testout yessir
What is the maximum data rate of an ISDN BRI line?
128 Kbps
Which of the following IP addresses are Class C addresses? (Select two.)
192.15.5.55 223.16.5.0
Which network modes can typically be used for both 2.4 GHz and 5 GHz clients? (Select two.)
802.11n only 802.11ax only
Which of the following BEST describes a MAC address?
A 48-bit number that serves as a unique identifier for network devices.
In virtualization, what is the role of a hypervisor?
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
Which of the following do hosts on a private network share if the network utilizes a NAT router?
A physical IP address
Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices?
ARP spoofing/poisoning
You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)
Account lockout threshold Minimum password length
Which of the following components are the SIEM's way of letting the IT team know that a pre-established parameter is not within the acceptable range?
Alerts
Which of the following is a characteristic of static routing in comparison to dynamic routing?
All routes must be manually updated.
Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?
CSMA/CD
Which of the following are network sniffing tools?
Cain and Abel, Ettercap, and tcpdump
What does SNMP use to identify a group of devices under the same administrative control?
Community strings
Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal?
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.
Within an SDN, what is commonly referred to as the brains?
Controllers
You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do?
Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?
Crimping tool
You need to connect two switches using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?
Crossover
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?
Crossover
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. Which kind of attack is this an example of?
DDoS
While using the internet, you type the URL of one of your favorite sites in your browser. Instead of going to the correct site, the browser displays a completely different website. When you use the web server's IP address, the correct site is displayed. Which type of attack has likely occurred?
DNS poisoning
Which of the following is a method of VLAN hopping?
Double tagging
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has already learned both networks. The router does not have a default route configured. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
Drop the packet.
You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?
Dump files
You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?
Dumpster diving
A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the MOST likely cause?
Duplex mismatch
Which of the following services automatically creates and deletes host records when an IP address lease is created or released?
Dynamic DNS
Which IPsec subprotocol provides data encryption?
Encapsulating Security Payload (ESP)
A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement?
Ethernet bonding
You've just signed up for a broadband home internet service that uses coaxial cabling. Which connector type will you MOST LIKELY use?
F-type
You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem?
Failed patch cable
Which of the following is the best device to deploy if you want to protect your private network from a public untrusted network?
Firewall
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. Which type of network hardware should you implement to prevent this from happening again?
Firewall
Your network uses the following backup strategy. You create: Full backups every Sunday night. Incremental backups Monday night through Saturday night. On a Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?
Four
What is the most common form of virtualization?
Full virtualization
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?
Identify possible side effects of the solution.
Which of the following is the MOST effective protection against IP packet spoofing on a private network?
Ingress and egress filters
Which of the following is true about single-mode fiber optic network cabling?
Its central core is smaller than the standard multi-mode fiber optic cabling core.
Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference?
Jitter is the up and down variation in latency.
Which recommendation should you follow while using 110 blocks for connecting Cat5 and higher data cables?
Keep wire pairs twisted up to within one half of an inch of the connector.
You are on a phone call using VoIP. You notice that it takes several seconds for the person on the other end to respond to questions that you ask. Which type of problem is occurring?
Latency
Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?
Level 0
Which of the following technologies uses variable-length packets, adds labels to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic?
MPLS
What is the primary goal of business continuity planning?
Maintain business operations with reduced or restricted infrastructure capabilities
Match the wireless networking term or concept on the left with its appropriate description on the right. (Each term may be used once, more than once, or not at all.)
Moving a wireless device between access points within the same wireless network. Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN. LWAPP Specifies the number of clients that can utilize the wireless network. Device density Automatically partitions a single broadcast domain into multiple VLANs. VLAN pooling Connects two wired networks over a Wi-Fi network. Wireless bridge The number of useful bits delivered from sender to receiver within a specified amount of time. Goodput
You have a large TCP/IP network and want to keep a host's real-time clock synchronized. Which protocol should you use?
NTP
You are an administrator of a growing network. You notice that the network you've created is broadcasting, but you can't ping systems on different segments. Which device should you use to fix this issue?
Network bridge
Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?
Network diagram
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
PPTP
A new law was recently passed requiring that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?
Policy
Which port does Remote Desktop use?
Port 3389
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer that's connected to a computer at home. Which protocol should you use?
RDP
Which of the following DHCP scope options assigns a static IP configuration to a device using that device's MAC address?
Reservation
Which of the following topologies connects each device to a neighboring device?
Ring
You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then tracks system activity and allows an attacker to remotely gain administrator access to the computer. Which of the following terms BEST describes this software?
Rootkit
You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible?
SFP GBIC
Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol enables message exchange between systems?
SMTP
Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
SSH
Which of the following can serve as a buffer zone between a private, secured network and an untrusted network?
Screened subnet
A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?
Send it out all ports except for the port it was received on.
Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet isn't working properly. Which of the following allows the service provider to remotely test the local loop?
Smartjack
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
Spamming
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?
Straight-through
What is a VPN (virtual private network) primarily used for?
Support secure communications over an untrusted network.
You've been asked to document your building's wiring. You'd like to identify the length of each Cat 5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?
TDR
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?
Test the solution.
Which of the following does Kerberos use for authentication and authorization? (Select two.)
Ticket granting server Time server
Why should you store backup media off site?
To prevent the same disaster from affecting both the network and the backup media
VoIP uses several protocols. Which layer of the OSI model do these protocols reside on?
Transport
Which hypervisor is for bare metal use?
Type 1
You've just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?
Update the signature files.
You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?
Use Syslog to send log entries to another server.
Which of the following identification and authentication factors are often well-known or easily discovered by others on the same network or system?
Username
You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?
Users cannot change the password for 10 days.
Which of the following scenarios would cause a problem in asymmetric routing?
Using two stateful firewalls in the traffic flow.
You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
VLAN
Which of the following CCTV camera types allows you to zoom the focus in and out?
Varifocal
Which VoIP device helps establish the connection between two VoIP phones?
VoIP server
Which operating system does not use Syslog by default?
Windows
Windows Update for Business (WUfB) lets you keep your devices current with the latest security upgrades and features. Which operating system releases does WUfB support?
Windows 10
Which of the following tools can you use to troubleshoot and validate Windows updates? (Select three.)
Windows Update Troubleshooter Windows Server Update Service (WSUS) PowerShell
Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?
arp
Which TCP/IP utility gives you the following output?
arp -a
You are troubleshooting a network connectivity issue on a Unix system. You're able to connect to remote systems by using their IP address, but you're unable to connect using the hostname. You check the TCP/IP configuration and notice that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Select two.)
dig nslookup
You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
ifconfig
Which command would you use on a switch to enable management from a remote network?
ip default-gateway 192.168.10.185
Which TCP/IP utility gives you the following output?
netstat -a
Examine the following output. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115Reply from 64.78.193.84: bytes=32 time=43ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=47ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=73ms TTL=115Reply from 64.78.193.84: bytes=32 time=46ms TTL=115 Which of the following utilities produced this output?
ping
You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the account manager's email address?
Which of the following utilities could you use to lock a user account? (Select two.)
usermod passwd