Incorrect Questions Part 1 (Exams 4 through 9)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Your company's wireless network was recently compromised by an attacker who utilized a brute force attack against the network's PIN to gain access. Once connected to the network, the attacker modified the DNS settings on the router and spread additional malware across the entire network. Which TWO of the following configurations were most likely used to allow the attack to occur? - WPS enabled - Guest network enabled - WPA2 encryption enabled - TKIP encryption protocols - Default administrative login credentials - Router with outdated firmware

- WPS enabled - Default administrative login credentials

Your company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department's needs. What is the correct CIDR notation for the Finance department's subnet, which requires 32 devices? /26 /28 /27 /29 /25 /30

/26

Your company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department's needs. What is the correct CIDR notation for the Finance department's subnet, which requires 32 devices? /28 /29 /27 /26 /30 /25

/26

Dion Training is adding a small branch office in the Philippines and wants to assign them a portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. The new office in the Philippines will have 8 users who need IP addresses assigned. What is the correct CIDR notation for the Philippines branch office in order to accommodate the 8 users while allocating the minimum number of addresses? /27 /26 /29 /28

/28

What is the network ID associated with the host located at 10.10.10.200/25? 10.10.10.192 10.10.10.0 10.10.10.128 10.10.10.64

10.10.10.128

Which cellular technology is compromised of HSPA+ and EV-DO to provide higher data speeds than previous cellular data protocols? 4G LTE 3G 5G

3G

A small law office has a network with three switches (8 ports), one hub (4 ports), and one router (2 ports). Switch 1 (switch port 8) is connected to an interface port (FastEthernet0/0) on the router. Switch 2 (switch port 8) and switch 3 (switch port 8) are connected to Switch 1 (switch ports 1 and 2). The hub has three computers plugged into it on ports 1, 2, and 3. The fourth port on the hub is connected to the router's other interface port (FastEthernet0/1). Based on the configuration described here, how many collision domains are there within this network? 2 8 1 4

4

Which two of the following should you do first when you are designing and implementing a new network? (Select two.) Begin documentation on your system and network. Determine the company's network needs and expectations. Buy all new NICs. Run a network analyzer

- Begin documentation on your system and network. - Determine the company's network needs and expectations.

Which options represent recommended approaches to troubleshooting? (Select three.) Power supply, video, memory, storage, CPU, peripherals Top-to-bottom of the OSI Model Divide and conquer Gather information, reproduce symptoms, establish and test theory, implement solution, document results. Bottom-to-top of the OSI Model

- Top-to-bottom of the OSI - Divide and conquer - Bottom-to-top of the OSI

Dion Training is adding two new employees in Peru and wants to assign them a portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. The two employees will be working from home and connecting over a VPN to a dedicated VLAN for the company's Peruvian employees. What is the correct CIDR notation for the Peruvian portion of the network in order to accommodate the 2 users while allocating the minimum number of addresses? /29 /30 /31 /28

/30

Certain IP addresses are not supposed to exist on the public Internet. Which block of IP addresses would MOST likely be prevented from crossing a border router? 238.0.0.0/8 8.0.0.0/8 122.0.0.0/24 172.16.0.0/12

172.16.0.0/12

A small real estate office has about 15 workstations and would like to use DHCP to assign classful IP addresses to each workstation. The subnet only has one octet for the host portion of each device. Which of the following IP addresses could be assigned as the default gateway? 172.16.0.1 169.254.0.1 10.0.0.1 192.168.0.1

192.168.0.1

Which of the following ports are used to provide secure remote connection sessions over the Internet? 23 22 80 25

22

A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement? MAC address filtering with IP filtering WPA2 with a pre-shared key PKI with user authentication 802.1x using PAP

802.1x using PAP

You are installing a Small Office/Home Office (SOHO) network consisting of a router with 2 ports, a switch with 8 ports, and a hub with 4 ports. The router has one port connected to a cable modem and one port connected to switch port #1. The other 6 ports on the switch each have a desktop computer connected to them. The hub's first port is connected to switch port #2. Based on the description provided, how many collision domains exist in this network? 3 9 8 11

9

Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up an on-path attack against Mary's computer by redirecting any layer 2 traffic destined for the gateway to his computer first. Rick is careful only to affect the traffic associated with Mary's computer and not the entire network. Which type of on-path attack is Rick conducting against Mary? IP spoofing MAC spoofing Evil twin ARP poisoning

ARP poisoning

Workers in a company branch office must visit an initial web page and click the "I agree" button before being able to surf the web. Which of the following is this an example of? EULA SLA AUP MOU

AUP

Which of the following policies or plans would dictate which types of websites should be added to the proxy server's content filter within an organization? Remote access policy Password policy Data loss prevention policy Acceptable use policy

Acceptable use policy

A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic? Stateful packet inspection Stateless packet inspection Intrusion detection system Application-aware firewall

Application-aware firewall

Your deep packet inspection firewall is dropping portions of your packet flow as it enters or leaves the network. The network is configured to use HSRP to load balance the network traffic across two network devices in a high availability cluster. Which of the following issues would cause your network security devices, such as your firewalls, to drop packet flows and cause intermittent network connectivity to your clients? Broadcast storm Asymmetric routing Multicast flooding Collision

Asymmetric routing

Routing prefixes are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR). What are these known as? Network handle Autonomous system number Top-level domain Route aggregation

Autonomous system number

What state is the switchport with the LEAST desirable path placed by the spanning tree protocol when a switch has multiple paths to reach the root bridge? Forwarding Listening Blocking Learning

Blocking

A 48-port switch on the Dion Training network just rebooted and all the clients are attempting to obtain a new DHCP address. Which of the following issues may begin to occur? Duplicate IP address Collisions Asymmetric routing Broadcast storm

Broadcast storm

Which of the following types of telecommunication links is used to provide high-speed internet service over a system of coaxial or HFC cables? Cable Satellite DSL Leased line

Cable

A user was moved from one cubicle in the office to a new one a few desks over. Now, they are reporting that their VoIP phone is randomly rebooting. When the network technician takes the VoIP phone and reconnects it in the old cubicle, it works without any issues. Which of the following is MOST likely the cause of the connectivity issue? Bad power supply Misconfigured DNS Attenuation Cable short

Cable short

The link lights on the front of your network switch are an example of which of the following principles of Ethernet? Multiple Access Collision Detection Collision Avoidance Carrier Sense

Carrier Sense

You are troubleshooting your company's T-1 connection to your ISP. The ISP has asked you to place a loopback on the device which connects your T-1 line to their central office. Which of the following devices should you connect a loopback adapter to test the connection? - Channel Service Unit/Data Service - DOCSIS modem - Digital subscriber line modem - Fiber optic modem

Channel Service Unit/Data Service

Question 70IncorrectAn employee at Dion Training reports that half of the marketing department is currently unable to access any network resources. A network technician determines that the switch has failed and needs replacement. Which of the following is required so that the technician can replace the switch and regain connectivity quickly? Router image Network diagram Configuration backup VLAN configuration

Configuration backup

IncorrectDuring the setup of a new office floor, Dorothy, a network administrator, configures ports on a switch to connect VoIP phones and workstations. She wants to ensure that voice traffic is prioritized over data traffic. Which of the following configurations should Dorothy use to BEST achieve this? Configure the voice VLAN on the switch ports where VoIP phones are connected. Configure QoS to prioritize VLAN 100 over VLAN 200. Set the native VLAN to 200 for voice and VLAN 100 for data. Enable link aggregation on the ports connected to VoIP phones.

Configure the voice VLAN on the switch ports where VoIP phones are connected.

Which of the following security features should be enabled to configure a quality of service filter to manage the traffic flow of a Cisco router or switch and protect it against a denial-of-service attack? DHCP snooping Dynamic ARP inspection Router Advertisement Guard Control plane policing

Control plane policing

An administrator would like to test out an open-source VoIP phone system before investing in the associated hardware and phones. Which of the following should the administrator do to BEST test the software? - Create virtual IP phones that utilize the STP protocol in your lab - Deploy new SIP appliances and connect them to the open-source phone application - Deploy an open-source VDI solution to create a testing lab - Create a virtual PBX and connect it to a SIP phone application

Create a virtual PBX and connect it to a SIP phone application

A technician receives a report that a VoIP phone is experiencing a "no network connectivity" error. The technician notices the Cat6a patch cable running from the back of the phone is routed behind the user's rolling chair. The cable appears to have been rolled over numerous times by the user, and it looks flattened from the abuse. Which of the following is the most likely cause of the connectivity issues being experienced on the VoIP phone? - Improperly crimped cable - Transmit and receive reversed - Cross-talk - Excessive collisions

Cross-talk

A technician is troubleshooting a workstation at Dion Training. The workstation is suffering from intermittent connectivity issues. The technician notices that the STP cable pairs are not completely twisted near the connector. Which of the following issues may be experienced because of this? Split pair Crosstalk 568A/568B mismatch Tx/Rx reverse

Crosstalk

Which of the following technologies is not commonly used by a captive portal to perform user redirection? DHCP redirect ICMP redirect DNS redirect HTTP redirect

DHCP redirect

After an employee connected one of the switchports on a SOHO router to the wall jack in their office, other employees in the building started to receive "duplicate IP address" errors and experiencing intermittent network connectivity. You check the configuration on one of the affected clients and see it has been assigned an IP address of 192.168.1.54. Which of the following could be enabled on the company's network to prevent this from occurring? DHCP snooping Router advertisement guard ARP inspection Split horizon

DHCP snooping

In the three-tier hierarchical model, which tier is in-between the other two and is responsible for providing connectivity as well as facilitating communication between different access layer devices? Access Core Distribution Aggregation

Distribution

What is the primary advantage of using dynamic inventories in networking? - Dynamic inventories simplify network management and reduces manual effort. - Dynamic inventories improve network performance and reduces latency - Dynamic inventories enable seamless scalability and supports rapid network expansion. - Dynamic inventories provide enhanced security and prevents unauthorized access

Dynamic inventories simplify network management and reduces manual effort.

A technician added memory to a router, but the router refuses to recognize the new memory module. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue? - Driver update - CMOS - VTP - ESD

ESD

You are investigating a network connectivity issue that is affecting two of your network clients. When you check the switchports of these clients, you observe that the switchports' physical interfaces are continually going up and down. Which of the following is the most likely reason for the flapping of the switchports you are observing? - Incorrect routing table entries on the core switch - Faulty or improperly seated Ethernet cables connecting the clients to the switch -Excessive collisions on the network -Inadequate power distribution in the data center causing intermittent interruptions to client connectivity

Faulty or improperly seated Ethernet cables connecting the clients to the switch

You are troubleshooting a 3 foot long fiber patch cable that you suspect is causing intermittent connectivity between two switches. Which of the following tools should you use to measure the signal as it transmits over the fiber optic cable? Cable tester Loopback adapter Fiber light meter Optical time domain reflectometer

Fiber light meter

Which of the following cloud infrastructures includes on-premise servers utilizing a centralized Syslog server hosted at a third-party organization to review the logs? Public Hybrid Private Community

Hybrid

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. Which of the following is the QUICKEST option to configure a replacement switch with a secure configuration? Baseline Archive Image Syslog

Image

The network administrator is troubleshooting the switchports for a file server with dual NICs. The file server needs to be configured for redundancy, and the dual NICs need to be combined for maximum throughput. What feature on the switch should the network administrator ensure is enabled for best results? Spanning tree LACP BPDU Load balancing

LACP

Which layer of the OSI model interfaces with the end-user software, such as by using a web browser to communicate over HTTP to display a website? Layer 5 Layer 6 Layer 4 Layer 7

Layer 7

Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability? Load balancing Multiplexing MPLS trunking VLAN tagging

Load balancing

You are having lunch at a local restaurant which has free Wi-Fi for its customers. There is not a captive portal and there is no password needed to connect to the network, but the restaurant has an automated method of disconnecting users after 30 minutes. As you are eating your lunch, you notice that 30 minutes have passed, but you want to reconnect to the wireless network. Which of the following techniques would allow you to reconnect? Dictionary attack MAC spoofing IP spoofing Brute-force attack

MAC spoofing

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP? WALK MIB TRAP GET

MIB

What technology could a telecom carrier use to segregate customer traffic over long runs of fiber-optic connections? MPLS VLAN PSTN VPN

MPLS

One of your coworkers recently installed a new game they found for free online. Ever since then, their computer has acted strange and is operating extremely slow. What type of attack are they likely a victim of? - Malware - Ransomware - Phishing - Brute-force

Malware

Which of the following network devices is used to separate broadcast domains? Bridge Media converter Hub Multilayer switch

Multilayer switch

In cloud environments, which option is specifically designed to permit internet access for resources within a VPC without exposing them directly to the internet? Direct Connect Gateway. NAT Gateway. Internet Gateway. VPN Gateway.

NAT Gateway

Which of the following would be considered firewall technology? (Select all that apply.) Dynamic routing Network Address Translation (NAT) Port filtering Packet filtering Proxy server

Network Address Translation (NAT) Port filtering Packet filtering Proxy server

What is BEST used to perform a one-time temporary posture assessment in a NAC environment? - Antivirus - Host-based firewall - Intrusion prevention system - Non-persistent agent

Non-persistent agent

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password have been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, which of the following should the technician do to prevent the password from being sniffed on the network again? - Only allow administrators to access routers using port 22 - Copy all configurations to routers using TFTP for security - Use SNMPv1 for all configurations involving the router - Ensure the password is 10 characters, containing letters and numbers

Only allow administrators to access routers using port 22

What one of the following systems is commonly used to manage digital certificates, ensuring secure communication and authentication over a network? PKI Symmetric Key Encryption 2FA TLS

PKI

Which port is commonly used for receiving emails from a mail server? Port 443 Port 25 Port 80 Port 110

Port 110

A network technician receives the following alert from a network device: "High utilization threshold exceeded on gi1/0/24: current value 88%" What is being monitored to trigger the alarm? Processor utilization Memory utilization Disk space utilization Port utilization

Port utilization

On the corporate network, many users report that Web pages are slow to load. The network administrator has checked the network and has determined that the Internet connection is saturated. Which technique would be BEST to decrease the traffic due to Web surfing? Proxy Caching Traffic analyzer Load balancing Port filtering

Proxy Caching

Your company has just installed a new web server that will allow inbound connections over port 80 from the internet while not accepting any connections from the internal network. The current network architecture is segmented using a triple-homed firewall to create the following three zones: ZONE INTERFACE, IP address-------------------------------------PUBLIC, eth0, 66.13.24.16/30 DMZ, eth1, 172.16.1.1/24PRIVATE, eth2, 192.168.1.1/24. Based on the requirements and current network architecture above, where should you install the webserver and how should you configure it? - Put the server in the PUBLIC zone with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP - Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP - Put the server in the DMZ with an inbound rule from eth1 to eth0 that allows port 80 traffic to the server's IP

Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server's IP

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue? SSL certificates CSMA/CA WPA2 security key RADIUS

RADIUS

A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN and using a router as their gateway device. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all the computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost-effective manner. Which routing protocol should be used with the gateway router and what device should you select to connect the computers within the branch office? EIGRP as the routing protocol; connect the computers with a 802.11n MIMO access point RIPv2 as the routing protocol; connect the computers with a Gigabit Layer 2 switch

RIPv2 as the routing protocol; connect the computers with a Gigabit Layer 2 switch

You have just replaced a faulty Ethernet cable in a patch panel. Within a few minutes, you find out that users are experiencing slow or no Internet connectivity all over the building. A broadcast storm has begun to occur. After removing the replacement cable, which of the following should you do NEXT? - Replace the cable during the next maintenance window - Remove and replace all of the other Ethernet cables on the switch - Attempt to isolate the broadcast storm by rebooting the switch - Review labeling and logical network diagram documentation

Review labeling and logical network diagram documentation

Which of the following errors would be received if an ethernet frame less than 64 bytes is received by a switch? Encapsulation error CRC error Giant Runt

Runt

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser? - PPP - PPTP - SSL - IPsec

SSL

What is the first flag used in the establishment of a TCP connection or during the initiation of a three-way handshake between two hosts? SYN RST FIN ACK

SYN

Sahra connects a pair of switches using redundant links. When she checks the link status of the two ports, one of them is not active. She changes the inactive link to another switchport, but the second link still remains inactive. What MOST likely is causing the second link to become disabled? Port mirroring IGRP routing SSID mismatch Spanning tree

Spanning tree

A technician installs a new WAP, and users in the area begin to report poor performance. The technician uses ping, and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next? Interface monitoring tool Packet capture tool Port scanner tool Spectrum analyzer tool

Spectrum analyzer tool

Your new firewall has just been installed on the corporate LAN. Based on the rules you've implemented, the firewall takes an incoming packet on port 25 and inspects the entire data packet, then allows the corresponding outgoing packet to pass through. What firewall technology best describes what is happening in this scenario? Stateful filtering MAC filtering Stateless filtering IDS

Stateful filtering

You are conducting an intensive vulnerability scan to detect which ports might be open to exploitation. During the scan, one of the network services becomes disabled and impacts the production server. Which of the following sources of information would provide you with the most relevant information for you to use in determining which network service was interrupted and why? Firewall logs Network mapping NIDS Syslog

Syslog

Dion Training's network technicians are about to upgrade a Cisco 3900-series router, but they first want to create a copy of the router's configuration and IOS files to serve as a backup. Which of the following tool should the technicians utilize? show route TFTP server traceroute tcpdump

TFTP server

home user ran a bandwidth speed test from their laptop and receive the following results: Ping: 53ms Download speed: 33.3 Mbps Upload speed: 10.2 Mbps Which of the following is the best interpretation of these results? - The laptop received data at 33.3 Mbps and sent data at 10.2 Mbps - The laptop took 53 ms to complete the bandwidth speed test - The website downloaded data at 33.3 Mbps and uploaded data at 10.2 Mbps - The laptop downloaded 33.3 MB of data and uploaded 10.2 MB of data

The laptop received data at 33.3 Mbps and sent data at 10.2 Mbps

You have just installed a new router in your MDF and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats a broadcast packet on your network? The router sends it back to its origin. The router records it for later analysis. The router discards it. The router forwards it.

The router discards it.

A technician installs three new switches to a company's infrastructure. The network technician notices that all the switchport lights at the front of each switch flash rapidly when powered on and connected. After about a minute, the switches return to normal operation. Additionally, there are rapidly flashing amber lights on the switches when they started up the next day. What is happening to the switches? - The switches are running through their spanning tree process - The switches are not functioning properly and need to be disconnected - The switches are having problems communicating with each other - The switches are connected and detected a spanning tree loop

The switches are running through their spanning tree process

You recently installed wireless network cards for laptop users. The help desk receives a call from a user who couldn't access the network with a laptop while on a business trip, although the laptop worked fine when he tested it on his desk. What is the likely cause of the problem? - The user is using the wrong encryption key for remote access to the access point. -The CAT 5 cable may be defective. -The user moved out of range of the access point. -The modem was unplugged.

The user moved out of range of the access point.

A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, the interface will not come up. The technician has cleaned the fiber connectors and used a fiber light meter to confirm that light passes in both directions without excessive loss. Which of the following is MOST likely the cause of this issue? - The cable is subject to cross-talk - The bend radius has been exceeded - There is a wavelength mismatch - The connection is suffering from EMI

There is a wavelength mismatch

Margery, a network admin, observes that users in one department are experiencing slow network speeds, especially during peak work hours. After ruling out hardware failures and confirming that the network infrastructure is properly configured, she suspects the issue may be related to the traffic flow through the network. Margery needs to identify the most likely cause of the slow network speeds, select the most appropriate statement. - DNS resolution times for the department's network segment have dramatically increased, leading to delays in accessing websites. - The firewall settings have been misconfigured, inadvertently blocking traffic from the department's subnet. - There is significant congestion on the network due to an increase in video conferencing traffic during peak hours. -The switch ports connecting to the department's access points are configured with incorrect VLAN settings, causing routing issues.

There is significant congestion on the network due to an increase in video conferencing traffic during peak hours.

Rowan, a network administrator is configuring a wireless network for a large corporate office with multiple floors. The office layout requires the deployment of several wireless access points to ensure complete coverage. To simplify the wireless network for end-users, they decide to use a single network name for the entire office. Why would Rowan use an Extended Service Set Identifier (ESSID) in this scenario? To create a unique identifier for each wireless access point to prevent interference between them. To allow wireless devices to roam seamlessly between different access points without needing to reconnect. To limit the bandwidth each user can consume, ensuring fair usage of the network resources. To encrypt the data transmitted over the wireless network for enhanced security.

To allow wireless devices to roam seamlessly between different access points without needing to reconnect.

An attacker has configured their machine to report itself as a switch when connected to a wired network in an attempt to exploit your enterprise network. Which of the following types of attacks is being conducted? VLAN hopping Rogue DHCP DNS poisoning ARP spoofing

VLAN hopping

Susan, an executive at Dion Training, will be traveling to Italy for a conference next week. She is worried about remaining connected to the internet while overseas and plans to use the WiFi in her hotel room and the local coffee shop with her laptop. Which of the following should she purchase and configure before leaving for Italy to ensure her communications remain secure regardless of where she is connecting from? - Local SIM card for her smartphone - VPN - International data roaming plan on her cellphone - Local mobile hotspot

VPN

You have just replaced the edge switch on the second floor of Dion Training. After you finish, a user states they can no longer access the network but everything was working fine yesterday before you replaced the switch. The user's coworkers claim their computers are able to access the network without any issues. You check the back of the user's workstation and you do not see any LED lights lit or blinking on their network interface card. Which of the following should you check next to solve this issue? - Verify the device is using the correct cable type. - Verify the switch is connected to the router. - Verify the network interface card is operating properly - Verify the network cable is attached to the new switch

Verify the network cable is attached to the new switch

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the datacenter. Which technology should be used to meet her requirement? Access badge reader Smart card Biometric access Video surveillance

Video surveillance

When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network? - Virtual NIC - VPN - VNC - VDI

Virtual NIC

You have been contracted by Dion Training to conduct a penetration test against its learning management system (LMS). The LMS is a web application that is hosted in the organization's DMZ. Which of the following appliance allow lists should the organization add your source IP in before the engagement begins? - NIDS - HIDS - DLP - WAF

WAF

You are a network technician troubleshooting connectivity issues in a large office building with multiple WiFi networks. To identify potential interference and optimize signal strength, which tool would be most effective for analyzing WiFi signals? WiFi analyzer Multimeter Cable tester Spectrum analyzer

WiFi analyzer

Which of the following requires that all users, whether inside or outside the organization's network, be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data? - Least privilege - Defense in depth - Zero trust - Acceptable use policy

Zero trust

Which of the following tools would allow you to detect running services, applications, or operating systems on the network's clients, servers, or devices by sending specifically crafted packets to them and analyzing their responses? ping nmap tcpdump Protocol analyzer

nmap

Which of the following commands is used to display the statistics for a given switchport on a Cisco switch? show route show config show diagnostic show interface

show interface

Timothy, a network engineer, is tasked with troubleshooting a network connectivity issue. He needs to determine which MAC addresses are associated with each switch port to identify the source of the problem efficiently. Which command should Timothy use to view these on a Cisco switch? show config show route show interface show mac-address-table

show mac-address-table

You just started work as a network technician at Dion Training. You have been asked to determine if Ethernet0/0 is currently connected using OSPF or EIGRP on one of the network devices. Which of the following commands should you enter within the command line interface? show config show route show interface show diagnostic

show route


Ensembles d'études connexes

Solving Linear Equations and Inequalities

View Set

Why is water called the universal solvent

View Set

NR327 Maternal-Newborn Exam 2 Review

View Set

Chapter 3&4- Organizational Development

View Set