Exam Compass
An OC-3 line supports transmission rates of up to: 1.544 Mbps 44.736 Mbps 51.84 Mbps 155.52 Mbps
155.52 Mbps
The IEEE 802.11ac standard specifies a maximum channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz
160 MHz
Which network command-line utility in MS Windows combines the features of ping and tracert? nbtstat pathping nslookup netstat
pathping
Which of the following devices resides at the data link layer of the OSI model? Router Passive hub Ethernet switch Repeater
Ethernet switch
Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening? -a -p -e -r
-a
Which netstat parameter allows to display the names of applications and executable file components that are accessing the network? -a -n -b -p
-b
Which of the netstat utility parameters listed below allows to display the contents of an IP routing table? -a -e -p -r
-r
What is the network address for the 192.168.223.15 255.255.255.252 host?
.252 is 11111100 which is /30 Everything past the 30th bit in 192.168.223.15 becomes a 0 so: .15 in binary is --> 00001111 past the 30th bit becomes 0: 192.168.223.00001100 The network address is: 192.168.223.12
Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? 1 5 6 9 11
1, 6, 11
T1 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
1.544 Mbps
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply) Coaxial cabling 100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) F-type connector 55-meter cable segment length 1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) BNC connector 100-meter cable segment length 10 Gbps transfer rate over all 4 pairs of cables (10GBaseT networks) Twisted-pair copper cabling RJ-45 connector Fiber-optic cabling
100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) 1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) 100-meter cable segment length Twisted-pair copper cabling RJ-45 connector
What is the typical cable segment length for a copper twisted-pair Ethernet cable? 33 meters 55 meters 100 meters 250 meters
100 meters
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5e (Cat 5e) cabling? (Select all that apply) BNC connector 100-meter cable segment length Coaxial cabling Twisted-pair copper cabling Fiber-optic cabling 1 Gbps transfer rate over 2 pairs of cables (1000BaseT networks) RJ-45 connector 55-meter cable segment length 1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks) F-type connector
100-meter cable segment length Twisted-pair copper cabling 1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks) RJ-45 connector
Which of the answers listed below refers to the maximum data transfer rate of E1 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
2.048 Mbps
The characteristic features of the IEEE 802.11n wireless standard include: (Select all that apply) Multiple Input / Multiple Output (MIMO) Maximum data signaling rate of 54 Mbps 2.4 GHz frequency band Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 5.0 GHz frequency band Multi-User Multiple Input / Multiple Output (MU-MIMO) Maximum data signaling rate of up to 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
2.4 GHz frequency band 5.0 GHz frequency band Multiple Input / Multiple Output (MIMO) Maximum data signaling rate of up to 600 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) Maximum data signaling rate of 54 Mbps 5.0 GHz frequency range Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method 2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
2.4 GHz frequency range Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
The IEEE 802.11a standard specifies a channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz
20 MHz
The IEEE 802.11g standard specifies a channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz
20 MHz
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz
20 MHz 40 MHz
Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? 20 MHz 22 MHz 40 MHz 80 MHz
22 MHz
Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) 128 - 191 Class B 192 - 223 Class C 224 - 239 Class D
224 - 239 Class D
Which of the following answers refers to the maximum data transfer rate of E3 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
34.368 Mbps
T3 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
44.736 Mbps
Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of: 1.544 Mbps 44.736 Mbps 51.84 Mbps 155.52 Mbps
51.84Mbps
A limited IPv4-to-IPv6 transition mechanism that allows for encapsulation of IPv6 packets in IPv4 packets transmitted over IPv4 networks is known as: 6to4 802.3af eDiscovery Miredo
6to4
The IEEE 802.11g standard is backwards compatible with: 802.11n 802.11a 802.11b 802.11ac
802.11b
The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) 802.11g 802.11ac 802.11b 802.11a
802.11g 802.11b 802.11a
Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection? 622.08 Mbps 1244.16 Mbps (1.24 Gbps) 2488.32 Mbps (2.49 Gbps) 9953.28 Mbps (9.95 Gbps)
9953.28 Mbps (9.95 Gbps)
Which of the following answers refer to IPv6 loopback addresses? (Select 2 answers) 127.0.0.1 0:0:0:0:0:0:0:1 169.254/16 ::1 FE80::/10
::1 0:0:0:0:0:0:0:1
MPLS (Multiprotocol Label Switching)
A network technology defined by a set of IETF specifications that enable Layer 3 devices, such as routers, to establish and manage network traffic.
Which of the following answers refer(s) to frame relay? (Select 3 answers) A network technology used for connecting devices on a LAN Data transfer rates of up to 10 Gbps Packet-switching method Data transfer rates of up to 45 Mbps A network technology used for connecting devices on a WAN Circuit-switching method
A network technology used for connecting devices on a WAN Data transfer rates of up to 45 Mbps Packet-switching method
Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? CAN WTLS UAV ANT+
ANT+
An IPv6 link-local address is an equivalent of IPv4's: APIPA address Routable IP address Public IP address MAC address
APIPA address
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? ARP poisoning Replay attack Cross-site request forgery DNS poisoning
ARP poisoning
What is the most common type of a DSL Internet access? VDSL ADSL SDSL UDSL
ASDL
Which of the following can be the source of RFI and cause disruptions in network connectivity? Cordless phones Fluorescent lights Microwave ovens Bluetooth devices All of the above
All of the above cordless phones, fluorescent lights, microwave ovens, and bluetooth devices all cause some form of RFI and can disrupt network connectivity.
A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as: GBIC Basic-Rate Interface (BRI) UC gateway Auto MDI-X
Auto MDI-X
Which of the answers listed below refers to a special type of frame used by STPs? MTU Jumbo frame BPDU ATM cell
BPDU
Which of the following answers refers to a fiber transceiver equipped with the capability to transmit and receive signals over a single fiber strand? Simplex Bidirectional Half duplex Unidirectional
Bidirectional
Which of the following reside at the physical layer of the OSI model? (Select 2 answers) IP address Switch Bit Router Network cabling Frame
Bit Network cabling
What is the name of an AES-based encryption mode implemented in WPA2? CCMP ECB CBC TKIP
CCMP
Which of the following answers refers to a channel access method used in 3G cellular networks? CDMA CSMA/CD TDMA CSMA/CA
CDMA
A solution that allows to control access to a shared transmission medium in 802.11 networks is known as: CWDM CSMA/CD CDMA CSMA/CA
CSMA/CA
Which of the following devices would be used for connecting a router to a T1 line? CSU/DSU Media converter IDF F-type connector
CSU/DSU (channel service unit/data service unit) is a digital-interface device used to connect data terminal equipment (DTE), such as a router, to a digital circuit, such as a Digital Signal 1 (DS1) T1 line.
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) Data signaling rate of up to 600 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method Maximum data signaling rate of up to 6.77 Gbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO) 2.4 GHz frequency band
Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method Multi-User Multiple Input / Multiple Output (MU-MIMO 5.0 GHz frequency band 6.77 Gbps
Which of the following answers refers to the minimum requirement for twisted-pair copper cabling in modern Ethernet networks? Cat 3 Cat 5 Cat 5e Cat 6 Cat 6A
Cat 5e
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space
Class A space
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space
Class C space
Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers) Twisted-pair copper cabling Suitable for short-distance cable runs Used for analog video and CCTV installations Coaxial cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems
Coaxial cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems
What are the characteristics of the RG-59 cabling specification? (Select 3 answers) Coaxial cabling Suitable for short-distance cable runs Used for analog video and CCTV installations Twisted-pair copper cabling Suitable for long-distance cable runs Used for cable television, satellite television and cable modems
Coaxial cabling Suitable for short-distance cable runs Used for analog video and CCTV installations
Which of the answers listed below refers to a security solution that allows to selectively block access to certain websites? Captive portal Firewall Content filter Proxy server
Content filter
Which of the answers listed below refer to the characteristic features of a modem? (Select 3 answers) Converts digital data into analog signal Allows a computer to send and receive information over telephone lines Forwards frames between network segments Converts analog signal into digital data Filters and transfers data packets between dissimilar types of computer networks
Converts analog signal into digital data Converts digital data into analog signal Allows a computer to send and receive information over telephone lines
What type of Ethernet cable would be used for establishing a direct communication link between two PCs? Patch cable Crossover cable Rollover cable Straight-through cable
Crossover cable
Which of the following attack types relies on amplification effect? Zero-day attack DDoS attack Brute-force attack MITM attack
DDoS attack
Which of the following connector types are used for RS-232 serial communications? (Select 2 answers) DE-9 RG-59 RJ-45 DB-25 RG-6 RJ-11
DE-9 DB-25 These are serial connectors
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS SNMP NAT DHCP
DHCP
A security feature of a network switch that provides countermeasures against rogue DHCP servers is called: DHCP scope DHCP reservation DHCP snooping DHCP relay agent
DHCP snooping
Which VPN type enables direct communication links between remote hosts on a WAN? Site-to-site VPN DMVPN Remote-access VPN Client-to-site VPN
DMVPN
Remapping a domain name to a rogue IP address is an example of what kind of exploit? DNS poisoning Domain hijacking ARP poisoning URL hijacking
DNS poisoning
Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers) DTLS bcrypt SCP IPsec SSL/TLS
DTLS IPsec SSL/TLS
In the OSI model, physical addressing takes place at the: Data link layer Layer 4 Physical layer Session layer
Data link layer
What are the characteristic features of ATM? (Select all that apply) A network technology used for connecting devices on a WAN Data transfer rates of up to 45 Mbps Used in SONET networks 53-byte data transfer unit (a.k.a. ATM cell) A network technology used for connecting devices on a LAN Data transfer rates of up to 10 Gbps
Data transfer rates of up to 10 Gbps 53-byte data transfer unit (a.k.a. ATM cell Used in SONET networks A network technology used for connecting devices on a WAN
A wireless disassociation attack is a type of: Downgrade attack Brute-force attack Denial of Service (DoS) attack Cryptographic attack
Denial of Service (DoS) attack
Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) Unidirectional antenna Dipole antenna Yagi antenna Omnidirectional antenna Dish antenna
Dipole antenna Omnidirectional antenna
Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops? Hybrid Link-state Distance-vector Dynamic
Distance-vector
Which type of switch simplifies virtual network configuration by enabling an option to configure switching for the entire network from a single interface? Managed switch Distributed switch Stackable switch Aggregation switch
Distributed switch
Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? EAP-TLS PEAP EAP-TTLS EAP-FAST
EAP-TLS
Which of the following EAP methods offers the highest level of security? PEAP EAP-FAST EAP-TLS EAP-TTLS
EAP-TLS
Which of the following enables automatic configuration of an IPv6 address? EUI-64 UEFI APIPA MAC-48
EUI-64
Which of the answers listed below refer(s) to MPLS? (Select all that apply) Circuit-switching method Used for connecting devices on a LAN Enables delivery of various data packet types over the same network link Packet-switching method Used for connecting devices on a WAN Designed to simplify and improve the performance of routing process
Enables delivery of various data packet types over the same network link Packet-switching method Used for connecting devices on a WAN Designed to simplify and improve the performance of routing process
A type of coaxial connector commonly used for cable television and cable modems is called: RG-6 F-type DB-9 MT-RJ
F-type
Which of the following answers lists a valid address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression? FE80:00A7::2AA:0:4C:FE9A FE80:A7::2AA::4C00:FE9A FE80:00A7::2AA:0:4C00:FE9A FE80:A7::2AA:0:4C00:FE9A
FE80:A7::2AA:0:4C00:FE9A
A network protocol that allows for secure file transfer over SSL is known as: TFTP SCP FTPS SFTP
FTPS
A dedicated communication channel used exclusively between two connected hosts is a characteristic feature of packet-switching networks. True False
False
Circuit-switching networks move data divided into small blocks over a shared connection. True False
False
What is the first valid host address for a node residing in the 10.119.136.143/20 network
First thing to do is get the network address. /20 is 11111111.11111111.11110000.00000000 136 in binary is 10001000 Since the CIDR notation is /20 everything past the 20th bit turns into a 0 10000000 = 128 The network address is: 10.119.128.0 The first available host address is adding 1 to the address so it is 10.119.128.1 <----
What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses? BPDU guard UTM Flood guard Root guard
Flood guard
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: Geofencing Quarantine network Geolocation GPS tagging
Geofencing
TCP port 1720 is used by: H.323 SMB LDAPS SNMP
H.323
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? SMB H.323 SCP IGP
H.323
Which of the protocols listed below enables remote access to another computer on the network via web browser? RDP HTTPS SSH VNC
HTTPS
Which of the following reside at the physical layer of the OSI model? (Select 2 answers) Router Hub Switch Network cabling Bridge
Hub Network cabling
Border Gateway Protocol (BGP) falls into the category of: Hybrid routing protocols Link-state routing protocols Distance-vector routing protocols Static routing protocols
Hybrid routing protocols
Which network protocol enables detection of packet loss? SMB ICMP ARP SNTP
ICMP
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP RSTP ICMP SNMP
ICMP
In 802.11 networks, the term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. Channel bonding was first introduced with the: IEEE 802.11a standard IEEE 802.11b standard IEEE 802.11g standard IEEE 802.11n standard IEEE 802.11ac standard
IEEE 802.11n standard
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS
IP
Which of the answers listed below refers to a means for executing reflective DOS attack? Phishing Logic bomb IP spoofing Man-in-the-middle
IP spoofing
The arp command can be used to perform what kind of resolution? IP to FQDN MAC to IP IP to MAC FQDN to IP
IP to MAC
Which of the answers listed below refers to a method for managing a network's IP address space? WMS SIEM UTM IPAM
IPAM IPAM (IP Address Management) is the administration of DNS and DHCP, which are the network services that assign and resolve IP addresses to machines in a TCP/IP network. Simply put, IPAM is a means of planning, tracking, and managing the Internet Protocol address space used in a network.
Which of following protocols reside(s) at the OSI network layer? (Select all that apply) IPv4 UDP IPsec TCP IPv6 ICMP
IPv4 IPsec IPv6 ICMP
Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN? WiMAX PoE ISDN HSPA+
ISDN
What is the network address for 154.24.67.147 /22
It is a /22 IP, so the binary representation would be 1111111.11111111.11111100.00000000 past the /22, all bits turn to 0's and art not counted towards the Network address. Therefore, the binary representation of 67 is 01000011 Since we turned off the 23 and 24th bit, the binary representation is 01000000 which is 64. This network address is 154.24.67.147
Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality? RADIUS MS-CHAP Kerberos TACACS+
Kerberos
Which of the following solutions enables combining several physical ports of a switching device into a single logical channel? RSTP VRRP LACP HSRP
LACP Link Aggregation Control Protocol. Within the IEEE specification, the Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel.
Which of the following answers refers to an SSL/TLS-based directory access protocol? H.323 PPTP Kerberos LDAPS
LDAPS
Which of the following answers refer to the characteristics of copper-based networks? (Select 3 answers) More expensive in comparison to optical fiber Used for last-mile cable runs Higher bandwidth and maximum cable segment length in comparison to fiber-optic links Used for network backbone cabling Less expensive in comparison to optical fiber Limited bandwidth and maximum cable segment length in comparison to fiber-optic links
Less expensive in comparison to optical fiber Limited bandwidth and maximum cable segment length in comparison to fiber-optic links Used for last-mile cable runs
Subnetting example
Let's say our address is 10.10.1.99/23 In Binary that becomes 00001010.00001010.00000001.01100011 The network portion is determined by the ones in the subnet mask.So /23 means the network portion is the first 23 bits as is, with the remainder of the bits set to 0 00001010.00001010.00000000.00000000 So 10.10.0.0 it the network address Broadcast address: set those last bits to 1's instead of 0's (everything after the 23 bits from subnet mask)00001010.00001010.00000001.11111111 So 10.10. 1.255 is the broadcast address 1st available host address - add one to the network adress00001010.00001010.00000000.00000001 So 10.10.0.1 Last available host address - subtract one from the broadcast address00001010.00001010.00000001.11111110 So 10.10.1.254 Range of host address is therefore 10.10.0.1 - 10.10.1.254
A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called: Dynamic Link-state Static Distance-vector
Link-state
Disabling SSID broadcast: Is one of the measures used in the process of securing wireless networks Makes a WLAN harder to discover Blocks access to a WAP Prevents wireless clients from accessing the network
Makes a WLAN harder to discover
What are the characteristic traits of a network switch? (Select all that apply) Makes forwarding decisions in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Older and less effective type of network device in comparison to network bridge Makes forwarding decisions in software Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge Typically capable of connecting fewer network segments than bridge (fewer physical ports)
Makes forwarding decisions in software Typically capable of connecting fewer network segments than switch (fewer physical ports) Older and less effective type of network device in comparison to network switch
A type of layer 2 network switch with configuration features that can be modified via a user interface is referred to as: Virtual switch Multilayer switch PoE switch Managed switch
Managed switch
Which of the answers listed below refer to the characteristic features of the IEEE 802.11a wireless standard? (Select 3 answers) Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency band Maximum data signaling rate of 11 Mbps Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method
Maximum data signaling rate of 54 Mbps 5.0 GHz frequency band Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range Maximum data signaling rate of 11 Mbps 5.0 GHz frequency range
Maximum data signaling rate of 54 Mbps Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method 2.4 GHz frequency range
What are the characteristic traits of GBIC? (Select all that apply) Data transfer of 10 Gbps Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Converts electrical signals to optical signals Data transfer of 1 Gbps
Modular (hot swappable) interface Converts optical signals to electrical signals Converts electrical signals to optical signals Data transfer of 1 Gbps
What are the characteristic traits of single-mode fiber optics? (Select 3 answers) Transmission distances of up to 2 km More expensive than multimode fiber optics Uses LED as the source of light Transmission distances of up to 100 km Uses laser as the source of light Less expensive than multimode fiber optics
More expensive than multimode fiber optics Uses laser as the source of light Transmission distances of up to 100 km
Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? Multiple Input / Multiple Output (MIMO) 40 MHz channel width Multi-User MIMO (MU-MIMO) Maximum data signaling rate of up to 600 Mbps
Multi-User MIMO (MU-MIMO)
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address? DNS APIPA NAT DHCP
NAT
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device? QoS DHCP NAT DNS
NAT
Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes, advertise the presence of routers, and locate routers? NTP NDR NCP NDP
NDP
A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers) Packet filter Layer 4 firewall NGFW Second-generation firewall Layer 7 firewall
NGFW Layer 7 firewall
Internet Protocol Security (IPsec) resides at: Network layer of the OSI model Transport layer of the OSI model Session layer of the OSI model Presentation layer of the OSI model
Network layer of the OSI model
Which of the following command-line tools is used for discovering hosts and services on a network? Nmap netcat Zenmap tcpdump
Nmap
Which of the following answers refers to a link-state routing protocol? BGP EIGRP RIP OSPF
OSPF
Which of the answers listed below refer to IMAP4? (Select 2 answers) Offers improved functionality in comparison to POP3 Serves the same function as POP3 Enables sending email messages from client devices Offers less functions than POP3 Enables email exchange between mail servers
Offers improved functionality in comparison to POP3 Serves the same function as POP3
Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? Omnidirectional antenna Dish antenna Unidirectional antenna Yagi antenna
Omnidirectional antenna
VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers) T1/T3 lines Site-to-site VPN PSTN E1/E3 lines Remote-access VPN POTS
POTS PSTN
Which network protocol enables encapsulation of PPP frames within 802.3 frames? FCoE PPPoE EAP IPsec
PPPoE (Point-to-Point over Ethernet)
Which of the protocols listed below resides at the session layer of the OSI model? HTTP UDP IP SMTP PPTP
PPTP
Which of the answers listed below refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems? BRI N-ISDN PRI B-ISDN
PRI
Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? AES PSK RC4 IKE
PSK (generally used in small offices, homes, etc)
Which of the answers listed below refer to components that reside at the OSI network layer? (Select 3 answers) Router Network cabling IP address TCP/UDP protocols Switch Packet
Packet IP address Router
Which of the answers listed below refer to iptables? (Select 2 answers) Packet capturing utility MS Windows command-line tool Packet tracing utility Linux command-line tool Packet filtering utility
Packet filtering utility Linux command-line tool
Which of the following answers refer to common cabling type used for connecting workstations to network devices? (Select 2 answers) Patch cable RG-59 cable Crossover cable RG-6 cable Straight-through cable
Patch cable Straight-through cable Patch cable is the same thing as a straight-through cable
Which of the following allows an administrator to inspect the traffic passing through a network switch? Port mirroring VLAN tagging Fault-tolerant mode Port scanning
Port mirroring
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? SSID broadcast Power level controls Maximum Transmission Unit (MTU) Quality of Service (QoS)
Power level controls
What are the characteristic features of a RADIUS server? (Select 3 answers) Primarily used for network access Encrypts the entire payload of the access-request packet Combines authentication and authorization Encrypts only the password in the access-request packet Primarily used for device administration Separates authentication and authorization
Primarily used for network access Encrypts only the password in the access-request packet Combines authentication and authorization
What are the characteristic features of TFTP? (Select 2 answers) Provides no security features Typically used for exchanging files over the Internet A very basic form of file sharing protocol Provides authentication and encryption Directory access protocol
Provides no security features A very basic form of file sharing protocol
In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as: Bridge Active hub Server Proxy
Proxy
Which of the answers listed below refers to an encryption algorithm used in TKIP? DES 3DES AES RC4
RC4
Examples of distance-vector routing protocols include: (Select 2 answers) EGP OSPF RIP EIGRP BGP
RIP EIGRP
What are the characteristic features of satellite Internet connections? (Select 3 answers) High signal latency Lack of signal interference Cheaper in comparison to terrestrial links Interference (weather dependent) Low signal latency Relatively high cost in comparison to terrestrial link
Relatively high cost in comparison to terrestrial link High signal latency Interference (weather dependent)
Which of the terms listed below refers to permanent IP address assignment from a DHCP server? Scope Reservation DHCP relay Lease
Reservation
Which of the following enables VoIP calls between PBXs? VTP PSTN SIP trunk PPPoE
SIP trunk
Which of the following answers refers to a network protocol used in the most common types of spoofing attacks? SMTP RDP SNMP Telnet
SMTP
Which of the following protocols reside at the application layer of the OSI model? (Select 3 answers) ATM HTTP FTP IP SMTP TCP/UDP
SMTP HTTP FTP
A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: BRI SNR RFI SVC
SNR (signal to noise ration) used to compare the amount of usable data and background noise being sent.
A unique WLAN identifier is commonly referred to as: EUI SSID OUI CNAME
SSID
Which of the following protocols provide protection against switching loops? (Select 2 answers) RTP SRTP RDP STP RSTP
STP RSTP
Which OSI layer assumes responsibility for managing network connections between applications? Network layer Data link layer Application layer Session layer
Session layer
Which of the answers listed below refer(s) to the feature(s) of SFP? (Select all that apply) Small form factor transceiver Converts electrical signals to optical signals Data transfer of 10 Gbps Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Data transfer of 1 Gbps
Small form factor transceiver Converts electrical signals to optical signals Newer transceiver type that replaces GBIC Modular (hot swappable) interface Converts optical signals to electrical signals Data transfer of 1 Gbps
A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as: OTDR Line tester Loopback adapter Smart jack
Smart jack
What allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask
Subnet Mask
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) Suitable for large corporate networks Does not require an authentication server Suitable for all types of wireless LANs Requires RADIUS authentication server
Suitable for large corporate networks Requires RADIUS authentication server
What are the characteristic components of the OSI data link layer? (Select 3 answers) MAC address Packet Switch Network cabling Router Frame
Switch MAC address Frame
Which port enables the FTP's Data Connection for sending file data? UDP port 20 TCP port 20 UDP port 21 TCP port 21
TCP PORT 20
The File Transfer Protocol (FTP) Control Connection for administering a session is established through: TCP port 20 UDP port 20 TCP port 21 UDP port 21
TCP PORT 21
Which of the answers listed below refers to a channel access method used in 2G GSM networks? CSMA/CA TDMA CSMA/CD CDMA
TDMA
A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called: PEAP TKIP CCMP WPA2
TKIP
An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is called: 6to4 Teredo eDiscovery Miredo
Teredo
broadcast address for the 46.28.247.109/10 network?
The CIDR notation is /10 so in binary it is 11111111.11000000.0000000.0000000 .28 in binary is 00011100 everything past the 10th bit becomes a 1 (use the subnet mask for /10 as reference to where everything becomes 1) so .28 becomes 0011111111.11111111.11111111 .63.255.255 the broadcast address is 46.63.255.255
Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) Uses laser as the source of light Transmission distances of up to 2 km More expensive than single-mode fiber optics Transmission distances of up to 100 km Less expensive than single-mode fiber optics Uses LED as the source of light
Transmission distances of up to 2 km Uses laser as the source of light Less expensive than single-mode fiber optics
Telnet: (Select 3 answers) Encrypts network connection Provides password authentication Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution
Transmits data in an unencrypted form Does not provide authentication Enables remote login and command execution
Which OSI layer is responsible for breaking up data into segments? Network layer Transport layer Presentation layer Data link layer
Transport layer
A network device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. T OR F
True
A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is referred to as demarcation point, or demarc. True False
True
An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). True or False
True
Category 3 (Cat 3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring and older Ethernet (10BaseT) networks. True False
True
Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6A, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBaseT networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling hasn't seen a widespread market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6A standard which offers similar performance and takes advantage of the traditional RJ-45 connector. True False
True
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. T OR F
True
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. True or False
True
In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. True False
True
In STP network topology, the term "Root guard" refers to a security mechanism designed to protect integrity of the designated main switch. True False
True
Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service. T OR F
True
The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts. True False
True
Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. True False
True
What are the characteristic traits of a network switch? (Select all that apply) Makes forwarding decisions in hardware (ASIC) Typically capable of connecting more network segments than bridge (more physical ports) Older and less effective type of network device in comparison to network bridge Makes forwarding decisions in software Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge Typically capable of connecting fewer network segments than bridge (fewer physical ports)
Typically capable of connecting more network segments than bridge (more physical ports Makes forwarding decisions in hardware (ASIC) Sometimes referred to as multiport bridge Newer and more effective type of network device in comparison to network bridge
Which of the answers listed below refer(s) to PPP? (Select all that apply) (Point-to-Point) Network protocol used for connecting devices on a WAN Transport layer (layer 4) protocol Enables encapsulation of IP traffic Used for establishing a direct connection between two networked devices Application layer (layer 7 protocol)
Used for establishing a direct connection between two networked devices Enables encapsulation of IP traffic Network protocol used for connecting devices on a WAN
Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) Uses laser as the source of light Transmission distances of up to 2 km More expensive than single-mode fiber optics Transmission distances of up to 100 km Less expensive than single-mode fiber optics Uses LED as the source of light
Uses LED as the source of light Transmission distances of up to 2 km Less expensive than single-mode fiber optics
What are the characteristic traits of single-mode fiber optics? (Select 3 answers) Transmission distances of up to 2 km More expensive than multimode fiber optics Uses LED as the source of light Transmission distances of up to 100 km Uses laser as the source of light Less expensive than multimode fiber optics
Uses laser as the source of light Transmission distances of up to 100 km More expensive than multimode fiber optics
Switch spoofing and double tagging are attack methods used in: DDoS attacks Downgrade attacks VLAN hopping attacks Wireless disassociation attacks
VLAN hopping attacks
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes? DNAT VLSM MPLS VLAN
VLSM Variable-Length Subnet Masking (VLSM) amounts to "subnetting subnets," which means that VLSM allows network engineers to divide an IP address space into a hierarchy of subnets of different sizes, making it possible to create subnets with very different host counts without wasting large numbers of addresses.
A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called: VTP VRF VTC VNC
VNC
Which of the following answers lists an example of a modern network bridging device? WAP Active hub VoIP endpoint Wireless range extender
WAP
Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? Protocol analyzer WAP power level controls Logical network diagram Network mapper
WAP power level controls
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is known as: MAN WLAN LAN VLAN
WLAN
Which of the following would be the best solution for securing a small network lacking an authentication server? WPA-PSK WPA2-Enterprise WPA2-PSK WPA-Enterprise
WPA2-PSK
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices? WAP WWAN Satellite WLAN
WWAN
What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46 255.255.128.0 network?
We must first get the network address to find the first valid host This is a /17 network, everything past the 17th bit becomes a 0 134.170.10000000.00000000 134.170.128.0 <--- network address plus 1 = the host address 134.170.128.1 <--- first available host address We must then find the broadcast address to get the last valid host everything past the 17th bit becomes a 1 134.170.11111111.11111111 <-- broadcast address minus 1 = the last valid host address 134.170.255.254 <-- last valid host address The range is 134.170.128.1 - 134.170.255.254
Which network device enables centralized management of WAPs? VPN concentrator Load balancer Multilayer switch Wireless LAN controller
Wireless LAN controller
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: Penetration testing Wireless site survey Vulnerability scanning End user awareness and training
Wireless site survey
Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) Yagi antenna Omnidirectional antenna Dish antenna Non-directional antenna Parabolic antenna Dipole antenna
Yagi antenna Parabolic antenna Dish antenna (Dish and Parabolic antenna are the same thing!)
Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? FCoE SDN Z-Wave SIEM
Z-Wave
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? arp -e netstat -n nslookup arp -a
arp -a
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) ifconfig eth0 down ipconfig /release ifconfig eth0 up ipconfig /renew
ipconfig /renew ipconfig /release
What are the characteristics of fiber-optic cabling? (Select all that apply) High signal attenuation Used for network backbone cabling Immunity to electromagnetic interference Less suitable for carrying digital information than copper cabling Limited bandwidth and maximum cable segment length in comparison to copper cabling Used for last-mile cable runs Provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling
provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling Immunity to electromagnetic interference Used for network backbone cabling
Which of the following answers refers to a command-line packet capturing utility? netcat Zenmap tcpdump Nmap
tcpdump
Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces (e.g. copper and fiber, or vice versa)? Bridge Transceiver Active hub Managed switch
transceiver such as a GBIC and a SFP