring? DoS Spoofing DDoS Wardriving

DDoS

A network technician was tasked to install a network printer and share it with a group of five human resource employees. The technician plugged the device into a LAN jack but was unable to obtain an IP address automatically. What is the cause of the problem? Incorrect DNS records Incorrect TCP port in ACL Split-horizon is disabled DHCP scope is exhausted

DHCP scope is exhausted

Which communication technology would MOST likely be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths? DWDM SONET ADSL LACP

Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly used in MANs (metropolitan area networks)

A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk? Enable the host-based firewall on the internet server Enable HIPS to protect the server until the patch is released Utilize WAF to restrict malicious activity to the Internet server Downgrade the server and defer the new feature testing

Downgrade the server and defer the new feature testing

A client has combined the voice-data circuit from a provider and gets a maximum download and upload speeds of 2.0Mbps. Which type of service is MOST likely being used by the client? ADSL T1 E1 VDSL

E1 service provides symmetric 2.0 Mbps of data service.

A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to identify the switches connected to each port quickly? Configure TACACS+ on each network device Enable a discovery protocol on the network device Configure each uplink to send LACP discovery units Enable a packet sniffer on each network device's uplink port

Enable a discovery protocol on the network device

Which of the following network devices would be considered a perimeter device and installed at the outermost part of the network? Switch Firewall Bridge Wireless access point

Firewall

A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features? Firmware updates Changing to IPv6 Cloning Vulnerability patching

Firmware updates

Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router can recognize drives up to 4TB in size, but she cannot get her 3TB hard drive to show up on the network. What should Lynne do to fix this problem? Load the latest hardware drivers for her USB drive Install the latest OS on her computers Download the latest playback software for her music files Flash the latest firmware for her router

Flash the latest firmware for her router

You have been asked to connect three 802.11a devices to an 802.11g access point configured with WEP. The devices are within 20 feet of the access point, but they still cannot associate with the access point. Which of the following is the MOST likely cause of the devices not associating with the WAP? Interference Frequency mismatch Signal loss Mismatched encryption

Frequency mismatch

Which of the following is designed to keep the system's uptime running in the event of a disaster? High availability Load balancing Quality of service Caching engines

High availability

A college needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. What type of antenna will provide the BEST coverage? High gain Bidirectional Dipole Omni-directional

High gain

A technician is tasked with troubleshooting a network's slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they can access the sites using the web browsers. What is the MOST likely cause? ICMP traffic being blocked by the firewall VLAN hoping TACACS misconfiguration MTU black hole

ICMP traffic being blocked by the firewall

Which device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks? Honeypot IPS Firewall IDS

IPS Can reconfigure themselves based on the threats experienced.

You are configuring a point-to-point link and want to ensure it is configured for the most efficient use of your limited pool of available public IP addresses. Which of the following subnet masks would be BEST to use in this scenario? /24 /28 /29 /30

If you see the option of /30 or /31, remember, they can be used for point-to-point networks.

Several users at an adjacent office building report connectivity issues after a new building was built in-between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption, and channels are all correct. Which of the following is MOST likely the cause of this issue? Device saturation Antenna type Bandwidth saturation Interference

Inteference

You have been asked to add an entry to your DNS records to allow SMTP traffic to be sent out using your domain name. Which type of record should you add to your DNS record? CNAME A MX AAAA

MX

The Chief Information Officer (CIO) in your company has been trying to convince the Chief Security Officer (CSO) that the company should move its data to a SaaS solution to save some money in the budget. The CSO is hesitant to move all of the company's data because she is concerned with the risk involved in moving the corporation's sensitive data to a SaaS solution. The CSO has been asked for a reason behind her fears. Which of the following might be her response? The SaaS solution is incompatible with our current network Migrating all of our data to a SaaS solution will result in a loss of full control over our data and resources Migrating our data to a Saas solution will result in decreased performance in our internal network Migrating to a SaaS solution will put us at a higher risk of exposure to malware and hackers.

Migrating all of our data to a SaaS solution will result in a loss of full control over our data and resources

Which type of wireless technology are OFDM, QAM, and QPSK examples of? Frequency Modulation RF interference Spectrum

Modulation

A client reports that half of the office is unable to access a shared printer on the network. Which of the following should the network technician use to troubleshoot the issue? Data backups Network diagrams Baseline information Vendor documentation

Network diagrams

Jason just got into his car and paired his smartphone to his car's stereo. Which of the following types of networks was just created? LAN PAN WAN MAN

PAN

Which of the following WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections? OC12 POTS WiMax OC3

POTS

A network technician needs to monitor the network to find a user who is browsing websites against the company policy. What should the technician use to view the website and find the user browsing it? SNMP GET Top listener tool Intrusion detection system Packet sniffer

Packet sniffer

You are testing a cable you found in your network closet. You connect a cable tester to both sides of the cable to verify the pinout of the Ethernet cable. After testing each pin, your cable tester gives you the following output: Patch cable Crossover cable Rollover cable RG-6 cable

Patch cable This is a patch cable (also known as a straight-through cable), as indicated by the matching of the Tx and Rx pins (pins 1, 2, 3, and 6) on both sides of the cable.

You have been asked by your supervisor, Martha, to ensure that you enable 802.3af on a managed switch. Which of the following features does Martha want you to enable?

PoE. The IEEE 802.3af standard defines power over Ethernet (PoE)

Your network has been the victim of a data breach. Your company has hired an incident response team to help control the breach's damage and restore the network to its full functionality. The incident response team wants to connect a packet capture device to the switch that connects your servers to the DMZ. Which of the following should be configured to ensure the packet capture device can receive all the network traffic going to and from the servers? 802.1q 802.1x Port mirroring Port security

Port mirroring

You are working as a wireless networking technician and running a wireless controller to aid in network administration. Your supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users? Layer 3 switch Proxy server RADIUS server VPN concentrator

RADIUS server

A network's design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as? CSU/DSU SCADA/ICS IS-IS LAN

SCADA/ICS is used in industrial control systems, such as an assembly-line network.

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following should be implemented within the network? SNMP SMTP NIDS SMS

SNMP. The keyword is MONITORING. SNMP stands for Simple Network Management Protocol.

You are trying to increase your network's security by implementing a system of two-factor authentication (2FA). Which of the following authentication factors should you choose to meet this requirement? Smartcard and PIN Facial scan and fingerprint Key fob and smartcard Username and password

Smartcard and PIN

An end-user receives a new computer and now is unable to connect to a database using ODBC. Other users can connect successfully, and the network technician can successfully ping the database server but still is unable to connect. What might have caused this issue? Missing IP routes on the router Wrong default gateway address Software firewall in blocking ports Failing network interface card

Software firewall in blocking ports

Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address? The administrator has enabled DHCP snooping on the network The administrator is blocking DHCP requests that originate from access points The administrator is blocking the wireless router's MAC address using MAC filtering The administrator has implemented a feature that only allows whiteless MAC addresses to connect to the network

The administrator has implemented a feature that only allows whiteless MAC addresses to connect to the network

You are working as a wireless networking technician and have been sent to a user's home to install a brand new 802.11 AC WAP to replace their old WAP. To ensure all of the current devices on the network will automatically connect to the new network, you set the SSID, encryption type, and password to the same ones as the old WAP. You turn the new WAP on and notice most of the devices connect automatically, but one older wireless printer won't connect. You notice that the printer is about 7 years old, but the user says it has always worked great over the old wireless network. What is the MOST likely reason that the printer will not connect to the new WAP? You forgot to set the channel properly The power level on the WAP is too low The password on he WAP was changed There is a mismatch in frequencies

There is a mismatch in frequencies

A user has installed a new wireless printer on the network. The user cannot get it connected to the Internet but can print locally. All other office users can reach the Internet but cannot connect to the new wireless printer. All users are wireless in this part of the office. What MOST likely has occurred? They installed the printer in infrastructure mode The installed the printer in the wrong subnet They misconfigured the gateway on the wireless printer They installed the printer in ad-hoc mode

They installed the printer in ad-hoc mode. In ad-hoc,devices talk to each other but n connection outside this "self-created" network

What can be issued from the command line to find the layer 3 hops to a remote destination? Traceroute Nslookup Ping Netstat

Traceroute

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues are occurring and remember that each time it occurs that the lights also become dimmer momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router's power cycling. What should you (a network technician) do to solve this problem? Install an upgraded router Install a surge protector Install a UPS Install a new electrical outlet

UPS. Uninterruptible power supply

One of the routers in your network just failed. You have been asked to replace it with the same model router from the spare inventory closet as part of an emergency change request. You find the new router in the closet and notice it was signed into inventory 13 months ago. You install the router and attempt to enable HTTPS in the configuration to allow for remote access. The failed router had this capability, but this spare does not, even though they are the same model and were purchased simultaneously. What should you do to enable HTTPS access for this router? Perform a factory reset Update the firmware Enable HTTP instead Reboot the router

Update the firmware

Which type of network geography is used to connect various circuits between remote locations? WAN PAN WLAN LAN

WAN

Which of the following is the BEST encryption from the options below to maximize network security between AP4 and AP5? Open WEP WPA WPA2-CCMP WPA2-TKIP

WPA2-CCMP

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially? authPriv authNoPriv authProtect authEncrypt

authPriv

What allows a telecommunication company to test the circuits of customers remotely? VLAN configuration Toner probe RDP Smart jack

smart jack

What is the correct color scheme for Pin 1 to Pin 8 for a T-568B connector? Blue, white/blue, orange, white/brown, brown, white/green, orange/white white/green, green, orange/white, blue, white/blue, orange, white/brown, brown white/orange, orange, white/green, blue, white/blue, green, white/brown, brown white/green, green,white/orange, orange, blue, white/blue, white/brown, brown

white/orange, orange, white/green, blue, white/blue, green, white/brown, brown


Kaugnay na mga set ng pag-aaral

MyProgrammingLab - Chapter 2: Java Fundamentals (Tony Gaddis)

View Set

Nutrition Chapter 2 (Nutrient Recommendations

View Set

Cattle Vaccinations and Preventable Diseases

View Set

Series 6: Variable Products (Variable Annuity Taxation)

View Set

General Practice Exam-MD Accident, Health & Life Producer Practice Exam B

View Set

Praxis Elem. Ed- Math(5003) Chapter 1 - Rational Number Operations & Properties Quiz Questions, Praxis Elem. Ed- Math(5003) Chpt 2 - Representing Rational Numbers & Operations Quiz Questions, Praxis Elem. Ed- Math(5003) Chpt 4 - Number Theory & Mathe...

View Set

CHAPTER 9 ONLINE RETAIL AND SERVICE

View Set

Working with Windows and CLI Systems Chapter 5

View Set

Music Humanities Quiz 2 Terminology

View Set