175chaptpractice

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following can you append to the end of the dig command to run a query for all the records in the zone?

-axfr

Which stratum level does the authoritative time device fall under?

0

Match the Class of Service (CoS) priority on the left with its corresponding value on the right.

0 Background 1 Best effort 2 Excellent effort 3 Critical applications 4 Video (< 100ms latency) 5 Voice (< 10ms latency) 6 Internetwork control 7 Network control

A rack's height is measured in rack units (Us). How tall is a single rack unit?

1.75 inches tall

Your network follows the 100Base-TX specifications for Fast Ethernet. What is the maximum cable segment length allowed?

100 meters

A host has an address of 100.55.177.99/16. Which of the following is the broadcast address for the subnet?

100.55.255.255

Which Gigabit Ethernet standard uses multimode fiber optic cabling and supports network segments up to a maximum of 550 meters long?

1000Base-SX

Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of 127.0.0.1?

::1

Which of the following is an example of an internal threat?

A user accidentally deletes the new product designs.

What is the main difference between a worm and a virus?

A worm can replicate itself, while a virus requires a host for distribution.

Which of the following functions are performed by the OSI Transport layer?

Data segmentation and reassembly Reliable message delivery : End-to-end flow control

Which of the following creates a visual representation of physical components along with a clearly defined set of principles and procedures?

Floor plan

Which of the following provides a layout of all electrical, plumbing, HVAC, and networking wiring and components?

Floor plan

Which of the following chains is used for incoming connections that aren't delivered locally?

Forward

Which of the following describes the worst possible action by an IDS?

The system identified harmful traffic as harmless and allowed it to pass without generating any alerts.

Which of the following are true regarding cloud computing? (Select three.)

The term cloud is used as a synonym for the internet. Cloud computing consists of software, data access, computation, and storage services provided to clients through the internet. Typical cloud computing providers deliver common business applications online. They are accessed from another web service or software, like a web browser.

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works. What is the MOST likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point.

Which device combines multiple security features, such as anti-spam, load-balancing, and antivirus, into a single network appliance?

Unified Threat Management (UTM)

Which of the following combines several layers of security services and network functions into one piece of hardware?

Unified Threat Management (UTM)

Upper management has asked you if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend?

Unified communications

Which of the following ensures that power is supplied to a server or device during short power outages?

Uninterruptible power supply

You've just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Update the signature files.

What should you try first if your antivirus software does not detect and remove a virus?

Update your virus detection software.

Which of the following strategies do we use to prevent duplicate IP addresses from being used on a network? (Select two.)

Use Automatic Private IP Addressing (APIPA). Install a DHCP server on the network.

Your computer seems to be running slowly. In particular, you notice that the hard drive activity light remains lit when you run multiple applications and switch between open windows. This happens even though you aren't saving large files. What should you do to troubleshoot the problem?

Use Resource Monitor to monitor memory utilization.

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?

Use Syslog to implement centralized logging.

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

Use Syslog to send log entries to another server.

Five salespeople work out of your office. They frequently leave their laptops on the desks in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST way to address your concerns?

Use cable locks to chain the laptops to the desks.

Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic?

Use encryption for all sensitive traffic.

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to the internet users. Which solution should you use?

Use firewalls to create a screened subnet. Place the web server inside the screened subnet and the private network behind the screened subnet.

Kate, a network administrator, has been tasked with staying within the company budget. She has a large network and doesn't want to spend more than she needs to on purchasing and registering multiple public IP addresses for each of the hosts on her network. Which of the following methods could help her provide internet access but also keep costs low and limit the number of registered IP addresses her organization needs to purchase?

Use network address translation

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?

Users cannot change the password for 10 days.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. Which of the following should you use in this situation?

VLAN

When does a router use ARP?

When the router's routing table doesn't contain the MAC addresses of devices on the local LAN that they need to forward frames to.

Windows Update for Business (WUfB) lets you keep your devices current with the latest security upgrades and features. Which operating system releases does WUfB support?

Windows 10

Which level of the OSI model does a Layer 2 switch operate at?

Data Link Layer

A security analyst is using tcpdump to capture suspicious traffic detected on port 443 of a server. The analyst wants to capture the entire packet with hexadecimal and ASCII output only. Which of the following tcpdump options will achieve this output?

-SXport443

Which frequencies does Zigbee operate on?

2.4 GHz, 900 MHz, and 868 MHz

You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multimode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.)

1000Base-SX 10GBase-SR

Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single-mode fiber optic cable?

1000BaseLX

You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.)

1000BaseLX Single-mode fiber

How many total channels are available for 802.11g wireless networks?

11

Which of the following uses metal clips placed over plastic slots to connect individual copper wires?

110 Block

What is the correct binary form of the decimal IP address 192.168.1.1?

11000000.10101000.00000001.00000001

Which of the following ports does NTP run on?

123

You've recently installed a new Windows server. To ensure system time accuracy, you've loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now you must configure your network firewall to allow time synchronization traffic through. Which of the following ports are you MOST LIKELY to open on the firewall?

123

Which of the following is the highest stratum level allowed?

15

What is the speed of an OC-3 connection?

155 Mbps

Which technologies are used by the 802.11ac standard to increase network bandwidth? (Select two.)

160 MHz bonded channels Eight MIMO radio streams

Which port number is used by SNMP?

161

Which network address and subnet mask does APIPA use? (Select two.)

169.254.0.0 255.255.0.0

Which of the following IP address ranges is reserved for Automatic Private IP Addressing (APIPA)?

169.254.0.1 - 169.254.255.254

Which of the following is NOT one of the IP address ranges defined in RFC 1918 that are commonly used behind a NAT server?

169.254.0.1 to 169.254.255.254

Which of the following is a valid APIPA address?

169.254.32.50

Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0. Which of the following are true concerning this network? (Select two.)

172.17.0.255 is the network broadcast address. 254 IP addresses can be assigned to host devices.

You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network?

2

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)

2.4 GHz 5.75 GHz

Based on the address prefix for each IPv6 address on the right, identify the address type from the list on the left. (Addresses may not represent actual addresses used in production.)

2001:6789:9078::ABCE:AFFF:FE98:0001 Global unicast FD00::8907:FF:FE76:ABC Unique local FEA0::AB89:9FF:FE77:1234 Link-local FF00:98BD:6532::1 Multicast FF02::1:2 Multicast

Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8.2 <<>> westsim111.com;;res options:init recurs defnam dnsrch;;got answer:;;->>HEADER<<-opcode:QUERY, status: NOERROR, id:4;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0;;QUERY SECTION:;; westsim111.com, type = A, class = IN;;ANSWER SECTION:westsim111.com. 7h33m IN A 76.141.43.129;;AUTHORITY SECTION:westsim111.com. 7h33m IN NS dns1.deriatct111.com.westsim111.com. 7h33m IN NS dns2.deriatct222.com.;;Total query time: 78 msec;;FROM: localhost.localdomain to SERVER:default -- 202.64.49.150;;WHEN: Tue Feb 16 23:21:24 2005;;MSG SIZE sent: 30 rcvd:103 What is the IP address of the DNS server that performed this name resolution?

202.64.49.150

What is the decimal form of the following binary IP address? 11001101.00111001.10101001.01000010

205.57.169.66

Which port does Telnet use?

23

What is the maximum number of nodes Z-Wave allows on its mesh network?

232

How many total channels (non-overlapping) are available for 802.11a wireless networks?

24

You're configuring a network firewall to allow SMTP outbound email traffic and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select two.)

25 110

Which Class of Service (CoS) priority value should be assigned to a video conference call?

4

Your network follows the 100Base-FX specifications for Fast Ethernet and uses half-duplex multimode cable. What is the maximum cable segment length allowed?

412 meters

Rack heights vary from a few rack units to many rack units. The most common rack heights are 24U and 42U. How tall is a 24U rack?

42 inches

Which of the following ports does TACACS use?

49

Which of the following are valid IPv6 addresses? (Select two.)

6384:1319:7700:7631:446A:5511:8940:2552 141:0:0:0:15:0:0:1

Your network uses a network address of 137.65.0.0 with a subnet mask of 255.255.0.0. How many IP addresses are available to assign to network hosts on this network?

65534

Which port is a DHCP Discover packet sent out on when a device first connects to a network?

67

Which port does the relay agent use when it sends DHCP information back to the client?

68

You manage a network with two locations (Portland and Seattle). Both locations are connected to the internet. The computers in both locations are configured to use IPv6. You'd like to implement an IPv6 solution to meet the following requirements: Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 internet. You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use?

6to4 tunneling

You have a Windows 10 system. You have used the Settings app to access Windows Update. From this location, how long can you pause updates?

7 days

Which network modes can typically be used for both 2.4 GHz and 5 GHz clients? (Select two.)

802.11ax only 802.11n only

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standard works best in this situation?

802.11n

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment, which your client complains runs too slowly. She wants to upgrade the network to run up to 600 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users' workstations. She has also indicated that the system must continue to function during the transiti

802.11n

Which of the following is the open standard for tagging Layer 2 frames?

802.1q

You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components should be part of your design? (Select two.)

802.1x AES encryption

Multi-mode fiber is designed to operate at which of the following wavelengths?

850 nm and 1300 nm

Which of the following must each device's MTU be set to for jumbo frames to transverse the network without risk of fragmentation?

9,000

Match the port security MAC address type on the left with its description on the right.

A MAC address that is manually identified as an allowed address. SecureConfigured A MAC address that has been learned and allowed by the switch. SecureDynamic A MAC address that is manually configured or dynamically learned and is saved in the config file. SecureSticky

Which of the following BEST defines a SAN?

A block-level storage network

Which of the following is true about a community string?

A community string identifies devices under the same administrative control.

Which of the following BEST describes Ethernet flow control?

A configuration that sends a pause frame to the transmitting device when the receiving device cannot keep up with the volume of data being sent.

Which of the following describes an on-path attack?

A false server intercepts communications from a client by impersonating the intended server.

Which of the following is true about processor performance?

A healthy system's CPU utilization should average around 40%.

In virtualization, what is the role of a hypervisor?

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

What is WindowsUpdate.log?

A log or record of all notable changes made to a Windows system.

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access. You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You're sure that your laptop's wireless adapter works because you use a wireless connection at work. What is the MOST likely cause of the problem?

A mismatched SSID

Your company has an internet connection. You also have a web server and an email server that you want to make available to your internet users, and you want to create a screened subnet for these two servers. Which of the following should you use?

A network-based firewall

Which of the following is true about a network-based firewall?

A network-based firewall is installed at the edge of a private network or network segment.

Which of the following is the strongest form of multi-factor authentication?

A password, a biometric scan, and a token device

Which of the following do hosts on a private network share if the network utilizes a NAT router?

A physical IP address

Which of the following BEST describes VoIP (Voice over Internet Protocol)?

A protocol optimized for voice data transmission (telephone calls) through a packet-switched IP network.

How does a proxy server differ from a packet-filtering firewall?

A proxy server operates at the Application layer, while a packet-filtering firewall operates at the Network layer.

Which of the following pieces of information are you MOST likely to find in a policy document?

A requirement for using encrypted communications for web transactions

Which of the following devices is MOST LIKELY to be assigned a public IP address?

A router that connects your home network to the internet.

While viewing the status of interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation that is located in a cubicle on the second floor. What could cause this to happen?

A strong EMI emitter near the cable connected to that interface.

Which of the following describe a system image backup?

A system image contains everything on the system volume, including the operating system, installed programs, drivers, and user data files.

Which of the following should you include in your site survey kit?

A tall ladder

Which of the following is an example of two-factor authentication?

A token device and a PIN

Larry is tasked with implementing a VoIP system in the office. He presents his research to his boss, who wants to use the current traditional hard phones to save money. What BEST explains why this is not possible?

A traditional hard phone does not have the internal computing parts to accept VoIP transmissions.

In the OSI model, which of the following functions are performed at the Presentation layer?

Data encryption and compression: Data format specifications

Which of the following is a valid MAC address?

AB.07.CF.62.16.BD

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the name of the company requesting payment?

ACME, inc

IPsec is implemented through two separate protocols. What are these protocols called? (Select two.)

AH ESP

You need to replace a fiber optic cable that's connecting two switches together. You inspect the existing cable and determine that it uses LC connectors. You also notice that the cable's ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable?

APC polish

A host wants to send a message to another host that has an IP address of 115.99.80.157, but it does not know the destination device's hardware address. Which protocol can be used to discover the MAC address?

ARP

During network transmission, data is transferred to various routers, which forward the data to the appropriate network. If the source and destination network addresses reside on the same network, which protocol is used to determine the destination IP's MAC address?

ARP

Which protocol is used by a device to ensure that an APIPA address is not already in use on the network?

ARP

Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?

ARP Poisoning

Which of the following attacks can also be used to perform denial of service (DoS) attacks?

ARP spoofing

Drag each description on the left to the appropriate switch attack type on the right.

ARP spoofing/poisoning The source device sends frames to the attacker's MAC address instead of to the correct device. Dynamic Trunking Protocol Should be disabled on the switch's end user (access) ports before implementing the switch configuration in to the network. MAC flooding Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. MAC spoofing Can be used to hide the identity of the attacker's computer or impersonate another device on the network.

lab 4.5.6

Access the CorpDC virtual server.From Hyper-V Manager, select CORPSERVER.Double-click CorpDC to connect to the server.Maximize the window for better viewing. Create a primary forward lookup zone.From Server Manager, select Tools > DNS.Expand CORPDC (the server that will host the zone).Right-click Forward Lookup Zones and select New Zone.In the New Zone wizard, select Next.Make sure Primary zone is selected.Clear Store the zone in Active Directory (this option is only available for domain controllers) and then select Next.In the Zone name field, enter acct.CorpNet.com for the zone and then select Next.Verify that Create a new file with this file name is selected and then click Next.Make sure Do not allow dynamic updates is selected and then click Next.Select Finish to complete the New Zone wizard. Configure zone transfers.Expand Forward Lookup Zones.Right-click acct.CorpNet.com (the new zone) and select Properties.Select the Zone Transfers tab.Verify that Allow zone transfers is selected.Select To any server.Select OK. Create a forward secondary zone.Expand CORPDC3 (the server that will host the new zone).Right-click Forward Lookup Zones and then select New Zone.Select Next.Select Secondary zone as the zone type and then select Next.In the Zone name field, enter acct.CorpNet.com and then select Next.In the Master Servers box, select Click here.Enter 192.168.0.11 or CorpDC.CorpNet.Local as the server that hosts a copy of the zone.Press Enter or click away from the IP address to begin validation.After validation is complete, select Next.Click Finish to complete the New Zone wizard.

What is the definition of latency?

The speed at which data packets travel from source to destination and back.

lab 4.5.5

Access the Ethernet properties dialog.Right-click Start and then select Settings.Select Network & Internet.From the right pane, select Change adapter options.Right-click Ethernet and select Properties. Configure the new DNS addresses.Select Internet Protocol Version 4 (TCP/IPv4).Select Properties.Select Use the following DNS server addresses to manually configure the DNS server addresses.Select Advanced to configure more than two DNS server addresses.Select the DNS tab (the top one).Select Add to configure DNS server addresses.Enter the DNS server address and then select Add.Repeat steps 2f-2g to configure the two additional DNS server addresses.Select OK. Validate the new DNS settings.Select Validate settings upon exit and then select OK.Select Close to close Ethernet Properties.

A security administrator is conducting a penetration test on a network. She connects a notebook system running Linux to the wireless network and then uses Nmap to probe various network hosts to see which operating system they are running. Which process did the administrator use for the penetration test in this scenario?

Active fingerprinting

Your Cisco router has three network interfaces configured. S0/1/0 is a WAN interface that is connected to an ISP. F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.2.0/24. You have configured an access control list on this router using the following rules: deny ip 192.168.1.0 0.0.0.255 any deny ip 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the rou

Add a permit statement to the bottom of the access list.

While browsing the internet, you notice that the browser displays ads linked to recent keyword searches you performed. Which attack type is this an example of?

Adware

You have a network that's connected using a physical star topology. One of the drop cables connecting a workstation has been removed. Which of the following BEST describes the effect that this will have on network communications?

All devices except the device connected with the drop cable will be able to communicate.

During a network infrastructure upgrade, you replaced two 10 Mbps hubs with switches and upgraded from a Category 3 UTP cable to a Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on your network?

All network nodes except the printer will be available.

Which of the following are characteristics of a stateless firewall? (Select two.)

Allows or denies traffic by examining information in IP packet headers. Controls traffic using access control lists, or ACLs.

Which of the following are characteristics of TACACS+? (Select two.)

Allows three different servers (one each for authentication, authorization, and accounting). Uses TCP.

Which of the following describes how access control lists can improve network security?

An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.

Which of the following defines an Acceptable Use Agreement?

An agreement that identifies the employees' rights to use company property, such as internet access and computer equipment, for personal use.

Which of the following BEST describes the main purpose of the codec used in VoIP?

An algorithm to compress data in order to save on bandwidth.

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software?

An application-specific integrated circuit

Which of the following BEST describes an ARP spoofing attack?

An attack that associates an attacker's MAC address with the IP address of a victim's device.

Which of the following is true about an intrusion detection system?

An intrusion detection system monitors data packets for malicious or unauthorized traffic.

You administer a network with Windows Server 2016, UNIX servers, and Windows 10 Professional, Windows 8, and Macintosh clients. A Windows 8 computer user calls you one day and says that he is unable to access resources on the network. You type ipconfig on the user's computer and receive the following output: 0 Ethernet adapter: IP address. . . . . . . . . : 169.254.1.17Subnet Mask . . . . . . . . : 255.255.0.0Default Gateway . . . . . . : You also check your NIC and see that the link light is on. What might the problem be in this scenario?

An unavailable DHCP server

Which of the following BEST describes an inside attacker?

An unintentional threat actor (the most common threat).

You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem for the business. The business has four computers that need to communicate with each other and the internet. The ISP's cable modem has only one RJ45 port. You need to set up the network within the following parameters: You must spend as little money as possible. You must not purchase unnecessary equipment. Computers need to have a gigabit connection to the network. New devices should not require management or configuration. You examine each computer and notice that only one of the four computers has a wireless NIC. They all have Ethernet NICs. What should you purchase?

An unmanaged switch and CAT 5e cabling.

Which IDS method defines a baseline of normal network traffic and then looks for anything that falls outside of that baseline?

Anomaly-based

Which of the following uses a 2.4 GHz ISM band, has fast transmission rates, and has been used for applications like geocaching and health monitors?

Ant+

Which of the following allows the same IPv6 address to be assigned to multiple interfaces?

Anycast

Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis?

Application log

What are the three layers of an SDN?

Application, Control, and Infrastructure

Which of the following are specific to extended Access control lists? (Select two.)

Are the most used type of ACL. Use the number ranges 100-199 and 2000-2699.

Which of the following works as an authoritative time device?

Atomic clock

Which of the following BEST describes the key difference between DoS and DDoS?

Attackers use numerous computers and connections.

What is the primary purpose of RADIUS?

Authenticate remote clients before access to the network is granted.

An organization's receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. Which type of social engineering is this individual engaging in?

Authority

What is the primary countermeasure to social engineering?

Awareness

Which of the following gives the same IP address to multiple servers and manually defines different routes on an IPv4 network?

BGP

You're working with an older 10Base2 Ethernet network. Which of the following connector types will you MOST LIKELY encounter?

BNC

You want to make sure that the correct ports on a firewall are open or closed. Which document should you check?

Baseline configurations

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Bastion

Which of the following BEST describes the special MAC address that multicast traffic frames are sent to?

Begins with 01-00-5E and ends with a form of the IP multicast group address

Where can you check your CPU's temperature?

Bios

Which deviation in power is the longest?

Blackout

You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

Bluetooth 802.11b

Which of the following is the term for when a system is unable to keep up with the demands placed on it?

Bottleneck

Which term does theMatch each TCP/IP layers with its function. OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment?

Breaks the data into pieces./Transport Prepares the data to be sent./Application Adds physical addresses./Link Adds logical addresses./Internet

You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using?

Brute force attack

Which of the following topologies connects all devices to a trunk cable

Bus

Which of the following physical topologies are used with Ethernet networks? (Select two.)

Bus Star

In business continuity planning, what is the primary focus of the scope?

Business processes

Which of the following are true about reverse proxy? (Select two.)

Can perform load balancing, authentication, and caching. Handles requests from the internet to a server on a private network.

You are using a protocol analyzer to capture network traffic. You want to only capture the frames coming from a specific IP address. Which of the following can you use to simplify this process?

Capture filters

Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated?

Cat 6

Which of the following are advantages of virtualization? (Select two.)

Centralized administration. Easy system migration to different hardware.

You are making Ethernet drop cables using Cat5e cables and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires. Which tool should you use?

Cable stripper

Which of the following is a valid MAC address?

C0-34-FF-15-01-8E

Which of the following is the customer's responsibility to maintain?

CPE

Which type of communication path-sharing technology do all 802.11 standards for wireless networking support?

CSMA/CA

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?

CSMA/CD

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

Which of the following services is available regardless of whether the telephone company network is available?

Cable modem

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device?

Change Management

You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location with an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What else should you do to increase the security of this device? (Select two.)

Change the default administrative username and password. Use an SSH client to access the router configuration.

What is spoofing?

Changing or falsifying information in order to mislead or re-direct traffic.

You are concerned that wireless access points might have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)

Check the MAC addresses of devices that are connected to your wired switch. Conduct a site survey.

Dan, a network administrator, gets an email from the CEO. She is upset because people keep talking over each other on conference calls. Which option BEST describes Dan's first step to remedy this problem?

Check the latency configuration. Latency should be set between 75 and 150 milliseconds.

What is the purpose of a frame check sequence (FCS) footer?

Checksum error detection

Which of the following statements about DSCP are true? (Select two.)

Classification occurs at Layer 3. It uses the DiffServ field to add precedence values.

Which of the following does the sudo iptables -F command accomplish?

Clears all the current rules.

You've implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but they don't host services of their own. Which type of network do you have?

Client-server

Which type of internet service uses the DOCSIS specification?

Coaxial cable

Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system?

Collectors

Which of the following is true about half-duplex mode?

Collision detection is turned on.

Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all.

Commonly sold at retail stores. Unmanaged switch Provides port security features. Managed switch Supports VLANs. Managed switch Provides very few configuration options. Unmanaged switch Can be configured over a network connection. Managed switch Can be configured over a dedicated communication channel. Managed switch

What does SNMP use to identify a group of devices under the same administrative control?

Community strings

Match each wireless term or concept on the left with its associated description on the right. Each term may be used more than once. (Not all descriptions have a matching term.)

Compares the Wi-Fi signal level to the level of background radio signals. Signal-to-noise ratio Checks channel utilization and identifies sources of RF inference. Spectrum analysis Identifies how strong a radio signal is at the receiver. Received signal level

Match each switch management method on the left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.

Competes with normal network traffic for bandwidth. In-band management Uses a dedicated communication channel. Out-of-band management Must be encrypted to protect communications from sniffing. In-band management Does not compete with normal network traffic for bandwidth. Out-of-band management Affected by network outages. In-band management

Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following BEST describes the frame's composition as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discovered that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You've decided to implement Gigabit Ethernet on your network; each switch port is connected to a single device. Following the installation, you find one device connected to a switch that's only running at 100 Mbps. Which of the following is MOST LIKELY the cause?

Crosstalk

Which of the following time standards does NTP use?

UTC

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal?

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge?

Configure a priority number of 4096 for switch C.

You have configured a wireless access point to create a small network. For security reasons, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do?

Configure a profile on the wireless client.

What does the ip address dhcp command allow you to do?

Configure a switch to obtain an IP address from a DHCP server.

For users on your network, you want to automatically lock user accounts if four incorrect passwords are used within 10 minutes. What should you do?

Configure account lockout policies in Group Policy

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do?

Configure account policies in Group Policy.

You are the network administrator for a small consulting firm. The office network consists of 30 computers, one server, two network printers, and a switch. Due to security concerns, there is no wireless network available in the office. One of your users, Bob, travels to client sites and is generally not in the office. When Bob goes to client sites, he typically just connects to their wireless networks. When he's in the office, Bob connects his laptop to the network with an Ethernet cable. You need to make sure that Bob's laptop is setup so that when he plugs the Ethernet cable into his laptop, no further configuration is needed. Which of the following would be the BEST option to achieve this?

Configure an alternate IP configuration.

You have hired 10 new temporary employees to be with the company for three months. How can you make sure that these users can only log on during regular business hours?

Configure day/time restrictions in user accounts.

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that's connected t

Configure port security on the switch.

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to the home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)

Configure the VPN connection to use IPsec. Configure the browser to send HTTPS requests through the VPN connection.

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do?

Configure the connection with a pre-shared key and AES encryption.

You manage your company's website, which uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure on a single component doesn't cause the website to become unavailable. What should you add to your configuration to accomplish this?

Connect one server to the internet through a different ISP.

You want to create a loopback plug using a single RJ45 connector. How should you connect the wires in the connector?

Connect pin 1 to pin 3 and pin 2 to pin 6.

You want to create a rollover cable that has an RJ45 connector on both ends. How should you connect the wires within the connectors?

Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5.

You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your test virtual machines has a network connection. However, they need to be able to connect to

Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for bridged (external) networking.

Which of the following tasks is associated with the Session layer?

Connection establishment

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions. Which type of device should you use to accomplish this?

Content switch

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall-content filter all-in-one device has been implemented

Control access to the work area with locking doors and card readers. Relocate the switch to the locked server closet.

Which of the following can become a critical point of failure in a large wireless network infrastructure?

Controller

Which of the following usually provides DHCP services to dynamically assign IP addressing information to wireless clients and connect the wireless network to the internal wired network and the internet?

Controllers

Within an SDN, what is commonly referred to as the brains?

Controllers

Which of the following scenarios would typically utilize 802.1x authentication?

Controlling access through a switch.

Which of the following actions typically involve the use of 802.1x authentication? (Select two.)

Controlling access through a wireless access point. Controlling access through a switch

Amber's employer has asked her to research what is needed to best utilize current assets in creating a scalable network. Amber knows that the company has two very robust servers. What is her BEST solution?

Convert the existing servers into host servers for virtualization using a Type 1 hypervisor.

Which of the following is a text file that a website stores on a client's hard drive to track and record information about the user?

Cookie

What is the basic purpose of the OSI Physical layer?

Coordinate rules for sending and receiving electrical signals.

Which of the following are benefits that a VPN provides? (Select two.)

Cost savings Compatibility

Which of the following are true about routed firewalls? (Select two.)

Counts as a router hop. Supports multiple interfaces.

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your test virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machin

Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.

A user reports that she can't connect to the internet. After some investigation, you find that the wireless router has been misconfigured. You're responsible for managing and maintaining the wireless access point. What should you do next?

Create an action plan.

A security administrator logs on to a Windows server on her organization's network. Then she runs a vulnerability scan on that server. Which type of scan did she conduct in this scenario?

Credentialed scan

You need to connect two switches using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?

Crossover

You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Crossover

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

Crossover

Which type of address identifies which single host to send a packet to?

Unicast

Which of the following internet connection technologies requires that the location be within a limited distance of the telephone company's central office?

DSL

You have a TCP/IP network with 50 hosts. There have been inconsistent communication problems between these hosts. You run a protocol analyzer and discover that two of them have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?

DHCP

You have a network with 50 workstations. You want to automatically configure the workstations with the IP address, subnet mask, and default gateway values. Which device should you use?

DHCP server

A network switch detects a DHCP frame on the LAN that appears to have come from a DHCP server that is not located on the local network. In fact, it appears to have originated from outside the organization's firewall. As a result, the switch drops the DHCP message from that server. Which security feature was enabled on the switch to accomplish this?

DHCP snooping

You are a network technician for a small consulting firm. Many users have reported issues with accessing the network. After some initial troubleshooting, you discover that devices are not receiving their IP configurations. You look into the issue and discover that the network is being targeted by a denial-of-service attack. Which of the following is your network MOST likely experiencing?

DHCP starvation attack

Which of the following allows incoming traffic addressed to a specific port to move through the firewall and be transparently forwarded to a specific host on the private network?

DNAT

You want to implement a protocol on your network that allows computers to find a host's IP address from a logical name. Which protocol should you implement?

DNS

You suspect that cache poisoning or spoofing has occurred on your network. Users are complaining of strange web results and being redirected to undesirable sites. Which log would help you determine what's going on?

DNS logs

Which type of denial-of-service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps hostnames to IP addresses?

DNS poisoning

You need to enable hosts on your network to find the IP address of logical names, such as srv1.myserver.com. Which device should you use?

DNS server

You have configured a wireless access point to create a small network and configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

Decrease the beacon interval.

Which device is NAT typically implemented on?

Default gateway router

Upon running a security audit in your organization, you discover that several sales employees are using the same domain user account to log in and update the company's customer database. Which action should you take? (Select two. Each response is part of a complete solution.)

Delete the account that the sales employees are currently using. Train sales employees to use their own user accounts to update the customer database.

What does the Windows Update Delivery Optimization function do?

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

Which of the following describes the point where the service provider's responsibility to install and maintain wiring and equipment ends and the customer's begins?

Demarc

Which of the following is an attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial-of-service attack

Which of the following can you use to stop piggybacking from occurring at a front entrance where employees swipe smart cards to gain entry?

Deploy a mantrap.

Which of the following information are you MOST likely to find in a procedure document?

Details on how to test and deploy patches

Which of the following is a best practice when establishing a baseline?

Determine baselines over time by analyzing network traffic.

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next?

Determine if escalation is needed.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?

Determine what has changed.

Which of the following BEST describes a stateful inspection?

Determines the legitimacy of traffic based on the state of the connection from which the traffic originated.

You have a network that's connected using a full physical mesh topology. The link between Device A and Device B is broken. Which of the following BEST describes the effect that this will have on network communications?

Device A will be able to communicate with all other devices.

Anabel purchased a smart speaker. She connected it to all the smart devices in her home. Which of the following communication models is she using?

Device-to-device

What are the four primary systems of IoT technology?

Devices, gateway, data storage, and remote control

Which backup strategy backs up only files that have the archive bit set and does not mark them?

Differential

On your way into the back entrance of your work building one morning, a man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?

Direct him to the front entrance and instruct him to check in with the receptionist.

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which of the following is a best practice for router security?

Disable unused protocols, services, and ports.

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic?

Distributed wireless mesh infrastructure

Which of the following is a method of VLAN hopping?

Double tagging

You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?

Dump files

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?

Dumpster diving

A web server on your network hosts your company's public website. You want to make sure that a NIC failure on the server does not prevent the website from being accessible on the internet. Which solution should you implement?

Ethernet bonding

You are the network administrator for a consulting firm. Your network consists of:40 desktop computersTwo serversThree network switchesTwo network printers You've been alerted to an issue with two desktop computers that are having problems communicating with the network. When only one computer is on, everything is fine. But when both computers are connected, the network connection is randomly dropped or interrupted. Which of the following would be the MOST likely cause for this?

Duplicate MAC Addresses

A network switch is configured to perform the following validation checks on its ports: All ARP requests and responses are intercepted. Each intercepted request is verified to ensure that it has a valid IP-to-MAC address binding. If the packet has a valid binding, the switch forwards the packet to the appropriate destination. If the packet has an invalid binding, the switch drops the ARP packet. Which security feature was enabled on the switch to accomplish this task?

Dynamic ARP inspection

Which of the following services automatically creates and deletes host records when an IP address lease is created or released?

Dynamic DNS

You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you MOST likely to recommend to the client?

EAP

Which EAP implementation is MOST secure?

EAP-TLS

Which of the following routing protocols is a hybrid that uses a composite number for its metric based on bandwidth and delay?

EIGRP

Which IPSec subprotocol provides data encryption?

ESP

You have a cable internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you MOST LIKELY to experience?

Echo

Which of the following conditions can low humidity result in?

Electrostatic discharge

A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown below. What should you do? (Choose two. Each response is a complete solution.)

Enable STP on each switch. Remove the patch cable connecting the first switch to the third switch.

Which other service is IPsec composed of, in addition to AH?

Encapsulating Security Payload (ESP)

Which of the following is the process of breaking a message into packets, adding controls and other information, and then transmitting the message through the transmission medium?

Encapsulation

Which of the following features are supplied by WPA2 on a wireless network?

Encryption

Which of the following features does WPA2 supply on a wireless network?

Encryption

Which of the following statements about an SSL VPN are true? (Select two.)

Encrypts the entire communication session. Uses port 443.

Which of the following is a characteristic of TACACS+?

Encrypts the entire packet, not just authentication packets.

Which of the following are best practices for hardening a server? (Select three.)

Ensure that a host-based firewall is running. Disable or uninstall unnecessary software. Apply the latest patches and service packs.

If dynamic DNS is in use, which of the following events causes a dynamic update of the host records? (Select two.)

Enter the ipconfig /registerdns command on a workstation. Renew the DHCP server's IP address lease.

Which of the following is the term for a calculation of how often bits are damaged in transit due to electromagnetic interference?

Error rate

You are the desktop administrator for your company. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). Which of the following actions can you take to accomplish this?

Establish a Remote Desktop connection to each computer.

Dumpster diving is a low-tech way of gathering information that may be useful for gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?

Establish and enforce a document destruction policy.

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy?

Establish the symptoms.

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement?

Ethernet bonding

You are creating a DHCP scope for a new network segment for the Development department. The department has several printers and servers that need to have a static IP address assigned to them that will not be changed by the DHCP server. Which of the following DHCP scope setting do you need to configure to avoid DHCP assigned IP addresses to these devices?

Exclusions

What is the primary benefit of CCTV?

Expands the area visible to security guards.

Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable?

Exterior dynamic routing protocols

You've just signed up for a broadband home internet service that uses coaxial cabling. Which connector type will you MOST LIKELY use?

F-type

Which of the following IPv6 addresses is used by a host to contact a DHCP server?

FF02::1:2

You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem?

Failed patch cable

You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach patch cables from the client system to the wall jack and from the patch panel to the switch. Once connected, you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known good one, but you still cannot connect. Which of the following might you suspect is the problem?

Failed patch cable between the client system and the wall jack

Which IDS traffic assessment indicates that the system identified harmless traffic as offensive and generated an alarm or stopped the traffic?

False positive

Upon conducting a visual inspection of the server room, you see that a switch displays LED collision lights that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collisions?

Faulty network card

Which type of cabling do Ethernet 100BaseFX networks use?

Fiber optic

Brett has been tasked with creating a new SAN. The company currently has Gigabit internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN. Brett tells the CTO that this will not work. Which of the following BEST describes the problem?

Fibre Channel over Ethernet requires 10 Gigabit internet.

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. Which type of network hardware should you implement to prevent this from happening again?

Firewall

You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect when you use the hostname. Which of the following do you need to configure so that the site can be accessed with the hostname?

Forward lookup zone

Your network uses the following backup strategy. You create: Full backups every Sunday night. Incremental backups Monday night through Saturday night. On a Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?

Four

Which backup strategy backs up all files from a computer's file system (regardless of whether the file's archive bit is set or not) and then marks them as backed up?

Full

John is using a host machine with a Type1 hypervisor. He has 40 virtual servers using unmodified guest OSs. Which type of virtualization BEST describes this configuration?

Full virtualization

Which of the following is a device that can send and receive data simultaneously?

Full-duplex

Which of the following does the DHCP relay agent use to tell the DHCP server which pool of addresses to use?

GIADDR

Which of the following can route Layer 3 protocols across an IP network?

GRE

Match the Network Access Protection (NAP) component on the left with its description on the right

Generates a Statement of Health (SoH) that reports the client configuration for health requirements. NAP client Runs the System Health Validator (SHV) program. NAP server Is clients' connection point to the network. Enforcement server (ES) Contains resources accessible to non-compliant computers on a limited-access network. Remediation server

Consider the following IPv6 address: FD01:0001:0001:005::7/64 Drag the component parts of this address on the left to the corresponding descriptions on the right.

Global routing prefix FD01:0001:0001:005 Subnet ID :005 Interface ID ::7 Prefix length /64 Unique local unicast prefix FD

You need to design an IPv6 addressing scheme for your network. The following are key requirements for your design: Infrastructure hosts, such as routers and servers, are assigned static interface IDs. However, workstations, notebooks, tablets, and phones are assigned interface IDs dynamically. Internet access must be available to all hosts through an ISP. Site-to-site WAN connections are created using leased lines. Which type of IPv6 addressing is most appropriate for hosts on this network?

Global unicast addressing

Your Windows system is a member of a domain. Windows Update settings are being controlled through Group Policy. How can you determine whether a specific security update from Windows Update is installed on the computer?

Go to Programs and Features in Control Panel.

Which of the following is true of a wireless network SSID?

Groups wireless devices together into the same logical network.

Which of the following is the first place a computer looks at during the name resolution process?

HOSTS file

Which of the following hardware devices regenerate a signal out of all connected ports without examining the frame or packet contents? (Select two.)

HUB Repeater

You maintain the network for an industrial manufacturing company. A short-circuit of a switch in the server room starts an electrical fire. Which of the following should you use to suppress the fire?

Halon or CO2

Which of the following are considered VoIP endpoints?

Hard phones and soft phones

Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.

Hardened carrier Protected cable distribution Biometric authentication Door locks Barricades Perimeter barrier Emergency escape plans Safety Alarmed carrier Protected cable distribution Anti-passback system Physical access control Emergency lighting Safety Exterior floodlights Perimeter barrier

Which of the following are characteristics of Teredo tunneling? (Select three.)

Has dual-stack hosts Is configured between individual hosts Can be used to send data over the internet

What BEST describes the designed purpose of InfiniBand?

High-performance supercomputers

Which of the following is a common social engineering attack?

Hoax virus information emails.

Which type of address is the IP address 198.162.12.254/24?

Unicast

Which of the following intrusion detection and prevention systems uses fake resources to entice intruders by displaying a vulnerability, configuration flaw, or valuable data?

Honeypot

As a security precaution, you've implemented IPsec to work between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?

Host-based IDS

You have been given a laptop to use for work. You connect the laptop to your company network, use the laptop from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use?

Host-based firewall

Routing data between computers on a network requires several mappings between different addresses. Which of the following statements is true?

Hosts use ARP to resolve known IP addresses into MAC addresses

Which of the following are the components of a SAN?

Hosts, storage, and SAN fabric

Most equipment is cooled by bringing cold air in the front and ducting the heat out the back. What is the term for where heat is sent?

Hot aisle

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)

How many devices will need to be supported? Is the size of the business expected to grow in the future? Which type of data will be transmitted on the network?

Which of the following is a configuration in which a wireless controller is connected to all APs through a wired link?

Hub and spoke

Which organization is responsible for allocating public IP addresses?

IANA

Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?

ICMP

Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?

IGMP

You have a small network with a single subnet connected to the internet, as shown in the exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway and DNS1 as the DNS server address. From the drop-down menu options, select the appropriate parameters to configure the workstation's TCP/IP settings.

IP address 192.168.12.46 Subnet mask 255.255.255.240 Default gateway 192.168.12.34 DNS server 198.162.1.22

Which of the following are configured when a device receives its IP configuration from APIPA? (Select two.)

IP address Subnet Mask

Which of the following would a device use to receive NTP configuration from a NTP server that's located on a different network?

IP helper

You're concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use?

IPS

Which of the following Network layer protocols provides authentication and encryption services for IP-based network traffic?

IPsec

You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that can both accommodate the company's current size and scale as the company grows. The service needs to provide adequate storage as well as additional computing power. Which cloud service model should you use?

IaaS

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

Identify possible side effects of the solution.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?

Identify the affected areas of the network.

Which of the following purposes do wireless site surveys fulfill? (Select two.)

Identify the coverage area and preferred placement of access points. Identify existing or potential sources of interference.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?

Identify the results and side effects of the solution.

Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers?

If the network is connected to the internet using multiple ISPs.

Which of the following are advantages of using fiber optic cabling for a network? (Select two.)

Immunity to electromagnetic interference Greater cable distances without a repeater

The owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network. She wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the internet. If a user does not provide the correct code, he or she should not be allowed to access the internet. What should you do?

Implement a captive portal.

You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?

Implement a virtual firewall within the hypervisor.

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of your facility's unique construction, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do?

Implement antenna diversity.

As you are helping a user with a computer problem, you notice that she has written her password on a note stuck to her computer monitor. You check your company's Password Policy and find that the following settings are currently required: Minimum password length = 10 Minimum password age = 4 Maximum password age = 30 Password history = 6 Account lockout clipping level = 3 Require complex passwords that include numbers and symbols Which of the following is the best action to take to make remembering passwords easier so that the user no longer has to write their password down?

Implement end user training.

You have been using SNMP on your network for monitoring and management, but you're concerned about the security of this configuration. What should you do to increase security in this situation?

Implement version 3 of SNMP

Which statements accurately describe the port states of both bridges and switches? (Select two.)

In the learning state, the MAC address table can be populated, but frames are not forwarded. Ports in a blocked state still receive BPDUs.

A user reports that they cannot browse to a specific website on the internet. From the user's computer, a computer tech finds that a ping test to the web server succeeds. A traceroute test shows 17 hops to the destination web server. What is the MOST likely cause of the problem?

Incorrect DNS server address

You are a network technician for a small consulting firm. One of your users is complaining that they are unable to connect to the local intranet site. After some troubleshooting, you've determined that the intranet site can be connected to by using the IP address but not the hostname. Which of the following would be the MOST likely reason for this?

Incorrect DNS settings

As a network administrator, you have 10 VLANs on your network that need to communicate with each other. Which of the following network devices is the BEST choice for allowing communication between 10 VLANs?

Layer 3 switch

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection:Connection-specific DNS Suffix. : mydomain.localDescription . . . . . . . : Broadcom network adapterPhysical Address . . . . . : 00-AA-BB-CC-74-EFDHCP Enabled. . . . . . . : NoAutoconfiguration Enabled . . : YesIPv4 Address. . . . . . . : 192.168.2.102(Preferred)Subnet Mask . . . . . . . : 255.255.255.0Default Gateway. . . . . . : 192.168.1.1DNS Servers . . . . . . . : 192.168.2.20 What is the MOST likely cause of the problem?

Incorrect IP address

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection:Connection-specific DNS Suffix . : mydomain.localDescription . . . . . . . : Broadcom network adapterPhysical Address. . . . . . : 00-AA-BB-CC-74-EFDHCP Enabled . . . . . . . : NoAutoconfiguration Enabled. . . : YesIPv4 Address . . . . . . . : 192.168.1.102(Preferred)Subnet Mask . . . . . . . : 255.255.255.0Default Gateway. . . . . . . . . : 192.168.2.1DNS Servers. . . . . . . . . . . : 192.168.2.20 What is the most likely cause of the problem?

Incorrect default gateway

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection:Connection-specific DNS Suffix . : mydomain.localDescription . . . . . . . : Broadcom network adapterPhysical Address. . . . . . : 00-AA-BB-CC-74-EFDHCP Enabled . . . . . . . : NoAutoconfiguration Enabled. . . : YesIPv4 Address . . . . . . . : 192.168.1.102(Preferred)Subnet Mask. . . . . . . . : 255.255.0.0Default Gateway . . . . . . : 192.168.1.1DNS Servers . . . . . . . : 192.168.1.20192.168.1.27 What is the MOST likely cause of the problem?

Incorrect subnet mask

You've configured your organization's DHCP server to dynamically assign IP addresses and changed the default lease time from eight to four days. What impact, if any, will this have on the network?

Increased network traffic

What is the purpose of using Ethernet bonding? (Select two.)

Increases network performance Provides a failover solution for network adapters

Which of the following does an agent send to the manager to confirm the receipt of a transmission?

Inform

Which of the following CCTV types would you use in areas with little or no light?

Infrared

Which option BEST describes the third layer in the SDN architecture?

Infrastructure

Which of the following is the MOST effective protection against IP packet spoofing on a private network?

Ingress and egress filters

You're replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network? (Select two.)

Install a RADIUS server and use 802.1x authentication. Configure devices to run in infrastructure mode.

Dan wants to implement reconnaissance countermeasures to help protect his DNS service. Which of the following actions should he take?

Install patches against known vulnerabilities and clean up out-of-date zones, files, users, and groups.

In the OSI model, which of the following functions are performed at the Application layer? (

Integration of network functionality into the host operating system. Enabling of communication between network clients and services.

You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. The power supplies on the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center?

Inverter

You notice that a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections. Which of the following labels applies to this growing ecosystem of smart devices?

IoT

Which of the following is true about an unmanaged switch?

It can connect to all devices in a small area.

Which of the following statements about Dynamic Host Configuration Protocol (DHCP) are true? (Select two.)

It can deliver other configuration information in addition to IP addresses. A DHCP server assigns addresses to requesting hosts.

Which of the following BEST describes how a switch functions?

It connects multiple cable segments (or devices) and forwards frames to the appropriate segment.

Which of the following is true about an NIDS?

It detects malicious or unusual incoming and outgoing traffic in real time.

Which of the following are true of the IS-IS routing protocol? (Select two.)

It divides large networks into areas. It supports IPv6 routing.

Which of the following are characteristics of a coaxial network cable? (Select two.)

It has a conductor made from copper in its center. It uses two concentric metallic conductors

Which of the following are true about a MAC address? (Select two.)

It is a 48-bit address. It is typically represented by hexadecimal numbers.

Which of the following statements accurately describe how a modem works? (Select two.)

It modulates digital data from a PC into analog data and transmits it on a telephone network. It demodulates analog data from a telephone network into digital PC data.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

Which of the following is a limitation of consumer-grade wireless equipment?

It supports a maximum of 5-10 wireless clients at a time.

Which of the following is true about Network Address Translation?

It supports up to 5,000 concurrent connections.

Which of the following is true about single-mode fiber optic network cabling?

Its central core is smaller than the standard multi-mode fiber optic cabling core.

What are the small, rapid variations in a system clock called?

Jitter

When packets arrive at their destination at different speeds, they sometimes arrive out of order. What does this cause?

Jitter

Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference?

Jitter is the up and down variation in latency.

Which of the following is the MOST important way to prevent console access to a network switch?

Keep the switch in a room that is locked by a keypad.

Which recommendation should you follow while using 110 blocks for connecting Cat5 and higher data cables?

Keep wire pairs twisted up to within one half of an inch of the connector.

Drag each penetration test characteristic on the left to the appropriate penetration test name on the right

Known test The tester has detailed information about the target system prior to starting the test. Partially known test The tester has the same amount of information that would be available to a typical insider in the organization. Unknown test The tester has no prior knowledge of the target system. Single-blind test Either the attacker has prior knowledge about the target system or the administrator knows that the test is being performed. Double-blind test The tester does not have prior information about the system, and the administrator has no knowledge that the test is being performed.

Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two.)

LC MTRJ

Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.)

LTE HSPA+

At which OSI model layer does a media converter operate?

Layer 1

Which of the following VPN protocols merged with the deprecated Point-to-Point Tunneling Protocol (PPTP) to create L2TP?

Layer 2 Forwarding

Workstation3 has started communicating with Workstation2. It sends a frame to the default gateway. Identify the Layer 2 and Layer 3 addresses used by the Cisco 2600 router to forward the data to Workstation2 by dragging the corresponding address from the list on the left to its location on the right.

Layer 2 source address/000b5f2a2222 Layer 3 source address/192.168.11.11 Layer 2 destination address/080046987654 Layer 3 destination address/192.168.10.12

Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3 addresses Workstation2 will use to send the data by dragging the corresponding address from the list on the left to its location on the right.

Layer 2 source address/080046987654 Layer 3 source address/192.168.10.12 Layer 2 destination address/000b5f2a2222 Layer 3 destination address/192.168.11.11

What does a remote access server use for authorization?

Remote access policies

On your network, you have a VLAN for the sales staff and a VLAN for the production staff. Both need to be able to communicate over the network. Which of the following devices would work BEST for communication between VLANs?

Layer 3 switch

Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?

Level 0

Which Syslog severity level indicates a debugging message?

Level 7

You're troubleshooting an IP addressing issue, and you issue a command to view the system's TCP/IP configuration. The command you use produces the following output: fxp0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500inet6 fe80::2a0:83ff:fe30:57a%fxp0 prefixlen 64 scopeid 0x1inet 192.168.1.235 netmask 0xfffffc00 broadcast 255.255.255.255ether 00:a0:83:30:05:7amedia: Ethernet autoselect (100baseTX <full-duplex>)status: activelo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384inet6 ::1 prefixlen 128inet6 fe80::1%lo0 prefixlen 64 scopeid 0x7inet 127.0.0.1 netmask 0xff000000 Which of the following operating systems are you working on?

Linux

Which of the following devices accepts incoming client requests and distributes those requests to specific servers?

Load balancer

Which of the following controls is an example of a physical access control method?

Locks on doors

Which of the following features does UDP provide? (Select two.)

Low Overhead Connectionless datagram services

Which of the following do switches and wireless access points use to control access through a device?

MAC address filtering

An attacker hides his computer's identity by impersonating another device on a network. Which of the following attacks did the attacker MOST likely perform?

MAC spoofing attack

Which of the following geographic network types is typically managed by a city as a public utility?

MAN

Which of the following terms identifies the wiring closet in the basement or ground floor that typically includes the demarcation point?

MDF

Which of the following technologies uses variable-length packets, adds labels to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic?

MPLS

What is the name of the computer that queries agents and gathers responses by sending messages?

Manager

You have a server that has a 100BaseFX network interface card you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use?

Media converter

Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?

Mesh

You have a network that uses a logical bus topology. How do messages travel through the network?

Messages are broadcast to all devices connected to the network.

You have a network that uses a logical ring topology. How do messages travel through the network?

Messages travel from one device to the next until they reach the destination device.

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)

Minimum password length Account lockout threshold

You have a server at work with a custom application installed. Connections to the server that use the custom application must use IPv6, but the server is currently running IPv4. You're the only person who connects to the server, and you always use your Linux laptop for the connection. Your laptop supports both IPv4 and IPv6, but the rest of your company network runs only IPv4. You need a cost-effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which client software should you use to connect to the server?

Miredo

Which of the following does an SNR higher than 1:1 indicate?

More signal than noise

Match the wireless networking term or concept on the left with its appropriate description on the right. (Each term may be used once, more than once, or not at all.)

Moving a wireless device between access points within the same wireless network. Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN. LWAPP Specifies the number of clients that can utilize the wireless network. Device density Automatically partitions a single broadcast domain into multiple VLANs. VLAN pooling Connects two wired networks over a Wi-Fi network. Wireless bridge The number of useful bits delivered from sender to receiver within a specified amount of time. Goodput

Which address type do people use to support video conference calls consisting of multiple participants?

Multicast

Which of the following address types shares multiple hosts and groups of computers that receive the same data stream?

Multicast

Which type of address is the IP address 232.111.255.250?

Multicast

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?

Multilayer switch

You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?

Multimeter

Which key advantage does a virtual router have over a physical router?

Multiple networks can connect to a single interface.

Which of the following BEST describes port aggregation?

Multiple ports linked together and used as a single logical port.

Which of the following is a feature of MS-CHAPv2 that is not included in CHAP?

Mutual authentication

Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed. Which solution should you use?

NAC

You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used?

NAS with clustering

Which of the following is a method that allows you to connect a private network to the internet without obtaining registered addresses for every host?

NAT

Which of the following functions does a consumer-grade access point combine into a single device? (Select two.)

NAT WAP

Which of the following is the protocol used for address resolution when you switch from IPv4 to IPv6?

NDP

You have a large TCP/IP network and want to keep a host's real-time clock synchronized. Which protocol should you use?

NTP

Which of the following locations creates the greatest amount of interference for a wireless access point? (Select two.)

Near backup generators Near cordless phones

At which OSI layer does a router operate to forward network messages?

Network

You are an administrator of a growing network. You notice that the network you've created is broadcasting, but you can't ping systems on different segments. Which device should you use to fix this issue?

Network bridge

Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?

Network diagram

Which network component connects a device to transmission media and allows the device to send and receive messages?

Network interface card

You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task?

Network segmentation

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. You need to isolate the remediation network from the secure network. Which technology should you implement to accomplish this task?

Network segmentation

You have a network that's connected using a physical bus topology. One of the cables that connects a workstation to the bus breaks. Which of the following BEST describes the effect that this will have on network communications?

No devices will be able to communicate.

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS on the rack along with redundant power supplies for the server. Will this configuration work?

No, you should not run a cable across the data center floor.

You're installing network wiring for a new Ethernet network at your company's main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon closer inspection, it appears very similar to the Cat 5e wiring. To finish the project, should you use the Cat 3 cabling as a substitute for the Cat 5e cabling?

No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk and supporting higher data rates

You are configuring a switch so that you can manage it using PuTTY from the same network segment. On the switch, you enter the following commands: switch#config terminalswitch(config)#interface vlan 1switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work?

No. The no shutdown command needs to be entered.

You're building a new network for a small financial services startup company. Security is paramount, so each organization within the company will have their own network segments separated by routers. Funds are limited, and you've been asked to keep costs to a minimum. You've acquired a used fiber optic switch, and you want to use it to create a fiber optic backbone that interconnects all of the routers. You've purchased several used multi-mode GBIC modules on eBay that you'll install on each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You've purchased several used 1-meter, multi-mode patch cables from Amazon. But when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you're able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work?

No. You should purchase patch cables that use MTRJ connectors.

You're building a new network for a small financial services startup company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you've been asked to keep costs to a minimum. You've acquired a used fiber optic switch, and you want to use it to create a fiber optic backbone that interconnects all of the routers. You've purchased several used single-mode GBIC modules on eBay that you'll install on each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1-meter multimode patch cables. Will this implementation work?

No. You shouldn't use multi-mode patch cables with single-mode GBIC modules.

Which of the following is a contract in which both parties agree not to share proprietary or confidential information gathered during the business relationship?

Non-Disclosure Agreement

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environmental monitoring device within the rack. Currently, the device shows that the temperature within the rack is 70 degrees Fahrenheit (21 degrees Celsius). What should you do?

Nothing, the temperature within the rack is within acceptable limits.

What are the main differences between the OSPF and IS-IS routing protocols?

OSPF requires an area 0, while IS-IS does not.

You're working with an existing fiber optic installation in your building. You want to know the length of each cable that runs through the walls. Which tool should you use?

OTDR

When a device renews its DHCP lease, which two steps in the DHCP process are skipped?

Offer Discover

Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the following main intrusion detection and prevention goals? (Select two.)

Offers attackers a target that occupies their time and attention while distracting them from valid resources. Reveals information about an attacker's methods and gathers evidence for identification or prosecution purposes.

Which of the following describe the EDGE cellular technology? (Select two.)

Offers speeds of 400 to 1,000 Kbps. Is the first internet-compatible technology.

You're setting up a wireless hotspot in a local coffee shop. For best results, you want to disperse the radio signals evenly throughout the coffee shop. Which of the following antenna types would you use on the AP to provide a 360-degree dispersed wave pattern?

Omni-directional

You want to implement 802.1x authentication on your wireless network. Where would you configure the passwords that will be used for the authentication process?

On a RADIUS server.

You need to place a wireless access point in your two-story building while avoiding interference. Which of the following is the best location for the access point?

On the top floor

Which of the following attack types consists of capturing packets as they travel from one host to another with the intent of altering the contents?

On-path

Your network performs a full backup every night. Each Sunday, the previous night's backup tape is archived. On a Wednesday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?

One

Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)

One D channel operating at 16 Kbps. Two B channels operating at 64 Kbps each.

Which of the following best describes NTP efficiency?

One packet per minute is necessary to sync two machines to an accuracy of within a millisecond of one another.

Which of the following are backed up during a differential backup?

Only files that have changed since the last full backup.

Which of the following are backed up during an incremental backup?

Only files that have changed since the last full or incremental backup.

With Wireshark, you've used a filter to capture only the desired packet types. Using the information shown in the image, which of the following BEST describes the effects of using the host 192.168.0.34 filter?

Only packets with 192.168.0.34 in either the source or destination address are captured.

Which of the following is required to establish a new network switch and configure its IP address for the first time?

Out-of-band management

Which of the following methods is best to have when a network goes down?

Out-of-band management

Which of the following authentication protocols transmits passwords in cleartext and is considered too unsecure for modern networks?

PAP

Which IDS type can alert you to trespassers?

PIDS

Match the authentication factor types on the left with the appropriate authentication factor on the right. (You can use each authentication factor type more than once.)

PIN Something you know Smart card Something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have Voice recognition Something you are Wi-Fi triangulation Somewhere you are Typing behaviors Something you do

Which of the following is a mechanism for granting and validating certificates?

PKI

Which of the following describes the lines used in a local loop for dial-up telephone access?

POTS

Which of the following best describes the purpose of using subnets?

Subnets divide an IP network address into multiple network addresses.

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal?

PSTN

You are traveling throughout North America to many metropolitan and rural areas. Which single form of internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN

Which options are you able to set on a firewall? (Select three.)

Packet destination address Packet source address Port number

Which of the following is a firewall function?

Packet filtering

What do you need to configure on a firewall to allow traffic directed to the public resources on the screened subnet?

Packet filters

You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic by protocol. Which tool should you use?

Packet sniffer

Which network type divides transmitted data into smaller pieces and allows multiple communications on the network medium?

Packet-switched

When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at different sites?

Packets

Which form of virtualization does not virtualize the hardware?

Paravirtualization

Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?

Partial mesh

Which of the following terminates individual wires from a 25-pair or 100-pair cable using female RJ45 ports?

Patch panel

You've implemented a network where each device provides all other devices on the network with access to shared files. Which type of network do you have?

Peer to peer

Your disaster recovery plan (DRP) calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you must choose a method that uses the least amount of backup media but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the DRP's specifications?

Perform a full backup once per week and a differential backup the other days of the week.

Which of the following security functions does CHAP perform?

Periodically verifies the identity of a peer using a three-way handshake.

Match each social engineering description on the left with the appropriate attack type on the right.

Phishing An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling An attacker gathers personal information about the target individual, who is a CEO. Spear phishing An attacker gathers personal information about the target individual in an organization. Dumpster diving An attacker searches through an organization's trash for sensitive information. Piggybacking An attacker enters a secure building by following an authorized employee through a secure door without providing identification. Vishing An attacker uses a telephone to convince target individuals to reveal their credit card information.

At which layer of the OSI model do hubs operate?

Physical

Which of the following are included as part of the Data Link layer specifications?

Physical network device identification Data transmission between hosts

You need to terminate a Cat6 UTP cable with an RJ45 connector. Your organization's IT policy states that all cable connectors must be wired according to TIA568B standards. Drag the UTP wire on the left to the correct pin on the RJ45 connector on the right.

Pin 1/White with orange stripe Pin 2/Solid orange Pin 3/White with green stripe Pin 4/Solid blue Pin 5/White with blue stripe Pin 6/Solid green Pin 7/White with brown stripe Pin 8/Solid brown

Which TCP/IP utility gives you the following output?

Ping

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are.

Which of the following Security Orchestration, Automation, and Response (SOAR) system components helps to document the processes and procedures that are to be used by a human during a manual intervention?

Playbook

You're adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You'd like to run your Ethernet cables in this area. Which type of cable must you use?

Plenum rated

You have a large Power over Ethernet flat screen that you are installing in a conference room that requires 70 watts of power. Which of the following IEEE standards does your PoE switch need to provide power for the flat screen?

PoE++ Type 4

You are preparing to attach wires in a 110 block. You want to connect the wires and trim off the excess at the same time. Which of the following should you do? (Select two.)

Point the cut side of the tool towards the wire end. Use a punch down tool with a notched blade

Listed below are several DNS record types. Match each record type on the left with its function on the right.

Points a hostname to an IPv4 address A Provides alternate names to hosts that already have a host record CNAME Points an IP address to a hostname PTR Points a hostname to an IPv6 address AAAA Identifies servers that can be used to deliver mail MX

Which port does Remote Desktop use?

Port 3389

You manage a network that uses switches. In the lobby of your building are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers in to the free network jacks and connect to the network, but you want employees who plug in to those same jacks to be able to connect to the network. Which feature should you configure?

Port authentication

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that's connected to a hub with three other computers. The hub is connected to a switch that's connected to the router. When you run the software, you see frames addressed to the four workstations but not to the router. Which feature should you configure on the switch?

Port mirroring

Your organization's management wants to monitor all the customer services calls. The calls are taken on VoIP phones. Which of the following configurations would BEST help you set up a way to monitor the calls?

Port mirroring

You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use?

Port scanner

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?

Port scanner

Which of the following switch features allows you to configure how the switch's MAC address table is filled?

Port security

Which type of security uses MAC addresses to identify devices that are allowed or denied a connection to a switch?

Port security

A network utilizes a network access control (NAC) solution to defend against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called?

Posture assessment

Which of the following tools can you use to troubleshoot and validate Windows updates? (Select three.)

PowerShell Windows Server Update Service (WSUS) Windows Update Troubleshooter

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters do you need to configure on the laptop? (Select two.)

Pre-shared key TKIP encryption

What are two major concerns regarding IoT devices? (Select two.)

Privacy Hacking

CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of network systems, you decide to use APIPA addressing. With APIPA configured, all the systems are able to communicate with each other, but you're having trouble configuring internet access. What is the MOST LIKELY cause of the problem?

Private addresses cannot directly communicate with hosts outside the local subnet.

You want to identify the traffic that is generated and sent through a network by a specific application on a device. Which tool should you use?

Protocol analyzer

Which term does the OSI model use that's different from the TCP/IP model in reference to the terms frame, packet, and segment?

Protocol data unit (PDU)

What is the purpose of using Ethernet bonding? (Select two.)

Provides a failover solution for network adapters. Increases network performance.

Match each description on the left with the appropriate cloud technology on the right.

Public cloud Provides cloud services to just about anyone. Private cloud Provides cloud services to a single organization. Community cloud Allows cloud services to be shared by several organizations. Hybrid cloud Integrates one cloud service with other cloud services.

Which tool should you use to extend network services beyond the demarc?

Punch down tool

You are managing a network and have used firewalls to create a screened subnet. You have a web server that internet users need to access. It must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

Put the database server on the private network. Put the web server inside the screened subnet.

You have used firewalls to create a screened subnet. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

Put the database server on the private network. Put the web server inside the screened subnet.

When analyzing assets, which analysis method assigns financial values to assets?

Quantitative

Which of the following is a platform-independent authentication system that maintains a database of user accounts and passwords to centralize the maintenance of those accounts?

RADIUS

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)

RADIUS TACACS+

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function, while TACACS+ allows these services to be split between different servers.

Which hardware components are controlled by the hypervisor?

RAM, CPU, storage

Which of the following is a role service that allows users with the Remote Desktop Connection client and an internet connection to connect on an internal network.

RD Gateway

Which of the following protocols or services would you associate with Windows Remote Desktop network traffic?

RDP

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer that's connected to a computer at home. Which protocol should you use?

RDP

You have a small home network connected to the internet using an RG-6 cable. You need to move the router, but you can't find anymore RG-6 cabling. Which cable type could you use instead?

RG-59

What is the main difference between RIP and RIPv2?

RIP is a classful protocol, while RIPv2 is a classless protocol.

Which of the following connectors is used with Ethernet 100BaseTX networks?

RJ45

Which of the following connectors is typically used for the ends of a rollover cable? (Select two.)

RJ45 Serial

Which of the following connector types would you most likely use to connect to a T1 WAN service?

RJ48c

Which of the following standards does a rollover cable typically use?

RS232

What is the process of a DNS server asking other DNS servers to perform name resolution known as?

Recursive lookup

In addition to performing regular backups, what must you do to protect your system from data loss?

Regularly test restoration procedures.

You have a company network with a single switch. All devices connect to the network through the switch. You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access except to a special server that holds the patches the computers need to download. Which of the following components should be part of your solution? (Select two.)

Remediation servers 802.1x authentication

Which of the following is a tool that allows access to the graphical desktop environment of another Windows client system over a network connection?

Remote Desktop

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office to access needed files. You want the connection to be as secure as possible. Which type of connection do you need?

Remote access

You are the network administrator for a large hospital. One of your users, Suzie, calls you stating that she is unable to access any network resources. After some initial troubleshooting, you realize that her computer is using the IP address 169.254.0.52. You've confirmed that the network's physical connection is connected properly. Which of the following should you do next?

Renew the IP address.

A user from the sales department calls to report that he is experiencing problems connecting to the sales file server. All users in the sales department connect to this server through a single Ethernet switch. No other users have reported problems connecting to the sales server. Which of the following troubleshooting actions are you MOST likely to perform first?

Replace the network card in the user's computer.

You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360-dispersed RF wave design. After installation, the signal between the two systems is weak, as many obstacles interfere with it. Which of the following strategies could you try to increase signal strength?

Replace the omni-directional antenna with a directional antenna.

Which of the following DHCP scope options assigns a static IP configuration to a device using that device's MAC address?

Reservation

Of the following restoration processes, which would result in the fastest restoration of all data if a system failure occurred on Friday?

Restore the full backup from Sunday and the last differential backup.

Based on the diagram, which type of proxy server is handling the client's request?

Reverse proxy server

Which of the following topologies connects each device to a neighboring device?

Ring

Your manager has asked you to set up four independent APs and configure them with the same SSID, channel, and IP subnet. What should you enable to accomplish this?

Roaming

You are a network technician for a small consulting firm. Many users have reported issues with accessing the network. After some initial troubleshooting, you discover that many devices have the same IP address assigned or incorrect IP configurations. Which of the following would be the MOST likely cause for this?

Rogue DHCP server

Your company security policy states that wireless networks are not to be used because of the potential security risk they present. One day you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this?

Rogue access point

You have purchased a new router that you need to configure. You need to connect a workstation to the router's console port to complete the configuration tasks. Which type of cable would you most likely use?

Rollover

In the OSI model, what is the primary function of the Network layer?

Route messages between networks

Which of the following hardware devices links multiple networks and directs traffic between networks?

Router

Which of the following connections would you use a straight-through cable for?

Router to a regular port on a switch

Which of the following BEST describes dynamic routing?

Routers learn about networks by sharing routing information with each other.

You have a Windows Server 2016 system that you want to use as a DHCP relay agent. Which Windows Server 2016 service would you use to do this?

Routing and Remote Access

Which of the following connectors usually require polishing as part of the assembly process? (Select two.)

SC ST

Which of the following internet services provides equal upload and download bandwidth?

SDSL

You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible? (Select two.)

SFP GBIC

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol enables message exchange between systems?

SMTP

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem?

SNMP

Which protocol uses traps to send notifications from network devices?

SNMP

Which of the following improvements to SNMP are included in version 3? (Select two.)

SNMP message encryption Agent and manager authentication

Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

Which of the following is a protocol used for terminal emulation?

SSH

Which of the following protocols can you use to securely manage a network device from a remote connection?

SSH

You have physically added a wireless access point to your network and installed a wireless networking card in two laptops that run Windows. Neither laptop can find the network, and you've come to the conclusion that you must manually configure the wireless access point (WAP). Which of the following values uniquely identifies the WAP?

SSID

Which of the following wireless network protection methods prevents the wireless network name from being broadcast?

SSID broadcast

Which protocol does HTTPS use to offer greater security for web transactions?

SSL

You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations, including airports, hotels, and public access points (like coffee shops and libraries). As such, you won't be able to configure the firewalls that might be controlling access to the internet in these locations. Which of the following protocols is MOST likely to be allowed through the widest number of firewalls?

SSL

Which of the following protocols are often added to other protocols to provide secure data transmission? (Select two.)

SSL TLS

Which of the following connectors is used with fiber optic cables and requires that you use a twisting motion to connect it?

ST

TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

SYN/ACK

Which of the following cloud computing solutions delivers software applications to a client either over the internet or on a local area network?

SaaS

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patients' statistical data to a central database via the internet that ensures network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

Which of the following uses access control lists (ACLs) to filter packets as a form of security?

Screened router

Which of the following can serve as a buffer zone between a private, secured network and an untrusted network?

Screened subnet

Which of the following is another name for a firewall that performs router functions?

Screening router

Which of the following will not function properly if there is a time mismatch error?

Security certificates

You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?

Security guards

What is the first thing a device does when it connects to a network?

Sends a DHCP Discover packet

Which of the following are examples of social engineering attacks? (Select two.)

Shoulder surfing Dumpster diving

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identifying entities listed in a database?

Signature-based IDS

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?

Single-mode fiber

You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for this implementation? (Select two.)

Single-mode fiber 10GBaseLR standards

Which of the following cables offers the best protection against EMI?

Single-mode fiber optic

Which of the following provides a VPN gateway that encapsulates and encrypts outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN gateway at the target site?

Site-to-site IPsec VPN

You are the network administrator for a small consulting firm. You've set up an NTP server to manage the time across all the machines in the network. You have a computer that's experiencing a slight time drift of just a few seconds. Which time correction should you use to fix the system's clock?

Slew

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet isn't working properly. Which of the following allows the service provider to remotely test the local loop?

Smartjack

Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?

Sniffing

What is the definition of any attack involving human interaction of some kind?

Social engineering

You manage a single subnet with three switches. The switches are connected to provide redundant paths between themselves. Which feature prevents switching loops and ensures that there is only a single active path between any two switches?

Spanning Tree

You are configuring the DHCP relay agent role on a Windows server. Which of the following is a required step for the configuration?

Specify which server network interface the agent listens on for DHCP messages.

Which VPN tunnel style routes only certain types of traffic?

Split

A router on the border of your network detects a packet with a source address from an internal client, but the packet was received on the internet-facing interface. Which attack form is this an example of?

Spoofing

Which type of activity changes or falsifies information in order to mislead or re-direct traffic?

Spoofing

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using?

Star

You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment method is being used?

Stateless autoconfiguration

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outsi

Static

Which of the following NAT implementations maps a single private IP address to a single public IP address on the NAT router?

Static NAT

Which of the following has the least default administrative distance?

Static route to an IP address

When troubleshooting network issues, it's important to carry out tasks in a specific order. Drag each trouble shooting task on the left to the correct step on the right.

Step 1 Identify the problem. Step 2 Establish a theory of probable cause. Step 3 Test the theory to determine the cause. Step 4 Establish a plan of action. Step 5 Implement the solution or escalate. Step 6 Verify full system functionality. Step 7 Document findings, actions, and outcomes.

Which resource is nearly impossible to decrease once allocated in virtualization?

Storage

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?

Straight-through

Which of the following are examples of newer devices that are often automated using IoT technology? (Select three.)

Streaming media devices Security systems Home appliances

You have only one physical interface but want to connect two IP networks. Which of the following would allow you to do so?

Subinterfaces

You have a small network with three subnets, as shown in the exhibit. IP addresses for each router interface are also indicated in the exhibit. How many IP addresses that you can assign to hosts remain on each subnet?

SubnetA = 125, SubnetB = 0, SubnetC = 13

What is a VPN (virtual private network) primarily used for?

Support secure communications over an untrusted network.

Which of the following purposes is a VPN primarily used for?

Support secured communications over an untrusted network.

Which of the following is the least effective power loss protection for computer systems?

Surge protector

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic, Angela discovers a high number of collisions. Which connectivity device would BEST reduce the number of collisions and allow future growth?

Switch

In which type of device is a MAC address table stored?

Switch

Which of the following is a communication device that connects other network devices through cables and receives and forwards data to a specified destination within a LAN?

Switch

Which of the following switch attacks bypasses the normal functions of a router to communicate between VLANs and gain unauthorized access to traffic on another VLAN?

Switch spoofing

Which of the following is a standard for sending log messages to a central logging server?

Syslog

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred. Which log type should you check?

System

Which of the following network services or protocols uses TCP/IP port 69?

T

Which of the following correctly describes the T1 carrier system? (Select two.)

T1 lines use two pairs of copper wire. A single T1 channel can transfer data at 64 Kbps.

You're an application developer, and you're writing a program for exchanging video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol provides this capability?

TCP

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?

Test the solution.

You are the network administrator for a small consulting firm. Users are complaining that they are unable to reach network resources. After some troubleshooting, you've confirmed that the DHCP server is down. Your network devices should be receiving an APIPA address so that they can at least communicate on the internal network, but many devices are not receiving this address. Which of the following is the MOST likely reason the devices are not receiving their APIPA addresses?

The DHCP lease has not expired.

You are the network administrator for a large hospital. One of your users, Suzie, calls you stating that she is unable to access any network resources. After some initial troubleshooting, you realize that her computer is using the IP address 169.254.0.52. You've performed the following troubleshooting steps so far: Verified physical network connection Attempted to renew the IP address Discovered other devices are experiencing the same issue Which of the following is the MOST likely cause for Suzie's issue?

The DHCP server is misconfigured or down.

On a typical network, what happens if a client attempts to receive DHCP configuration from a DHCP server that's located on a different subnet?

The router drops the DHCP request.

Which of the following BEST describes roaming?

The ability to broadcast the same SSID across multiple APs.

What is the definition of bandwidth?

The amount of data that can be transferred from one place to another in a specific amount of time.

You've connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device. What does this output indicate? (Select two.)

The cable is functioning correctly. This is a crossover cable.

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is MOST likely the cause of the problem?

The client system has moved too far away from the access point.

After you install a new DHCP server on your network, you need to verify that the network devices are receiving IP addressing via DHCP. You reboot a Windows 10 client system and, using the ipconfig /all command, receive the following information: Ethernet adapter Local Area Connection 1:Description . . . . . . . . . . . : Intel(R) Ethernet ConnectionPhysical Address. . . . . . . . . : 02-00-4C-4F-3F-50DHCP Enabled. . . . . . . . . . . : YesAutoconfiguration Enabled . . . . : YesAutoconfiguration IPv4 Address. . : 169.254.25.129Subnet Mask . . . . . . . . . . . : 255.255.0.0Default Gateway . . . . . . . . . :DNS Servers . . . . . . . . . . . : Which of the following statements are true? (Select two).

The client system is unable to reach the DHCP server. The client system is configured to use DHCP.

Dan, a network administrator, has noticed a consistent increase in bandwidth consumption since installing a new VoIP system. The increase is outside of the parameters given by the vendor. What is MOST likely the issue Dan needs to address?

The codec needs to be replaced with a more efficient one.

Which statement BEST describes IPsec when used in tunnel mode?

The entire data packet, including headers, is encapsulated.

A switch receives a frame with a destination MAC address that is not found in its MAC address table. What happens next?

The frame is replicated and sent to every active port on the switch except the source port.

Which IP address do broadcast messages use?

The last valid IP address on the subnet

Which of the following could be to blame if your computer is regularly crashing or restarting?

The processor is too hot.

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: A wireless television distribution system running at 2.4 GHz. A wireless phone system running at 5.8 GHz. A wireless phone system running at 900 MHz. An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range.

The wireless TV system

You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer, and all settings (with the exception of SSIDs) remain configured to their defaults. Which of the following might you suspect is the cause of the connectivity problems?

There are overlapping channels.

Which of the following is considered part of a smart home?

Thermostat

Match each smart device with its description.

Thermostat Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. Switch Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. Bulb Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. It doesn't work when turned off. Plug Easy solution for making small appliances (such as lamps, coffee makers, and toasters) smart. Security camera Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. Door lock Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device. Speaker/digital assistant Uses voice recognition software and activates through a Wake

Which of the following are characteristics of an LC fiber optic connector? (Select two.)

They are half the size of standard connectors. They use a housing and latch system similar to an RJ45 UTP connector.

Which of the following are characteristics of an MTRJ fiber optic connector? (Select two.)

They use metal guide pins to ensure accurate alignment. They can be used with multi-mode fiber optic cables.

With Kerberos authentication, which of the following terms describes the token that verifies the user's identity to the target system?

Ticket

What is it called when a system's clock begins to be off by a few seconds or even minutes?

Time drift

You are the network administrator for a consulting firm. A website that users on your network visit has a habit of frequently changing its IP address. When these IP mappings change, users are unable to connect until you clear the DNS cache. Which of the following settings should you configure so that the cache does not need to be manually cleared every time?

Time to live

Which of the following technologies does GSM use to allow multiple connections on the same frequency?

Time-division multiple access

Why should you store backup media off site?

To prevent the same disaster from affecting both the network and the backup media

Which device sends signals from a computer onto a network?

Transceiver

Match the wireless signaling method on the left with its definition on the right.

Transfers data over a radio signal by switching channels at random within a larger frequency band. FHSS Makes the transmitted bandwidth signal wider than the data stream needs. DSSS Encodes data over a wireless network using non-overlapping channels. OFDM

In which of the following tables does a NAT router store port numbers and their associated private IP addresses?

Translation table

VoIP uses several protocols. Which layer of the OSI model do these protocols reside on?

Transport

When an event occurs, the agent logs details regarding the event. What is this event called?

Trap

You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches?

Trunking

Which of the following are IPsec modes of operation? (Select two.)

Tunnel mode Transport mode

Which of the following is a secure doorway that can be used with a mantrap to allow an easy exit but actively prevents re-entrance through the exit portal?

Turnstiles

How many types of full virtualization are there?

Two

Your network uses the following backup strategy. You create: Full backups every Sunday night. Differential backups Monday night through Saturday night. On Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?

Two

Which hypervisor is for bare metal use?

Type 1

Which of the following BEST describes an enterprise-level hypervisor?

Type 1

What is the MOST common Transport layer protocol that VoIP uses?

UDP

Which of the following protocols does DHCP use when it sends out IP configuration?

UDP

Which of the following attacks manipulates a switch's auto-negotiation setting to access a virtual local area network that's connected to the same switch as the attacker's virtual local area network?

VLAN spoofing

Which of the following remote protocols was originally designed for UNIX?

VNC

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think that you've resolved the problem, but you'd like to be able to manage the server remotely just in case more issues occur. Which of the following protocols should you use for remote management? (Select two.)

VNC ICA

Which of the following is the BEST solution to allow access to private resources from the internet?

VPN

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?

VPN concentrator

You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you need enter your username and password in a new website so you can manage your email and spam using the new service. What should you do?

Verify that the email was sent by the administrator and that this new service is legitimate.

You have a network that occupies all three floors of a building. The WAN service provider has installed the line in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?

Vertical cross connect

Which of the following statements are true about virtual NICs? (Select two.)

Virtual NICs need the appropriate driver to function. Multiple virtual NICs can be added to a virtual machine.

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual OS4) One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS

Virtual OS2 + 3

You have configured a virtual network that includes the following virtual components: Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual OS4) One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS

Virtual OS3, all Physical OS

You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?

Virtual servers

Which component is MOST likely to allow physical and virtual machines to communicate with each other?

Virtual switch

For which of the following devices does a voice VLAN prioritize traffic?

VoIP phone

You want to be able to identify the services running on a set of servers on your network. Which tool would BEST give you the information you need?

Vulnerability scanner

What is the main difference between vulnerability scanning and penetration testing?

Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.

Which wireless networking component is used to connect multiple APs together?

WDS

Which of the following wireless security methods uses a common shared key that's configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

Which of the following provides security for wireless networks?

WPA

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?

Wait for convergence to take place.

Which SNMP component uses GETNEXT messages to navigate the MIB structure?

Walk

Which log file type is one of the most tedious to parse but can tell you exactly when a user logged onto your site and what their location was?

Web server logs

A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of attack BEST describes the scenario?

Whaling

How do switches and bridges learn where devices are located on a network?

When a frame enters a port, the source MAC address is copied from the frame header.

While deploying Windows updates, when would you use the critical update ring?

When deploying updates to important systems (only after the update has been vetted).

When deploying Windows updates, when would you use the preview update ring?

When deploying updates to users that want to stay on top of changes.

Which of the following are true about Windows Update for Business? (Select three.)

Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades. Windows Update for Business works with all versions of Windows 10 except Windows 10 Home. Windows Update for Business can be configured with Group Policy, Mobile Device Management, or Systems Center Configuration Manager.

Which of the following forms of networking allows roaming within a limited area of coverage, but can be limited by dead spots?

Wireless

Which of the following connects wired or wireless networks together?

Wireless bridge

Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?

Wiring schematic

Due to wide network expansion, you've decided to upgrade your network by configuring a DHCP server. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to 192.168.2.100. You use the subnet mask of 255.255.255.0. After you make all the setting changes on the DHCP server, you reboot each client system, but they are not able to obtain an IP address from the DHCP server. Which of the following explains the failure?

You must configure the clients to obtain IP addressing from a DHCP server.

Which of the following is true about a firewall?

You must manually specify which traffic you want to allow through the firewall. Everything else is blocked.

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will run through the suspended tile ceiling in the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device on the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.)

You should implement a UPS between the wall outlet and the network devices. You should implement redundant power supplies for the network devices.

Why might you use an RJ11 connector?

You want to connect your computer to the internet with a DSL modem.

In which of the following situations would you MOST likely implement a screened subnet?

You want to protect a public web server from attack.

Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate?

Z-Wave

What are the two protocols used most often with IoT devices? (Select two.)

Zigbee Z-Wave

Match each networking function or device on the left with its associated OSI model layer on the right.

application/http, presentation/translates data, session/sess id number, transport/port #, network/router, data link/switch, physical/modem

Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3Internet Address Physical Address Type192.168.1.23 00-d1-b6-b7-c2-af dynamic

arp

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

Which of the following is the top-level domain in www.testout.com.'s fully qualified domain name (FQDN)?

com

Consider the following output. ;; res options: init recurs defnam dnsrch;;got answer:;;->>HEADER<<-opcode:QUERY, status; NOERROR,id:4;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0;;QUERY SECTION:;; westsim111.com, type = A, class = IN;;ANSWER SECTION:westsim111.com. 7h33m IN A 76.141.43.129;;AUTHORITY SECTION:westsim111.com. 7h33m IN NS dns1.deriatct111.com.westsim111.com. 7h33m IN NS dns2.deriatct222.com.;;Total query time: 78 msec;;FROM: localhost.localdomain to SERVER: default -- 202.64.49.150;;WHEN: Tue Feb 16 23:21:24 2005;;MSG SIZE sent: 30 rcvd: 103 Which of the following utilities produced this output?

dig

You are using Linux and need to perform a reverse lookup of the IP address 10.0.0.3. Which command would you use to accomplish this?

dig -x 10.0.0.3

Match the SAN technology on the left with it's specialization on the right. (Items may be once, used more that once or not at all.)

iSCSI No specialized hardware or knowledge. FC Requires specialized hardware and knowledge. FCoE No specialized hardware, but requires specialized knowledge. infiniband: requires specialized hardware and knowledge.

You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?

iSCSI Initiator

You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

ifconfig

Which command would you use on a switch to enable management from a remote network?

ip default-gateway 192.168.10.185

You need to configure a Cisco RFC 1542-compliant router to forward any received DHCP frames to the appropriate subnet. The remote DHCP server's address is 172.16.30.1. Which of the following commands would you use to configure the router?

ip helper-address 172.16.30.1

Which TCP/IP utility gives you the following output?

ipconfig

You've been called in to troubleshoot a connectivity problem on a newly installed Windows Server system. The system is operating well and is able to communicate with other systems on the local network. However, it's unable to access any systems on other segments of the corporate network. You suspect that the system's default gateway parameter hasn't been configured or may be configured incorrectly. Which of the following utilities are you MOST likely to use to view the system's default gateway information?

ipconfig

You are a network technician for a small consulting firm. One of your responsibilities is to manage the intranet site and configuration. You recently had to update the site's IP mapping due to a server upgrade. A user is having an issue with connecting to the intranet site now. When the user attempts to connect through their web browser, they receive a message that the page cannot be displayed. If you type in the IP address, the page loads fine. Which of the following commands should you use to fix this issue?

ipconfig /flushdns

Which of the following commands do you use to clear the local DNS cache?

ipconfig /fulshdns

Which two commands do you use to force a new IP configuration? (Select two.)

ipconfig /renew ipconfig /release

Examine the following output: Active ConnectionsProto Local Address Foreign Address StateTCP SERVER1:1036 localhost:4832 TIME_WAITTCP SERVER1:4798 localhost:1032 TIME_WAITTCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAITTCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHEDTCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHEDTCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED Which of the following utilities produced this output?

netstat

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

netstat

Which TCP/IP utility gives you the following output?

netstat -r

Examine the following output: Server: to.xct.mirrorxhq.netAddress: 209.53.4.130Name: westxsim.comAddress: 64.78.193.84 Which of the following utilities produced this output?

nslookup

Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?

nslookup

You are troubleshooting a network connectivity issue on a Unix system. You're able to connect to remote systems by using their IP address, but you're unable to connect using the hostname. You check the TCP/IP configuration and notice that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Select two.)

nslookup dig

You suspect that the gshant user account is locked.

passwd -S gshant

Examine the following output: Reply from 64.78.193.84: bytes=32 time=86ms TTL=115Reply from 64.78.193.84: bytes=32 time=43ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=47ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=73ms TTL=115Reply from 64.78.193.84: bytes=32 time=46ms TTL=115 Which of the following utilities produced this output?

ping

Which TCP/IP utility gives the following output?

ping

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more than once.

presentation/application, data link/network, applicaton/application, session/application, network/internetwork, transport/transport

How many network interfaces does a dual-homed gateway typically have?

three

While working on a Linux server, you're unable to connect to the Windows Server system on the internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside the local network. Which utility would you use to track the route a packet takes as it crosses the network?

traceroute

While working on a Linux server, you're unable to connect to your Windows Server system across the internet. You're able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?

traceroute

Which of the following commands should you use to check the route a packet takes between a workstation and the DNS server?

tracert

During TCP/IP communication between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right.

transport/Segments, network/Packets, data link/Frames, physical/Bits

An employee named Bob Smith, whose username is bsmith, has left the company. You have been instructed to delete his user account and home directory. Which of the following commands would produce the desired outcome? (Select two.)

userdel -r bsmith userdel bsmith;rm -rf /home/bsmith

Which of the following utilities could you use to lock a user account? (Select two.)

usermod passwd

You have performed an audit and found an active account for an employee with the username joer. This user no longer works for the company. Which command can you use to disable this account?

usermod -L joer


संबंधित स्टडी सेट्स

Lab 10-5: Secure a Linux Terminal and Implement Logging Services: Linux installation and configuration

View Set

PSYC 203 Behavioral Challenges of Autism

View Set

The Origins of the Civil War 1820-61 Review

View Set

Developmental Psychology units 5-8

View Set

Chp 14 ACC2 Long-Term Liabilities

View Set

EXPERIENCE Chapter 7 Psychology Lab: False Memory

View Set

Abeka 11th Grade US History Test 5

View Set

Chapter 7 Input and Output: Extending Capabilities of Computers and Mobile Devices

View Set