Neti 104 M6
In this project, which command option prevents fragmentation of oversized packets?
-f
Your first ping request was assigned a TTL value of 232. What happens to this value each time the PDU passes its next hop?
Decreases by 1
Which type of attack misleads a user to connect to a malicious wireless access point? Evil Twin ARP Spoofing IP Spoofing Phishing MAC Spoofing
Evil Twin
Which Windows features did you have to enable to use the sandbox? Hyper-V Windows Sandbox Both of these
Windows Sandbox
A routing protocol's reliability and priority are rated by what measurement? a. Routing table b. Latency c. AD d. MTU
c. AD
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet? a. RIPv2 b. OSPF c. BGP d. IP
c. BGP
What is the standard MTU size for Ethernet II PDUs without fragmentation? 1473 1492 1493 1500
1500
In which type of attack are the cache records manipulated for malicious purposes? [Choose all that apply] ARP Spoofing Ransomware attack DNS Poisoning Denial of Service attack Shoulder Surfing
ARP Spoofing DNS Poisoning
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios? a. Locking rack b. Smart locker c. Access control vestibule d. Locking cabinet
b. Smart locker
Which permission allows a user access to a resource? Password Authorization Username Authentication
Authentication
What specifications define the standards for cable broadband? a. FTTC b. PSTN c. HFC d. DOCSIS
DOCSIS
Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. PDoS attack b. FTP bounce c. DRDoS attack d. Ransomware
DRDoS attack
What type of attack relies on spoofing? a. Pen testing b. Tailgating c. Deauth attack d. Friendly DoS attack
Deauth attack
When a router can't determine a path to a message's destination, where does it send the message? a. Gateway of last resort b. Administrative distance c. Routing table d. Default gateway
Gateway of last resort
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. BYOD b. AUP c. NDA d. MDM
NDA
Which permission needs to be assigned to a user to be able to connect to a VPN connection? Local administrator permissions VPN permissions Network Access permissions Network Administrator permissions
Network Access permissions
Which OSI layer is responsible for directing data from one LAN to another? a. Transport layer b. Physical layer c. Network layer d. Data link layer
Network layer
What did you have to download to use Windows Sandbox the first time? Hyper-V Windows Sandbox Nothing A VMM
Nothing
Which of the following is considered a secure protocol? a. FTP b. Telnet c. HTTP d. SSH
SSH
Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas? Client-to-Site VPN RDP Site-to-Site VPN SSH
Site-to-Site VPN
What kind of device can monitor a connection at the demarc but cannot interpret data? a. DTE b. Smartjack c. CSU/DSU d. Line driver
Smartjack
In a _________ attack, the user is misled by a caller that he is a network technician gathering personal information from the user. DNS Poisoning Denial of Service attack Malware ARP Spoofing Social Engineering
Social Engineering
What kind of route is created when a network administrator configures a router to use a specific path between nodes? a. Trace route b. Static route c. Default route d. Dynamic route
Static route
What method does a GSM network use to separate data on a channel? a. TDMA b. CDMA c. SIM d. TDM
TDMA
In __________________ a malicious user gains physical access to restricted area of the network. On-path attack Shoulder surfing Phishing Tailgaiting
Tailgaiting
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? a. Logic bomb b. Worm c. Virus d. Ransomware
Logic bomb
To be able to remotely manage a Windows device securely, which of the following protocols can be used? RDP RDG SSH VPN
RDP
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? a. Security audit b. Posture assessment c. Exploit d. Data breach
Posture assessment
What is the purpose of Windows Sandbox? Protect host machine from malware Isolate sandbox from the host Create a limited virtual machine All of these
All of these
Which type of attack can be conducted to render a network device inaccessible? [Choose all that apply] Ransomware attack Man-in-the-middle attack Shoulder Surfing VLAN Hopping Denial of Service attack
Denial of Service attackRansomware attack
While configuring a new VPN client, which Role service needs to be installed for the Remote Access role on a Windows server? Direct Access and VPN (RAS) .Net Framework 4.5 Web Application Proxy Routing
Direct Access and VPN (RAS)
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? a. Vulnerability b. Denial of service c. Insider threat d. Principle of least privilege
Insider threat
Which of these cellular technologies offers the fastest speeds? a. CDMA b. LTE-A c. 4G-LTE d. GSM
LTE-A
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? a. Layer 3 b. Layer 4 c. Layer 2 d. Layer 5
Layer 3
Which program capable of downloading apps was available? Google Chrome Microsoft Edge Both of these Neither of these
Microsoft Edge