TestOut Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Your network follows the 100BaseTX specifications for Fast Ethernet. What is the maximum cable segment length allowed?

100 meters

What is the binary format for the following decimal IP address? 131.9.202.11

10000011.00001001.11001010.01101111

You have been tasked with designing a high-speed Ethernet network. Your client's building already has 150-ohm shielded twisted pair (STP) wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation? 1000BaseSX 1000BaseLX 1000BaseT 1000BaseZX 10BaseFL 1000BaseCX

1000BaseCX

Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single-mode fiber option cable?

1000BaseLX

Which Gigabit Ethernet standard uses multimode fiber optic cabling and supports network segments up to a maximum of 550 meters long?

1000BaseSX

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cable. Which Ethernet standard meets these guidelines? (Choose two.) 10GBaseER 1000BaseSX 10BaseFL 1000BaseT 1000BaseCX 10GBaseSR

1000BaseSX 10GBaseSR

Which of the following use the CSMA/CD access method? Token Ring FDDI 1000BaseT 10BaseFL

1000BaseT

Which of the following Ethernet standards uses fiber-optic cabling? (Select two.) 1000BaseCX 100BaseT4 100BaseFX 100BaseTX 1000BaseLX

100BaseFX 1000BaseLX

You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementation? (Select two.) 10GBaseSR standards 10GBaseER standards Multi-mode fiber 10GBaseLR standards Single-mode fiber

10GBaseLR standards Single-mode fiber

How many total channels are available for 802.11g wireless networks? 3 11 12 23 54

11

Which data transmission rate is defined by the IEEE 802.11b wireless standard? 2 Mbps 10 Mbps 11 Mbps 56 Mbps

11 Mbps

Assuming the network is indicated by the default portion of the IP address, which three of the following IP addresses belong to the Class A network 114.0.0.0? (Select three) 114.122.66.12 114.0.0.15 114.58.12.0 115.0.0.66 115.77.89.4 115.88.0.55

114.122.66.12 114.0.0.15 114.58.12.0

You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now, you must configure the firewall on your network to allow time synchronization traffic through. Which of the following ports are you most likely to open on the firewall? 119 123 80 110

123

A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation?

129.11.99.78/16

Which of the following IP addresses is a valid IP address for a host on a public network? 172.16.254.12 192.168.16.45 10.3.125.2 142.15.6.1

142.15.6.1

What is the speed of an OC-3 connection? 622 Mbps 10 Mbps 155 Mbps 100 Mbps

155 Mbps

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask? 166.71.0.0 166.70.255.255 166.70.0.255 166.70.255.254 166.70.0.254

166.70.255.254

What is the network address and subnet mask used by APIPA?

169.254.0.0 255.255.0.0

Which of the following IP address ranges is reserved for automatic private IP addressing? 192.168.0.1 - 192.168.254.255 169.254.0.1 - 169.254.255.254 169.168.0.1 - 169.168.255.255 192.168.0.0 - 192.168.255.254 169.192.0.0 - 169.192.254.255

169.254.0.1 - 169.254.255.254

Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 169.254.0.1 - 169.254.255.254 10.0.0.1 - 10.255.255.254 172.16.0.1 - 172.31.255.254 192.168.0.1 - 192.168.255.254

169.254.0.1 - 169.254.255.254

You've decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (Select two) 172.17.32.0 172.17.128.0 172.17.16.0 172.17.96.0 172.17.0.0

172.17.128.0 172.17.0.0

Your network has been assigned the Class B network address of 179.113.0.0. Which three of the following addresses can be assigned to hosts on your network? 179.113.89.0 179.112.95.64 179.113.0.0 179.113.65.12 179.113.0.118 179.114.88.0 180.113.0.67

179.113.89.0 179.113.65.12 179.113.0.118

You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply) 192.168.12.253 224.15.166.12 240.12.188.1 127.0.0.1 32.188.99.10 10.0.12.15 172.18.188.67

192.168.12.253 10.0.12.15 172.18.188.67

Which of the following are frequencies define by 802.11 committees for wireless networking? (Select two) 900 MHz 1.9 GHz 2.4 GHz 5.75 GHz 10 GHz

2.4 GHz 5.75 GHz

Your network has been assigned the Class C network address 200.78.151.0. Which of the following addresses can be assigned to hosts on your network? (Select three) 200.78.151.0 200.78.151.257 200.78.151.12 200.78.151.111 200.78.151.252 200.78.152.14 200.78.151.255

200.78.151.12 200.78.151.111 200.78.151.252

You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?

2000 meters

What is the decimal format of the binary IP address? 11001110.00111010.10101010.01000011

206.58.170.67

How many total channels are available for 802.11a wireless networks? 3 11 12 23 54

23

Your network follows the 100BaseFX specifications for Fast Ethernet and uses half-duplex multi-mode cable. What is the maximum cable segment length allowed?

412 meters

Which of the following ports are used with TACACS? 22 49 50 and 51 1812 and 1813 3389

49

Which tunneling method is used to send IPv4 traffic through an IPv6 network?

4to6 tunneling

What is the frequency of 802.11a networking? 900 MHz 1.2 GHz 2.4 GHz 5.75 GHz

5.75 GHz

You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable? 53 21 443 80 42

53

You manage a network with two locations, Portland and Seattle. Both locations are connected to the internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: Host in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 internet and you want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use?

6to4

Haley configures a website using Windows Server 2016 default values. What are the HTTP port and SSL port settings? 80 for HTTP; 443 for SSL 440 for HTTP; 160 for SSL 160 for HTTP; 440 for SSL 443 for HTTP; 80 for SSL

80 for HTTP; 443 for SSL

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed the operate at 2.4 GHz. Which 802.11 standard will work best in this situation? 802.11d 802.11b 802.11a 802.11g 802.11c

802.11a

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two) 802.11a 802.11b 802.11g 802.1x Bluetooth

802.11a 802.11g

Which IEEE standard describes wireless communication? 802.5 802.7b 802.11b 802.2 802.3

802.11b

After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversly affected. Which of the following wireless networking standards are you most likely using? (Select two) 802.11g Bluetooth 802.11a 802.11b

802.11g 802.11b

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? 802.11g 802.11n 802.11a 802.11b

802.11n

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her user's workstations. She has also indicated the the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? 802.11d 802.11b 802.11c 802.11n 802.11a

802.11n

You are designing an update to your lient's wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? 802.11a 802.11n 802.11b 802.11d

802.11n

You have been contacted by OsCorp to recommend a wireless Internet solution. The wireless strategy must support a transmission range of 1,200 feet, use a frequency range of 5 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend? 802.11a 802.11n 802.11b WEP Bluetooth

802.11n

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards will work best in this situation? (Select two) 802.11d 802.11n 8002.11g 802.11a 802.11b

802.11n 802.11a

Which DNS record type points a host name to an IPv4 address?

A

Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? A DHCP server assigns addresses to requesting hosts It cannot be configured to assign the same IP address to the same host each time it boots It can deliver other configuration information in addition to IP addresses It is only used to deliver IP addresses to hosts

A DHCP server assigns addressed to requesting hosts It can deliver other configuration information in addition to IP addresses

Select the statement that best describes a broadcast storm. A broadcast storm occurs when the amount of electrical interference on a cable exceeds acceptable levels, broadcasting a storm of noise and preventing accurate data transfer A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth A broadcast storm occurs when a network server loses its connection to the network, and the disconnected cable sends feedback messages that overwhelm the network cable capacity A broadcast storm occurs when the level of TCP/IP transfers overwhelm a gateway

A broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth

In virtualization, what is the role of the hypervisor? A hypervisor is a software implementation that executes programs like a physical machine A hypervisor has the actual hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM, and motherboard A hypervisor is created within the host operating system and simulates a hard disk for the virtual machine A hypervisor allows virtual machines to interact with the hardware without going through the host operating system

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system

Which of the following are typical components of a NAS device? (Select two) A minimal network OS Initiator server An FC switch A dedicated network One or more NICs

A minimal network OS One or more NICs

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptops wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem? Different LAN protocols are being used A mismatched SSID WAP is out of range PPP is not configured correctly Antenna strength on the WAP is too low

A mismatched SSID

Which of the following is the strongest form of multi-factor authentication? A password, a biometric scan, and a token device A password and a biometric scan Two-factor authentication Two passwords

A password, a biometric scan, and a token device

You connect your computer to a wireless network available at the local library. You find that you can access all Web sites you want on the Internet except for two. What might be causing the problem? A firewall is blocking ports 80 and 443 The router has not been configured to perform port forwarding Port triggering is redirecting traffic to the wrong IP address A proxy server is blocking access to the websites

A proxy server is blocking access to the websites

An all-in-one security appliance is best suited for which type of implementation? A company that transmits large amount of time-sensitive data A remote office with no on-site technicians A credit card company that stores customer data An office with a dedication network closet

A remote office with no on-site technicians

What is a soft phone? A software algorithm that compresses VoIP data prior to transmission on an IP network A traditional or VoIP phone that has a padded handset that is more comfortable for a user A software application that runs on a computer or other device that accesses a VoIP server to make real-time phone calls A device that converts fax calls and other soft calls between the PSTN and an IP network

A software application that runs on a computer or other device that accesses a VoIP server to make real-time phone calls

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the 2nd floor. What could be causing this to happen?

A strong EMI emitter near the cable run connected to that interface.

In a variation of a brute force attack, an attacker may use a predefined list (dictionary) of common usernames and passwords to gain access to existing user accounts. Which countermeasure best addresses this issue? AES encryption VLANs 3DES encryption A strong password policy

A strong password policy

Which of the following is an example of an internal threat? A user accidentally deletes the new product designs A server backdoor allows an attacker on the internet to gain access to the intranet site A delivery man is able to walk into a controlled area and steal a laptop A water pipe in the server room breaks

A user accidentally deletes the new product designs

Which DNS record type points a hostname to an IPv6 address?

AAAA

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two) WEP encryption AES encryption 802.1x Preshared keys TKIP encryption Open authentication

AES encryption 802.1x

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?

ARP

Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer? ARP poisoning MAC spoofing IP spoofing Replay attack

ARP poisoning

Which of the following attacks tries to associate an incorrect MAC address with a known IP address? Null session ARP poisoning Hijacking MAC flooding

ARP poisoning

Which of the following are characteristics of MPLS? (Select two) Adds labels to data units uses a committed information rate (CIR) Supports variable-length data units Is a local loop technology uses fixed-length data units

Adds labels to data units Supports variable-length data units

You have a network connected using a physical star topology. One of the drop cables connecting a workstation has been removed. Which of the following best describes what effect this will have on network communications? Devices on one side of the missing cable will be able to communicate with each other; devices on the other side of the missing cable will not be able to communicate. No devices will be able to communicate. All devices except the device connected with the drop cable will be able to communicate. Devices on one side of the missing cable will be able to communicate with each other; devices on the other side of the missing cable will be able to communicate with each other. All devices will be able to communicate.

All devices except the device connected with the drop cable will be able to communicate.

During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e path cable that stretches from the network printer to the upgraded switch. What is the impact on the network? All network nodes except the printer will be available. All network nodes connected to the switch will be unavailable. All network nodes on the same subnet as the printer will be unavailable. All network nodes authenticated by the same server as the printer will be unavailable. All network nodes, including the printer, will be available.

All network nodes except the printer will be available.

Which of the following is a characteristic of static routing when compared to dynamic routing? Routers can only use static routing when not connected to the internet All routes must be manually updated on the router Routers use the hop count to identify the distance to a destination network Routers send packets for destination networks to the next hop router

All routes must be manually updated on the router

Which of the following are characteristics of TACACS+? (Select two) Uses UDP Allows the possibility of two different servers, one for authentication and authorization, and another for accounting Allows the possibility of three different servers, one each for authentication, authorization, and accounting Uses TCP

Allows the possibility of three different servers, one each for authentication, authorization, and accounting Uses TCP

Which of the following best describes the ping of death exploit? Partial IP packets with overlapping sequencing numbers Sending multiple spoofed ICMP packets to the victim An ICMP packet larger than 65,536 bytes Redirecting echo responses from an ICMP communication

An ICMP packet larger than 65,536 bytes

Which of the following describes how access lists can be used to improve network security? An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket number An access list identifies traffic that must use authentication or encryption An access list filters traffic based on the frame header such as source or destination MAC address An access list looks for patterns of traffic between multiple packets and take action to stop detected attacks

An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket number

Which of the following defines an acceptable use agreement? An agreement that outlines the organization's monitoring activities An agreement that is a legal contract between the organization and the employee that specifies that the employee is not to disclose the organization's confidential information An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use An agreement that prohibits an employee from working for a competing organization for a specified time after the employee leaves the organization

An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use

You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ45 port. You need to set up the network with the following in mind: • Spend as little money as possible. • Do not purchase unnecessary equipment. • Computers need to have a gigabit connection to the network. • New devices should not require management or configuration. You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs. What should you purchase? An unmanaged switch and CAT 5e cabling. A wireless AP and three new wireless NICs. A hub and CAT 5e cabling. A new cable modem with a built-in switch and CAT 6a cabling. A managed switch and CAT 6 cabling.

An unmanaged switch and CAT 5e cabling.

Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type?

Angled Physical Contact (APC)

You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable's ferrule has a slight slant to it. Which polish grad should you use to replace the existing cable?

Angled Physical Contact polish

Which of the following statements about the use of anti-virus software is correct? Once installed, anti-virus software needs to be updates on a monthly basis If servers on a network have anti-virus software installed, workstations do not need anti-virus software installed on them If you install anti-virus software, you no longer need a firewall on your network Anti-virus software should be configured to download updated virus definition files as soon as they become available

Anti-virus software should be configured to download updated virus definition files as soon as they become available

Which of the following measures are you most likely to implement to protect a system from a work or Trojan horse? Firewall Antivirus software IPsec Password policy

Antivirus software

RADIUS is primarily used for what purpose? Controlling entry gate access using proximity sensors Managing access to a network over a VPN Managing RAID fault-tolerant drive configurations Authenticating remote clients before access to the network is granted

Authenticating remote clients before access to the network is granted

What is the primary countermeasure to social engineering? Traffic filters A written security policy Awareness Heavy management oversight

Awareness

Which of the following routing protocols is used by routers on the internet for learning and sharing routes? RIP BGP IS-IS EIGRP OSPF

BGP

Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions? EIGRP BGP IS-IS RIP OSPF

BGP

You are working with an older 10Base2 Ethernet network. Which connector type will you most likely encounter?

BNC

Which of the following are typically associated with human resource security policies? (Select two) Password policies Background checks Change management Termination SLA

Background checks Termination

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic?

Baseline

You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect the change?

Baseline

A switch running STP is classified as a backup bridge. What state is it in?

Blocking

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two) Bluetooth 802.3a 802.11b Infrared 802.11a

Bluetooth 802.11b

A programmer that fails to check the length of input before processing leaves his code vulnerable to what form of common attack? Privilege escalation Backdoor Session hijacking Buffer overflow

Buffer overflow

Which of the following attacks is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle? Time of check/time of use (TOC/TOU) Buffer overflow Data diddling Smurf

Buffer overflow

Which topology connects all devices to a trunk cable?

Bus

In business continuity planning, what is the primary focus of the scope?

Business processes

Which DNS record type provides alternate names to hosts that already have a host record?

CNAME

Which of the following are the WAN service provider's responsibility to maintain? (Select four) DTE CO Local loop DCE CPE PSE

CO Local loop DCE PSE

All of the 802.11 standards for wireless networking support which type communication path sharing technology? CSMA/CA CSMA/CD Token passing Polling

CSMA/CA

What must you install between your network and a T1 line for your network to use the T1 line? Gateway CSU/DSU Transceiver Bridge

CSU/DSU

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals? Proxy CSU/DSU Modem IDS

CSU/DSU

Which of the following services are available regardless of whether the telephone company network is available? ISDN Dial-up DSL Cable modem

Cable modem

The media access control method of all Ethernet networks is ______.

Carrier sense multiple access with collision detection (CSMA/CD)

What is the minimum cable specification that supports 1000 Mbps Ethernet?

Cat 5e

Which of the following are requirements of the 1000BaseT Ethernet standards? (Select three.) SC or ST connectors Cat 5 cabling The cable length must be less than or equal to 1000m Cat 5e cabling The cable length must be less than or equal to 100m RJ45 connectors

Cat 5e cabling The cable length must be less than or equal to 100m RJ45 connectors

Which of the following cable types often includes a solid plastic core that keep the twisted pairs separated? Cat 6 Cat 3 Cat 5 Cat 5e

Cat 6

What type of cabling is used with 100BaseTX Fast Ethernet networks?

Cat5 or higher

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection too the network?

Certifier

You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? (Select two) Remove any backdoors Change default account password Conduct privilege escalation Apply all patches and updates Implement separation of duties

Change default account passwords Apply all patches and updates

You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cable connecting the computer to the network. Which type of document should you update?

Change documentation

You plan to implement a new security device on your network. Which of the following policies outlines the process you should following before implementing that device? Change management Resource allocation SLA Acceptable use

Change management

Which component of a change and configuration management policy identifies the need for a proposed change?

Change request

You recently installed a new all-in-one security appliance in a remote office. You are in the process of configuring the device. You need to increase the security of the device, enable remote management from the main office, and allow users to be managed through Active Directory. You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible. Which of the following tasks should you carry out? (Select two) Deny login from the device's WAN interface Create an Active Directory user group and add all users to the group Change the default username and password Deny login from all external IP addresses Configure the device's authentication type to use Active Directory

Change the default username and password Configure the device's authentication type to use Active Directory

Which network type establishes a dedicated physical connection between two hosts in order to transmit time-sensitive data? Sliding window Multiplexed Frame-based Circuit-switched Packet-switched

Circuit-switched

You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type? Classful Multicast Broadcast Public Classless

Classless

Which of the following terms are often synonymous with or made possible with CIDR? (Select two) Classful Classless NAT OSPF VLSM

Classless VLSM

A code of ethics accomplishes all but which of the following? Improves the professionalism of your organization as well as your profession Serves as a reference for the creation of acceptable use policies Clearly defines courses of action to take when a complex issue is encountered Establishes a baseline for managing complex situations

Clearly defines courses of action to take when a complex issue is encountered

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have?

Client-server

You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this? ActiveX Client-side scripts CGI Server-side scripts

Client-side scripts

When designing a firewall, what is the recommended approach for opening and closing ports? Open all ports; close ports that expose common network attacks Close all ports Open all ports; close ports that show improper traffic or attacks in progress Close all ports; open ports 20, 21, 53, 80, and 443 Close all ports; open only ports required by applications inside the DMZ

Close all ports; open only ports required by applications inside the DMZ

Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service? Mirroring Storage area networks (SANs) Clustering Adapter bonding

Clustering

Which type of internet service uses the DOCSIS specification? Shielded twisted pair Coaxial cable Fiber optic Unshielded twisted pair

Coaxial cable

You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number of CRC errors displayed. What are the most likely causes? (Select two. Each response is a complete solution) Collisions The cable connected to this interface is a cross-over cable, but should be a straight-through cable The device on the other end of the cable is powered off or the other interface is administratively shutdown EMI or cross-talk on the cable connected to the interface The cable connected to this interface is a straight-through cable, but should be a cross-over cable

Collisions EMI or cross-talk on the cable connected to the interface

As a victim of a Smurf attack, what protection measure is the most effective during the attack? Blocking all attack vectors with firewall filters Updating your anti-virus software Communicating with your upstream provider Turning off the connection to the ISP

Communicating with your upstream provider

Your organization entered into an interoperability agreement (IA) with another organization a year ago. As a part of this agreement, a federated trust was established between your domain and the partner domain. The partnership has been in the ongoing operations phase for almost nine months now. As a security administrator, which tasks should you complete during this phase? (Select two) Draft an MOU document Disable user and group accounts that the partner organization used to access your organization's data Negotiate the BPO agreement Conduct periodic vulnerability assessments Verify compliance with the IA documents

Conduct periodic vulnerability assessments Verify compliance with the IA documents

You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?

Configuration documentation

You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do? Enable the wireless card on the client Decrease the beacon interval on the access point Configure a profile on the wireless client Set the channel of the client to match the channel used by the access point

Configure a profile on the wireless client

You are the wireless network administrator for your organization. As the size of the organization had grown, you've decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution) Configure all RADIUS clients with a preshared key Configure all wireless access points with client certificates Configure the RADIUS server with a server certificate Configure the RADIUS server with a preshared key Configure all wireless workstations with client certificates

Configure the RADIUS server with a server certificate Configure the RADIUS server with a preshared key

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the hme network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two) Configure the VPN connection to use PPTP Configure the browser to send HTTPS requests through the VPN connection Configure the VPN connection to use IPsec Configure the VPN connection to use MS-CHAPv2 Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection

Configure the browser to send HTTPS requests through the VPN connection Configure the VPN connection to use IPsec

You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following is a required part of your configuration? Configure the remote access servers as RADIUS servers Configure remote access clients as RADIUS clients Configure the remote access servers as RADIUS clients Obtain certificates from a public or private PKI

Configure the remote access servers as RADIUS clients

To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine become infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again? Switch to a more reliable anti-virus software Carefully review open firewall ports and close any unneeded ports Create a scheduled task to run sfc.exe daily Configure the software to automatically download the virus definition files as soon as they become available

Configure the software to automatically download the virus definition files as soon as they become available

What does the ip address dhcp command allow you to do? Configure the switch to obtain an IP address from a DHCP server Configure the switch to act as a DHCP server Send the DHCP server address to all connected devices Specify the DHCP relay server for forwarding DHCP packets

Configure the switch to obtain an IP address from a DHCP server

You want to create a rollover cable that has an RJ45 connector on both ends. How should you connect the wires within the connectors? Connect pink 1 to pink 8, pink 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5. Connect pin 1 to pin 3 and pin 2 to pin 6. Connect each pin on one end to the same pin on the other end (pin 1 to pin 1, pin 2 to pin 2, etc.) Use the T568A standard on one end and the T568B standard on the other end.

Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5.

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution) Create a new virtual switch configured for bridged (external) networking Disable the switch port that the hypervisor's network interface is connected to Create MAC address filters on the network switch that block each virtual machine's virtual network interfaces Connect the virtual network interfaces in the virtual machines to the virtual switch Disconnect the network cable from the hypervisor's network interface Create a new virtual switch configured for host-only (internal) networking

Connect the virtual network interfaces in the virtual machines to the virtual switch Create a new virtual switch configured for host-only (internal) networking

Which of the followings tasks is associated with the Session layer? Connection establishment Host ID number assignment Acknowledgement coordination Transmission synchronization

Connection establishment

The UDP transport protocol provides which of the following features? (Select all that apply) Connectionless datagram services Sequence numbers and acknowledgements Low overhead Guaranteed delivery

Connectionless datagram services Low overhead

Which of the following actions typically involves the use of 802.1x authentication? (Select two) Authenticating VPN users through the internet Authentication remote access clients Controlling access through a switch Controlling access through a router Controlling access through a wireless access point

Controlling access through a switch Controlling access through a wireless access point

Which of the following applications typically use 802.1x authentication? (Select two) Controlling access through a wireless access point Controlling access through a switch Authenticating remote access clients Authenticating VPN users through the internet Controlling access through a router

Controlling access through a wireless access point Controlling access through a switch

Which of the following are included as part of Data Link layer specifications? (Select two) Controlling how messages are propagated through the network Identifying physical network devices Synchronizing individual bits as they are transmitted through the network Composing electrical signals as they pass through the transmission medium

Controlling how messages are propagated through the network Identifying physical network devices

You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network? Link state VLSM Classful Distance vector Convergence

Convergence

Which of the following is a text file that a website stores on a client's hard drive to track and record information about the user? Cookie Certificate Mobile code Digital signature

Cookie

What is the basic purpose of the OSI Physical layer?

Coordinates rules for transmitting bits

You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do? (Select two. Each response is one part of the complete solution) Create a new virtual switch configured for bridged (external) networking Disable the switch port that the hypervisor's network interface is connected to Create a new virtual switch configured for internal networking Connect the virtual network interfaces in the virtual machines to the virtual switch Create a new virtual switch configured for host-only networking

Create a new virtual switch configured for bridged (external) networking Connect the virtual network interfaces in the virtual machines to the virtual switch

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?

Crimping tool

Would you use a straight-through or crossover cable when connecting the following devices: Workstation to a workstation, router to a router, or workstation to a router (in a back-to-back configuration) Uplink port on a hub or switch to an uplink port on a hub or switch Workstation or router to the uplink port on a hub or a switch Hub or switch using a regular port to a hub or a switch using a regular port

Crossover

You need to connect two switches using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?

Crossover

You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Crossover

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

Crossover

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack? Replay DoS Backdoor Spamming DDoS

DDoS

You have a TCP/IP network with 50 hosts. There has been inconsistant communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?

DHCP

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use? DNS server DHCP server Router Gateway

DHCP server

You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?

DNS

While using the Internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, however, the browser displays a completely different website. When you use the IP address of the Web server, the correct site is displayed. Which type of attack has likely occurred? Man-in-the-middle Spoofing DNS poisoning Hijacking

DNS poisoning

You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use? IDS DNS server Bandwidth shaper IPS Load balancer

DNS server

Which wireless networking component is used to connect multiple APs together? BSS DS IBSS STA

DS

Which of the following internet connection technologies requires that the location be within a limited distance of the telephone company central office? Wireless Satellite Cable modem DSL

DSL

A switch is associated with which OSI model layer?

Data Link

Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning?

Data Link

Which of the following statements about the functionality of LCP are true? (Select three) LCP provides remote terminal access in public data networks LCP is responsible for logical addressing in PPP Data can be compressed at the source and decompressed at the destination LCP provides multilink support Usernames and passwords may be required during the handshake LCP encapsulates multiple protocols

Data can be compressed at the source and decompressed at the destination LCP provides multilink support Usernames and passwords may be required during the handshake

Which of the following functions are performed by the OSI Transport layer? (Select three) Data segmentation and reassembly Control media access, logical topology, and device identification End-to-end flow control Path identification and selection Reliable message delivery Consistent data formatting between dissimilar systems Format packets for delivery through the media

Data segmentation and reassembly End-to-end flow control Reliable message delivery

You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do? Create a wireless profile on the client Enable SSID broadcast Change the channel on the access point to a lower number Decrease the beacon interval

Decrease the beacon interval

You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would your most likely need to change? DNS server IP address Default gateway Subnet mask

Default gateway

What is the point where the service provider's responsibility to install and maintain wiring and equipment ends, and the customer's responsibility begins?

Demarc

Which of the following is not a valid response to a risk discovered during a risk analysis? Mitigation Assignment Acceptance Denial

Denial

Which of the following can be used to stop piggybacking from occurring at a front entrance where employees swipe smart cards to gain entry? Install security cameras Use weight scales Use key locks rather than electronic locks Deploy a mantrap

Deploy a mantrap

You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all that apply) Checksum Destination address of a packet Source address of a packet Port number Sequence Number Digital signature Acknowledgement number

Destination address of a packet Source address of a packet Port number

You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all that apply) Destination address of a packet Source address of a packet Digital signature Checksum Port number Sequence number Acknowledgement number

Destination address of a packet Source address of a packet Port number

You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what affects this will have on network communications? No devices will be able to communicate with any other device. Device A will be able to communicate with any device except for device B. Device A will not be able to communicate with any other device. Device A will be able to communicate with all other devices.

Device A will be able to communicate with all other devices.

Which of the following statements describe how VLANs affect broadcast traffic within an internetwork? (Select two) Broadcast traffic is only transmitted on VLAN1 Devices on the same VLAN have the same subnet address Broadcast traffic is transmitted to all devices on all VLANs Devices on separate VLANs share the same subnet address Broadcast traffic is transmitted only within a VLAN

Devices on the same VLAN have all the same subnet address Broadcast traffic is transmitted only within a VLAN

Which of the following best describes the concept of a VLAN? Devices connected through the internet that can communicate without using a network address Devices in separate networks (which means they have different network addresses) logically grouped as if they were in the same network Devices on different networks that can receive multicast packets Devices on the same network logically grouped as if they were on separate networks Devices connected by a transmission medium other than cable (such as microwave or radio transmissions)

Devices on the same network logically grouped as if they were on separate networks

On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do? Tell him no and quickly close the door Let him in and help him find the restroom. Then let him work Let him in Direct him to the front entrance and instruct him to check in with the receptionist

Direct him to the front entrance and instruct him to check in with the receptionist

You need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two) Omni-directional Bridge Directional High-gain Normal-gain

Directional High-gain

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving? Use a form of authentication other than open authentication Disable SSID broadcast Implement WPA2 Personal Change the default SSID

Disable SSID broadcast

You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: Dual core processor Dual power supplies RAID 5 volume One RAID controller Two 1000 Mbps network adapters Which component is a single point of failure for the website? Disk controller Disk storage Network adapter Power supply

Disk controller

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic? Hub-and-spoke infrastructure Independent access points Distributed wireless mesh infrastructure Lightweight access point (LWAP) with wireless controller infrastructure

Distributed wireless mesh infrastructure

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): Corpnet Security: WPA2-PSK using AES Requency: 5.7 GHz Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do? Upgrade to 802.11a access points Implement antenna diversity Double the bandwidth assigned per channel to 40 MHz Switch to TKIP encryption

Double the bandwidth assigned per channel to 40 MHz

Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two) Double-entry door Mantrap PTZ CCTV Anti-passback system Turnstile

Double-entry door Turnstile

In the output of the netstat command, you notice that a remote system has made a connection to your Windows Server 2016 system using TCP/IP port 21. Which of the following actions is the remote system most likely performing? Downloading a web page Downloading a file Downloading email Performing a name resolution request

Downloading a file

When you browse to a website, a pop-up window tells you that your computer has been infected with a virus. You click on the window to see what the problem is. Later, you find out that the window has installed spyware on your system. What type of attack has occurred? DLL injection SQL injection Drive-by download Trojan horse

Drive-by download

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet

Which of the following are examples of social engineering? (Select two) Port scanning War dialing Dumpster diving Shoulder surfing

Dumpster diving Shoulder surfing

You want to connect your small company network to the internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connections to internal hosts. What type of network address translation (NAT) should you implement? Static Shared Dynamic Restricted

Dynamic

Which service automatically creates and deletes host record when an IP address lease is created or released?

Dynamic DNS

You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client? PPP EAP MS-CHAP CHAP

EAP

You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use? MS-CHAP v2 PKI IPsec EAP

EAP

Which of the following cellular network types provide internet connectivity? (Choose four) EDGE LTE HSPA+ 2G 4G

EDGE LTE HSPA+ 4G

Which of the following routing protocols is classified as a hybrid routing protocol? RIP EIGRP IS-IS OSPF

EIGRP

IPsec is implemented through two separate protocols. What are these protocols called? (Select two) ESP AH EPS SSL L2TP

ESP AH

Which of the following are advantages of virtualization? (Select two) Reduced utilization of hardware resources Redundancy of hardware components for fault tolerance Easy system migration to different hardware Centralized administration Improved detection host host-based attacks

Easy system migration to different hardware Centralized administration

You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?

Echo

You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two) Enable chassis intrusion detection Educate users about malware Schedule regular full system scans Enable account lockout Disable UAC

Educate users about malware Schedule regular full system scans

Which technologies are used by the 802.11ac standard to increase network bandwidth? (Select two) Four MIMO radio streams 40 MHz bonded channels Data compression Eight MIMO radio streams 160 MHz bonded channels

Eight MIMO radio streams 160 MHz bonded channels

You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm? Configure each switch with a single trunk port Manually set the speed for each switch port Disable auto-duplex detection Enable spanning tree on the switches

Enable spanning tree on the switches

In the OSI model, which of the following functions are performed at the Presentation layer? (Select two) Maintain separate client connections Transmit data frames Handle general network access, flow control, and error recovery Encrypt and compress data Provide network services Specify data format (such as file formats)

Encrypt and compress data Specify data format (such as file formats)

Which of the following features are supplied by WPA2 on a wireless network? Client connection refusals based on MAC address Encryption A centralized access point for clients Traffic filtering based on packet characteristics Network identification

Encryption

Which of the following is a characteristic of TACACS+? Encrypts the entire packet, not just authentication packets Supports only TCP/IP Uses UDP ports 1812 and 1813 Requires that authentication and authorization are combined in a single server

Encrypts the entire packet, not just authentication packets

Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving? Create a strong password policy Secure all terminals with screensaver passwords Mandate the use of Integrated Windows Authentication Establish and enforce a document destruction policy

Establish and enforce a document destruction policy

An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using AirSnort to capture packets, but found that she couldn't break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. Which attack techniques did the attacker use in this scenario? (Select two) Evil twin Denial of service Pharming Man-in-the-middle Smurf

Evil twin Pharming

You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use?

F-type

Which oof the following is a valid IPv6 address? FEC0:AB98::A7::9845:4567 199.12.254.11 FEC0:AB04:899A FEC0::AB:9007 FEC0:9087:AB04:9900:7GA2:7788:CEDF:349A

FEC0::AB:9007

You want to allow users to download files from a server running the TCP/IP protocol. You want to require user authentication to gain access to specific directories on the server. Which TCP/IP protocol should you implement to provide this capability? TFTP HTTP TCP IP FTP HTML

FTP

Which of the following is likely to be located in a DMZ? Backup server User workstations FTP server Domain controller

FTP server

You have just connected four new computer systems to an Ethernet switch using space patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem? Incorrect routing table Failed switch Incorrect LAN protocol Faulty IP stack Failed patch cable

Failed patch cable

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have any difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. Which of the following might you suspect as the problem? Failed switch Incorrect duplex settings Faulty termination Failed patch cable between the client system and the wall jack Failed network card Server software configuration error

Failed patch cable between the client system and the wall jack

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collisions?

Faulty network card

Which component of a change and configuration management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?

Feasibility analysis

Ethernet 100BaseFX networks use what type of cabling?

Fiber optic

Which of the following are characteristics of a circuit-level gateway? (Select two) Filters by session Stateful Filters IP addresses, but not ports Stateless Filters by URL

Filters by session Stateful

Which of the following is the best device to deploy if you want to protect your private network from a public untrusted network? Gateway Router Hub Firewall

Firewall

You are the administrator of your company's network. You want to prevent unauthorized access to your intranet from the internet. Which of the following should you implement? ICS Packet Internet Groper Proxy server Firewall

Firewall

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet to provide users with internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again?

Firewall

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Forward the packet to the next hop router specified by the route to network 0.0.0.0.

Which of the following WAN technologies provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps? X.25 ISDN Frame relay POTS

Frame relay

What type of virtualiation completely simulates a real physical host? Paravirtualization Full virtualization Semi-virtualization Partial virtualization

Full virtualization

Which of the following can route Layer 3 protocols across an IP network? PPTP IPsec GRE SSL

GRE

Which of the following is true of a wireless network SSID? Is a 48-bit value that identifies an AP Allowing devices to find a specific AP within an ESS Is used by STAs as they roam between APs Groups wireless devices together into the same logical network

Groups wireless devices together into the same logical network

Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two) HSPA+ EDGE LTE WiMAX CDMA2000

HSPA+ LTE

Which protocol is used on the World Wide Web to transmit web pages to web browsers?

HTTP

Which protocol is used to securely browse a webstie?

HTTPS

Which of the following are true about reverse proxy? (Select two) Handles requests from inside a private network out to the internet Handles requests from the internet to a server in a private network Sits between a client computer and the internet Clients always know they are using reverse proxy Can perform load balancing, authentication, and caching

Handles requests from the internet to a server in a private network Can perform load balancing, authentication, and caching

Which of the following is a common social engineering attack? Hoax virus information emails Distributing false information about your organization's financial status Using a sniffer to capture network traffic Logging on with stolen credentials

Hoax virus information emails

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use? Proxy server VPN concentrator Host-based firewall Network-based firewall

Host-based firewall

An access point that conforms to the IEEE 802.11b standard behaves similarly to what other networking device? Terminal Hub Router Gateway Patch bay

Hub

Which of the following devices does not segment the network? Switch Router Firewall Hub

Hub

Which of the following devices operates at the OSI model Layer 1? Hub Switch Firewall Router

Hub

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two) Hub Repeater Bridge Router Switch Gateway

Hub Repeater

Which protocol allows hosts to exchange messages to indicate problems with packet delivery?

ICMP

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor?

IDF (intermediate distribution frame)

What protocol does an IP host use to inform a router that it wants to receive specific multicast frames?

IGMP

You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? Distance vector Link state IGP BGP Dynamic Static

IGP

Which protocol stores email on the mail server and allows users to access messages from various client devices without having to download the emails?

IMAP4

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol was designed for this purpose?

IMAP4

You have a router that is configured as a firewall. The router is a Layer 3 device only. Which of the following does the router use for identifying allowed or denied packets? Username and password IP address Session ID MAC address

IP address

You have a router that is configured as a firewall. The router is a Layer 3 device only. Which of the following does the router use for identifying allowed or denied packets? Username and password Session ID MAC address IP address

IP address

You have a workstation connected to a small branch network using a single switch. The network does not have any routers and is not connected to the internet. What are the minimum configuration parameters required on the workstation to be able to communicate with all hosts on the network?

IP address and subnet mask

What are other names for a VoIP server? (Select two) Hard phone Jitter QoS IP-PBX VoIP PBX

IP-PBX VoIP PBX

Which of the following network layer protocols provides authentication and encryption services for IP-based network traffic? L2TP IPsec TCP SSL

IPsec

Which of the following protocols or mechanisms is used to provide security on a wireless network? (Select three) IPsec RDP WPA 802.1x

IPsex WPA 802.1x

Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels? X.25 ISDN BRI Frame relay ATM

ISDN BRI

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use? SaaS PaaS IaaS DaaS

IaaS

Your organization is in the process of negotiating an interoperability agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two) Identify how data will be shared Verify compliance with the IA documents Identify how data ownership will be determined Reset all passwords the third party uses to access data or applications on your network Conduct security audits on the partner organization

Identify how data will be shared Identify how data ownership will be determined

A workstation is connected to a switch on the Gi0/2 interface using a straight-through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in full-duplex mode. Which of the following are true in this scenario? (Select three) The switch interface will display as administratively down If the link speed is 10 Mbps or 100 Mbps, full-duplex is due If the ink speed is 1000 Mbps or faster, half-duplex is used If the link speed in 1000 Mbps or faster, full-duplex is used The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected If the link speed is 10 Mbps or 100 Mbps, half-duplex is used

If the link speed in 1000 Mbps or faster, full-duplex is used The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected If the link speed is 10 Mbps or 100 Mbps, half-duplex is used

Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers? If the network is connected to the Internet using multiple ISPs If the network is connected to the Internet using public addressing If the network has over 15 hops If the network has over 15 areas and uses IPv6

If the network is connected to the Internet using multiple ISPs

Which of the following are advantages of using fiber optic cabling for a network? (Select two) Immunity to electromagnetic interference No special training or equipment is required Lower installation cost Greater cable distances without a repeater

Immunity to electromagnetic interference Greater cable distances without a repeater

Which of the following is not a form of social engineering? A virus hoax email message Impersonating a utility repair technician Impersonating a manager over the phone Impersonating a user by logging on with stolen credentials

Impersonating a user by logging on with stolen credentials

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Route VM-to-VM traffic through a physical firewall and back to the virtual network Create a virtual router with VRF technology Implement a virtual firewall within the hypervisor Define VLAN memberships on each VM

Implement a virtual firewall within the hypervisor

You recently created a new network segment for the development department. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem? Configure the router to forward broadcast messages Implement an IP helper address on the router Install and configure a new DHCP server on the development network segment Move the DHCP server to the new network segment

Implement an IP helper address on the router

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHZ Bandwidth per channel: 40 MHZ Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do? Implement antenna diversity Switch to RADIUS authentication for wireless clients Reduce the power of the access point radio signals Install directional access points

Implement antenna diversity

As you are helping a user with a computer problem, you notice that she has written her password on a note stuck to her computer monitor. Which of the following is the best action to take to make remembering passwords easier so that she no longer has to write the password down? Implement end-user training Increase the maximum password age Remove the complex password requirement Decrease the minimum password length Increase the account lockout clipping level

Implement end-user training

Which statements accurately describe the port states of both bridges and switches? (Select two) In the learning state, the MAC address table can be populated, but frames are not forwarded Ports in a blocked state still receive BPDUs In the learning state, all ports are in a forwarding state Ports in a blocked state cannot receive BPDUs In the learning state, the MAC address table cannot be populated because the port is blocked

In the learning state, the MAC address table can be populated, but frames are not forwarded Ports in a blocked state still receive BPDUs

Match each with its correct switch management method: Competes with normal network traffic for bandwidth Uses a dedicated communication channel Must be encrypted to protect communications from sniffing Does not compete with normal network traffic for bandwidth Affected by network outages

In-band management: Competes with normal network traffic for bandwidth Must be encrypted to protect communications from sniffing Affected by network outages Out-of-band management: Uses a dedicated communication channel Does not compete with normal network traffic for bandwidth

You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. You are using a Windows server for DHCP, and the default lease time is eight days. What impact, if any, will this have on the network? Increased network traffic Network bandwidth will increase No impact Decreased network traffic Router performance will increase No impact Decreased network traffic Router performance will improve

Increased network traffic

Which of the following are reasons to configure VLANs on a switch as opposed to using switches without VLANs? (Select two) Increased number of broadcast domains Allowing broadcast traffic between subnets Redundant paths between two hosts Increased security Increased number of collision domains

Increased number of broadcast domains Increased security

Which of the following CCTV types would you use in areas with little or no light? C-mount A camera with a high LUX rating Infrared PTZ

Infrared

Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (Select two) Configure a HOSTS file for local IP resolution Configure client systems to use static IP assignment Install a DHCP server on the network Use Automatic Private IP Addressing Install the DHCP client on all workstations Set the Windows network-monitoring utility to identify potential IP conflicts

Install a DHCP server on the network Use Automatic Private IP Addressing

You would like to control internet access based on users, time of day, and websites visited. How can you do this? Configure internet zones using Internet Options Enable Windows Firewall on each system. Add or remove exceptions to control access Install a proxy server. Allow internet access only through the proxy server Configure the Local Security Policy of each system to add internet restrictions Configure a packet filtering firewall. Add rules to allow or deny internet access

Install a proxy server. Allow internet access only through the proxy server

Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do? Add a UPS system to the switch. Install a dedicated power circuit for the switch. Add a dedicated A/C unit to the switch closet. Install shielded cables near the elevator.

Install shielded cables near the elevator.

Arrange the Fibre Channel (FC) SAN implementation tasks in the order they should be performed to build a redundant FC SAN. Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. Deploy two FC switches. Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs. Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN. Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.

Install two Fiber Channel host bus adapters in each server that will access the shared storage on the SAN. Deploy two FC switches. Using fiber optic cables, connect each server to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch. Deploy the shared storage devices, such as an external RAID device containing multiple hard disk drives and two FC HBAs. Using fiber optic cables, connect each storage device to each FC switch by connecting one FC HBA to one FC switch and the other FC HBA to the other FC switch.

While using a web-based order form, an attacker enters an unusually large value in the quantity field. The value entered is large enough to exceed the maximum value supported by the variable type used to store the quantity in the web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario? Integer overflow Watering hole URL hijacking Buffer overflow

Integer overflow

In the OSI model, which of the following functions are performed at the Application layer? (Select all that apply) Integrating network functionality into the host operating system Enabling communication between network clients and services Conversation identification Data translation

Integrating network functionality into the host operating system Enabling communication between network clients and services

Which of the following best describes how a switch functions? It connects multiple segments of different architectures. It translates frames and forwards them to the appropriate segment It connects multiple segments of different architectures. It translates frames and broadcasts them to all of its ports It connects multiple cable segments (or devices) and broadcasts frames to all of its ports It connect multiple cables segments (or devices) and forwards frames to the appropriate segment

It connect multiple cables segments (or devices) and forwards frames to the appropriate segment

A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? It does not record address or segment information. However, the message is forwarded. It does not record address or segment information. It does not forward the message It places the source address and segment in its database and forwards the message It places the source address and segment in its database, but does not forward the message.

It does not record address or segment information. It does not forward the message

You have installed anti-malware software that checks for viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file? The infection has been removed, and the file has been saved to a different location The file extension has been changed to prevent it from running It has been deleted from your system It has been moved to a secure folder on your computer

It has been moved to a secure folder on your computer

Which of the following is true about the MAC address? (Select two) It is a 64-bit address It is a 48-bit address It is a 32-bit address It is typically represented by hexadecimal numbers It is typically represented by octets of decimal numbers between 0-255

It is a 48-bit address It is typically represented by hexadecimal numbers

Which of the following statements accurately describes how a modem works? (Select two) It demodulates analog PC data into digital data that can be transmitted through a telephone network It modulates digital data from a telephone network into analog data that a PC can use It communicates over a telephone network using digital signals It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps It modulates digital data from the PC into analog data and transmits it on a telephone network It demodulates analog data from a telephone network into PC data

It modulates digital data from the PC into analog data and transmits it on a telephone network It demodulates analog data from a telephone network into digital PC data

A switch is running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? It places the source address and segment in its database and forwards the message It does not record address or segment information. However, the message is forwarded It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. It does not record address or segment information. It does not forward the message

It uses the source MAC address and network segment information to build its bridge database, but does not forward the message

Which of the following are characteristics of coaxial network cable? (Select three) It uses two concentric metallic conductors. It uses two concentric conductors that are made from plastic or glass and conduct light signals. It has a conductor made from copper in the center of the cable. It is composed of four pairs of 22-gauge copper wire. The ends of the cable must be terminated. It uses RJ45 connectors. The conductors within the cable are twisted around each other to eliminate cross-talk.

It uses two concentric metallic conductors. It has a conductor made from copper in the center of the cable. The ends of the cable must be terminated.

Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system? Packet loss Echo Latency Jitter

Jitter

Which of the following is the most important way to prevent console access to a network switch? Keep the switch in a room that is locked by a keypad Set console and enable secret passwords Disconnect the console cable when not in use Implement an access list to prevent console connections

Keep the switch in a room that is locked by a keypad

Which recommendation should you follow while using 110 blocks for connecting Cat 5 and higher data cables? Keep wire pairs twisted up to within one-half on an inch to the connector Use C-5 connectors Connect wires using the T568B standard Connect wires using the T568A standard

Keep wire pairs twisted up to within one-half of an inch of the connector

Which of the following authentication methods uses tickets to provide single sign-on? 802.1x PKI Kerberos MS-CHAP

Kerberos

Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? (Select two) PPPoE ICA L2TP PPTP VNC

L2TP PPTP

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two) LC BNC MTRJ SC

LC MTRJ

What connection order would two TCP/IP routers use to open a session with PPP? LCP, NCP, authentication NCP, LCP, authentication NCP, authentication, LCP LCP, authentication, NCP

LCP, authentication, NCP

What is the most common security policy failure? Overlooked critical assets Failure to assign responsibilities Lack of user awareness Improperly outlined procedures

Lack of user awareness

You are on a phone call using VoIP. You notice that it takes several seconds for the person on the other end to respond to questions you ask. Which type of problem is occurring? Jitter Echo Latency Packet loss

Latency

At which OSI model layer does a media converter operate?

Layer 1

At which OSI layer does a router operate?

Layer 3

Which of the following are functions of the MAC sublayer? (Select two) Creating routing tables based on MAC addresses Letting devices on the network have access to the LAN Mapping hardware addresses to link-layer addresses Defining a unique hardware address for each device on the network

Letting devices on the network have access to the LAN Defining a unique hardware address for each device on the network

Switches running the STP are in the process of exchanging BPDUs and redefining their roles. In what state are the switches?

Listening

Which of the following controls is an example of a physical access control method? Hiring background checks Smart cards Passwords Access control lists with permissions Locks on doors

Locks on doors

What is one benefit of placing VoIP gateways in geographically separated branch offices that have an existing WAN connection? Less costly VoIP gateways can be used in place of expensive routers and modems to provide WAN connectivity Data can be transported between VoIP gateways over the PSTN instead of via the expensive WAN Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred VoIP gateways can aggregate multiple VoIP calls for more efficient transmission to the home office

Long-distance PSTN charges can be reduced by switching VoIP calls to the PSTN in locations where only local call charges would be incurred

The Data Link Layer of the OSI model is comprised of two sublayers. What are they?

MAC LLC

Which of the following attacks, if successful, causes a switch to function like a hub? Replay MAC spoofing ARP poisoning MAC flooding

MAC flooding

What is the wiring closet in the basement or a ground floor that typically includes the demarcation point?

MDF (main distribution frame)

Which networking technology creates virtual links between two remote network endpoints by prefixing packets with a header containing one or more labels? ATM MPLS Frame relay Ethernet

MPLS

Which of the following technologies uses variable-length packets, adds label to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic? MPLS Frame relay SONET ATM ISDN

MPLS

Which DNS record type identifies servers that can be used to deliver mail?

MX

What is the primary goal of business continuity planning?

Maintaining business operations with reduced or restricted infrastructure capabilities or resources

An attacker captures packets as they travel from one host to another with the intent of altering the contents of the packets. Which type of attack is being executed? Man-in-the-middle attack Spamming Distributed denial of service Passive logging

Man-in-the-middle attack

Which business document is a contract that defines a set of terms that will govern future agreements between two parties?

Master service agreement

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use?

Media converter

You have implemented an ad hoc wireless network that doesn't employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?

Mesh

You want to implement a fault tolerant topology as you connect routers on your wide area network. Which topology meets your needs?

Mesh

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which network topology provides redundancy for a failed link?

Mesh

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

When multiple routes to a destination exist, what is used to select the best possible route?

Metric

Which geographic network type is typically managed by a city as a public utility?

Metropolitan area network (MAN)

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the internet. Which of the following is likely the cause of the problem? Duplex mismatch between a switch and a router Switching loop on the user's subnet Incorrect default gateway setting on the computer Missing default route on a router

Missing default route on a router

You manage a network with multiple subnets connected to the internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet. However, the computer does access other computers on other subnets as well as the internet. Which of the following is most likely the cause of the problem? Missing route on the default gateway router Incorrect default gateway setting on the computer Incorrect VLAN membership of the accounting server Switching loop on the user's subnet

Missing route on the default gateway router

When recovery is being performed due to a disaster, which services are to be stabilized first?

Mission critical

To access the internet through the PSTN, what kind of connectivity device must you use? DTE Modem CSU/DSU Switch TDM

Modem

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a username of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Use TFTP to back up the router configuration to a remote location Change the default administrative username and password Move the router to a secure server room Use encrypted type 7 passwords Use a Telnet client to access the router configuration

Move the router to a secure server room

Which of the following functions are performed at the Physical layer of the OSI model? Provisioning environments where you can run network applications Conversation identification Enabling network services Moving data across network cables Data translation

Moving data across network cables

Which address type is shared by multiple hosts and used to form groups of computers that receive the same data stream?

Multicast

Which address type is used for a video conference call consisting of multiple participants?

Multicast

Which type of address is the IP address 232.111.255.250?

Multicast

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

Multimeter

What key advantages does a virtual router have over a physical router? Allows the virtual router redundancy protocol (VRRP) to be used Multiple networks can be connected to a single interface Faster routing performance Routing protocols are not necessary for routing data between networks

Multiple networks can be connected to a single interface

Which of the following statements about virtual NICs are true? (Select two) Virtual NICs don't have a MAC address Virtual NICs can only communicate with other virtual NICs The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated Multiple virtual NICs can be added to a virtual machine Virtual NICs need the appropriate driver installed to function

Multiple virtual NICs can be added to a virtual machine Virtual NICs need the appropriate driver installed to function

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP? Mutual authentication Three-way handshake Certificate-based authentication Hashed shared secret

Mutual authentication

You manage a network with three dedicated storage devices. Users on the network see only a single file server. Which network-based storage technology is being used? NAS with clustering Fibre channel SAN iSCSI SAN with clustering NAS

NAS with clustering

Which of the following networking devices or services prevents the use of IPsec in most cases? Switch NAT Firewall Router

NAT

Which of the following protocols is used by PPP to enable support for multiple Network layer protocols? NCP TCP LCP SAP HDLC

NCP

You have a large TCP/IP network and want to keep hosts' real time clock synchronized. What protocol should you use?

NTP

What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? In common or community work areas Near a window In the center of the building Above the 3rd floor

Near a window

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?

Negligence

PPP supports authentication, compression, and multiple Network layer protocols. Which of the following correctly sequences these functions when a PPP link is established? Negotiate Network layer protocols, perform authentication, negotiate compression settings Negotiate Network layer protocols, negotiate compression settings, perform authentication Perform authentication, negotiate Network layer protocols, negotiate compression settings Negotiate compression settings, perform authentication, negotiate Network layer protocols Perform authentication, negotiate compression settings, negotiate Network layer protocols Negotiate compression settings, negotiate Network layer protocols, perform authentication

Negotiate compression settings, perform authentication, negotiate Network layer protocols

Which of the following are benefits of LCP? (Select three) Provides logical addressing for the data link layer Negotiates the use (or lack) of authentication before starting the session Monitors data dropped on the link and avoids frame looping Provides load balancing across multiple links Provides physical addressing for the data link layer

Negotiates the use (or lack) of authentication before starting the session Monitors data dropped on the link and avoids frame looping Provides load balancing across multiple links

At which OSI layer does a router operate to forward network messages?

Network

You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue? Network hub Access point Range extender Network bridge

Network bridge

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Network diagram

Which network component connects a device to transmission media and allows the device to send and receive messages?

Network interface card

Which of the following devices operate at OSI model Layer 2? (Select two) Firewall Network interface card Switch Router Hub Repeater

Network interface card Switch

Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ? IPS VPN concentrator Network-based firewall Host-based firewall IDS

Network-based firewall

You have a network connected using a physical bus topology. One of the cables that connects a workstation to the bus breaks. Which of the following best described what effect this will have on network communications? No devices will be able to communicate. Devices on one side of the break will be able to communicate with each other; devices on the other side will not be able to communicate. All devices except the device connected with the drop cable will be able to communicate. Devices on one side of the break will be able to communicate with each other ; devices on the other side of the break will be able to communicate with each other. All devices will be able to communicate.

No devices will be able to communicate.

You are configuring a switch so that you can manage it using PuTTY from the same network segment as the switch. On the switch, you enter the following commands: switch#config terminal switch(config)#interface vlan 1 switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? Why or why not?

No, the no shutdown command needs to be entered

You are installing networking wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon investigation, it appears very similar to Cat 5e wiring. Should you use Cat 3 cabling as a substitute for Cat 5e cabling to finish the project? Why or why not?

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates.

Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)? RIP OSPF EIGRP IS-IS

OSPF

Which of the following routing protocols uses relative link cost as the metric? OSPF BGP RIP EIGRP

OSPF

Which of the following best describes OSPF? OSPF is a classless link state routing protocol OSPF is a classful distance vector routing protocol OSPF is a classful link state routing protocol OSPF is a classless distance vector routing protocol

OSPF is a classless link state routing protocol

What are the main differences between the OSPF and IS-IS routing protocols? OSPF is a classful protocol, while IS-IS is a classless protocol OSPF is a link state protocol, while IS-IS is not OSPF is an IGP routing protocol, while IS-IS is a BGP routing protocol OSPF requires an area 0, while IS-IS does not

OSPF requires an area 0, while IS-IS does not

You are working with an existing fiber optic installation in your building. You want to know the length of each cable that runs through the walls. Which tool should you use?

OTDP

What is the difference between an OTDR and a TDR?

OTDR is used on fiber optic cables, TDR on copper cables.

You have a web server that will be used for secure transactions for customers wo access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server? Obtain a certificate from a public PKI Create your own internal PKI to issue certificates Run a third-party tool to generate the certificate Have the server generate its own certificate

Obtain a certificate from a public PKI

Which of the following describe the EDGE cellular technology? (Select two) An extension to 3G Offers speeds of 400-1000 Kbps Uses MIMO The first internet-compatible technology

Offers speeds of 400-1,000 Kbps The first internet-compatible technology

You are setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern? Multi-directional Directional Multi-point Uni-directional Omni-directional

Omni-directional

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication? On a certificate authority (CA) On a RADIUS server On the wireless access point and each wireless device On the wireless access point

On a RADIUS server

You need to place a wireless access point in your two-story building. While trying to avoid interference, which of the following is the best location for the access point? On the top floor In the basement In the kitchen area Near the backup generators

On the top floor

What is the primary difference between impersonation and masquerading? One is used against administrator accounts, and the other is used against end user accounts One is easily detected, and the other is subtle and stealthy One is more active, and the other is more passive One is a real-time attack, and the other is an asynchronous attack

One is more active, and the other is more passive

You work for a large multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: Verified that the server is up and running Verified that the various routers in between the two locations are up and running You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 -f -l 1500 command on your workstation. The pink command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set." What does this mean? One of the intermediate routers is offline One of the intermediate routers is an MTU black hole The destination host is down Communications are functioning normally between your workstation and the target server Collisions are occurring on the network

One of the intermediate routers is an MTU black hole

Which of the following is not an example of a physical barrier access control mechanism? mantraps Biometric locks One-time passwords Fences

One-time passwords

After blocking a number of ports to secure your server, you are unable to send email. To allow email service, which of the following needs to be done? Open port 25 to allow SNMP service Open port 110 to allow POP3 service Open port 80 to allow SNMP service Open port 110 to allow SMTP service Open port 80 to allow SMTP service Open port 25 to allow SMTP service

Open port 25 to allow SMTP service

Which of the following are true of a circuit proxy filter firewall? (Select two) Operates at the Session layer Verifies sequencing of session packets Operates at the Network and Transport layers Operates at the Application layer Operates at ring 0 of the operating system Examines the entire message contents

Operates at the Session layer Verifies sequencing of session packets

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems? The SSIDs of the two server systems match WEP overlap Overlapping channels The SSIDs of the two client systems match Crosstalk the RF signals

Overlapping channels

Which of the following associated a port number with a host on a private network? CIDR NAT VLSM PAT

PAT

Which TCP/IP protocol do email clients use to download messages from a remote mail server?

POP3

You are configuring you computer to dial up the the internet. What protocol should you use? PPP SMTP PPTP VPN

PPP

Your client has acquired several small companies and would like to connect them together into one network. Not all of the routers are Cisco devices, and compatibility is a concern. Which WAN encapsulation method should you recommend your client use? Cisco HDLC PPP Ethernet PAP

PPP

Which of the following protocols or services is commonly used on cable internet connections for user authentication? RDP PPPoE RRAS PPP

PPPoE

You have just signed up for internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the internet connection? PPPoE RDP ICA PPP L2TP

PPPoE

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over and IP network. Which of the following protocols is suitable for this task? NetBEUI PPP SLIP PPTP

PPTP

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should yo implement until DSL is available if your existing connectivity needs are minimal? PSTN ISDN Cable modem Satellite

PSTN

You are traveling throughout North America to many metropolitan and rural areas. Which single form of internet connectivity provides the greatest potential connectivity wherever you travel? DSL ISDN Broadband cable PSTN

PSTN

Which DNS record type points an IP address to a host name?

PTR

You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose? C-mount PTZ Dome Bullet

PTZ

Which of the following best describes the platform as a service (PaaS) cloud computing service model? PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments PaaS delivers everything a developer needs to build an application onto the cloud infrastructure PaaS stores and provides data from a centralized location without requiring local collection and storage PaaS delivers software applications to the client either over the internet or on a local area network

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure

Which of the following is a firewall function? FTP hosting Encrypting Frame filtering Protocol conversion Packet filtering

Packet filtering

Which network type divides transmitted data into smaller pieces and allows multiple communications on the network medium? Sliding window Frame-based Circuit-switched Multiplexed Packet-switched

Packet-switched

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which network topologies should you implement?

Partial mesh

Which of the following is the most common form of authentication? Digital certificate on a smart card Photo ID Password Fingerprint

Password

Which device is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports?

Patch panel

You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have?

Peer-to-peer

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information.What kind of exploit has been used in this scenario? (Select two. Both responses are different names for the same exploit) Pharming Domain name kitting DNS poisoning Reconnaissance Man-in-the-middle

Pharming DNS poisoning

Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this? Phishing Piggybacking Smurf Man-in-the-middle

Phishing

At which layer of the OSI model do hubs operate?

Physical

Ethernet uses which topologies?

Physical bus, logical star Physical star, logical star Physical star, logical bus

What topology is used with 100BaseTX Fast Ethernet networks? (Select two.) Physical star/logical bus Physical star/logical star Physical ring/logical star Physical star/logical ring

Physical star/logical bus Physical star/logical star

Which pins in an RJ45 connector are used to transmit data when used on a 100BaseT Ethernet network?

Pin 1 Pin 2

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? Place access points above where most clients are Place access points near outside walls Place access points in the basement Place multiple access points in the same area

Place access points above where most clients are

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum rated cable

Which of the following features is used with digital IP phones to supply power through a switch port? VPN 802.1x PoE Trunking Spanning tree

PoE

Which switch features are typically used with VoIP? (Select two) Spanning tree PoE VLAN Mirroring

PoE VLAN

A new law was recently passes that states that all businesses must keep a history of... Which document type would you update first in response to this new law?

Policy

You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers into the free network jacks and connect to the network. But employees who plug into those same jacks should be able to connect to the network. What feature should you configure? Mirroring Spanning tree Port authentication Bonding VLANs

Port authentication

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host? EIGRP Port forwarding Spanning tree protocol Port address translation

Port forwarding

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two) AES encryption BSSID Preshared key TKIP encryption Channel

Preshared key TKIP encryption

You have a small network at home that is connected to the internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can't you access the server? The server has been assigned a multicast address The server isn't using the default subnet mask Private addresses are not accessible through the internet The server must have an entry on a DNS server that exists on the internet

Private addresses are not accessible through the internet

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. What APIPA configured, all systems are able to communicate with each other, but you are having trouble configuring Internet access. What is the likely cause of the problem? All client systems must be rebooted Private addresses cannot directly communicate to hosts outside the local subnet The default gateway is not set on the client systems The default gateway is not set on the server The DNS server is unavailable to resolve internet host names

Private addresses cannot directly communicate to hosts outside the local subnet

Your computer has an IP address of 161.13.5.15. Your computer is on a: Class C network Multi-cast network Private network Public network

Public network

How can an organization help prevent social engineering attacks? (Select two.) Publish and enforce clearly written security policies Educate employees on the risks and countermeasures Utilize 3DES encryption for all user sessions Implement IPsec on all critical systems

Publish and enforce clearly written security policies Educate employees on the risks and countermeasures

You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now you need to cut off the excess end of each wire. Which tool should you use?

Punch down tool

You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to vest protect the servers? (Select two) Put the web server on the private network Put the database server on the private network Put the database server inside the DMZ Put the web server inside the DMZ

Put the database server on the private network Put the web server inside the DMZ

How can QoS be configured so that large data transfers will not block VoIP calls by using too much network bandwidth? QoS can be configured on network devices to set a bandwidth threshold on selected ports QoS can be configured on network devices to give priority to VoIP traffic QoS can be configured on network devices to limit the size of a file that can be transferred on the network QoS can be configured on network devices to only allow network protocols that throttle network bandwidth usage

QoS can be configured on network devices to give priority to VoIP traffic

When analyzing assets, which analysis method assigns financial values to assets?

Quantitative

Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts? RADIUS EAP NAS RRAS

RADIUS

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two) 802.1x PKI AAA RADIUS EAP TACACS+

RADIUS TACACS+

Which of the following are differences between RADIUS and TACACS+? RADIUS encrypts the entire packet contents; TACACS+ only encrypts the password RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers RADIUS uses TCP; TACACS+ uses UDP RADIUS supports more protocols than TACACS+

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers

Which type of device is required to implement port authentication through a switch? Router Proxy server RADIUS server Layer 3 switch

RADIUS server

You want to set up a service that allows multiple users to dial in to the office server from modems on their home computers. What service should you implement? PPP RAS ISDN RIP

RAS

You have a small home network connected to the internet using an RG-6 cable. You need to move the router connecting the network to the internet, but can't find any RG-6 cable. Which cable type could you use instead?

RG-59

F-type connectors are typically used with which cable standards? (Select two)

RG-59 RG-6

Which of the following cables offers the best protection against EMI? RG-6 Cat 6a Cat 5 Cat 5e

RG-6

Which of the following protocols has a limit of 15 hops between any two networks? EIGRP BGP IS-IS RIP OSPF

RIP

Which of the following statements about RIP is true? RIP is suitable for large networks RIP is a link state routing protocol RIP uses hop counts as the cost metric RIP is the routing protocol used on the internet

RIP uses hop counts as the cost metric

Which of the following connectors is used with Ethernet 1000BaseT networks? RJ11 ST BNC RJ45

RJ45

Which of the following connector types would you most likely use to connect to a T1 WAN service? RJ45 RJ48c RJ11 GG45

RJ48c

Which of the following standards is typically used in a rollover cable? RJ11 RG6 RS232 RG58

RS232

You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use?

Rapid PVST+

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

Regulation

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need? Internet Remote access Virtual private network Intranet

Remote access

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. Which of the following should you include in your plan? Repeater Half-duplex Shielded twisted pair Spanning tree

Repeater

A user from the sales department calls to report that he is experiencing problems connecting to the sales file server. All users in the sales department connect to the sales server through a single Ethernet switch. No other users have reported problems connecting to the sales server. Which of the following troubleshooting actions are you most likely to perform first? Replace the Ethernet switch in the sales department. Replace the network card in the user's computer. Replace the network card in the sales server. Reinstall the network card drivers on the sales server.

Replace the network card in the user's computer.

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. in the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength? Replace the omni-directional antenna with a directional antenna Increase the RF power of the isotropic antenna Replace the directional antenna with an omni-directional antenna Increase the RF setting on the client system Increase the RF setting on the AP

Replace the omni-directional antenna with a directional antenna

Which of the following are solutions that address physical security? (Select two) Scan all floppy disks before use Require identification and name badges for all employees Implement complex passwords Disable guest accounts on computers Escort visitors at all times

Require identification and name badges for all employees Escort visitors at all times

Which of the following does not accurately describe an iSCSI SAN? Requires special hardware and knowledge to implement Needs dedicated Ethernet cabling Can authenticate connections and encrypt data transmissions Uses port 3260 by default

Requires special hardware and knowledge to implement

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?

Residual risk

In which topology does each device on the network act as a repeater, sending the signal to the next device?

Ring

Which topology connects each device to a neighboring device?

Ring

Which topologies is a CAN able to use? (Three)

Ring Star Bus

Your company security policy states that wireless network are not to be used because of the potential security risk they present to your network. One day you find that an employee had connected a wireless access point to the network in his office. What type of security risk is this? Social engineering Phishing Rogue access point Man-in-the-middle Physical security

Rogue access point

Which component of a change and configuration management policy specifies option for reverting a system back to the state it was in before a change was made?

Rollback

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?

Rollover

Which of the following tasks do routers perform? (Select two) Identify devices through hardware addresses Route data based on logical network addresses Control access to the transmission media Route data based on hardware device addresses Maintain information about paths through an internetwork Multiplex signals onto the same transmission media

Route data based on logical network addresses Maintain information about paths through an internetwork

Which of the following hardware devices links multiple networks and directs traffic between networks? Bridge Router Hub Repeater

Router

In the OSI model, what is the primary function of the Network layer?

Routes messages between networks

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?

Routing

You have a Windows Server 2016 system that you want to use as a DHCP relay agent. Which Windows Server 2016 service would you use to do this?

Routing and Remote Access

Which of the following connectors usually require polishing as part of the assembly process? (Select two) SC ST RJ45 F-type BNC

SC ST

Which of the following internet services provides equal upload and download bandwidth? VDSL VHDSL SDSL ADSL

SDSL

You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible? SFP GBIC OC-x MPL5

SFP GBIC

Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call? SIP TLS RTP SSH NTP

SIP

What protocol sends email to a mail server?

SMTP

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between the email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol will enable message exchange between systems?

SMTP

Tel is inherently insecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet? SHTTP SLIP Remote Desktop SSH

SSH

Which of the following protocols can be used to securely manage a network device from a remote connection? Telnet SFTP SSH TLS

SSH

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identifies the network AP? Channel WEP PS SSID

SSID

You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three) Username and password TKIP Channel SSID Preshared key AES

SSID Preshared key AES

Which protocol does HTTPS use to offer greater security in web transactions? IPsec SSL Kerberos Username and password authentication

SSL

You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls? L2TP IPsec SSL PPPoE PPTP

SSL

Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two) SNMP SSL TLS HTTPS SMTP

SSL TLS

Which connector is used with fiber optic cables and requires that you use a twisting motion to connect it?

ST (Set-and-Twist)

Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? PaaS IaaS SaaS DaaS

SaaS

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? Same SSID, different channel Different SSID, different channel Different SSID, same channel Same SSID, same channel

Same SSID, different channel

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Cable modem Satellite DSL ISDN Dial-up

Satellite

Which of the following is most susceptible to interference related to atmospheric conditions? Satellite Cable modem DSL ISDN Dial-up

Satellite

Which security protocols use RSA encryption to secure communications over an untrusted network? (Select two) Secure sockets layer Transport layer security Point-to-point tunneling protocol Internet security association and key management protocol

Secure sockets layer Transport layer security

You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan? Low LUX or infrared camera PTZ camera Sufficient lighting Security guards

Security guards

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame? Send it out all ports except for the port it was received on. Forward it out the port and to the device with that MAC address Drop the frame Process the frame and respond to the sending device

Send it out all ports except for the port it was received on

An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

Send the frame out ports two through eight

Which of the following connectors is typically use on one end of a rollover cable? BNC F-type LC Serial ST SC

Serial

Which of the following protocols is an open source protocol used by most manufacturers of VoIP systems? Stream control transmission protocol (SCTP) Session initiation protocol (SIP) User datagram protocol (UDP) Transmission control protocol (TCP)

Session initiation protocol (SIP)

You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?

Short circuit

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?

Single-mode

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.) Single-mode fiber 1000BaseLX 1000BaseCX Multi-mode fiber 1000BaseSX

Single-mode fiber 1000BaseLX

Of the following cables, which offer the best protection against EMI? Cat 5e Cat 5 Single-mode fiber optic RG-6

Single-mode fiber optic

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which tool allows the service provider to remotely test the local loop?

Smartjack

Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network? Fraggle Fingerprinting Session hijacking Smurf

Smurf

You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 1720. What is the source of this network traffic? Someone is using voice over IP (VoIP) to make a telephone call A workstation is using the DNS protocol to send a name resolution request to a DNS server Someone is downloading files from a server using the FTP protocol A man-in-the-middle attack is in process

Someone is using voice over IP (VoIP) to make a telephone call

An attacker sends an unwanted and unsolicited email message to multiple recipients with an attachment that contains malware. What kind of attack has occurred in this scenario? Repudiation attack Phishing Open SMTP relay Spam

Spam

Which of the following features are common functions of an all-in-one security appliance? (Select two) Content caching Password complexity Spam filtering Bandwidth shaping Quality of Service

Spam filtering Bandwidth shaping

What feature dynamically places switch ports in blocking or forwarding states?

Spanning tree

Which of the following solutions would you implement to eliminate switching loops? Spanning tree Auto-duplex CSMA/CD Inter-VLAN routing

Spanning tree

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support?

Spanning tree

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?

Spanning tree

You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration? Use the ip helper-address command to specify the remote DHCP server Configure the Windows server to be on the same subnet as the DHCP server Connect an RFC 1542 compliant router to the Windows server Specify which server network interface the agent listens on for DHCP messages

Specify which server network interface the agent listens on for DHCP messages

Which type of activity changes or falsifies information in order to mislead or re-direct traffic? Snooping Sniffing Spoofing Spamming

Spoofing

Which topology connects each network device to a central hub?

Star

You have a small network that uses a switch too connect multiple devices. Which physical topology are you using?

Star

You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment method is being used?

Stateless autoconfiguration

Which business document is a contract that defines the tasks, time frame, and deliverables that a vendor must perform for a client?

Statement of work

You are the network administrator for a small company that implements NAT to access the internet. You recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these five servers? Restricted Dynamic Static Overloading

Static

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access? DNS CNAME record Static NAT DNS A record Multicast Dynamic NAT

Static NAT

Would you use a straight-through or crossover cable when connecting the following devices: Workstation to a regular port on a hub or switch Router to a regular port on a hub or a switch Regular port on a hub or switch to an uplink port on a hub or a switch

Straight-through

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?

Straight-through

Which of the following best describes the purpose of using subnets? Subnets place each device within its own collision domain Subnets divide an IP network address into multiple network addresses Subnets let you connect a private network to the internet Subnets combine multiple IP network addresses into one network address

Subnets divide an IP network address into multiple network addresses

You manage a subnet that uses the subnet address 198.162.1.0/23. Which of the following best describes how addressing is configured for the subnet? Supernetting Private Classful Subnetting

Supernetting

A VPN is used primarily for which purpose? Allow the use of network-attached printers Support secured communications over an untrusted network Support the distribution of public web documents Allow remote systems to save on long-distance charges

Support secured communications over an untrusted network

Which of the following are characteristics of VDSL? (Select two) Supports both data and voice at the same time Supports only data (not voice) Does not require splitters Equal download and upload speeds Unequal download and upload speeds

Supports both data and voice at the same time Unequal download and upload speed

Which of the following is a characteristic of SDSL? Supports data traffic only (no voice) Requires splitters on the line Speeds up to 100 Mbps Unequal download and upload speeds

Supports data traffic only (no voice)

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. In a check of network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and provide future growth?

Switch

What connectivity hardware is used to create a VLAN?

Switch

What device is used to create a physical star topology?

Switch

Which of the following devices operates at the OSI model Layer 2? Switch Hub Firewall Router

Switch

You can create a virtual LAN using which of the following? Hub Gateway Switch Router

Switch

You want to reduce collisions by creating separate collision domains and virtual LANs. Which device should you use?

Switch

When you configure VLANs on a switch, which of the following is used to identify a device's VLAN membership? Switch port MAC address IP address Host name

Switch port

Which of the following devices operate at the Data Link layer of the OSI model? (Select three) Hubs Switches Bridges Routers Repeaters Network interface cards (NICs)

Switches Bridges Network interface cards (NICs)

Which of the following statements accurately describes a VLAN ID? VLAN IDs are defined at the Networrk layer and help route the frame through the switch fabric Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to VLAN IDs identify the VLAN where the frame originated so the receiving host can reply VLAN IDs identify both the source and destination VLAN. They are like network addresses, except they exist at the Data Link layer

Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to

Which problem does the spanning tree protocol prevent? Switching loops from developing when redundant paths are implemented between switches Packet blocking on backup bridge ports to allow switches to forward frames to all BPDUs Buffer overflows by defining source-quench messages that a receiving device sends to the transmitting device Routing table from becoming outdated by decreasing the convergence time on a network

Switching loops from developing when redundant paths are implemented between switches

You are implementing internet connectivity for a new start-up company. Your client will provide online storefronts for retailers. To do this, they have calculated that their internet connection must provide a data rate of at least 20-30 Mbps. Which type of service should you implement? Fractional T1 Dial-up ISDN T1 T3 Integrated T1

T3

Which of the following protocols can be used to centralize remote access authentication? TACACS EAP Kerberos SESAME CHAP

TACACS

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two) TACACS+ AAA PKI 802.1x EAP RADIUS

TACACS+ RADIUS

Which protocol includes extensive error checking to ensure that a transmission is sent and received without mistakes?

TCP

You are an application developer, and you are writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability?

TCP

You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?

TDR

If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records? (Select two) A CNAME record is added to the DNS server The DHCP server renews an IP address lease An MX record is added to the DNS server The browser cache on a workstation is cleared The ipconfig /registerdns command is entered on a workstation

The DHCP server renews an IP address lease The ipconfig /registerdns command is entered on a workstation

You administer a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: IP address: 192.168.23.8 HTTP Port: 1030 SSL Port: 443 Users complain that they can't connect to the Web site when they type www.westsim.com. What is the most likely source of the problem? SSL is blocking internet traffic FTP is not configured on the server The HTTP port should be changed to 80 Clients are configured to look for the wrong IP address

The HTTP port should be changed to 80

You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427. Which kind of network traffic uses this port? A workstation is using the DHCP protocol to request an IP address from a DHCP server Someone is remotely accessing another system using the SSH protocol A ping of death attack of a network host is in progress The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network

The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network

Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link The WAN provider is throttling bandwidth on the link There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link The WAN interface on the router at the branch office has been disabled

The WAN provider is throttling bandwidth on the link

This question is not a question, but a novel with a question mark at the end. So just remember that you shouldn't shove a connector in something it isn't supposed to go into. For example, do not plug an RJ45 connector into an RJ11 port or a fork into a wall outlet.

The answer is so simple, why did they have to include War and Peace just to make their dumb point.

Which of the following is true about single-mode fiber optic network cabling? Single-mode fiber optic cabling is less expensive than multi-mode cabling. The central core is smaller than standard multi-mode fiber optic cabling core. Single-mode cabling supports shorter segment lengths than multi-mode fiber optic cabling. The central core is composed of braided plastic or glass fibers.

The central core is smaller than standard multi-mode fiber optic cabling core.

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following i most likely the cause of the problem? An SSID mismatch between the client and the WAP An SSID mismatch between the client and the server The client system has moved too far away from the access point The client has incorrect WEP settings The encryption level has been erroneously set back to the default setting

The client system has moved too far away from the access point

After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows 10 client system and using the ipconfig /all command, receive the following information: Ethernet adapter Local Area connection 1: Description . . . . . . . . : Intel(R) Ethernet Connection Physical Address. . . . . . : 02-00-4C-4F-3F-50 DHCP Enabled. . . . . : Yes Autoconfiguration Enabled. . . . . : Yes Autoconfiguration IPv4 Address. . : 169.254.25.129 Subnet Mask. . . . . : 255.255.0.0 Default Gateway. . . . .: DNS Servers. . . . : Which of the following statements are true? (Select two) The client system is unable to reach the DHCP server The default gateway address needs to point to the DHCP server DHCP is disabled on the client system The network subnet mask is incorrect The network is configured to use static IP addressing The client system is configured to use DHCP

The client system is unableto reach the DHCP server The client system is configured to use DHCP

A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages? The device transmits whenever it is ready. The device is notified of its turn to send messages. The device with the token can use the transmission media. The device requests permission from a controlling device. The device listens to determine if the transmission media is free.

The device listens to determine if the transmission media is free.

What information does the 'next hop' entry in a routing table identify?

The first router in the path to the destination network

What is a fault domain?

The location of a physical problem

Which of the following are true regarding using multiple VLANs on a single switch? (Select two) The number of broadcast domains increases The number of collision domains remains the same The number of broadcast domains decreases The number of collision domains decreases The number of broadcast domains remains the same The number of collision domains increases

The number of broadcast domains increases The number of collision domains remains the same

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem? The user needs a new IP address because she is working on a different floor The user is out of the effective range on the wireless access point on her floor The user has not yet logged off and back on to the network while at her new location The wireless network access point on the user's normal floor has failed The user has not yet rebooted her laptop computer while at her new location

The user is out of the effective range on the wireless access point on her floor

Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available, so you contracted with a satellite provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and the audio was frequently out of sunc with the video. What is the most likely cause of this poor WAN performance? The WAN interface on the router at the branch office has been disabled There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link There is latency on the WAN link There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link

There is latency on the WAN link

What is the risk associated with smart technology used in networked devices such as smart refrigerators, environmental controls, or industrial equipment? They are not compatible with routing protocols, which causes a burden on network bandwidth They are not physically secure, so they can be reconfigured by anyone who has access to them They use redundant paths for fault tolerance that can cause message loops to develop on the network They are vulnerable to exploits due to weaker security

They are vulnerable to exploits due to weaker security

Which of the following are characteristics of an LC fiber optic connector? (Choose two) They are threaded. They use a housing and latch system similar to an RJ45 UTP connector. They can be used with either fiber optic or copper cabling. They are half the size of standard connectors. They use a one-piece bayonet connecting system.

They use a housing and latch system similar to an RJ45 UTP connector. They are half the size of standard connectors.

Which of the following are characteristics of an MTRJ fiber optic connector? (Select two) They are used with multi-fiber fiber optic ribbon cables They used a keyed bayonet They use metal guide pins to ensure accurate alignment They can be used with multi-mode fiber optic cables They must never be used with single-mode fiber-optic cables

They use metal guide pins to ensure accurate alignment They can be used with multi-mode fiber optic cables

When using Kerberos authentication, which of the following terms is used to describe the token that verifies the user's identity to the target system? Ticket Voucher Hashkey Coupon

Ticket

Which of the following technologies does GSM use to allow multiple connections on the same frequency? Multiple-input and multiple-output Time division multiple access Code division multiple access Frequency division multiple access

Time division multiple access

What purposes does a wireless site survey fulfill? (Choose two) To document existing infrared traffic in the 5.4 GHz spectrum To identify the recommended 100 degree separation angle for alternating access points To identify the coverage area and preferred placement of access points To identify existing or potential sources of interference

To identify the coverage area and preferred placement of access points To identify existing or potential sources of interference

Which of the following is a good reason to install a firewall? To translate between internet IP addresses and the IP addresses on your private network To limit public access to just your DHCP server instead of your whole network To prevent hackers from accessing your network To cache web pages

To prevent hackers from accessing your network

Which of the following is an example of three-factor authentication? Pass phrase, palm scan, voice recognition Token device, keystroke analysis, cognitive question Photo ID, smart card, fingerprint Smart card, digital certificate, PIN

Token device, keystroke analysis, cognitive question

A user named Bob Smith has been assigned a new desktop workstation to complete his day-to-day work. The computer runs Windows 7. When provisioning Bob's user account in your organization's domain, you assigned an account name of BSmith with an initial password of bw2Fs3d. At his first logon, Bob is prompted to change his password, so he changes it to Fido, the name of his dog. What should you do to increase the security of Bob's account? (Select two) Do not allow users to change their own passwords Upgrade the workstation to Windows 8 Train users not to use passwords that are easy to guess Require users to set a stronger password upon initial logon Configure user account names that are not easy to guess

Train users not to use passwords that are easy to guess Require users to set a stronger password upon initial logon

Which device sends signals from a computer onto a network?

Transceiver

Purchasing insurance is what type of response to risk?

Transference

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport

Which option is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously? ActiveX controls Worm Outlook Express Trojan horse

Trojan horse

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?

Trunk ports

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communications between these two devices through the switches?

Trunking

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?

Trunking

Which of the following are characteristics of Teredo tunneling? (Select three) Tunnel endpoints configured on hosts Dual stack routers Dual stack hosts Works through NAT IPv4-only hosts communicate with IPv6-only hosts

Tunnel endpoints configured on hosts Dual stack hosts Works through NAT

Which of the following describe the channels and data transfer rated used for ISDN BRI? (Select two) Two B channels operating at 64 Kbps each One D channel operating at 16 Kbps One D channel operating at 64 Kbps 23 B channels operating at 64 Kbps

Two B channels operating at 64 Kbps each One D channel operating at 16 Kbps

Which of the following are true regarding cloud computing? (Select three) Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser Cloud computing requires end user knowledge of the physical location and configuration of the system that delivers the services Cloud computing is software, data access, computation, and storage services provided to clients through the internet The term "cloud" is used as a synonym for the internet

Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser Cloud computing is software, data access, computation, and storage services provided to clients through the internet The term "cloud" is used as a synonym for the internet

What is the greatest threat to theft of data in most secure organizations? Malware Hacker intrusion USB devices Operator error

USB devices

Which type of address in the IP address 198.162.12.254/24?

Unicast

Which type of address is used in a packet to address the packet to a single host?

Unicast

Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend? Unified communication Voice over IP Quality of service PSTN

Unified communication

Match each type of switch with its corresponding characteristics: Commonly sold at retail stores Provides port security features Supports VLANs Provides very few configuration options Can be configured over a network connection Can be configured over a dedicated communication channel

Unmanaged switch: Commonly sold at retail stores Provides very few configuration options Managed switch: Provides port security features Supports VLANs Can be configured over a network connection Can be configured over a dedicated communication channel

If your anti-virus software does not detect and remove a virus, what should you try first? Scan the computer using another virus detection program Set the read-only attribute of the file you believe to be infected Update your virus detection software Search for an delete the file you believe to be infected

Update your virus detection software

You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first? Use a tone generator to test the network cables between the computer and the network switch and between the network switch and the server system. Use a punch down tool to test the network cable between the computer system and the network switch. Use a wire crimper to ensure that the cable ends are still fully attached to the cable in two places: between the computer and the network switch, and between the network switch and the server system. Use a cable tester to test the cable between the computer system and the network switch. Use a cable tester to test the cable between the network switch and the server system.

Use a cable tester to test the cable between the computer system and the network switch

While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks? Use the same channel ID, but configure a different SSID Use a different channel ID Use the same channel ID, but configure your wireless network to use WEP Use 802.11b instead of 802.11g

Use a different channel ID

You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure that broadcast traffic sent by accounting computers is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do? Use a router to configure a subnet for the accounting computers Configure a VLAN on the switch for the accounting computers Implement NAC with 802.1x authentication for the accounting computers Configure MAC address filtering on the switch for the accounting computers

Use a router to configure a subnet for the accounting computers

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Move the device to a secure data center Use a stronger administrative password Use a web browser to access the router configuration using an HTTP connection Use an SSH client to access the router configuration

Use a stronger administrative password

Five salesmen who work out of your office. They frequently leave their laptops laying on the desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best way to address your concerns? Use cable locks to chain the laptops to the desks Require strong passwords in the local security policy Encrypt all company data on the hard drives Implement screen saver passwords

Use cable locks to chain the laptops to the desks

What method would you use to create a crossover cable?

Use the T568A standard on one connector and the T568B standard on the other connector.

You have installed anti-virus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the computer's user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?

User awareness training

Which of the following are characteristics of ATM? (Select two) Uses fixed-length cells of 53 bytes Supports variable-length packets Adds labels to data units Uses POTS in the local loop Connects to the WAN cloud with a CSU/DSU

Uses fixed-length cells of 53 bytes Adds labels to data units

Which of the following statements about SSL VPN are true? (Select two) Provides message integrity using HMAC Uses UDP port 500 Encapsulates packets by adding a GRE header Uses port 443 Encrypts the entire communication session Uses pre-shared keys for authentication

Uses port 443 Encrypts the entire communication session

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?

VLAN

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?

VLAN

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement?

VLANs

You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network? VLANs NIC teaming MAC filtering Subnetting

VLANs

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access the private network through a single server. Which solution should you implement? VPN concentrator IDS RADIUS IPS DMZ

VPN concentrator

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? DMZ IDS IPS RADIUS VPN concentrator

VPN concentrator

Match the Cisco device password type on the with its function: Controls the ability to log on through a LAN or WAN interface configured on the device Controls the ability to connect to the device using a web browser using HTTPS Controls the ability to connect to the device using a direct connection

VTY - Controls the ability to log on through a LAN or WAN interface configured on the device SDM - Controls the ability to connect to the device using a web browser using HTTPS Console - Controls the ability to connect to the device using a direct connection

Which of the following CCTV camera types lets zoom the focus in and out? Varifocal C-mount Fixed Infrared

Varifocal

You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do? Verify that the email was sent by the administrator and that this new service is legitimate Click on the link in the email and follow the directions to enter your login information Delete the email Open a web browser, type in the URL included in the email, and follow the directions to enter your login credentials Click on the link in the email and look for company graphics or information before you enter the login information

Verify that the email was sent by the administrator and that this new service is legitimate

You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?

Vertical cross connect

Which of the following terms describes a test lab environment that does not require the use of physical hardware? Offsite virtual storage Network as a service (NaaS) Virtual sandbox VLAN

Virtual sandbox

You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual servers Network as a service (NaaS) Virtual desktops Virtual networks

Virtual servers

Which component is most likely to allow physical and virtual machines to communicate with each other? Host operating system VHD Virtual switch Virtual desktop

Virtual switch

Match the firewall type (Virtual or Routed firewall) with its associated characteristics. Operates at Layer 2 Operates at Layer 3 Counts as a hop in the path between hosts Does not count as a hop in the path between hosts Each interface connects to a different network Each interface connects to the same network segment

Virtual: Operates at Layer 2 Does not count as a hop in the path between hosts Each interface connects to the same network segment Routed: Operates at Layer 3 Counts as a hop in the path between hosts Each interface connects to a different network

Which VoIP device helps establish the connection between two VoIP phones? VoIP endpoint VoIP codec VoIP gateway VoIP server

VoIP server

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise WPA Enterprise and WPA2 Enterprise WEP, WPA Personal, and WPA2 Personal WPA Personal and WPA2 Enterprise

WEP, WPA Personal, and WPA2 Personal

Which of the following provides security for wireless networks? WPA WAP CSMA/CD 802.3u 802.11a

WPA

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? Manually reconfigure the default route to point to the new next hop router Wait for convergence to take place Stop and restart the RIP protocol on the router Force RIP to perform an immediate update

Wait for convergence to take place

You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server? Email server, Newsgroup server, and DNS server Web server, DNS server, and email server Web server, DNS server, and DHCP server Web server and email server

Web server and email server

You manage a website for your. The website uses three servers configured in a cluster. incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure? Web server Network adapter Power supply Website storage

Website storage

A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification of several of the project's details so that the project can get back on schedule. Which type of an attack best describes the scenario? Passive Whaling Masquerading MAC spoofing

Whaling

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three) What type of data will be transmitted on the network? Is the size of the business expected to grow in the future? Are there microwaves or cordless phones that can cause interference? How many devices will need to be supported? Where can network hardware be mounted in the building?

What type of data will be transmitted on the network? Is the size of the business expected to grow in the future? How many devices will need to be supported?

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header

When would you typically use an RJ11 connector?

When connecting a phone to a phone line

When would you consider changing the codec used in your VoIP system? (Select two) When an open source VoIP protocol requires a different codec When sound quality is poor When network latency causes callers to talk over each other When excessive jitter causes unusual sound effects in VoIP calls When VoIP data consumes too large a portion of your network bandwidth

When sound quality is poor When VoIP data consumes too large a portion of your network bandwidth

When is choosing to do nothing about an identified risk acceptable?

When the cost of protecting the asset is greater than the potential loss

You want to use the T56B standard for adding connectors to your Cat5 cable. Starting with pin 1, which order should you use for the wires within the connector?

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly? DSL Satellite Wireless ISDN Dial-up

Wireless

Which of the following documents would likely identify that drop cables on your network use the T568A standard? Change log Policy Wiring schematic Baseline Network diagram

Wiring schematic

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring schematic

You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?

Wiring schematic

You are troubleshooting the connection of a computer in an office to the punch down block in the distribution closet. Which document would you consult to identify the termination of the cable on the punch down block based on the wall jack location in the office?

Wiring schematic

Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches? You can provide guaranteed bandwidth between two devices You can create multiple collision domains You can create multiple broadcast domains You can segment the network based on physical location

You can create multiple broadcast domains

Why might you use an RJ11 connector? You want to connect the 10BaseT network card in your computer to a switch. You want to connect your computer to the internet with a DSL modem. You want to upgrade your 10BaseT network to 100BaseTX. You want to test a network cable to see if there is a break in the line.

You want to connect your computer to the internet with a DSL modem.

In which of the following situations would you most likely implement a demilitarized zone (DMZ)? You want internet users to see a single IP address when accessing your company network You want to protect a public web server from attack You want to encrypt data sent between two hosts using the internet You want to detect and respond to attacks in real time

You want to protect a public web server from attack

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file? You will be the only one able to open the downloaded file No one has read the file contents as it was downloaded Your copy is the same as the copy posted on the website You can prove the source of the file

Your copy is the same as the copy posted on the website

Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate? Ant+ Z-Wave 802.11 AC NFC

Z-Wave

You need to perform a reverse lookup of the 10.0.0.1 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.) nbtstat -a 10.0.0.3 ipconfig /dnslookup 10.0.0.3 dig -x 10.0.0.3 nslookup 10.0.0.3 arp 10.0.0.3

dig -x 10.0.0.3 nslookup 10.0.0.3

Wow this question is just as long. Just remember that you shouldn't use multi-mode patch cables with single-mode GBIC modules and to stay hydrated

https://youtu.be/EGIoE53FBdU

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2016 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use? iSCSI under File and Storage Services in Server Manager Multipath I/O iSCSI Initiator Internet Storage Name Service

iSCSI Initiator

You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which command would you use to view the default gateway information of the Linux server?

ifconfig

You work in a office that uses Linux servers and Windows Servers. The network uses both the TCP/IP protocol. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use?

ifconfig

Your office has both Windows and Linux computers. You want to be able to view the address of the default gateway that a computer is using. Which of the following utilities could you use? (Select two) netstat ifconfig ipconfig host dig

ifconfig ipconfig

In a SAN implementation, the servers that connect to shared storage devices are called _____.

initiators

Which command would you use on a switch to enable management from a remote network? no shutdown ip default-gateway 192.168.10.185 ip address 192.168.10.185 255.255.255.0 ip address dhcp

ip default-gateway 192.168.10.185

You need to configure a Cisco RFC 1542-compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1. Which of the following commands would you use to configure the router? ifconfig 172.16.30.1 ip helper-address 172.16.30.1 host 172.16.30.1 ip address dhcp 172.16.30.1

ip helper-address 172.16.30.1

Your computer is sharing information with remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

netstat

Which command displays network activity statistics for TCP, UDP, and IP?

netstat -s

Mary calls to tell you that she can't connect to an intranet server called WebSrvl. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?

nslookup

You work in an office that uses Linux servers and Windows servers. The network uses the TCP/IP protocol. You are sitting at a workstation that uses Windows 10. An application you are using is unable to contact a Windows server name FileSrv2. Which command can you use to determine whether your computer can still contact the server?

ping

Which of the following utilities would you use to view the routing table? mtr dig tracert traceroute route

route

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use? show interfaces gi0/1 status show controllers gi0/1 show interfaces gi0/1 description show interfaces gi0/1

show interfaces gi0/1

You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You suspect that a duplex mismatch error has occurred, and you need to determine the duplex settings configured on the interface. Which commands could you use? (Choose two. Each response is a complete solution) show interfaces gi0/1 description show interfaces gi0/1 status show controllers gi0/1 show interfaces gi0/1 show interfaces counters

show interfaces gi0/1 status show interfaces gi0/1

Which utility would you use to track the route a packet takes as it crosses the network?

traceroute

Examine the following output: 4 22 ms 21 ms 22 ms sttlawa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.placa01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispoxy.net [205.171.206.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.151.142.1] Which of the following produced this output? tracert pingroute ping nslookup

tracert

You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX servers, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients. Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly. What TCP/IP utility can you use to see if a router is working properly? netstat tracert nslookup nbtstat

tracert


Kaugnay na mga set ng pag-aaral

Penny Review: Chromosomal Abnormalities

View Set

Chapter 11 venture growth management

View Set

Can I ask you some questions?我(wǒ) 可(kě)以(yǐ) 问(wèn)你(nǐ) 一(yì)些(xiē) 问(wèn)题(tí) 吗(ma)?

View Set

Christian Worldview Midterm- Rapinchuk

View Set

Topic 5: Regulatory framework II

View Set

Small Steps Chapter Four: You Can't Burn My Bear!

View Set