Business Data Networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

On host 10.0.0.254, how many ports were open? In the space provided, enter only the numeric value.

1

In a DNS database, which of the choices describes the record that holds the alternative names for a host?

CNAME

Which choice would NOT be recommended to install on a host running Hyper-V?

Virtual Box

The installation media used in the lab was installed as the _____.

Virtual SATA Optical disk

Which VMM was used in your lab tasks?

VirtualBox

Which choice requires installation of a virtual switch to access the internet?

Hyper-V

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used?

Star-bus

You have been asked to set up a new data center. Before you proceed with the actual setup, you need to create a rack diagram of an existing rack that you want to use. Which of the following could be the reason for you to create one such diagram? [Choose all that apply].

To determine the quantity of servers you need to purchase To manage the size of the equipment to fit into the rack

Which of these is considered a secure place to store a list of documented network passwords?

a password manager

You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?

SSH

You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.

Zenmap Command Prompt PowerShell

Which of the following is true about the OSPF routing protocol?

Each router has complete knowledge of the network topology

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/10

Which type of DNS record identifies an email server?

MX record

Within which of the following OSI layers would a malfunction caused by a bad switch port reside?

Physical

Which part of a MAC address is unique to each manufacturer?

The OUI

Which choice is virtual hard disk file?

vhdx

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?

Peer-to-peer

From the lab you know that the first six hexadecimal characters represent the OUI. Which choice is NOT the basis for the las six hexadecimal characters?

Addressing capabilities

What is the first step of inventory management?

List all components on the network

Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation?

192.168.2.0/24 2001:db8::/32

In a DNS database, which of the choices describes the record that holds the name-to-address mapping for IPv4 addresses?

A

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig /release

You have configured a DHCP pool to allocate the IP addresses to the system for 3 days? What have you defined?

lease time

You are the host computer preparing for a Quick assist session. Which choice do you make to begin?

Get Assistance

Which type of address is used at the Transport layer to identify the receiving application?

Port

You are examining a network problem that many users are experiencing, and you decide to begin your investigation at the network layer of the OSI model. Which of the following troubleshooting approaches are you using?

Divide and conquer approach

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

Entrance facility

DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this?

Forward lookup zone

Which email protocol allows an email client to download email messages to the local computer?

POP3

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Patch cable

When interconnecting a switch port to a patch panel, which of the following information should be documented according to best practices? [Choose all that apply]

The port number of the switch used The network device on the other end of the link

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

Which of the following are examples of Platform as a Service (PaaS)?

Apprenda

RADIUS provides AAA services. What does AAA stand for?

Authentication, Authorization, and Accounting

Which routing protocol does an exterior router use to collect data to build its routing tables?

BGP

Which choice best describes security flaws in software that allows unauthorized users to access a system?

Backdoor

Which transmission characteristic is never fully achieved?

Bandwidth

You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?

Baseline review

Where does a MPLS label go in a PDU?

Between Layers 2 and 3

A hacker takes advantage of of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?

Bluejacking

Which protocol can be used to connect to and control Microsoft computers?

Both choices will work

When configuring a vNIC to access a physical network using the host machine's NIC, which choice is used?

Bridged mode

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, Cat 6a, Cat 7

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?

Cat 6a

A spoofed DNS record spreads to other DNS servers. What is this attack called?

DNS poisining

A DNS server is tricked into returning incorrect IP addresses for specific domain names

DNS poisoning

What specifications defines the standards for cable broadband?

DOCSIS

Which type of DoS attack orchestrates an attack using uninfected computers?

DRDoS (Distributed Reflection DoS) attack

You are asked to perform an analysis on the network that will allow you to deduce information from patterns in communication. Which of the following types of analysis are you asked to perform?

Data traffic analysis

Which of these attacks is a form of Wi-Fi DoS attack?

Deauthentication attack

A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?

Default route

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

DiffServ

The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?

Distributed Switching

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

Eight

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

switchport port-security

Which of the following describes the configuring of MAC reservation in a DHCP server?

Manually allocate the MAC address to a desired IP address in the DHCP server

In which of the following applications can a virtual IP address be used?

NAT Gateway Redundancy Protocols

What manufacturer is listed for your sample MAC OUI?

Intel

What manufacturer is listed for your Ethernet MAC OUI?

Hewlett Packard

Which ports and services were filtered on your host?

None

Which choice is required for virtual machine manager to be installed on a system?

HAV

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

Rack ears

Which choice describes a DNS name resolution request that requires a resolution for answer?

Recursive

On your subnet, how many IPv4 addresses were scanned? In the space provided, enter only the numeric value.

10

The 6-digit security code expires after how many minutes?

10 minutes

On host 10.0.0.0.254, how many total ports were scanned? In the space provided, enter only the numeric value.

100

You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?

-a

All network devices have a MAC address. How many bits does this address require?

48

Which choice requires HAV on a 64-bit host?

64-bit operating system

On the Details tab for your host, what was the state of the host?

up

Which computers are the highest authorities in the Domain Name System hierarchy?

Root servers

How many CNAME records were shown when you initially executed the ipconfig /displaydns command?

1

Which of the following format can be considered a valid IPv6 addresses?

2001:0db8:0000:0003:0000:ff00:0042:8329

You need to connected to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection?

3389

Users on a network are complaining that they cannot to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver?

53

A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses are available in the subnet the computer is in?

64

What manufacturer is listed for your Wi-Fi MAC OUI?

Liteon

Suppose you send data to the 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

All devices on your local network

You are on the client computer preparing for a Quick assist session. Which choice do you make to begin?

Give Assistance

In the client-server model, what is the primary protocol used for communication between a browser and web server?

HTTP

Which email protocol allows an email client to read mail stored on the mail server?

IMAP4

Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?

SSL and TLS

You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use?

SSL/TLS

What type of diagram shows a graphical representation of a network's wired infrastructure?

Wiring schematic

In a DNS database, which of the choices describes the record that holds the name-to-address mapping for IPv6 addresses?

AAAA

If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?

ICMP

What was the file type of the installation file you used to install Ubuntu?

.iso

By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?

Bandwidth and delay

You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently your network consists of servers, routers, and switches that have not been upgraded for several years. You are still running Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns?

Ensuring that the hardware and software support the implementation Keeping the hardware and software costs under control

A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network?

IPv6 tunneling

Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication services for application?

Transport layer

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

VoIP gateway

What decimal number corresponds to the binary number 11111111?

255

To get started with Quick Assist, you need to enter the 6-digit security code. Which is the correct code?

312862

You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this?

80

The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?

Port 20 along with port 21 must also be permitted

Which Ubuntu distribution was installed in the lab tasks?

Ubuntu Desktop

On host 10.0.0.254, how many closed ports were shown? In the space provided, enter only the numeric value.

99

You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?

Block all incoming ICMP requests

You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting from the Physical layer of the OSI model. Which of the following approaches would you use to troubleshoot this problem?

Bottom up approach

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?

By implementing a limit on the number of hops allowed in a path

What is the first thing you should check of you discover that domain names are not resolving into IP addresses on a PC or workstation?

Check connectivity to the default DNS server

You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer?

Client-server

Which of the following OSI layers is involved with media access controls, hardware addressing and the local delivery of frames between devices on the same LAN?

Datalink layer

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?

Default gateway

You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?

It will continue to route traffic on the same path

You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?

Load balancer

A transceiver was recently damaged by a lightning strike during the storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You want to put a provision in place where you can monitor their visits to the different Websites and block all unwanted Websites. Which of the following should you install and configure?

Proxy server

Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication? [Choose all that apply].

RDP SSH

You need to highlight the location of physical servers and network devices mounted on standardized frames that are installed within a datacenter to a new colleague. Which of the following types of diagrams should you show?

Rack diagram

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

Remote Desktop

Which of the following devices are you likely to find in the MDF? Choose all that apply.

Routers Switches KVM switch

You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?

SMB

Refer to the following statements: This type of diagram depicts how devices are interconnected to each other using wires and cabling2) This type of diagram depicts the arrangement of devices and how they communicate with each other. Which diagram types are being described?

Statement 1 describes a physical network diagram while statement 2 describes a logical one

What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?

Static IP address allocation

Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allows? [Choose all that apply].

TCP port 20 TCP port 21

True or false? During a Quick Assist session, the technician providing assistance has the same rights and privileges as the user account that is being assisted (the host computer).

TRUE

Which of these commands is available only in Linux?

dig

What method does a GSM network use to separate data on a channel?

TDMA

A stateless firewall is faster than a stateful firewall.

TRUE

PAP, CHAP, and MS-CHAP are now considered legacy protocols.

TRUE

Telnet, SSH, and VNC are which type of software?

Terminal emulation

When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

Why did the command prompt window open when you ran your task?

It is what you set to run

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

When configuring a vNIC to obtain IP addressing from its host, which choice is used?

NAT mode

What's the closest router location to Scoot Base's web server that your trace reached?

The Netherlands

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

Application awareness

What type of fiber cable problem is caused when parking a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

What is the Internet standard MTU?

1,500 bytes

What is the WAN Default Gateway?

10.0.0.1

What is the router's WAN IP Address?

10.0.0.136

What is the IP address of your primary interface? Enter you answer in the space provided.

10.0.2.15

When you traced the route to Oxford University, what was the longest delay on milliseconds? In the space provided, enter only the numeric value.

101

What 802.11 standards (mode) are used for the router's 5Ghz wireless band?

11ac only

What 802.11 standards (mode) are used for the router's 2.4Ghz wireless band?

11bgn mixed

In the space provided, enter the Upload speed reported by the online bandwidth tester. Enter only the numeric value.

12

What is the MTU value for your primary interface? Enter your answer in the space provided.

1500

What is the new IP address?

169.254.183.21

In the space provided, enter the Upload speed reported by the desktop app. Enter only the numeric value.

17.28

What is the IP address of your primary DNS server? Enter your answer in the space provided.

192.168.0.1

What is the router's LAN IP Address?

192.168.0.1

Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?

200 GB

How many channels are in an ISDN PRI connection?

23B+D

How many bits of a Class A IP address are used for host information?

24 bits

What is the netmask of your primary interface? Enter your answer in the space provided.

255.255.255.0

Which formulas can be used to calculate the magic number?

256 - the interesting octet 2^h

What is the formula for determining the number of possible hosts on a network?

2^h -2 = Z

You need to implement high availability in your network. One implementation company ensures that their implementation will provide 99% of availability in a period of one year. With the mentioned availability, what would be the total downtime in a year?

3.65 days

On what date did your DHCP error occur? Enter answer in MM/DD/YYYY.

3/16/2018

In the space provided, enter the Download speed reported by the desktop app. Enter only the numeric value.

300.84

In the space provided, enter the Download speed reported by the online bandwidth tester. Enter only the numeric value.

306

When you traced the route to University, what was the IP address of the first London router responded?

62.115.135.95

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11n

Which IEEE standard determines how VLANs work on a network?

802.1Q

A routing protocol's reliability and priority are rated by what measurement?

AD

What feature of Windows Server allows for agentless authentication?

AD (Active Directory)

Your computer has autoconfigured another IP address. What type of address did your computer resort to?

APIPA

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

Access Control

When configuring the User accounts, which should be changed as a first step?

Administrator

What software might be installed on a device to authenticate it to the network?

Agent

The software you used in this lab can be compared to which of the tools listed?

All of these

Which of these choices is a feature of an NGFW?

All of these

The practice of releasing system patches on a set schedules provides hackers with which of the choices?

All of these are correct

Which of the event types are NOT displayed in Event Viewer?

All of these are displayed

You are configuring two switches of different vendors such that they connect to each other via single link that will carry multiple VLANs. What kind of trunk link must you configure for the two devices to successfully function in this manner?

An IEEE 802.1q trunk

If you need to perform port scanning in your network, which of the following tool are you likely to use?

Angry IP Scanner Superscan

You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?

Changes since the full backup

When a switch receives data on one of its ports, what is the next step does it perform?

Checks the MAC table for the destination system

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

What kind of network is the PSTN?

Circuit-switched

Which Bluetooth class has the highest power output?

Class 1

A virtual host containing 5 virtual servers represents a single point of failure. How can virtual services like email, file, web and database servers be best managed?

Clustering and Automatic Failover

What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?

Coaxial cable, F-connector

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold site

Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?

Compare network performance to baselines

Which of the following are examples of Software As A Service (SaaS) cloud model?

Concur Salesforce Google Apps

Your network comprises of multiple switches and a single router. Currently, all users of finance and marketing on the third floor are connected to a flat switch. You must segregate traffic between your finance and marketing groups. You need to ensure that critical finance information can flow without delay to the finance users and ensure additional level of security. What should you do?

Configure VLANs on the switch

What kind of firewall blocks traffic based on application data contained within the packets?

Content-filtering firewall

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server to each VLAN. What software will you need to make the central DHCP server accessible across VLANs?

DHCP relay agent

What was the source of your DHCP error?

DHCP-client

What kind of information would you expect to find within a network device's event log?

Event Descriptions Time of events

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil twin

Which choice best describes the practice of taking advantage of weakness?

Exploit

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?

FHSS

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____?

Full

When a router can't determine a path to a message's destination, where does it send the message?

Gateway of last resort

File integrity monitoring (FM) is generally performed on which device?

HIDS

The activities you performed in this lab are all examples of this type of security.

Hardening

When configuring a vNIC, which choice is used to allow VMs on the same host to communicate but NOT with other network nodes?

Host-Only mode

Which of the following is the correct use case for a public cloud?

Hosting of latency intolerant Web tiers Need for auto-scaling environment to host large Web application

When examining tunneling protocols, which choice is a component of the IPsec protocol suite?

IKEv2

When you traced the route to the Scott Base research website, which choice was NOT a possible reason for your packets to be dropped?

IP configuration

When you traced the route to the University of Lisbon in Portugal, which internet protocol was used?

IPv6

Telnet, SSH, RDP, and VNC all rely on which type of management?

In-band

When restoring a backup, which of them is likely to be most time consuming to restore?

Incremental

Which one of the following wireless transmission types requires a clear LOS to function?

Infrared

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat

After manually changing your IP address your computer identified the duplicate IP address problem. How can you tell?

It displays a duplicate address warning

How can you tell this is an APIPA address?

It is in the 169.254.0.1 through 169.254.255.254 range

In the lower pan of the Task Scheduler under Security options, which user account will be used to run your task?

LabConnection

What is the router's SSID for the 2.4Ghz wireless band?

LabConnection 2.4n

What is the router's SSID for the 5Ghz wireless band?

LabConnection 5.0ac

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

What is the lowest layer of the OSI model at which wired and wireless transmission share the same protocols?

Layer 3

At what layer of the OSI model do proxy servers operate?

Layer 7

What is another term used for Next Generation Firewalls?

Layer 7 firewall

Which of the following types of authentication and access control does not need an external AAA server to verify credentials inputted by users?

Local authentication

Which of the following types of authentication will continue to function even if network connectivity to any available AAA servers is lost?

Local authentication

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

You have added a new device to the network management application. What else should you add to the network management application to be able to control it?

MIB

Which fiber connector contains two strands of fiber in each ferrule?

MTRJ

Which of the following is an example of public cloud?

Microsoft Azure Amazon Web Services IBM Bluemix

What is the most common cause of firewall failure?

Misconfiguration

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

NFC

Merging physical and virtual network architecture is known by what acronym?

NFV

Which choice is best suited to operate in a network DMZ?

NIDS

What do well-chosen subnets accomplish?

Network documentation is easier to manage

At which OSI layer does IP operate?

Network layer

What OSI layer is responsible for directing data from one LAN to another?

Network layer

A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?

Network performance baseline

______ in SONET are analogous to the _____ of T-carriers.

OC levels, digital signal levels

To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?

Offline folders

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

Online UPS

Using port 110, you have configured an E-mail client to retrieve E-mails from a remote server over a TCP/IP connection. Which protocol is the E-mail client configured with?

POP

You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?

Password policy

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Penetration testing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Your colleague received an E-mail from a bank that is requesting credit card and PIN information. Which of the following types of attacks is this?

Phishing

What port do SNMP agents listen on?

Port 161

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?

Posture assessment

Which of the following can be prevented if DHCP snooping is implemented on a switch?

Preventing the malformed DHCP traffic Preventing the rogue DHCP servers

Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?

Privileged user agreement

Which of the following networking protocols provide a centralized authentication, authorization, and accounting management system for users that connect and use network services?

RADIUS

A password policy as part of a network user agreement may require users to do which of the following?

Require a minimum number of characters Require at leas one of different kinds of characters (numbers, capital letters)

Geofencing is an effective way to accomplish which of the following?

Restrict access areas

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

Rogue AP

When implementing secure remote file access which choices will be incompatible with each other? Select all that apply.

SFTP FTPS

An E-mail client application uses port 25 to connect to the outgoing E-mail server. Which protocol is being used in this scenario?

SMTP

You have recently installed a new firewall on a network. After the firewall is installed, you review the firewall logs and notice that the port 25 incoming traffic is blocked. Which of the following protocol is impacted with this?

SMTP

You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?

SNMP

You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?

SNMP

What command requests the next record in an SNMP log?

SNMP Get Next

Which of the following is considered a secure protocol?

SSH

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical line division multiplexing)

Which of the following cloud model is like thin-client model of software provisioning?

SaaS

You configured the computer to display a logon screen on resume. Which choice would NOT be required in the current configuration on resume?

Smart card

What kind of device can monitor a connection at the demarc but cannot interpret data?

Smart jack

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rather than the legitimate network server. What kind of attack is this?

Spoofing

Which type of firewall monitors each packet according to currently existing data streams?

Stateful

Which of the following is true about Load balancing on a network? 1) Provides redundancy 2) Provides an increase in throughput 3) Increases CPU resources

Statements 1 and 2 are true

Which of the following statements is true about Fault tolerance? 1) It is a direct result of the design of the network itself. 2) It is name of the feature that allows for dual layer 2 connections between switches 3) Enables a network to continue functioning normally in case of partial failure.

Statements 1 and 3 are true

A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the network. Which of the above statements is true?

Statements 2 and 3

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Static route

Which of the following IP network configuration elements a DHCP server, running on Windows Server 2012, can provide to a Windows 10 system?

Subnet mask IPv4 address

You are required to implement an AAA solution for several services found within the corporate network. Which of the following protocols would you use?

TACACS+

Which protocol's header would a Layer 4 device read and process?

TCP

Which of the following are characteristics of the MTU when applied to IP and Ethernet networks?

The default MTU is 1500 bytes The MTU is the largest size an encapsulated segment can have

If users in your organizations use laptops and mobile to access online E-mail accounts. You are using IMAP as the protocol. What will happen if a user, using both mobile and a laptop, deletes one E-mail using either of the device?

The deletion of the E-mail will occur on both the devices

Identify the correct statement for a switch's MAC Address Table. It is possible to have more than one MAC address corresponding to a single port. It is possible to have more than one port corresponding to a single MAC address.

The first is true, the second is false

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. However, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?

The host-based firewall settings are blocking the service.

Why would an attacker perform a brute force attack?

To gain access to a password protected system

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

Why would a network administrator implement vulnerability scanning on a network?

To reveal vulnerabilities in the network

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top listeners

You have been experiencing connectivity with various websites. The response time open these websites is high You tested the same websites from your home and could open them much faster. You assume that the slow access to the Websites might be due to high latency. Which of the given utility is likely to help you in finding the source that may be causing the latency issue?

Traceroute

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic shaping

Which of the following protocols is a centralized Authentication, Authorization, and Accounting protocol?

UTM appliance

Which Linux distribution did you install your lab tasks?

Ubuntu

You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?

Upgrade the firmware on the wireless router

To establish secure sign-in during the lab, you set the CTRL+ALT+DEL logon requirement. Which system applet did you use to enable it?

User Accounts

Which of the following features is common to both an NGFW and traditional firewalls?

User authentication

Which DSL standard has the fastest speeds immediately outside the CO?

VDSL

While examining frames on the network using a packet analyzer, you observe several frames that are double tagged. What kind of attack could a host on the network be performing that may result in this?

VLAN hopping

Your colleague has configured a trunk between two switches. You notice that the configuration on each end is inconsistent. On one of the switch, your colleague has configured VLAN 10 and on the second switch, no VLAN is configured. With this configuration, which problem are you likely to face?

VLAN mismatch

Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?

VPN concentrator

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit http any any

You have created a virtual machine. For the virtual machine to communicated with the physical network, what should you configure in the virtual machine?

Virtual NIC

You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?

Virtual Switch

Which choice best describes a weakness in a system or process?

Vulnerability

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

Wireshark

When examining the User accounts, did any have unusual assignments?

Yes, User

While troubleshooting an E-mail client issue on a user's system, you that the incoming mail server settings are configured to listen on port 143. How will the client be able to use port 143? [Choose all that apply]

You can use multiple devices to access E-mails Incoming E-mails will be stored on the server

When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If this is not done correctly, which of the following can occur?

a VLAN mismatch

An organization can lease a private _____ that is not shared with other users, or a ______ that can be physically configured over shared lines in the carrier's cloud.

dedicated line, virtual circuit

You would like to determine the domain name of a specific IP address that exists on the Internet without using a web browser. Which of the following tools could you use for this?

dig

What is the name of your primary interface? Enter your answer in the space provided.

enp0s3

Software enables computers to perform the functions of a packet filtering firewall. Which choice is a command utility?

iptables

You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?

network-to-network

To troubleshoot a network problem, you are required to use a packet analyzer on a Unix based system. Which of the following command line interface commands will provide you with the required functionality?

tcpdump

Which port mode on a switch enables that the port to manage traffic for multiple VLANs?

trunk

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

white/green


Ensembles d'études connexes

Chapter 1 "The Nature of Negotiation"

View Set

Final Exam (Code Red Cardiac Arrest)

View Set

Concepts of Bio- Test 1 study guide

View Set

Chapter 4 Beco - The Theory of Individual Behavior (exam 2)

View Set

MACRO Chpt 17: Money & the Federal Reserve

View Set