more final questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Comparing VRRP and HSRP

* VRRP is an IEEE standard (RFC 2338) for router redundancy; HSRP is a Cisco proprietary protocol. * The virtual router that represents a group of routers is known as a VRRP group. * The active router is referred to as the master virtual router. * The master virtual router may have the same UP address as the virtual router group, * Multiple routers can functions as backup routers * VRRP is supported on Ethernet, Fast Ethernet, and Gigabit Ethernet interfaces as well as on Multiprotocol Label Switching (MPLS), virtual private networks (VPNs), and VLANs.

VRRP Redundancy Characteristics

* VRRP provides redundancy for the real IP address of a router or for a virtual IP address shared among the VRRP group members. * If a real IP address is used, the router with that address becomes the master. * If a virtual IP address is used, the master is the router with the highest priority. * A VRRP group has one master router and 1 or more backup routers. * The master routers uses VRRP messages to inform group members of its status. * VRRP allows load sharing across more than 1 virtual router.

A company switches to a VoIP PBX network from the traditional PBX system. The network utilizes the SIP protocol for all the communications. However, the network technician has been receiving complaints from the users that they are unable to call. Upon troubleshooting, the network administrator finds that the firewall is blocking the required ports. Which of the following ports should be opened on the firewall for proper communication?

- 5061 - 5060

A server administrator is setting up a new server for the company's network. Which port and service should he open to allow the newly installed server to assign IP addresses for the devices connecting with the network?

- 67 - DHCP

Which of the following ping command options specifies the time stamp for count hops in IPv4 addresses only?

-s count

DNS lookups for a given host are intermittently failing. Which of the following would Kim, a technician, MOST likely use to verify this problem? A. arp B. nbtstat C. traceroute D. dig

...

What is the top-level domain in www.nike.com ? a. www b. nike c. .com d. "dot"

.com

Which of the following would be the most efficient subnet mask for a subnetwork accommodating eight hosts?

/28

How many broadcast domains are created when an unmanaged 12-port switch is used?

1

In the full mesh network, how many possible paths are there between any two points? a. 1 b. 5 c. 9 d. 10

10

Which of the following IP addresses is reserved for private use?

10.100.200.0

What is the distance limitation of a Category 5 horizontal cross-connect cable?

100 meters (328 feet)

You are designing a network for Perfect Wear Inc. You need to make a choice between 100BASE-FX and 100BASE-TX. What are the two prime differences between 100BASE-FX and 100BASE-TX? Each correct answer represents a complete solution. Choose two.

100BASE-FX is fiber-based, whereas 100BASE-TX is copper-based. The maximum segment length of 100BASE-FX is longer than that of 100BASE-TX.

Which of the following IEEE 802.3 standards support up to 30 workstations on a single segment?

10Base2

The maximum speed of 802.11b is __________.

11 Mbps

IEEE 802.11b

11Mbps

A network technician replaces a hub with a 12-port switch to increase the number of collision domains. Which of the following represents the possible number of collision domains on the newly replaced switch?

12

Which of the following UDP ports is used by NTP?

123

A company wants to make the corporate emails secure from network attacks such as phishing. The network technician has decided to install a port security firewall for this purpose. On which of the following ports should this be enabled to have the desired result? Each correct answer represents a complete solution. Choose all that apply.

143 110 25

Which of the following represents the APIPA address range?

169.254.x.x

In a TCP/IP-based network, you configure the default mask for a host having the IP address 193.100.154.1. What will be the network ID of the host?

193.100.154

An organization has a network with two Layer 2 switches, each one with eight ports. The switch is connected to a router that has a hub with three computers plugged into one of its interfaces. Which of the following represents the number of broadcast domains in the organization's network?

2

How many of the routers are dual-band? a. 0 b. 1 c. 2 d. 3

2

Which frequencies does the FCC not regulate? a. wireless frequencies b. radio frequencies c. Internet frequencies d. 2.4 GHz and 5 GHz

2.4 GHz and 5 GHz

What is the default port number for SSH?

22

What is the default port number for SSH?

22 SSH Remote Login Protocol

By default, TELNET uses the port ____.

23

What is the well-known port number for TELNET?

23

What is the well-known port number for Telnet?

23

What is the well-known port number for SMTP?

25

Which of the following is the default port used by SMTP (Simple Mail Transfer Protocol)?

25

How many AT&T routers did each packet pass through when this Traceroute report was generated? a. 1 b. 3 c. 14 d. 18

3

What is the distance limitation of 10GBASE-SW?

300m 10GBASE-ER and 10GBASE-EW each use single mode fiber (SMF) as their media type, have a bandwidth capacity of 10 Gbps, and a distance limitation of 40 km. Also, 100GBASE-ER4 uses SMF as its media type, has a bandwidth capacity of 100 Gbps, and a distance limitation of 40 km. 10GBASE-LW uses single mode fiber (SMF) as its media type, has a bandwidth capacity of 10 Gbps, and a distance limitation of 10 km. 10GBASE-SW uses multimode fiber (MMF) as its media type, has a bandwidth capacity of 10 Gbps, and a distance limitation of 300 m. 10GBASE-LR uses single mode fiber (SMF) as its media type, has a bandwidth capacity of 10 Gbps, and a distance limitation of 10 km.

A network administrator creates a virtual machine in the cloud. The employees also want to connect to it remotely using RDP. Which of the following default ports needs to be opened for this purpose?

3389

Which TCP port is used by the Remote Desktop Protocol (RDP)?

3389

What is the default port number for HTTPS?

443

Which port number is used by the HTTPS protocol for secure Web transmission?

443

You need to have secure communications using HTTPS. What port number is used by default?

443

A network technician is setting up a web server for hosting a web application of a company. Both secured and unsecured access have to be provided to the front end. Which of the following ports must be opened for this?

443 80

How big is the payload of an ATM cell?

48 bytes (The average between 32 and 64)

A network technician in a company receives complaints from users that they are unable to access certain VoIP applications. Which of the following ports should the network technician check to solve this issue?

5060

Which of the following ports needs to be opened on the firewall for DNS?

53

Which of the following ports needs to be opened on the firewall for DNS?

53 Answer options A, D, and C are incorrect. The port numbers 23, 25, and 3389 are used by Telnet, SMTP, and RDP, respectively.

If you can ping by IP address but not by hostname, or FQDN, which of the following port numbers is related to the server process that is involved?

53 The problem is with DNS, which uses both TCP and UDP port 53.

IEEE 802.11a

54Mbps

IEEE 802.11g

54Mbps uses the 2.4 HGz frequency band to operate a network

How many hosts per subnet are provided by a subnet mask of 255.255.255.192?

62

Which of the following approaches to wireless LAN (WLAN) security involves the use of an authentication server?

802.1X

Which of the following are the IEEE version of STP? (Choose 2) 802.1x VLANs 802.1d 802.11 802.1w

802.1d 802.1w 802.1d and 802.1w are both IEEE STP versions, with 802.1w being the latest and greatest version

Which of the following specifications of IEEE (Institute of Electrical and Electronic Engineers) defines the standard for fiber-optic cables?

802.8

EIGRP

A Cisco proprietary protocol that uses diffusing update algorithm (DUAL)

iptables

A Windows PC is trying to ping a Linux machine. Which UNIX command has most likely been configured between the first result and last results pictured below?

Keylogger

A _______________ can be a piece of hardware or a software program that records everything a user types.

DDoS

A botnet can be used to set a ___________ coordinated attack in motion.

use ipconfig /release and then ipconfig /renew to request a new IP address assignment from the DHCP server

A few years ago Microsoft released an update that prevented Windows 10 from acquiring an IP address from the network automatically. If you're troubleshooting a PC and suspect that IP addressing might be an issue, what can be done?

evil twin

A hacker configures an access point to appear as a legitimate Wi-Fi hotspot. Which term best describes this configuration?

netstat

A network technician is trying to determine if a web page that a user visits is connecting to a malicious web address in the background. Which of the following tools would provide information on TCP connections?

STP

A new IT employee links three network switches together such that each switch connects to the two others. As a result, the network is flooded with useless traffic. What could prevent this situation from happening again?

IP: 192.168.2.131 Subnet: 255.255.255.0 Default gateway: 192.168.2.2

A new technician was provided the necessary configuration details for a workstation that was being added to the network. Unfortunately after inputting the network configuration details on the client computer, an error message was generated stating: "There is an IP address conflict with another system on the network" Drag and drop the IP settings onto the image provided so it no longer generates a conflict on the network.

Outside local

A private IP address referencing an outside device

BGP

A routing protocol of the global Internet for exchanging information between gateway hosts.

What is a disadvantage of a star topology?

A single point of failure.

IPsec

A standardized network protocol that encrypts data at the Network layer

An organization needs a centrally located firewall that can block specific incoming and outgoing traffic and check each packet individually. Which of the following types of firewalls should a network technician install?

A stateless network-based firewall

Syslog server

A type of server used for collecting diagnostic and monitoring data from network devices is known as:

the client system has moved too far from the AP

A user on a network has had no problems accessing the wireless network in the past, but recently she moved to a new office. Since the move she cannot access the wireless network. Which of the following is the MOST likely reason for the problem?

Theory of probably cause

A(n) _______________________ is your guess at what is wrong with the machine.

Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this? A. Cable tester B. Toner probe C. OTDR D. Loopback plug

A. Cable tester

Which of the following would Kim, a technician, do to monitor remote traffic through an access point? A. Enable an SNMP agent B. Enable network mapping C. Set monitoring SSID D. Select WPA2

A. Enable an SNMP agent

A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem? A. Environmental monitor B. Cable tester C. TDR D. Loopback plug

A. Environmental monitor

Which of the following is the prefix for a link-local IPv6 address? A. FE80::/10 B. FF00::/8 C. 2FFE::/16 D. FEEF:/12

A. FE80::/10

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks? A. Honeynet B. Honeypot C. Vulnerability scanner D. Network based IDS

A. Honeynet

Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO). A. Physical B. Session C. Data Link D. Network E. Transport

A. Physical C. Data Link

Which of the following is used to prevent Layer 2 switching loops within a local area network? A. STP B. MTU C. EGP D. IGP

A. STP

Which of the following can Jeff, a network technician, change to help limit war driving? A. Signal strength B. SSID C. Frequency D. Channel

A. Signal strength

Which of the following authentication solutions also provides AAA and uses TCP? A. TACACS+ B. Kerberos C. RADIUS D. RAS

A. TACACS+

Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis? A. TDR B. Protocol analyzer C. Multimeter D. Cable crimper

A. TDR

Which DNS record is used to resolve hostnames for IPv6 addresses?

AAAA

90

AD of EIGRP

170

AD of External EIGRP

110

AD of OSPF

120

AD of RIP

1

AD of statically configured network

A network technician is setting up a new wireless network. With the WPA2 standard in use, which of the following will provide both data confidentiality and data integrity?

AES CCMP

What protocol does a host use to find the hardware address of a neighbor host so that they can communicate?

ARP

What protocol is used to find the hardware address of a local device?

ARP Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.

A disgruntled employee performs a man-in-the-middle attack on a company's network. All the layer 2 traffic, which was destined for the default gateway, is redirected to the employee's network. What kind of attack has the employee performed?

ARP cache poisoning

An attacker floods a switch with frames in an attempt to redirect traffic to his own server. Which of the following attacks is the attacker most likely using?

ARP poisoning

Which WAN technology uses cell switching?

ATM

A network technician during a random survey found that some of the employees were watching sports channels on their systems. Which of the following policies is being violated by the mentioned incident?

AUP

The types of ports that can found on a switch are___________________ and ___________________. (Choose two.) VLAN Trunk Protocol Access 802.1Q Trunk

Access Trunk Hosts are connected to a switch and are members of one VLAN. This is called an access port. Trunk links connect between switches and pass information about all VLANs.

Joe, a network technician wants to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. What should Joe do to meet these requirements?

Add a layer 3 switch and create a VLAN.

After setting up a new firewall, a network technician enters only three rules for network security that allow traffic on ports 21, 25, and 110. Due to this, users report that they cannot access web pages using URLs. What should the network technician do to resolve the issue?

Add one more rule at the end allowing ports 80 and 53.

Which of the following protocols is used to resolve IP address to MAC address?

Address Resolution Protocol (ARP)

Three switch functions

Address learning forward/filter decisions loop avoidance

What are the distinct functions of Layer 2 switching that increase available bandwidth on the network? (Choose three.) Address learning Routing Forwarding and filtering Creating network loops Loop avoidance IP addressing

Address learning Forwarding and filtering Loop avoidance Layer 2 features include address learning, forwarding and filtering of the network, and loop avoidance

What are the three switch functions at Layer 2?

Address learning, filtering, and loop avoidance

to eliminate a single point of failure

After an assessment, an auditor recommends that an application hosting company should contract with additional data providers for redundant high speed Internet connections. Which of the following is MOST likely the reason for this recommendation?

Hypertext Transfer Protocol (80)

All those snappy websites comprising a m ©lange of graphics, text, links, and so on- the Hypertext Transfer Protocol (HTTP) is making it all possible. It's used to manage communications between web browsers and web servers, and opens the right resource when you click a link, wherever that resource may actually reside.

RAS (Remote Access Service)

Allows Microsoft Windows clients to remotely access a Microsoft Windows network

Virtual Router Redundancy Protocol (VRRP)

Allows a group of routers of routers to form a single virtual router. A VRRP group has 1 master router and one or more backup router. Open standard.

CARP

Allows multiple hosts on the same local area network to share a set of IP addresses

Which of the following are uses of a VPN concentrator?

Allows remote users to build a VPN tunnel Performs authentication for each VPN tunnel Provides data encryption

RDP (Remote Desktop)

Allows users to view and control the desktop of a remote computer

Port mirroring or SPAN (Switch Port Analyzer):

Allows you to sniff traffic on a network when using a switch and used for network appliances that require monitoring of network traffic such as an intrusion detection system, RUM (Real User Monitoring) technology used to support APM (Application Performance Management).

MAC

Although rare, there are tools that can make an operating system believe that the NIC has the ___________ address (normally "burned" into a NIC and can't change) of a user's choosing. This can cause a high number of collisions on a LAN.

Simple Mail Transfer Protocol works at which layer of the OSI model?

Application

When you have tried all your theories and still can't resolve the problem.

At what point during a repair should you escalate the problem?

GLBP

Attempts to overcome the limitations of existing redundant router protocols by adding basic load balancing functionality

EAP-TLS

Authentication protocols is required in order to implement two factor authentication

Which of the following DNS records would a web browser access to determine the IP address of an Internet web page? A. CNAME B. A C. MX D. PTR

B. A

A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice? A. IS-IS B. BGP C. OSPF D. RIP

B. BGP

An employee, Mary, wants to use her personal laptop in the office to reduce the burden of syncing work files between an office and a home system. Which of the following policies she has to agree on before using her own personal system in the office?

BYOD

If a switch receives a frame, and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame? Discard it and send an error message back to the originating host Flood the network with the frame Add the source address and port to the MAC address table and forward the frame out the destination port Add the destination to the MAC address table and then forward the frame

Because the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.

Allow logical grouping of users by function Enhance network security increase the number of broadcast domains while decreasing the size of the broadcast domains

Benefits of VLANs

Which of the following will be the most secure option in preventing unauthorized access to a server room?

Biometric lock

In an STP topology, a switch has multiple paths to reach the root bridge. Into which of the following states is the port with the least desirable path placed by the STP?

Blocking

To prevent the use of the looped path, a port should be in which STP state?

Blocking

A network administrator wants to connect multiple ports on a switch in an office to multiple ports on a switch in another switch closet. Which advanced feature allows these ports to be combined and managed as a single entity?

Bonding

Which of the following would increase the bandwidth transmission by joining multiple connections together into one logical connection?

Bonding

What Transport layer protocol does a DNS server use?

Both TCP and UDP! A DNS server uses TCP port 53 for zone transfers and UDP port 53 for name resolutions. Notice that DNS uses both TCP and UDP. Whether it opts for one or the other depends on what it's trying to do.

Transport Layer Security/Secure Sockets Layer (995/465)

Both Transport Layer Security (TLS) and its forerunner, Secure Sockets Layer (SSL), are cryptographic protocols that come in really handy for enabling secure online data-transfer activities like browsing the Web, instant messaging, Internet faxing, and so on. They're similar: both use X.509 certificates and asymmetric cryptography to authenticate to the host they are communicating with and to exchange a key. This key is then used to encrypt data flowing between the hosts. This allows for data/message confidentiality, message integrity, and message authentication. Even though I listed TLS/SSL as using port 995 and 465, which is true if you're using Gmail, TLS/SSL isn't tied down to any certain ports and can use various different ones.

A user is experiencing an issue with his wireless device. While he is in the hall, the wireless signal is steady and strong. However, at his desk, the signal is consistently dropping, yet the device indicates a strong signal. What is the most likely cause of the issue?

Bounce

VLAN

Breaks up broadcast domains in a Layer 2 switch network

A technician has to connect two LAN segments each consisting of a switch with three PCs connected to it. The device connecting the two LAN segments should form a single broadcast domain. Which of the following devices should the technician use?

Bridge

Which of the following devices can be used between two LAN segments to have a single broadcast domain?

Bridge

You need to separate a LAN segment into two collision domains. The structure should not affect the broadcast domain. Which of the following devices will you choose?

Bridge

Which of the following devices operate at the Data Link layer of the Open Systems Interconnection (OSI) model? Each correct answer represents a complete solution. Choose all that apply

Bridge Switch

VLANs break up ________ domains in a Layer 2 switched network.

Broadcast

Which LAN topology is characterized by all devices being daisy-chained together with the device at each end being connected to only one other device?

Bus topology.

What are the three primary LAN topologies?

Bus, ring, and star.

You want to improve network performance by increasing the bandwidth available to hosts and limiting the size of the broadcast domains. Which of the following options will achieve this goal? Managed hubs Bridges Switches Switches configured with VLANs

By creating and implementing VLANs in your switched network, you can break up broadcast domains at Layer 2. For hosts on different VLANs to communicate, you must have a router or Layer 3 switch.

The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model? A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5

C. Layer 4

Which of the following protocols is commonly used for VoIP technology? A. Telnet B. SMTP C. SIP D. SNMP

C. SIP

Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked? A. WPA should be enabled B. PKI should be turned off C. WAP SSIDs are matching D. WAPs are transmitting on same channel

C. WAP SSIDs are matching

Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable? A. nmap B. nbtstat C. dig D. arp

C. dig

Which of the following utilities would Kim, a technician, use to resolve the FQDN of a web server to its IP address? A. netstat B. route C. nslookup D. arp

C. nslookup

Which of the following commands can Lisa, a technician, use on a server to display the default router setting? A. ping B. nslookup C. route D. arp

C. route

Which of the following residential Internet media types uses the DOCSIS specification?

Cable (Data-Over-Cable Service Interface Specification)

A company is going through some infrastructure changes. A network technician simply wants to test the category of the existing cable in use and the supported frequency. Which of the following tools would be the best to use in this case?

Cable Certifier

A network technician is using a new copper cable between two legacy switches. When the network technician connects the two switches together using the cable, they are failing to establish a connection. Which of the following is the most likely cause of the issue?

Cable is straight-through Since it's a legacy switch, MDIX would be present, switching TX and RX already

In a computer lab, a network technician is using a new copper cable between two legacy switches. When the network technician connects the two switches together using the cable, they are failing to establish a connection. Which of the following is the most likely cause of the issue?

Cable is straight-through.

You need to install a WAN for a remote office with only four users. Which WAN technology would you most likely use?

Cable modem

IGMPv2

Can send queries to a specific group and support a leave message.

Which of the following statements are true about a CAT5 cable? Each correct answer represents a complete solution. Choose all that apply.

Capable of transferring data at 100Mbps Has three twists per inch of each twisted pair Uses a 24-gauge copper wire

A company wants to secure its WLAN network by implementing a method that will provide a web page before the users asking for authentication credentials before allowing them access to the network. Which of the following will help in satisfying this requirement?

Captive portal

You need to connect two devices on a vertical connect and they need to send voice traffic. Which cable will you use?

Cat 5 at a minimum.

Which UTP cable not rated?

Cat 8. 2-6 have standards.

Which UTP wiring uses four twisted wire pairs (eight wires) and is rated for 250MHz?

Category 6.

A company's management has given a list of requirements to the network technician for a LAN connection using CAT6 cabling in an older building. The technician has to keep the environmental factors in mind during network installation. Which of the following should the network technician consider when deciding whether or not to use plenum-rated cables?

Ceiling airflow condition

A network technician reports to a compromised workstation. The technician secures the area, documents the scene, checks the compromised machines by taking them offline and then leaves them there without making any record. Which of the following steps in the incident handling has not been performed correctly by the network technician?

Chain of custody

A network technician in a company reports to the management that multiple switches require a major update. Which of the following should be followed for the accomplishment of this task?

Change management policy

A network technician has recently replaced a wireless access point on the company's wireless network. All the settings for the new access point were configured manually. Due to this change, the users connecting to the new AP are facing a lot of interference. What can be the possible cause of this issue?

Channel overlap

A network technician is troubleshooting a wireless connectivity issue in a small building where tenants access multiple wireless networks. The users report intermittent connectivity. Which of the following is the most likely cause of the problem?

Channel overlap

Bandwidth Delay Jitter

Characteristics affected by QoS

Designed to share prefix information between systems.

Characteristics of BGP (EGP)

Designed to route within an autonomous system.

Characteristics of OSPF, RIP and IS-IS (IGPs).

OSPF and RIP comparison

Characteristics: Type of protocol OSPF: Link state RIPv2: Distance vector RIPv1: Distance vector Characteristics: Classless support OSPF: Yes RIPv2: Yes RIPv1: No Characteristics: VLSM support OSPF: Yes RIPv2: Yes RIPv1: No Characteristics: Auto-summerization OSPF: No RIPv2: Yes RIPv1: Yes Characteristics: Manual summarization OSPF: Yes RIPv2: No RIPv1: No Characteristics: Discontiguous support OSPF: Yes RIPv2: Yes RIPv1: No Characteristics: Route propagation OSPF: Multicast on change RIPv2: Periodic multicast RIPv1: Periodic broadcast Characteristics: Path metric OSPF: Bandwidth RIPv2: Hops RIPv1: Hops Characteristics: Hop-count limit OSPF: None RIPv2: 15 RIPv1: 15 Characteristics: Convergence OSPF: Fast RIPv2: Slow RIPv1: Slow Characteristics: Peer authentication OSPF: Yes RIPv2: Yes RIPv1: No Characteristics: Hierarchical network OSPF: Yes (Using areas) RIPv2: No (flat only) RIPv1: No (flat only) Characteristics: Updates OSPF: Event triggered RIPv2: Route table updates time intervals RIPv1: Route table updates Characteristics: Route computation OSPF: Dijkstra RIPv2: Bellman-Ford RIPv1: Bellman-Ford

ETSi

Chartered to produce common standards in Europe

A company has received recent reports of equipment thefts from its workstations. Which physical security methods can be used to prevent this from happening?

Cipher lock Mantrap Biometric lock Don't use CCTV because it doesn't actually stop a thief from stealing anything

ISDN is an example of which of these WAN types?

Circuit Switched

Which of the following dedicates a communication channel to each data transmission? a. Internet b. Packet-switched network c. Circuit-switched network d. FedEx

Circuit-switched network

EIGRP

Cisco-proprietary hybrid routing protocol that runs on only Cisco equipment and uses diffusing update algorithm default administrative distance of 90

An IP addresses whose first octet is in the range 1 - 126

Class A IP address.

What class of IP address is 172.16.1.2?

Class B

An IP address whose first octet is in the range 192 - 223

Class C IP address.

SSL Secure Sockets Layer security model

Client always authenticates the server server can optionally authenticate the client

What network model draws a clear distinction between devices that share their resources and devices that do not?

Client server.

Switches, by default, only break up ________ domains.

Collisioin

IP security

Company wants to allow remote users to connect and access its private network through a dial-up connection via the internet. All the data will be sent across a public network. For security management wants the data sent through the internet to be encrypted. The company plans to use a L2TP connection. Which communication protocol will peter use to accomplish the task

A network administrator discovers multiple attempts to scan network hosts and devices originating from a single host on the network. Which of the following threats is most likely involved?

Compromised system

Authentication, Authorization, and Accounting

Computer security what does AAA stand for

QoS

Configure to provide priority to voice traffic

The switch port the host is connected to is not configured to the correct VLAN membership STP shut down the port

Connect a host to a switch port but the new host cannot log into the server that is plugged into the same switch what could the problem be

The DoD model: Internet layer

Corresponds to the OSI's Network layer, designating the protocols relating to the logical transmission of packets over the entire network. It takes care of the logical addressing of hosts by giving them an IP address, and it handles the routing of packets among multiple networks.

When designing a network and deciding which type of network topology, what should be considered?

Cost, ease of installation, ease of maintenance, fault-tolerance requirements.

DMZ

Could be configured as a network segment located outside the firewall

IEEE

Creates and maintains operational standards

A company has decided to change the old Cat 3 UTP cables with Cat 6 UTP cables throughout the offices. For this, spools of cable have been purchased and the network technician has been asked to properly terminate the cables to every end devices. Which of the following tools should the network technician use to accomplish the task?

Crimper RJ-45 connector

Jeff, a technician, is troubleshooting an issue where a user has snapped the retention tab off of a network cable. Which of the following tools would help Jeff to replace the RJ-45 connector?

Crmper

Which type of cable will you use to connect switches?

Crossover.

Which of the following ports is the default telnet port? A. 20 B. 21 C. 22 D. 23

D. 23

Which of the following is the usual number of bits for the host identifier part of an IPv6 address? A. 16 B. 32 C. 48 D. 64

D. 64

Which of the following units of data does the data-link layer send from the network layer to the physical layer of the OSI model?

Data Frames

What is the name for the point where the local exchange carrier's responsibility ends when they connect a DCE network to an office?

Demarcation point

The point at which the operational control or ownership changes from your company to a service provider is referred to as ___________________.

Demarcation point or demarc.

A network administrator observes an increased amount of web traffic without an increased number of financial transactions. Which of the following attacks is the company most likely experiencing?

Denial of Service

On reaching a site of an incident, a network administrator starts evidence and data collection after securing the area. Which of the following steps are being missed by him in the incident handling?

Documentation eDiscovery (finding signs of evidence in electronic equipment)

Domain Name Service (53)

Domain Name Service (DNS) resolves hostnames-specifically, Internet names to their corresponding IP addresses. You don't have to use DNS; you can just type in the IP address of any device you want to communicate with. An IP address identifies hosts on a network and the Internet as well. DNS is used to resolve a fully qualified domain name (FQDN) to an IP address. An FQDN, or DNS namespace, is a hierarchy that can logically locate a system based on its domain identifier.

What is the correct order in which the given routing protocols will get preference over each other?

EIGRP > OSPF > RIP > External EIGRP (Just think of a diminishing number of characters)

WLANA

Educates and raises consumer awareness regarding WLANs

- confidentiality - integrity

Enabling WPA2 on a WLAN provides what? Select one or more: - confidentiality - authentication - availability - integrity

Data at rest

Encrypting stored data is encrypting ___________

ping -t 192.168.1.1

Enter the Windows command that would repeatedly send ICMP echo messages to the target IP 192.168.1.1 until you stop it by pressing Ctrl+C

ping -6 ipv6.google.com

Enter the Windows or UNIX command that could be used to ping Google's IPv6 address which is ipv6.google.com

route print

Enter the command that creates the following output pictured below

Ipconfig /all

Enter the command that will display a PC's IP address, MAC address, DNS Server, and Default Gateway

A network technician in a company has decided to teach basic network troubleshooting to some of the end users. However, it has to be done remotely and most of the users are non-technical. Which of the following documents should the network technician consider for effective transfer of knowledge?

Equipment labeling

In an organization, it is found that a bad module in a core switch results in an outage. What is the correct order of troubleshooting in solving the problem?

Establish a plan of action, implement the action plan, verify problem resolution, and documentation.

A user reports to a network technician about having a connectivity problem. The network technician discovers that the issue is with the wireless router. What step in the troubleshooting methodology should the technician take next to resolve the problem?

Establish a theory of probable cause.

The dominant standard for wired LANs ___

Ethernet

What is an example of a hybrid network?

Ethernet switch: uses a star physical topology with a logical bus technology.

A user, Mary, in the sales department of a company moves to the account department and plugs in her wireless device into the wall socket to access the company's wireless network. Which of the following does she accidentally created?

Evil twin

VPN concentrator in a network

External switch vpn concentrator internal switch firewall

Which of the following copper connector types is most commonly used for cable TV connections?

F-Connector

Which 3 bytes of the MAC address F3-B2-CD-E4-F4-42 designate the organizationally unique identifier?

F3-B2-CD

Which of the following is considered reliable?

FTP

___ client software, such as FileZilla, provides a way to upload and download files from an internet-based server to a computer on a LAN

FTP

Name the protocol that uses both TCP ports 20 and 21.

FTP uses both TCP ports 20 and 21 for the data channel and the control channel, respectively.

Back-to-back firewall

Features a DMZ (demilitarized zone) network located between two firewalls, one between the Internet and the DMZ, and one between the DMZ and the company intranet.

What type of cable should be used if you need to make a cable run longer than 100 meters?

Fiber Optic.

What type of cable transmits lights from end to end?

Fiber Optic.

A network technician configured a network device. After restarting, the device was unresponsive. Even after doing a hard reset, the device was not restored to factory defaults and did not display any output. Which of the following has the technician most likely performed?

Firmware update

2.4GHz

Frequencies does an 802.11g network operate

create a security zone that allows public traffic but is isolated from the private inside network

Function of DMZ

A host IP address of 169.250.13.30 is what type of address?

Global

How to install the correct NIC card

Go to the Motherboard tab. From the Network Adapters category, identify the network adapter that supports Fast Ethernet 1000BaseTX, and then insert it into a PCIe x1 slot on the motherboard. Go to the Computer tab, then click Back to view the back of the computer. Remove the RJ-45 cable from the RJ-45 port at the back of the computer and place it to the NIC port.

Honeynet

Group of servers used to lure attackers

Spanning tree protocol

Helps mitigate switching loops

IP proxy

Hides all the devices' IP addresses on the internal network by exchanging its IP address.

A company is concerned about the possible attacks on its network by hackers to gain access to confidential research data. Which of the following is a type of vulnerable system that could be implemented to redirect any attackers on the network?

Honeypot

Which network toplogy is a combination of two or more types of physical or two or more types of logical topologies?

Hybrid.

A user reports to a network technician about having a connectivity problem. What will be the first two steps that the network technician should take on reaching the site of the problem?

Hypothesize a theory. Ask the user to detail the issue. (Don't Create an action plan just yet)

802.1w 802.1d

IEEE designations for STP

127.0.0.0/8

IP address should you deny into your internetwork

Network

IPSec is defined and operated at what layer of the OSI model

A network technician receives an urgent call from a user. The user faced a wireless connectivity issue and demanded an immediate resolution. The technician begins offering suggestions for a fix. The first few suggestions do not resolve the issue. Which of the following steps in the troubleshooting methodology should the technician have performed first?

Identifying the problem

the system or node requesting access to a network resource

In the 802.1X security framework, which of the following BEST describes the role of the supplicant?

Tim works as a network administrator for Tech Perfect Inc. The company has a Windows 2008 domain-based network. The network has 10 Windows 2008 member servers and 1500 Windows 7 Ultimate client computers. The network has a DHCP server. All the client computers receive IP addresses dynamically from the DHCP server. The company plans to increase the number of client computers to 3900 in its network. According to the company's future growth plan, Tim has to configure a DHCP scope to host the 3900 client computers. How should he configure the DHCP scope?

In the New Scope Wizard, the IP address range should be from 10.0.0.101 to 10.0.15.160. In the New Scope Wizard, the subnet mask should be 255.255.240.0

The hosts on a company's network are unable to access the Internet. The IP range assigned to the company by the ISP is 192.168.132.0/27. The network administrator checks the company's gateway router and found its configuration as follows: IP address: 192.168.132.0 Subnet Mask: 255.255.255.224 Default gateway: 192.168.132.32 Duplex: Auto State: No shutdown

Incorrect default gateway Incorrect IP address

While troubleshooting a network issue, a network technician found that a host is unable to communicate with some hosts on other subnets. What can be the possible cause of the issue?

Incorrect subnet mask configuration

A network administrator is configuring a VLAN across multiple switches. Which of the following changes do VLANs have on a switch port in the existing network?

Increase flexibility Create separate broadcast domains

Which of the following advantages are provided by IPv6 over IPv4? Each correct answer represents a complete solution. Choose all that apply.

Increases the number of available IP addresses Uses 128-bit addresses Provides improved authentication and security

Which of the following advantages are provided by IPv6 over IPv4?

Increases the number of available IP addresses Provides improved authentication and security Uses 128-bit addresses

IEEE 802.1Q

Inserts a field into the frame to identify the VLAN a standard method of frame tagging

A retail company is concerned about outside users gaining access to its confidential resources. The retail company hosts a Simple Mail Transfer Protocol (SMTP) server as well as a secure Internet shopping site using HTTPS. How can it protect its network without severely impacting business operations?

Install a firewall and block traffic on all incoming ports except 443 and 25.

Switch

Interconnecting device to connect the five hosts to the server in the given network

ICMP

Internet Control Messaging Protocol

IGMP

Internet Group Management Protocol

ZigBee, Z-Wave, and RFID are low-power wireless technologies that transport data on ___ networks

IoT, Internet of Things

Hot Standby Router Protocol (HSRP)

It defines a standby group, and each standby group that you define includes the following routers: * Active router * Standby router * Virtual router * Any other router that maybe attache to the subnet The problem with HSRP is that only 1 router is active and 2 or more routers just sit there in standby more and won't be used unless a failure occurs. Active and standby router communicate to each other via multicast Hello messages. If active router stops sending hello messages the standby router becomes the active one.

What are two advantages of fiber-optic cabling?

It is completely immune to EMI and RFI and can transmit to 50 km (25 miles).

How does a DHCP reservation work?

It matches a specific MAC address to a specific IP address.

Which of the following describe the DHCP Discover message? (Choose two.)

It uses FF:FF:FF:FF:FF:FF as a Layer 2 broadcast. It uses UDP as the Transport layer protocol.

If a frame is received on a switch port and the source MAC address is not in the forward/filter table, what will the switch do?

It will add the source MAC address to the forward/filter table

A network administrator wants to allow increased throughput over an FCoE network. Which of the following Ethernet features will allow this as long as all network devices recognize its specific size?

Jumbo Frame

Which of the following OSI layers has packet as its PDU?

Layer 3

In which two states is the MAC address table populated with addresses? Blocked Listening Learning Forwarding

Learning Forwarding In the blocked and listening states, the MAC address table is not learning. Only in the learning and forwarding states is the MAC address table learning MAC addresses and populating the MAC address table

IS-IS

Link state routing protocol that uses a dimensionless metric associated with an interface

CSMA/CA

Listen before talk method used to minimize collisions caused by simultaneous transmission by multiple radios

A network technician has configured a VLAN for the Sales and Accounts department of a company. The users of each department are located at different floors of the office. The network technician decides to educate the users regarding the VLAN configuration. Which of the following will help the network technician to easily make the users understand?

Logical diagram Network diagram

Which of the following documents contains IP addressing and subnet information?

Logical network diagram

Private network only authorized users have access in a public network everyone that is connected has access

Main difference between a private network and a public network

Which of the following periods should be used for all scheduled work on production network equipment?

Maintenance Window (NOT Authorized Downtime)

Which of the following periods should be used for all scheduled work on production network equipment?

Maintenance window

Install two Linux servers in a cluster. Cluster the airline software, with its data being written to shared storage.

Majestic Airlines has hired you to ensure that its customer reservation system is always online. The software runs and stores data locally on a Linux based server operating system. What should you do?

A company has received recent reports of equipment thefts from its workstations. What physical security methods can be used to prevent this from happening? Each correct answer represents a complete solution. Choose all that apply.

Mantrap Biometric lock Cipher lock

A network administrator has to implement a physical security control method that can prevent an attacker from gaining access to a network closet or server room. Which of the following will help in achieving this goal?

Mantraps Proximity readers

Prevent unauthorized disclosure of information--Confidentiality Assure that data cannot be modified in an unauthorized manner--Integrity Information should be readily accessible for authorized users--Availability

Match the 3 core principles of information security with the statement that best describes them. Prevent unauthorized disclosure of information--_______________ Assure that data cannot be modified in an unauthorized manner--_______________ Information should be readily accessible for authorized users--_______________

MGCP (Multimedia) (2427/2727)

Media Gateway Control Protocol (MGCP) is a standard protocol for handling the signaling and session management needed during a multimedia conference. The protocol defines a means of communication between a media gateway, which converts data from the format required for a circuit-switched network to that required for a packet-switched network, and the media gateway controller. MGCP can be used to set up, maintain, and terminate calls between multiple endpoints.

Which of the following network topologies is the most fault tolerant?

Mesh

Which type of toplogy has the greatest number of physical connections?

Mesh: a path from every connection to each other. Offers robust fault tolerance.

Which physical topology has the most connections and is the least popular for LANs?

Mesh: has point-to-point connections for every device.

A network technician has recently installed a new router on the company's wireless network. The users connected to the new access point on the inside network can communicate with each other and utilize the network printer also. But they are not able to connect to the Internet. What can be the most likely cause of the issue?

Misconfigured Default Gateway

To prevent switching loops

Most switches run the spanning tree protocol by default

What provides physical layout flexibility in a very large, geographically dispered enterprised network?

MultiProtocol Label Switching.

What does MPLS stand for?

Multiprotocol Label Switching.

A network technician has to set up a firewall on a company's network that would assign private IP addresses to users inside the network and show a public IP address out to the Internet. Which of the following should the network technician use to achieve this goal?

NAT

An organization has been provided a limited IP address range from the ISP. With increasing users on the company's network, the company wants to use a method that can translate internal network IP addresses to external ones. Which of the following should be used to achieve this?

NAT

A network administrator wants a central time source for the entire company's network so that all network devices will synchronize properly. Which network protocol could be used for this purpose?

NTP

You want a central time source for your entire network so that all network devices synchronize. What network protocol will you use?

NTP

Routers VLANs

Need to separate your network into broadcast domains. Which of the following entities will help you

A network technician during monitoring of a company's network notices that the network traffic to one of the company's servers is very high. Which of the following should the technician use to compare the change from normal functioning?

Network Baseline

802.1x

Network access security method is commonly used in wireless networks

Which of the following are not considered hybrid routing protocols? Each correct answer represents a complete solution. Choose all that apply.

OSPF RIPv2 IS-IS

Which of the following are not considered hybrid routing protocols?

OSPF IS-IS RIPv2

verify

Once you have successfully repaired the machine, it is important to ___________ with the user that everything is working correctly.

How many hosts on a half-duplex segment can talk at one time?

One; a device can either send or receive, but not both.

In a physical star topology, what happens when a workstation loses its physical connection to another device?

Only that workstation loses its ability to communicate.

Here's how to set up a DMZ on a SOHO router

Open the dlink website. show steps × On the taskbar, click the Internet Explorer icon to open it. Type http://support.dlink.com/emulators/dir655/133NA/login.html, which opens the D-Link router page. Configure Firewall settings. show steps × Click Log in to login to the router's settings. On the menu bar, click ADVANCED. In the left pane, click FIREWALL SETTINGS to configure the firewall settings of the router manually. Scroll down, and in the DMZ Host section, check Enable DMZ to set a single computer on the network outside of the router. Type 192.168.0.1 as DMZ IP address of the host that will be connected to the DMZ. Save settings. show steps × Scroll up and save the configuration by clicking Save Settings. Close Internet Explorer.

NMAP

Originally intended to simply identify devices on the network

A junior network technician is configuring voice control of devices in the office cabin of the CEO. Which type of IoT network is being established here?

PAN

Which of the following protocols is old, outdated, and shouldn't be used on a network because it sends usernames and passwords in clear text?

PAP

A network administrator has a tough job of connecting more than 100 users to the Internet, but the ISP has only provided a /30 network ID. What technology should the network administrator implement to make this work?

PAT

hybrid

PGP uses symmetric encryption, but it also uses asymmetric encryption for digital signatures and for sending the session key. For this reason, it is know as a ______________ cryptosystem.

Which of the following are types of DNS records?

PTR A SRV

A company wants a cloud service solution that can provide a deployment platform for its applications and it doesn't need to worry about the infrastructure requirements. Which of the following cloud services should be used for this purpose?

PaaS

A network administrator has been asked by the company's management to find a cloud solution that will allow quick provisioning of additional servers to host custom applications, as well as the installation of server operating systems and virtual networking devices. Which of the following cloud services should the network administrator choose for this purpose?

PaaS

Which of the following is an indication of slow network speed and congestion?

Packet drop

In what type of network are all computers considered equals and they do not share any central authority?

Peer-to-peer.

Transforming Human Network Communication to Bits

Physical ==> Bits Data Link ==> Frame Network ==> Packet Transport ==> Segment Session ==> Data Presentation ==> PDU (Protocol Data Unit) Appliciation ==> PDU (Protocol Data Unit)

Repeater

Physical Layer

How is a T1 crossover cable crosses wired?

Pins 1, 2, 3, and 5 are connected to 4, 5, 1, and 2. Uses T568B pairs 1 and 2, so to connect two T1 CSU/DSU devices back-to-back requires a crossover cable that swaps them.

A network engineer is currently planning for LAN cabling for a new area in an office building. The cable will run between the structural and drop-down ceilings. Which of the following cables will be best suited in this environment?

Plenum

You are a Network Administrator and currently planning for LAN cabling for a new area of your office building. The cable will run between the structural and drop-down ceilings. Which of the following cables will be best suited in this environment?

Plenum-rated

PPP

Point to point protocol Remote access protocol that supports encryption

What type of topology gives you a direct connection between two routers so that there is one communication path?

Point-to-point topology: direct connection between two routers. Can be linked by a serial cable, making it a physical network, or be separated and connected by a circuit within a Frame Relay network, making it logical.

Which network topology or connection type can be implemented with only two endpoints?

Point-to-point.

Which of the following ports is used by NTP (Network Time Protocol) for communication?

Port 123

Which UDP port is used by the TFTP (Trivial File Transfer Protocol)?

Port 69

A network technician has recently replaced a hub with a switch in the network. He hasn't changed the port on which the network sniffer was attached. As a result of this, he is unable to view traffic passing through other ports. What can be the solution to solve the problem?

Port Mirroring

A newly appointed network administrator wants to check the services of the company that are exposed to the outside world. Which of the following tools should the network administrator use?

Port Scanner

Which of the following is a security technique at the Layer 2 of the OSI model?

Port Security

Disabled

Port does not participate in the frame forwarding or STP

Mary, a network administrator is installing an IDS device on the company's TCP/IP network. Which of the following can be configured on the switch to effectively use the IDS device?

Port mirroring

A user has performed multiple JSON and XML edits. This relates to an operation at which of the following OSI layers?

Presentation

What are the advantages of using a layer 2 switch over a hub? Each correct answer represents a complete solution. Choose two.

Prevents broadcast storms Has more collision domains

What are the advantages of using a layer 2 switch over a hub?

Prevents broadcast storms Has more collision domains

A network technician has recently performed an upgrade to all of its printers to connect multi-function devices. Now, users can print to the new devices, but they also need the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?

Printer firmware

___ IP addresses are not routable over the Internet.

Private

Inside local

Private IP referencing an inside device

Drag the layers of the DOD model from the bottom onto their matching protocols and standards they use on the top.

Process/Application layer ===> Telnet/FTP || LDP/SNMP ===> TFTP/SMTP || NFS/XWindow Host-to-Host layer ===> TCP || UDP Internet layer ===> ICMP / ARP / RARP ===> IP Network Access layer ===> Ethernet / Fast Ethernet / Gigabit Ethernet / Wireless 802.11

The TCP/IP protocol suite

Process/Application layer ===> Telnet/FTP || LDP/SNMP ===> TFTP/SMTP || NFS/XWindow Host-to-Host layer ===> TCP || UDP Internet layer ===> ICMP / ARP / RARP ===> IP Network Access layer ===> Ethernet / Fast Ethernet / Gigabit Ethernet / Wireless 802.11

Mark the layer in the DOD model that corresponds to the transport layer of the OSI model.

Process/Application layer ===> Application/Presentation/Session Host-to-Host layer ===> Transport Internet layer ===> Network Network Access layer ===> Data Link/Physical

The DoD and OSI models

Process/Application layer ===> Application/Presentation/Session Host-to-Host layer ===> Transport Internet layer ===> Network Network Access layer ===> Data Link/Physical

Network Time Protocol (123)

Professor David Mills of the University of Delaware came up with this handy protocol that's used to synchronize the clocks on our computers to one standard time source (typically, an atomic clock). Network Time Protocol (NTP) works in conjunction with other synchronization utilities to ensure that all computers on a given network agree on the time. This may sound pretty simple, but it's very important because so many of the transactions done today are time- and date-stamped. Think about your precious databases, for one. It can mess up a server pretty badly if it's out of sync with the machines connected to it, even by mere seconds (think crash!). You can't have a transaction entered by a machine at, say, 1:50 a.m. when the server records that transaction as having occurred at 1:45 a.m. So basically, NTP works to prevent "back to the future sans DeLorean" from bringing down the network-very important indeed!

Drag the protocols from the right onto their matching port numbers on the left.

Protocol ====> Port Number TFTP ====> 69 HTTPS ====> 443 IMAP ====> 143 POP ====> 110 SMTP ====> 25

A network technician in a company is diagnosing a time-out issue generated from an employee's web browser. The employee's web browser issues standard HTTP get and post commands to interact with the website. Having this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools will help the technician in this work?

Protocol analyzer

A company has subscribed to a DSL connection for its network. Which tool will be used to extend the demarc for the new connection?

Punch down tool

Which of the following can be used to authenticate remote workers connecting from an offsite location?

RADIUS 802.1X

A network administrator wants to have a centralized server to manage credentials for all network devices on the company's network. Which of the following types of servers are most likely to be used?

RADIUS TACACS+

Which is not a routing protocol?

RDP

You need to have a connection to run applications that are installed on only your desktop computer at your office. Which protocol will provide a GUI interface to your work computer?

RDP Remote Desktop Protocol (RDP) allows you to connect to a remote computer and run programs, as Telnet does. However, the large advantage that RDP has over Telnet is that RDP allows you to have a GUI interface connection.

What type of wireless channels are most typically used for networks in homes and coffee shops? a. RF b. Coax c. Microwave d. WiMAX

RF

IPv6 Routing Protocols

RIPv1 & v2 >> RIPng EIGRP >> EIGRPv6 OSPF >> OSPFv3

Which of the following are not considered link state routing protocols?

RIPv2 RIP

Which of the following types of connectors are used for unshielded twisted-pair connections? Each correct answer represents a complete solution. Choose two.

RJ-45 RJ-11

Which of the following types of connectors are used for unshielded twisted-pair connections?

RJ-45 RJ-11

What type of connector does UTP cable typically use?

RJ-45.

Which protocol describes a packet-formatting standard for delivering audio and video over IP networks?

Real-time Transport Protocol (RTP)

FCC

Regulates the use of wireless devices in the us

You have a user that still uses Windows 98. He complains that he can't get onto the Internet and refuses to upgrade the operating system. You asked the user to open the command prompt and ping 127.0.0.1. He receives a message that says, "Unable to contact IP driver, error code 2." How can you resolve this issue without upgrading the OS?

Reinstall the TCP/IP protocol stack.

Determine if the user has the correct VPN address and password

Remote user cannot connect to the central office with his VPN client, however, this user can get to the internet. What is your first step to troubleshoot this problem

You work as a technician for Peach Tree Inc. Rick, a sales manager, has a laptop that is compatible with 802.11b and 802.11g wireless networks. He complains that whenever he connects to his home network wirelessly, he gets the maximum connectivity speed of 11Mbps. However, when he connects his computer to the office wireless network, he gets much better connectivity speed. Which of the following steps will you take to resolve the issue?

Replace his home network router with one that is 802.11g compatible.

What advantage does the client-server architecture have over peer-to-peer?

Requests for resources go to a main server that responds by handling security and directing clients to resources instead of going directly to the machine.

Flooding

Result when a network switch receives a packet for which there is no defined destination MAC address or in the situation that the destination MAC address is not known to the switch

During a random site survey in an organization, a wireless device was found which didn't happen to be installed by the network team. Which of the following types of network threats is this?

Rogue AP

Default Administrative Distances (AD)

Route source = Connected interface Default AD = 0 Route source = Static route Default AD = 1 Route source = External BGP Default AD = 20 Route source = Internal EIGRP Default AD = 90 Route source = IGRP Default AD = 100 Route source = OSPF Default AD = 110 Route source = ISIS Default AD = 115 Route source = RIP Default AD = 120 Route source = External EIGRP Default AD = 170 Route source = Internal BGP Default AD = 200 Route source = Unknown Default AD = 255 (this route will never be used)

A host with an IP address of 10.0.0.126/25 needs to transfer data to a host with an IP address of 10.0.0.129/25. Which of the following devices will be required for this purpose?

Router

You have a small network wtih multiple devices and need to have a smaller broadcast domain while working with a single device. What is the best solution?

Routers break up broadcast domains.

Routing flow tree

Routing >> Static Routing, Dynamic routing Dynamic Routing >> IGP, EGP (Protocols: BGP) IGP >> Distance Vector (Protocols: RIPv1 & 2, IGRP), Link State (Protocols: OSPF, IS-IS) Distance Vector, Link State >> Hybrid (Protocols: EIGRP, BGP)

Distance Vector Routing Protocols

Routing Information Protocol (RIP) - Sends complete routing table out to all active interfaces every 30 seconds. Only uses hop count to determine best path. Has maximum allowable hop count of 15 by default, a hop count of 16 would be deemed unreachable. Slow to converge. Uses classful routing meaning all devices in the network must use the same subnet mask for each specific class. RIPv2 provides something called prefix routing and does send subnet mask info with the route updates allowing classless routing. RIPv1: Distance vector RIPv2: Distance vector RIPv1: Max hop count of 15 RIPv2: Max hop count of 15 RIPv1: Classful RIPv2: Classless RIPv1: Broadcast based RIPv2: Uses multicase 224.0.0.9 RIPv1: No support for VLSM RIPv2: Supports VLSM networks RIPv1: No authentication RIPv2: Allows for MD5 authentication RIPv1: No support for discontiguous networks RIPv2: Supports dscontiguous networks

RIP

Routing Information Protocol Distance vector uses only hop count as a metric to find the best path to a remote network default administrative distance of 120

Administrative Distance

Routing protocol characteristic that indicates the believability of the routing provocol

Which of the following describes dynamic routing?

Routing tables are updated automatically when changes occur in the network.

You need to transfer files between two hosts. Which two protocols can you use? (Choose two.)

SCP FTP Secure Copy Protocol (SCP) and File Transfer Protocol (FTP) can be used to transfer files between two systems.

A security technician identifies a security breach on his company's network. Which of the following should he use to aggregate and analyze network's security logs?

SIEM

Which of the following services use TCP? (Choose three.)

SMTP FTP HTTP

You need a protocol that will help you simplify the process of setting up a network and administering it. Which of the following will you use?

SNMP

Which of the following protocols can use TCP and UDP, permits authentication and secure polling of network devices, and allows for automated alerts and reports on network devices?

SNMP Simple Network Management Protocol is typically implemented using version 3, which allows for a connection-oriented service, authentication and secure polling of network devices, and alerts and reports on network devices.

Identify the Simple Network Management Protocol (SNMP) component that is an unsolicited message sent from an SNMP managed device to provide a notification about a significant event occurring on that managed device.

SNMP Trap

You need to log in to a Unix server across a network that is not secure. Which of the following protocols will allow you to remotely administrate this server securely?

SSH Secure Shell (SSH) allows you to remotely administer router, switches, and even servers securely.

What are three types of fiber-optic connectors?

ST, SC, LC.

A network technician is setting up a new network. To eliminate single points of failure from the design, he wants to include redundant paths in the network. However, he also wants to prevent performance degradation. Which of the following should he implement to accomplish this?

STP

A network technician is setting up a new network. To eliminate single points of failure from the design, he wants to include redundant paths in the network. However, he also wants to prevent performance degradation. Which of the following should he implement to accomplish this?

STP (Spanning Tree Protocol)

A company has decided to migrate the email management system to a vendor cloud. The company will only pay for this service and everything else will be managed by the cloud provider. Which of the following cloud services will provide this benefit?

SaaS

Which WAN technology is associated with high latency?

Satellite

Secure File Transfer Protocol (22)

Secure File Transfer Protocol (SFTP) is used when you need to transfer files over an encrypted connection. It uses an SSH session (more on this later), which encrypts the connection, and SSH uses port 22, hence the port 22 for SFTP. Apart from the secure part, it's used just as FTP is-for transferring files between computers on an IP network, such as the Internet.

SSH

Secure Shell

Secure Shell (22)

Secure Shell (SSH) protocol sets up a secure Telnet session over a standard TCP/IP connection and is employed for doing things like logging into other systems, running programs on remote systems, and moving files from one system to another. And it does all of this while maintaining a nice, strong, encrypted connection. You can think of it as the new-generation protocol that's now used in place of rsh and rlogin-even Telnet. Both SSH (port 22) and HTTPS (port 443) are used to encrypt packets over your intranet and the Internet.

WPA PEAP WPA Enterprise WPA 2

Secure for a wireless network

War drivers Hackers Employees Rogue access points

Security threats for WLANs

What is a concern when using peer-to-peer networks?

Security: trouble with standardizing authentication.

If a switch receives a frame and the destination hardware address is not in the forward/filter table, what will the switch do with this frame?

Send it out to all ports

Serial Line IP

Serial Line IP (SLIP) is a protocol created with the IP protocol stack and designed to work over serial ports and modem connections. It's also completely outdated, so I'm not sure why it's listed on the exam objectives. In the 1970s through the early 1990s, we used SLIP with our modem configurations. It was not compatible with DHCP, so everything was statically configured and assigned. SLIP has been completely replaced by the Point-to-Point Protocol (PPP), which is better engineered, has more features, and does not require a static IP address configuration.

NAT Proxy Packet filtering

Services provided by a firewall

Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?

Shielded twisted pair (STP)

Which of the following protocols allows you to gather data by polling devices on a network from a network management station?

Simple Network Management Protocol (SNMP)

An employee at a company received a call from someone in the IT department asking for information about the company's network. The caller explained that the information would be used to improve connection speed, thus improving performance. However, the caller ID on the phone indicated that the call came from outside the company. Which of the following types of attack has occurred?

Social engineering

A network technician wants to implement a network topology that is scalable and easy to troubleshoot. Which of the following topologies would the network technician use?

Star

Which of the following network topologies utilizes a central device with point-to-point connections to all other devices?

Star

Which of the following represents a topology constructed with a router, switch, and three PCs connected to it?

Star

VLANs

Switching technology reduces the size of a broadcast domain

Which of the following ports is the default port for IMAP4 protocol?

TCP port 143

What Layer 4 protocol is used for a Telnet connection, and what is the default port number?

TCP, 23 Telnet uses TCP at the Transport layer with a default port number of 23.

Which Layer 1 technology allows a single PRI to deliver multiple voice calls simultaneously?

TDM

Drag the TCP/IP layers from the bottom onto the boxes that correspond to the protocols used in those layers of the TCP/IP architecture.

The Application layer HTTP (Hypertext Transfer Protocol Secure) FTP (File Transfer Protocol) Telnet SMTP (Simple Mail Transfer Protocol) POP3 (Post Office Protocol3) IMAP4 (Internet Message Access Protocol4) The Transport layer TCP (Transmission Control Protocol) UDP (User Datagram Protocol) The Internet layer RIP (Routing Information Protocol) OSPF (Open Shortest Path First) IGMP (Internet Group Management Protocol) ICMP (Internet Control Message Protocol) The Network Access layer Consists of the network card driver and the circuitry on the network card itself. It makes use of only the ARP protocol.

You work as a network administrator for a company. The company has a TCP/IP-based network. Users on the network are complaining that they're unable to connect to the Web server hosted on the Intranet by using its host name. You find that users can access the server by using its IP address. What is the most likely cause of the issue?

The DNS server is unavailable.

The Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created by?

The Department of Defense (DoD) to ensure and preserve data integrity as well as to maintain communications in the event of catastrophic war.

TCP/IP and the DoD Model

The DoD model is basically a condensed version of the OSI model; it's composed of four, instead of seven, layers: Process/Application layer Host-to-Host layer Internet layer Network Access layer

You plug a host into a switch port, but the user can't get to the services it needs. What is probably the problem?

The VLAN port membership is set wrong

tcpdump

The __________ tool can be used to explore networks, perform security scans, and find open ports on remote network machines.

Convergence

The amount of time required for a routing protocol to failover from a previously active route to a back route.

Metal ceilings concrete walls cordless phones

The company has a TCP/IP based network. You have configured an 802.11g wireless LAN on your network. Which factors can deteriorate the performance and range of WLAN

WEP

The company has a TCP/IP based network. Your required to add more work stations to the network. Management wants the new workstations to be connected to the network wirelessly. Your prime concern right now is security. Which of the following protocols will provide basic security for the wireless network security mechanisms have been compromised

A network administrator has installed a DHCP server on the company's network to automatically assign IP addresses to client computers. The network administrator configures a computer for a new user. The user complains that she is unable to access the network resources. The network administrator runs the ipconfig command on her computer and receives the following IP configuration information: IP address — 169.254.75.182 Subnet Mask — 255.255.0.0 Default Gateway — NA

The computer is not able to connect to the DHCP server.

A network administrator has installed a DHCP server on the company's network to automatically assign IP addresses to client computers. The network administrator configures a computer for a new user. The user complains that she is unable to access the network resources. The network administrator runs the ipconfig command on her computer and receives the following IP configuration information: IP address — 169.254.75.182 Subnet Mask — 255.255.0.0 Default Gateway — NA Other users are not facing the same problem. What is the most likely cause of this issue?

The computer is not able to connect to the DHCP server.

MTTR

The database server used by the payroll system crashes at 3PM and payroll is due by 5PM. Which of the following metrics is MOST important in this instance?

You are designing a network for Perfect Wear Inc. You need to make a choice between 100BASE-FX and 100BASE-TX. What are the two prime differences between 100BASE-FX and 100BASE-TX?

The maximum segment length of 100BASE-FX is longer than that of 100BASE-TX. 100BASE-FX is fiber-based, whereas 100BASE-TX is copper-based.

IPv6 Routing Protocols >> RIPng

The primary features of RIPng are the same as they were with RIPv2. Still distance vector, max hop count 15, as well as using UDP port 521. Still uses mutlicast to send its updates but in IPv6, it uses FF02::9 vs RIPv2 address 224.0.0.9 Routers keep the next-hop addresses of their neighbor routers for every destination network in their routing table. The difference is that with RIPng, the router keeps track of this next-hop address using the link-local address, not a global address.

hardening

The process of disabling unneeded network services on a computer is referred to as what?

The states of STP

The purpose of the blocking state is to prevent the use of looped paths. A port in the listening state prepares to forward data frames without populating the MAC address table. A port in the learning state populates the MAC address table but doesn't forward data frames. A port in the forwarding state sends and receives all data frames on the bridged port. Last, a port in the disabled state is virtually nonoperational.

How does a server can distinguish among different simultaneous services from the same host?

The requests have different port numbers.

You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be? (Choose two.) The router is not configured for the new host. The STP configuration on the switch is not updated for the new host. The host has an invalid MAC address. The switch port the host is connected to is not configured to the correct VLAN membership. The STP shut down the port

The switch port the host is connected to is not configured to the correct VLAN membership. The STP shut down the port Tthe best answers are that the VLAN membership for the port is configured incorrectly and that STP shut down the port.

A home user wants to test his Internet connection and uses a speed test website. The test result shows the following details: Upload speed: 7.5 Mbps Download speed: 35.2 Mbps

The user is receiving data at 35.2 Mbps and sending data at 7.5 Mbps.

Which of the following are benefits of VLANs? (Choose three.) They increase the size of collision domains. They allow logical grouping of users by function. They can enhance network security. They increase the size of broadcast domains while decreasing the number of collision domains. They simplify switch administration. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

They allow logical grouping of users by function. They can enhance network security. They increase the number of broadcast domains while decreasing the size of the broadcast domains. VLANs break up broadcast domains in a switched Layer 2 network, which means smaller broadcast domains. They allow configuration by logical function instead of physical location and can create some security if configured correctly.

What would an ARP destination MAC address appear as?

This would be a Layer 2 broadcast, or FF:FF:FF:FF:FF:FF

Address learning filtering and loop avoidance

Three switch functions at layer 2

Which ISP tier is not the subject to transport fees from other tiers? a. Tier 1 b. Tier 2 c. Tier 3

Tier 1

Which of the following tools can be used to test the continuity of a cable?

Time-domain reflectometer

A network technician is troubleshooting a network connectivity issue on a user's PC. The network technician is unable to locate the cable from the PC to the wall jack. Which of the following tools will be helpful in this situation?

Tone generator

A technician has identified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. The technician is unable to locate the cable from the patch panel due to improper labelling. Which of the following devices will help him in this task?

Tone generator and probe

A utility called ___ reports the path of packets over the Internet

Traceroute

Fiber-optic cable is immune to electromagnetic interference (EMI) and radio frequency interference (RFI) because it ___________________ .

Transmits digital signals using light impulses.

At which layer of the OSI model does UDP operate?

Transport

Trivial File Transfer Protocol (69)

Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of FTP. It doesn't give you the abundance of functions that FTP does. TFTP has no directory-browsing abilities; it can do nothing but send and receive files. This compact little protocol also skimps in the data department, sending much smaller blocks of data than FTP, and there's no authentication as with FTP, so it's insecure. Few sites support it because of the inherent security risks.

Which of the following security threats is a program that appears to be for one purpose (for example, a game), but secretly performs another task (for example, collecting a list of contacts from an end-user's e-mail program)?

Trojan horse

T/F: Data traveling on a wired channel tends to be more secure than data traveling on a wireless channel.

True

T/F: Ethernet and Wi-Fi are compatible network standards

True

False

True or False? A VoIP call is typically less latency sensitive than a FTP file transfer.

False

True or False? A false positive happens when an IDS identifies an attack as legitimate activity. A false negative happens when an IDS identifies legitimate activity as something malicious.

True

True or False? A wireless access point is both a transmitter and a receiver used for wireless LAN signals.

False

True or False? The following image represents a typical network interface card with a link light and activity light. The flashing green means the connection is up but the flashing green and amber lights indicate that network collisions may bring this connection down soon.

Which of the following features of a switch will allow two switches to pass network information? PoE VLANs Trunking STP

Trunking allows switches to pass information about many or all VLANs configures on the switches.

Which of the following protocols is used by TFTP as a file transfer protocol?

UDP

Which of the following is the default port for SNMP (Simple Network Management Protocol)?

UDP port 161

A company's remote site recently faced a brownout issue that resulted in malfunctioning of many network devices. The network technician has been asked to implement a solution that will prevent any such occurrence in future. Which of the following will be helpful in the event of another brownout?

UPS

Which Ethernet Unshielded twisted-pair cabling types are commonly used?

UTP is commonly used in twisted pair ethernet like 10BaseT, 100BaseTX, 1000BaseTX, etc.

when signal overlap occurs between APs

Under what circumstance would you change the default channel on an access point?

Blocking

Use of loop paths is prevented, a port should be in which STP state

Spanning tree protocol (STP)

Used at layer 2 to prevent switching loops

SSH (Secure Shell)

Used to securely connect to a remote host

PKI

User authentication method uses a public key and private key pair

Interference from a cordless phone

Users are complaining that their 802.11g network is going up and down, and when it does work, it has slow response time. What could the problem be?

tracert

Users on a network are complaining that it takes a long time to get to a website they commonly use for expense tracking. This is a new problem and you've been tasked with identifying the source of the bottleneck and finding a reasonable solution for this issue. Which of the following command line utilities would you use to get started?

Fingerprint

Utilizing multifactor authentication which is an example of verifying something you are

Which of the following breaks up broadcast domains in a Layer 2 switched network?

VLAN

In which of the following attacks does an attacker connect to an unused VoIP phone port to gain unauthorized access to a network?

VLAN hopping

Broadcast domains in a layer 2 switched network

VLANs break up

You need to access your company's internal website from a remote location via a wireless Internet connection. Which type of connection do you need to make this secure?

VPN

HSRP

Vendor specific FHRP protocol

OSPFv3

Version or name of OSPF that is used with IPv6

Availability

Vincent is responding to a security incident that compromised one of his organization's web servers. He does not believe that the attackers modified or stole any information, but they did disrupt access to the organization's website. What security objective did this attack violate?

Which switching technology reduces the size of a broadcast domain? ISL 802.1Q VLANs STP

Virtual LANs break up broadcast domains in Layer 2 switched internetworks

Which of the following help isolate network traffic? hubs VLANs Repeaters Hosts

Virtual LANs help isolate network traffic by breaking up broadcast domains in a layer‐2 switched network

What is a difference between LAN and WAN?

WAN: connects two or more remote LANS together using someone else's network (ISP) and a router.

Which of the following approaches to wireless LAN (WLAN) security uses RC4 as its encryption algorithm?

WEP

Reduces cost increase flexibility mobile support guest access

WLANs provide

What is the most effective encryption tech? a. SSID b. WEP c. WPA

WPA

BGP

What EGP routing protocol is used on the global internet for exchanging information between gateway host and considered a distance vector

CSMA/CA

What is the access method employed by the 802.11 wireless standards?

warm site

What is the minimal level for an alternative site that could include live networking?

SSID

What is the network name that is needed to connect to a wireless AP called? Provide the acronym

first-hop redundancy

What redundancy concept is displayed in the following image?

- MU-MIMO - MIMO

What technologies are considered two of the biggest developments for 802.11n and 802.11ac and the key to the speeds associated with these standards? Select one or more: - MU-MIMO - MIMO - FHSS - DSSS

DMZ

What term BEST describes the area between the two firewalls shown here?

Destination network address. Neighbor router.

What two pieces of information does a router require to make a routing decision

IPS

What will detect a network or host intrusion and take action to prevent the intrusion from succeeding?

Routing Table

What will you look at to check the path IP will use to forward a packet through a router?

When would you possibly find Frame Relay being utilized in a corporate network to help save money?

When a centralized office needs to communicate with many branch offices When a full mesh of WAN links is in place

What is an example of when a point-to-multipoint network is called for?

When a centralized office needs to communicate with many branch offices.

Lowest administrative distance

When a router learns a route from different routing sources, what source is injected into the router's IP routing table?

When is STP said to be converged? (Choose two.) When all ports are in the forwarding state When all ports are in the blocking state When all ports are in the Listening state When all ports are in the Learning state

When all ports are in the forwarding state When all ports are in the blocking state The sequence of steps for STP convergence is, by default, blocking, listening, learning, and forwarding. When all ports are in either the blocking or forwarding state, STP is converged.

When all your routers are Cisco routers

When could you use EIGRP

Destination device

Where along the IP routing process does a packet get changed

nslookup

Which command created the following output?

- 1 - 6 - 11

Which of the following 2.4GHz frequency channels are considered non-overlapping channels? Select one or more: - 3 - 1 - 5 - 11 - 6

G3L$tUr9wY%

Which of the following passwords is the most complex?

Disk Encryption

Which of the following provides data confidentiality?

The IP address of the server

You are trying to reach a server on another subnet. What will be the destination IP address of a packet sent from your host

BitTorrent can be called ___ a. distributed network b. peer-to-peer network c. file sharing network d. all of the above

all of the above

When might you want to change your DNS server? a. when the DNS server that I'm using goes down b. when I'm traveling and other DNS servers are closer c. if I suspect that my DNS server has been hacked d. all of the above

all of the above

MAC addresses

always local on the LAN and never go through or past a router.

Which protocol category is responsible for the standards that attempt to block junk mail? a. physical b. transport c. arrival

arrival

EMI interception

attacker copies information traveling over the wire

The Internet ___ is a system of high-capacity routers and fiber-optic communication links

backbone

Which of the following situations is most suitable for a network that connects most devices with cables? a. university campus b. bank branch office c. private home d. coffee shop

bank branch office

Networks that handle at least 25 Mbps are classified by the FCC as ___.

broadband

A specification such as 10 Mbps that we commonly refer to as "connection speed" is technically a measurement of ___

capacity

Proxy server

centralized point of access to the internet it also generally provides cashing capabilities

A network technician reports to a compromised workstation. The technician secures the area, documents the scene, checks the compromised machines by taking them offline and then leaves them there without making any record. Which of the following steps in the incident handling has not been performed correctly by the network technician?

chain of custody

1, 6, 11

channel combinations would allow three WAPs to operate without interfering with one another

The communication ___ used for networks include copper cables, coaxial cables, radio signals, and microwaves.

channels

Autonomous system / routing domain

collection of networks or subnets that are in the same administrative domain

SYN flood

communication between two computers initially established by a three way handshake

MS-CHAPv2

concerned about level of security for passwords that are passed between remote clients and your VPN server running windows server 2008 R2. All remote clients are running windows vista or later Microsoft operating systems. You want to ensure the highest level of security is used for the passwords in transit over the network which authentication protocols should you choose

What kind of files should Dan store in his Public folder? a. files for a drop box b. files he would prefer not to share c. copies of files that he doesn't mind being altered d. files that he doesn't want deleted

copies of files that he doesn't mind being altered

Security zones

data from one of your subnets should be restricted from entering another subnet the subnets should be configured as different

Intrusion prevention system ips

devices are proactive to stop a hacker in their tracks

Dial-up connections use a voiceband modem to convert signals from ___ a. analog to digital b. tones to pulses for outgoing signals, and voltages to binary digits for incoming signals c. digital to analog d. digital to analog for outgoing signals, and analog to digital for incoming signals

digital to analog for outgoing signals, and analog to digital for incoming signals

When network ___ is on, your computer can see other devices that are connected to a LAN

discovery

On reaching a site of an incident, a network administrator starts evidence and data collection after securing the area. Which of the following steps are being missed by him in the incident handling?

eDiscovery Documentation

Encryption key

encode or read an encrypted message what tool is necessary

unreachable default gateway

encounter a system that is unable to access the internet what problem might be causing this issue

Technologies such as WEP, WPA, and PSK are examples of ___ that can be used on wireless networks

encryption

proactive detection

ensures that your network is impenatrable

ARPANET a. network used by the Soviet Union's space program b. essentially a pilot program for what later became the Internet c. created by National Science Foundation

essentially a pilot program for what later became the Internet

Trunking

features of a switch will allow two switches to pass VLAN networking information

Botnet

group of computers connected on the internet for the purpose of performing a task in a coordinated manner

Which one of the following is most likely to affect the actual speed of your cable Internet connection from day to day? a. your ISP service plan b. weather c. high traffic from other users d. watching TV shows

high traffic from other users

A network technician while troubleshooting a Linux system wants to display the associated IP address of a network adapter. Which of the following commands should he use?

ifconfig

A system administrator can access a remote workstation using telnet only. Which of the following utilities will help him identify if the workstation uses DHCP?

ipconfig

What command will show you the DNS server your host is using to resolve hostnames?

ipconfig /all

the ping of death

is the type of denial service attack

Passive reactions from an IDS

logging notification and shunning are what types of reactions from what type of security device

Packet filtering

method that allows or restricts the flow of specific types types of packets from crossing over the firewall

A technician is troubleshooting a client's computer. The technician is able to ping a website using its IP address, but not by URL. The technician wants to identify the default DNS server and also display the IP sessions. Which of the following commands should the network technician use to accomplish this task?

netstat nslookup

Install a network based ids

network administrator of a corporate network you want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process what will you do

social engineering

network attacks can be mitigated by providing proper training to the employees in an organization would be considered an attack in the human element of network security you receive an email from your software vendor the email contains information about a critical fix that needs to be installed on your computer. It further states that if this patch is not installed the right away your system will crash and you will lose all your data now they require your maintenance account password which types of security attacks do you think it is art of convincing people and making them disclose useful information such as account names and passwords the information is further exploited by hackers to gain access to a users computer network

In Shannon's model, signals traveling along a communication channel can be disrupted by a. source b. transmitter c. receiver d. noise

noise

buffer overflow

occurs when more data is put into a buffer than it can hold

When using a DSL connection, can you expect similar upload and download speeds? a. yes, if it is an asymmetrical connection b. yes, if it is a broadband connection c. yes, if it is ADSL d. only if it is SDSL

only if it is SDSL

The Internet uses ___ switching technology to route data from many different messages over a single communication channel.

packet

Files are divided into ___ before being shipped over the Internet a. packets b. email messages c. bits d. tiers

packets

A network technician has been given the permission to exploit a weakness in the company's network. This process is known as:

penetration testing.

A ___ area network connects smart sensors and digital devices within a range of about 30 ft.

personal

changing the default SSID value configuring a new administrator password

practices help secure your wireless access points from unauthorized access

Intrusion detection

process of detecting unauthorized access known as

Wi-fi alliance

promotes and tests for WLAN interoperability

RIPng

protocol will advertise routed IPv6 networks

Communication ___ set standards for physical channels, transporting data, and correcting errors.

protocols

Suppose you would like to allow friends to access some photos, but you don't want them to make changes. What permission would you assign? a. read b. read and write c. write d. drop box

read

Quality of service (QoS)

refers to the way the resources are controlled so that the quality of services is maintained. It's basically the ability to provide a different priority for one or more types of traffic over other levels.

Make sure the user has the correct VPN address and password

remote user who can connect to the internet but not to the office via their VPN client. After determining the problem which should be your next step

To extend the reach of your wireless network out onto your balcony, which of the following devices would be best? a. hub b. router c. repeater d. gateway

repeater

One way to ensure that only valid users can access shared files is ___ a. require a password b. check the MAC address c. only accept IP addresses d. require encryption

require a password

In LAN, all the network data goes through the ___ a. modem b. printer c. router d. Internet

router

The key device at the center of a LAN is ___

router

active detection

searches for hackers attempting known attack methods and scans for the kind of suspicious activity

Disaster recovery

seeks to restore they system or data that has been lost to a working state as quickly as possible

content filtering segregate network segments signature identification scanning services

services firewalls can provide

File ___ has to be turned on before any files on your computer can be accessed by other devices on a network

sharing

malware

software program designed to damage or take other unwanted actions on a computer system

Are Wi-Fi actual speeds faster than Ethernet actual speeds? a. yes b. no c. some Wi-Fi speeds are faster than 10BaseT Ethernet d. only 802.11ac Wi-Fi is slower than Ethernet

some Wi-Fi speeds are faster than 10BaseT Ethernet

phishing

someone calls you and asks for your bank account number because the bank is having problems with your account you give them this information and latter find out that you were scammed what type of account is this

a rogue access point

someone installed a wireless router on your network without your knowledge the wap would be called

Direct sequence

spread spectrum technology is used in wireless networks. What spread spectrum modulation technique does 802.11b use

Disable SSID

steps will you take to secure a newly installed wireless router

The primarily role of ICANN a. run the Internet b. provide funding for the Internet c. supervise Internet address assignments d. make sure that every country in the world gets equal access to the Internet

supervise Internet address assignments

Dynamic VLANs

support instant movability of end devices while static VLAN provides a simple way to assign VLAN to a port

dumpster diving

technique used to retrieve information that could be used to carry out an attack on a network

A user is complaining that it takes too long to access an application on a remote server. Which utility will identify the number of hops from the client to the server where the application resides?

tracers

A network technician is troubleshooting a company's network where several users on the company's network are reporting that they are unable to reach a particular website. Which of the following commands would provide the best information about the path taken across the network to this website?

tracert

What's the purpose of the domain name system? a. hand out IP addresses b. translate domain names into IP addresses c. route packets to their destinations d. encrypt data that is sent over the Internet

translate domain names into IP addresses

Intrusion detection system ids

used to detect unauthorized attempts to access and manipulate computer systems locally or through the internet or an intranet

MS-CHAP

user authentication method is available only in an all windows environment

sudden reduction in system resources corrupted or missing files

which are symptoms of a virus attack on your computer

Which of the following statements are true about a CAT5 cable?

- Uses a 24-gauge copper wire - Capable of transferring data at 100Mbps - Has three twists per inch of each twisted pair

You need to separate your network into broadcast domains. Which of the following entities will help you?

- VLANs - Routers

A company wants to make the corporate emails secure from network attacks such as phishing. The network technician has decided to install a port security firewall for this purpose. On which of the following ports should this be enabled to have the desired result?

25 110 143

How many devices are set to discovery mode on the Windows network? a. 0 b. 2 c. 3 d. 5

3

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

30

How many devices can be connected to a full-duplex segment?

2; requires point-to-point configuration because the collision-avoidance circuit is disabled.

network load balancing

A busy clustered website regularly experiences congested network traffic. You must improve the website response time. What should you implement?

Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO). A. MAC addressing B. IP addressing C. Port speed D. IPv6 addressing E. Duplex

C. Port speed E. Duplex

Hypertext Transfer Protocol Secure (443)

Hypertext Transfer Protocol Secure (HTTPS) is a secure version of HTTP that arms you with a whole bunch of security tools for keeping transactions between a web browser and a server secure. It's what your browser needs to fill out forms, sign in, authenticate, and encrypt an HTTP message when you make a reservation or buy something online. Both SSH (port 22) and HTTPS (port 443) are used to encrypt packets over your intranet and the Internet.

What protocol from the Internet Protocol (IP) stack is used for diagnostics and error messages?

ICMP

Which of the following protocols provides troubleshooting, control, and error detection mechanism?

ICMP

The mac address of the router sending the frame to the server

A server has received a frame from your remote host What will be the source hardware address of the frame

IP address of the server

A server has received a packet from your remote host. What will be the destination Internet Protocol address of the packet

A newly appointed network administrator wants to check the services of the company that are exposed to the outside world. Which of the following tools should the network administrator use?

Port scanner

Forwarding

Port sends and receives all data frames on the bridged port

Router

Network Layer Where does a data link layer frame have to carry a network layer packet if the packet is destined for a remote network?

Post Office Protocol (110)

Post Office Protocol (POP) gives us a storage facility for incoming mail, and the latest version is called POP3. When a client device connects to a POP3 server, messages addressed to that client are released for downloading. It doesn't allow messages to be downloaded selectively, but once they are, the client-server interaction ends and you can delete and tweak your messages locally at will. A newer standard, IMAP, is being used more and more in place of POP3.

Which of the following is primarily used for VoIP?

RTP

The OSI model has seven layers and the DoD has four. At which layer does SMTP work in both models?

Application

Which of the following firewalls inspects actual contents of packets/traffic?

Application layer

Drag the layers of the TCP/IP architecture into their correct sequence.

Application layer: Provides access to network resources Transport layer: Responsible for preparing data to be transported across the network Internet layer: Responsible for logical addressing (such as IP Addresses) and routing Network Access layer: Translates logical network address into physical machine address

- a version of a TDR exists that will find breaks in fiber optic network cables - capable of finding breaks in copper network cables

Which of the following is true of a TDR? Select one or more: - a version of a TDR exists that will find breaks in fiber optic network cables - capable of finding breaks in copper network cables - locates the beginning and end of a cable in a cabling bundle - checks compliance with TIA and ISO networking standards

MD5

Which of the following provides data integrity?

RDP

Which of the following refers to a Microsoft proprietary remote-access protocol providing a user with a graphical interface for connecting to another computer over a network?

SIEM

Which of the following refers to technology that allows for real-time analysis of security alerts generated by network hardware and applications?

You need to make a 568B cable for a FastEthernet link. How many pairs will you use?

Two; it is an RJ-45 wire.

- the use of CSMA/CA contributes to increased latency on wireless networks - all wireless devices connecting to the same wireless AP are in the same collision domain which increases latency

Which of the following statements are TRUE as it relates to increased latency on wireless networks? Select two Select one or more: - the use of CSMA/CD contributes to increased latency on wireless networks - the use of CSMA/CA contributes to increased latency on wireless networks - all wireless devices connecting to the same wireless AP are in the same collision domain which increases latency - all wireless devices connecting to the same wireless AP are in different collision domains which increases latency

- SNMP data Correct - traffic capture data Correct - log file data Correct

Which of the following are valid sources of data for network monitoring. Choose all that apply. Select one or more: - customer complaint data - SNMP data Correct - traffic capture data Correct - log file data Correct

baseline reporting

Which of the following can be described as a comparison of the present security state of a system compared to a standard established by the organization.

nbtstat -A 172.16.212.128

Which of the following commands would produce the command output image displayed below?

sending too much data to an application that allows the hacker to run arbitrary code

Which of the following descriptions best describes a buffer overflow attack?

NDA (Non-Disclosure Agreement)

Which of the following documents (pictured below) is a legal document between the holder of confidential information and another party to whom that information is disclosed?

non-repudiation

Which of the following is NOT one of the steps of the incident response process?

- protocol analyzer - packet sniffer

Which of the following is a dedicated software tool used for monitoring and examining the contents of network traffic? Choose all that apply Select one or more: - network mapper - protocol analyzer - packet sniffer - port scanner

- log files should be backed up - a log file retention policy should be in place - log files should be stored in a secure place - alerts should be set up when the log becomes full

Which of the following is important for good log maintenance? Select one or more: - log files should be backed up - a log file retention policy should be in place - log files should be stored in a secure place - alerts should be set up when the log becomes full

Which operating system offers a way to designate individual files as shared? a. macOS b. iOS c. Android d. Windows

Windows

run traceroute

Your UNIX network has been experiencing some severe congestion lately. You suspect the oldest 2 routers on your network as the cause of the recent issue. How could you verify this?

antivirus app

Your company's BYOD policy pays a monthly allowance to employees that use their own personal phones for work purposes. Given the following choices, what type of app should the company ensure is installed and running on all BYOD personal devices?

SLA

Your local ISP provides an agreement stating a 99.97% service availability for T1 connectivity to the Internet. How would you classify the type of documentation?

In a DoD model, also known as a TCP/IP model, a TCP or UDP header is added to a message at different layers. Which of the following information is added to the source and destination port fields of the TCP header?

Source and destination port numbers identifying the upper layer protocol

You need a topology that is scalable to use in your network. Which should you install?

Star: it is the most common hub and switch device.

Full and differential

Your server backup routine consists of a full backup each Friday night and a nightly backup of all data changed since Friday's backup. What type of backup is this?

Server Message Block (445)

Server Message Block (SMB) is used for sharing access to files and printers and other communications between hosts on a Microsoft Windows network. SMB can run on UDP port 137 and 138, and TCP port 137 and 139 using NetBIOS.

What is the term for a device that shares its resources with other network devices?

Server.

SIP (VoIP) (5060/5061)

Session Initiation Protocol (SIP) is a popular signaling protocol used to construct and deconstruct multimedia communication sessions for many things like voice and video calls, videoconferencing, streaming multimedia distribution, instant messaging, presence information, and online games over the Internet.

A network technician conducts a high availability test of a system and finds that a fiber interruption does not re-route traffic. Which of the following routing concepts is being indicated by this result?

Static

You need to crimp on a connector using an RJ-45 connector. Which pin-out configuration would you use to connect a host into a switch?

Straight-through cable with a pin-out 568A.

You want to connect a host to a switch port. What type of Ethernet cable will you use?

Straight-through.

The main purpose of the Spanning Tree Protocol in a switched LAN

The main purpose of STP is to prevent switching loops in a network with redundant switched paths.

- 100 meters - attenuation

The network pictured below has recently added a repeater to create two distinct network segments. The network administrator noticed that the previous CAT6a Ethernet segment was allowed to exceed the maximum segment length and users experienced signal quality deterioration. Choose the correct maximum segment length for CAT6a, AND choose the issue the network administrator resolved successfully. Select one or more: - 100 meters - attenuation - crosstalk - 55 meters

workstation A

The network shown in the following image has subnetted the 192.168.4.0 network using a 26-bit subnet mask. Determine the one network device (nodes A, B, C, or D) that has been assigned an IP address outside the local subnet.

An organization needs a centrally located firewall that can block specific incoming and outgoing traffic and check each packet individually. Which of the following types of firewalls should a network technician install?

The network technician should use a stateless network-based firewall. A network-based firewall is used in companies or organizations to protect the private network from public networks. It is designed to protect an entire network of computers instead of just one system, and it is usually a combination of hardware and software. The fact that we require a stateless network-based firewall instead of just a network-based firewall is that a stateless network-based firewall examines each packet individually and does not track existing states. It uses less memory and is faster than the stateful network-based firewall.

What is the main difference between single-mode fiber (SMF) and multimode fiber (MMF)?

The number of light rays (signals) they carry.

Redistributed Routes Injected Routes Route Installation

The interaction between IP routing protocol data structures and IP routing tables as traffic is routed through a network which are given below:

Syslog

__________ is the standard for computer message logging. Most devices such as switches, routers, and firewalls use it, or they can be updated to use it.

Ping

___________ is a command line utility used for checking the reachability of a remote network host.

BYOD

____________ refers to a policy permitting employees to bring personal mobile devices and to use them for accessing company information and applications.

tcpdump

_______________ is often used with Wireshark and is a command-line tool used to capture or filter TCP/IP packets received or transmitted over a network on a specific interface.

Social Engineering

_______________________ uses deception and manipulation to obtain confidential information.

wpa2

wireless access is widely used at the college you want the most secure wireless connections you can have which would you use

Which Wi-Fi infrastructure is most similar to Ethernet? a. wireless ad-hoc b. wireless infrastructure

wireless infrastructure

802.11n

wireless network protocol is the newest standard providing 200+ Mbps transfer rates over radio frequencies operating on the 2.4 GHz band

802.11a

wireless protocol LAN standard devices suffers from fewer interference problems and is least affected by interference from domestic appliances such as microwave ovens and can be used when required to provide up to 54Mbps transfer rates

bluejacking

wireless threats sends unsolicited messages to devices in the form of a vcard

passive detection

works by examining files and data and then calculating the checksums for each

Read and ___ permission allows a shared file to be opened, viewed, modified, and deleted

write

Suppose you have a Fast Ethernet connection to your LAN. Will it keep up with the data you exchange with the Internet? a. yes, Fast Ethernet is faster than my Internet connection speed b. yes, my ISP uses Fast Ethernet for my modem c. no, my Internet connection is faster than my Ethernet connection d. no, Fast Ethernet makes streaming video pause occasionally

yes, Fast Ethernet is faster than my Internet connection speed

Would the connection used for the speed test be classified as broadband? a. yes, it is synchronous b. yes, the download speed qualifies as broadband c. no, its minimum speed of 17.22 Mbps is not fast enough d. No, its average speed is only 24.27 Mbps

yes, the download speed qualifies as broadband

Static VLANs

are configured manually while dynamic VLANs use a database that stores a VLAN to MAC mapping

The basic goals of VLAN Trunking Protocol (VTP)

are to manage all configured VLANs across a switched internetwork and to maintain consistency throughout that network.

Which Windows TCP/IP utility will produce the following result?

arp

Which Windows TCP/IP utility will produce the following result? Interface: 199.102.30.152 Internet Address Physical Address Type 199.102.30.152 A0-ee-00-5b-0e-ac dynamic

arp

Which command-line utility shows the relationship between a MAC address and the corresponding IP address?

arp

Each record int he domain name system ___ a. represents a correspondence between a domain name and an IP address b. protects domain names from DNS spoofing c. routes packets over the Internet d. has a spoofed IP address that is easy for hackers and governments to change

represents a correspondence between a domain name and an IP address

The current rollout of mobile ___ service uses LTE tech

4G

A company has decided to make the users sign a policy document before logging into the company's network. Which of the following policy documents has the company prepared for this purpose?

AUP

RIP

Distance vector routing protocol with a maximum usable hop count of 15.

What is the most common attack on network servers?

DoS

What WAN technology uses 32 (64 Kbps) channels?

E1

What is the correct order in which the given routing protocols will get preference over each other?

EIGRP > OSPF > RIP > External EIGRP

Neighbor table and Topology table

EIGRP information is held in RAM and maintained through the usage of hello and update packets

Distance Vector Routing Protocols >> EIGRP

EIGRP is a classless, enhanced distance vector protocol that possesses a real edge over another older Cisco proprietary protocol, IGRP. EIGRP uses the concept of an autonomous system to describe the set of contiguous routers that run the same routing protocol and share routing information. EIGRP includes the subnet mask in its route updates. EIGRP is referred to as a hybrid routing protocol because it has characteristics of both distance and link state protocols. It sends distance vector updates containing information about networks, plus the cost of reaching them from the perspective of the advertising router. Its link state characteristics is that it synchronizes routing tables between neighbors at startup and then sends specific updates only when topology changes occur. EIGRP is suitable for very large networks. EIGRP features over RIP & RIPv2 * Support for IP and IPv6 (and some other useless routing protocols) via protocol-dependent modules. * Considered classless (same as RIPv2 and OSPF) * Support for VLSM/Classless Inter-Domain Routing (CIDR) * Support for summaries and discontiguous networks. *Efficient neighbor discovery. * Communication via Reliable Transport Protocol (RTP). * Best path selection via Diffusing Update Algorithm (DUAL). EIGRP uses *bandwidth* and *delay* of line as well as send *reliability*, *load*, and the *MTU* information between routers, but it only uses *bandwidth and delay by default*. Neighbor Table - Each router keeps state information about adjacent neighbors. When a newly discovered neighbor is learned on a router interface, the address and interface of that neighbor are recorded and the information is held in the neighbor table and stores in RAM. Sequence numbers are used to match acknowledgments with update packets. The last sequence number received from the neighbor is recorded so that out-of-order packets can be detected. Topology Table - is populated by the neighbor table, and the best path to each remote network is found by running Diffusing Update Algorithm (DUAL). The topology table contains all destinations advertised by neighboring routers, holding each destination address and a list of neighbors that have advertised the destination. For each neighbor, the advertised metric, which comes only from the neighbor's routing table, is recorded. If the neighbor is advertising this destination, it must be using the route to forward packets. Feasible Successor (Backup Routes) - is a path whose reported distance is less than the feasible (best) distance, and it is considered a backup route. EIGRP will keep up to six feasible successors in the topology table. Only the one with the best metric (the successor) is copied and placed in the routing table. Successor (Routes in a Routing Table) - is the best route to a remote network. A successor route is used by EIGRP to forward traffic to a destination and is stored in the routing table. It is backed up by a feasible successor route that is stored in the topology table - if one is available. *Route redistribution is the term used for translating from one routing protocol into another. An example would be where you have an old router running RIP and you have an EIGRP network. You can run route redistribution on one router to translate the RIP routes into EIGRP.*

Users in a company report intermittent connectivity issues. When the network technician asks the users to detail the issue, they say that the issue is frequent, happens anytime, and the cause is unknown. While troubleshooting, the network technician discovers that the Ethernet cable runs parallel to the electric cable. What can be the cause of the issue?

EMI

Which of the following can occur if the power cable runs along with the computer network cable?

EMI

arp -a

Execute the command to display the current ARP entries by interrogating the current protocol. The command used to view the arp cache on your host

HSRP >> HSRP Timers

*Hello Times* - The hello times is the defines interval during which each of the routers sen out Hello messages. Their default interval is 3 seconds, and they identify the state that each router is in. This is important because the particular state determines the specific role of each router and, as a result, the actions each will take within the group. This timer can be changed to milliseconds if you want. *Hold Timer* - Hold timer specifies the interval the standby router uses to determine whether the active router is offline or out of communication. By default, the hold timer is 10 seconds, roughly 3 times the default hello timer. If 1 timer is changed for some reason, it's recommended using 3x multiplier to adjust the other timers to. This is to avoid failover if there is short break in communication. *Active Timer* - Active timer monitors the state of the active router. The timer resets each time a router in the standby group receives a Hello packet from the active router. This timer expires based on the hold time value that's set in the corresponding field of the HSRP hello message. *Standby Timer* - Standby timer is used to monitor the state of the standby router. The timer resets anytime a router in the standby group receives a hello packet from the standby router and expires on the hold time value that's set in the respective hello packet.

How many wires are used in a 100 Mbps UTP transmission?

4; pins 1, 2, 3, 6

Which of the following wireless connection types utilize MIMO on non-overlapping channels?

- 802.11ac - 802.11n

Which of the following are uses of a VPN concentrator?

- Allows remote users to build a VPN tunnel - Performs authentication for each VPN tunnel - Provides data encryption

An organization on changing the ISP for its network has been assigned a new address range of 192.168.16.0/26. Which of the following represent the correct configuration of the gateway router if all communications to the Internet are possible without having any issue?

- Default gateway - 192.168.16.62 - IP address - 192.168.16.1 - Duplex - Auto

You want to inspect network traffic flowing through your TCP/IP network. Which of the following combinations of device and feature will you use to accomplish this?

- Hub, network sniffer - Switch, network sniffer, port mirroring

You work as a network administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You've configured an 802.11g Wireless LAN (WLAN) on your network. Users are complaining that the network is going up and down and, when it does work, it has slow response time. What could be the cause of the problem?

- Metal ceilings - Cordless phones - Concrete walls

Which of the following networking devices are used with 802.1q tagged frames?

- Router - Layer 3 switch

You need to transfer files between two systems. Which of the following protocols can be used?

- SCP - FTP

A company has decided to switch to a VoIP PBX network from the traditional PBX system. Which of the following protocols will be in use over the newly formed VoIP network?

- SIP - RTP - H.323

Which of the following connectors are used with fiber-optic cables?

- ST - SC - MT-RJ

A network technician has been asked to configure an email server that will use secure protocols. On completing the upgrade, which of the following ports on the firewall should be configured to allow for connectivity?

- TCP 587 - TCP 993 - TCP 995

A technician, Ann, has to assign two IP addresses to WAN interfaces on connected routers. Which of the following subnet masks should Ann use for this subnet to conserve address space?

/30

Which of the following would be the most efficient subnet mask for a point-to-point link?

/30

A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following represents the correct pin mapping that the technician should do to make a crossover cable before crimping the new plug?

1 > 3, 2 > 6, 3 > 1, and 6 > 2

568B uses which pins to make a connection?

1 to 3 and 2 to 6.

568A uses which pins to make a connection?

1, 2, 3, and 6.

What is the distance limitation of 10GBASE-LW?

10km 10GBASE-LW uses single mode fiber (SMF) as its media type, has a bandwidth capacity of 10 Gbps, and a distance limitation of 10 km. 10GBASE-SW uses multimode fiber (MMF) as its media type, has a bandwidth capacity of 10 Gbps, and a distance limitation of 300 m. 10GBASE-LR uses single mode fiber (SMF) as its media type, has a bandwidth capacity of 10 Gbps, and a distance limitation of 10 km. 10GBASE-ER and 10GBASE-EW both use single mode fiber (SMF) as their media type, have a bandwidth capacity of 10 Gbps, and a distance limitation of 40 km. Also, 100GBASE-ER4 uses SMF as its media type, has a bandwidth capacity of 100 Gbps, and a distance limitation of 40 km.

A device connected to the company's network is having an IP address 120.168.1.1. A network administrator wants to verify that the device had a TCP/IP stack loaded. Which of the following addresses should the network administrator ping?

127.0.0.1

A device connected to the company's network is having an IP address 120.168.1.1. A network administrator wants to verify that the device had a TCP/IP stack loaded. Which of the following addresses should the network administrator ping?

127.0.0.1 (Loopback address)

There is a special range of addresses reserved for systems that cannot obtain an IP address automatically from a DHCP server. These addresses are not routable on the network. What is the value in the first octet for these addresses?

169 Values of 10, 172, and 192 are private but internally routable. A portion of the 169.254.0.0/16 address space is reserved for systems that do not receive an automatic address. This reserved portions of the address space is not routable.

A network technician in a company has to create a subnet for 500 host machines. The technician is instructed to use a class B address scheme and leave possible rooms for additional subnets of the same size. Which of the following would fulfill these requirements?

172.18.0.0/23

Which of the following TCP ports must be opened on the firewall for the VPN connection using PPTP (Point-to-Point Tunneling Protocol)?

1723

A technician is troubleshooting a customer's network connectivity issue. He needs to determine the IP address of the customer's router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer's router?

192.168.1.1

You have an interface on a router with the IP address 192.168.1.199/28. What is the broadcast address the hosts will use on this LAN?

192.168.1.207

A company is setting up a new branch office. The new office will have two departments, Finance and Engineering. The Finance department will have 55 employees and the Engineering department will have 5 employees. The IP subscribed from the ISP is 192.168.1.0/29. The network administrator is configuring the subnets for the two departments starting with the Finance department. What will be the last host address on the Engineering subnet?

192.168.1.78

Which of the following is a private IP address?

192.168.255.1

What is the dotted-decimal equivalent of IP address 11000000.10101000.00110011.00001111?

192.168.51.15

What default subnet mask is used with the Class C private IP address range?

255.255.0.0

What is the default subnet mask for IP address 194.216.44.9?

255.255.255.0

You have a choice fo network connections. Which one of the following is broadband? a. 56 Kbps phone link b. 2.4 GHz cordless phone c. 50 Mbps cable connection d. 1.2 Mbps satellite link

50 Mbps cable connection

A network technician needs to configure a wireless network for a company but he can't use the 2.4 GHz range because of interference issues. What wireless standard can he choose at the 5 GHz range to get 54 Mbps data rate?

802.11a

Which of the following wireless LAN standard devices is least affected by interference from domestic appliances such as microwave ovens?

802.11a

A network technician is setting up a wireless access point for a SOHO location. The user has demanded exclusive use of the 5GHz band. Which of the following wireless standards should the network technician use for this purpose?

802.11ac

For a small office, a network technician has to design a WLAN which is capable of supporting HD video streaming to multiple devices. Which of the following wireless technologies would be appropriate for this design?

802.11ac

In an organization, the users usually connect to wireless APs and have speed of 11 Mbps. Which of the following WLAN standards is in use?

802.11b

A network technician is configuring a wireless router on a company's network and must decide which wireless standard to use for large file transfer at far distance from the router. Which of the following wireless standards will best meet the requirements?

802.11n

The existing wireless standard in an organization only allows for three non-overlapping channels. Which of the following should a technician upgrade to if more non-overlapping channels are needed?

802.11n

IS-IS

A link state routing protocol that uses a dimensionless metric associated with an interface.

OSPF

A link-state routing protocol that uses metric of cost based on the link speed between two routers.

A protocol analyzer can be used to capture all packets that it has access to by placing the computer's network interface card (NIC) adapter into promiscuous mode.

A protocol analyzer can be used to capture all packets that it has access to by placing the computer's network interface card (NIC) adapter into ___________________ mode.

SSL/TLS

A secure protocol that encrypts the entire protocol stack

Inside global

A public IP address referencing an inside device

Outside global

A public IP address referencing an outside device.

SLA (Service Level Agreement)

A security administrator is reviewing the company's data backup plan. The plan implements nightly offsite data replication to a third party company. Which of the following strict documents specifies how much data can be stored offsite, how quickly the data can be retrieved by the company from the third party, and who is responsible?

Will a computer that shares no resources likely be connected to the backbone or to a segment?

A segment.

L2TP

A standardized tunneling protocol that combines the best features of PPTP and L2F

a combination of characters from 3 different character groups

A strong password that meets password complexity requirements should consist of which of the following?

QoS

A suite of technologies that allows you to strategically optimize network performance for select traffic types is known as what? Provide the acronym

Power over Ethernet (PoE)

A system for transmitting electrical power, along with data, to remote devices over standard twisted-pair cable in an Ethernet network.

After setting up a new firewall, a network technician enters only three rules for network security that allow traffic on ports 21, 25, and 110. Due to this, users report that they cannot access web pages using URLs. What should the network technician do to resolve the issue?

Add one more rule at the end allowing ports 80 and 53. The port 80 is used by HTTP to securely retrieve content from a web server and the port 53 is used by DNS for resolving domain names to corresponding IP addresses.

IGMPv3

Adds a feature called SSM, which allows a client to request traffic not only destined for a particular multicast group but also sourced from a specific server.

IPv6 Routing Protocols >> OSPFv3

Adjacency (neighbor routers running OSPF) and next-hop attributes now use link-local addresses, and OSPFv3 still uses multicast traffic to send its updates and acknowledgements, with the addresses FF02::5 for OSPF routers and FF02::6 for OSPF designated routers, which provide topolocial updates (route information) to other routers. These new addresses are replacements for 224.0.0.5 and 224.0.0.6, respectively, which were uses in OSPFv2 (aka OSPF) *Shortest Path Bridging (SPB), specified in the IEE 802.1aq standard, is a computer networking technology intended to simplify the creating and configuration of networks and replace the older 802.1d/802.1w protocols, while enabling multipath routing*

Inter switch link

Allows the switch to identify the VLAN membership of a frame over the trunked link Way of explicitly tagging VLAN information onto an Ethernet frame

Only the owner of the key

Authentication system that uses private and public keys who should have access to the private key

duplex/speed mismatch

An technician is trying to resolve an issue at a customer's business location. The customer just added a few brand new switches and connected them with some older switches. Now users are experiencing decreased communication speeds and no communication in some cases. Which of the following is the MOST likely cause of this condition?

Hot site

An urban law enforcement agency leases a different space in another part of town, complete with a functioning computer network that mirrors the current live site. A high-speed network link constantly synchronizes data between the two sites. What type of site is the new leased location?

Warm site

An urban law enforcement agency leases a different space in another part of town, complete with a functioning computer network that mirrors the current live site. Data backups from the primary site are copied to the different leased location every two days. What type of site is the leased location?

backup tape or optical media hard drive RAM CPU registers

Arrange the following data storage areas from least volatile on top to most volatile on the bottom as it relates to performing incident response procedures. CPU registers backup tape or optical media RAM hard drive

Security log

As a Windows server administrator, you configure auditing on all servers so that you can track who deletes files. Files have recently been disappearing from a file share named, SALES. Where will you view the audit results?

SLA

As a network administrator you often deal with different ISPs. You want to ensure that a provider guarantees a certain level of end-to-end traffic performance. What is this referred to as?

An employee was assigned a laptop by the network administrator, which was assigned to someone else in the company. Upon delivering the laptop to the new employee, the administrator documents the new location, the employee's name, and when the device was reassigned. Which of the following best describes these actions?

Asset management

While diagnosing a company's network, a network technician finds that the computers on the company's network are vulnerable to smurf attack. Which of the following describes a smurf attack?

Attack on a target using spoofed ICMP packets to flood it

Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone? A. Loopback plugs B. Butt set C. Cable certifier D. Toner probe

B. Butt set

Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology? A. Verify full system functionality and if applicable implement preventative measures. B. Implement the solution or escalate as necessary. C. Document findings, actions, and outcomes. D. Establish a theory of probable cause (e.g. question the obvious).

B. Implement the solution or escalate as necessary.

Which of the following separates broadcast domains? A. Port mirroring B. Router C. Convergence D. Switch

B. Router

Which of the following could Kim, a network technician, use to find the approximate location of a break in a long network cable? A. Protocol analyzer B. Time domain reflectometer C. Toner probe D. Multimeter

B. Time domain reflectometer

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together? A. Cable tester B. Toner probe C. Cable crimper D. Punch down tool

B. Toner probe

Joe, a network technician, is implementing highly available datacenters for a company. The company wants to maintain an Internet presence at all sites even if the WAN circuit at one site goes redundant. Which of the following will Joe use?

BGP

What is a routing protocol that is used for moving prefixes back and forth between different autonomous systems?

BGP

What routing protocol is typically used on the Internet and allows routing information to be passed from one autonomous system to another?

BGP

Distance Vector Routing Protocols >> Border Gateway Protocol (BGP)

BGP is an EGP by default. It can be used within an AS which is why it's a hybrid protocol. It's known as a path vector protocol. BGP is essentially an alternative to using default routes for controlling path selection. *An autonomous system is a collection of networks under a common administrative domain. IGP operate within an autonomous system, and EGP connect different autonomous system together.* BGP would come in really handy if you wanted to multi-home a network for better redundancy, either to a multiple access point of a single ISP or to multiple ISPs. BGP doesn't broadcast its entire routing table like RIP; it updates a lot more like OSPF, which is a huge advantage. The routing table in BGP is called Routing Information Base (RIB). BGP also tells you about any/all networks reachable at the end of the path. BGP even gives you the history on how the networks at the end of the path were introduced into BGP in the 1st place, known as the origin code attribute.

John, a network technician is troubleshooting a wired device on the network. He notices that the link light on the NIC does not illuminate, but after testing the device on a different RJ-45 port, the device connects successfully. What is the cause behind this issue?

Bad Wiring

John, a network technician is troubleshooting a wired device on the network. He notices that the link light on the NIC does not illuminate, but after testing the device on a different RJ-45 port, the device connects successfully. What is the cause behind this issue?

Bad wiring

A company has recently made some changes to upgrade the existing network infrastructure. A network technician has been asked to track improvement of the new network infrastructure. Which of the following should the technician refer to have an accurate comparison?

Baseline

An organization's security policy requires that when new devices are introduced to the network, the devices must be monitored to establish normal traffic patterns. Which of the following is generated from the initial monitoring of the devices?

Baseline

performance problems and security posture

Baseline reporting enables a security administrator to identify the _______________________________________ of an application, system, or network. Select the BEST answer.

What is a disadvantage of using port spanning? It breaks up broadcast domains on all ports It can create overhead on the switch It makes the switch one large collision domain It makes the switch fast between only two ports instead of all ports

Be careful when using port mirroring/spanning on a switch because it can cause a lot of overhead on the switch and possibly crash your network. So, it's a good idea to use this feature at strategic times and only for short periods if possible

A company has received recent reports of equipment thefts from its workstations. What physical security methods can be used to prevent this from happening?

Biometric lock Cipher lock Mantrap

A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary data center. The Chief Information Officer (CIO) is concerned because the contract doesn't include a long-term strategy for extended outages. Which of the following should the CIO complete?

Business continuity plan

Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? A. 20 B. 21 C. 22 D. 23

C. 22

Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO). A. Layer 2 switch B. MAC address filtering C. ACLs D. IIS server E. Port scanner F. Firewall

C. ACLs F. Firewall

Which of the following technologies could be implemented to improve call clarity when using VoIP technology? A. Static IP addressing B. Caching engines C. QoS D. Port forwarding

C. QoS

Ann, a network technician, has to implement a physical security control that will allow her to detect any intrusion into the server room. Which of the following physical security controls will be the most suitable for this purpose?

CCTVs

Subnetting extends a classful subnet mask of an IP network to create additional subnets. However, what IP addressing approach removes bits from a classful subnet mask, to summarize multiple classful networks?

CIDR (Classless Inter-Domain Routing)

Your manager has asked you to negotiate standoff timers to allow multiple devices to communicate on congested network segments in a company. Which will help you to accomplish the task?

CSMA/CD

Which UTP uses four twisted wire pairs (eight wires), is rated for 100MHz, and is capable of handling the disturbance on each pair caused by transmitting on all four pairs at the same time?

Category 5e.

An IP address whose first octet is in the range 224 - 239

Class D IP address. Note that Class D IP addresses are never used as source IP addresses. Rather, they are only used as destination multicast addresses.

RIPv1

Classful routing protocol has a maximum hop count of 15 that runs over UDP and determines path based upon distance vectors and no authentication Periodic broadcast

You need a network that provides centralized authentication for your users. Which topology should you use?

Client server: allows you to have a centralized database of users so that authentication is provided in one place.

You work as a network administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. The network is configured as shown in the figure below: You to configure telnet to Switch-1 from Client1. Which of the following are required to accomplish the task?

Configure 192.168.2.100 as the default gateway address at Switch-1. Configure 192.168.1.100 as the default gateway address at Client1.

You need to perform maintenance on a router and need to temporarily reroute traffic through another office. Which is the best way to perform this action?

Configure static routing.

You need to implement a separate network for contractors and guests working at your office. Which technology should you implement?

Create a VLAN for Contractor and another VLAN for guests

A company recently faced an attack on its network infrastructure. On further inspection, it was found that the attacker exploited the vulnerabilities resulting from open switch ports. The Chief Information Officer (CIO) has instructed the network administrator that he not only wants the network to be secure, but also would like to monitor any attack in future. Which of the following should the network administrator implement to achieve this goal?

Create a VLAN with honeypots.

In which of the following wireless standards is MIMO used? A. 802.11a B. 802.11b C. 802.11g D. 802.11n

D. 802.11n

Which of the following BEST describes a switch port? A. Broadcast domain B. Distance vector C. Link state D. Collision domain

D. Collision domain

A bridge handles frames at which of the following layers of the OSI model? A. Network B. Session C. Transport D. Data Link

D. Data Link

When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality? A. Establish a plan of action to resolve the problem and identify potential effects. B. Implement the solution. C. Establish a theory of probable cause. D. Document findings, actions, and outcomes.

D. Document findings, actions, and outcomes.

When using high bandwidth applications over multiple WAN connections, which of the following should be used? A. Static IP addressing B. Half-duplex C. PoE devices D. Load balancing

D. Load balancing

Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for users connecting to a web server? A. nbtstat command B. dig command C. ipconfig command D. Protocol analyzer

D. Protocol analyzer

Which of the following is a method to prioritize network traffic coming from VoIP phones? A. PAT B. DNS C. SIP D. QoS

D. QoS

Which of the following technologies allows for redundant links within a Layer 2 segment? A. OSPF B. RIP C. Port Mirroring D. Spanning Tree

D. Spanning Tree

Which of the following can Jeff, a technician, modify on an 802.11n router that is not available as an option on an 802.11g device? A. SSID B. Encryption C. Channels D. Spectrum

D. Spectrum

Which of the following connectors will be used to connect a serial port and an Ethernet port on a switch?

DB-9 RJ-45

Modems and routers are examples of ___ that control the flow of data within a network and act as a gateway from one network to another (use acronym)

DCE

Which of the following is not a type of public-key encryption?

DES

If you have four wireless devices connected to your network and you do not want any interlopers to join, you can configure ___ to assign only four IP addresses a. SSID b. WEP c. DHCP d. Guest network

DHCP

When connected to a network, your computer can receive an address from ___ a. DHCP b. packets c. IPv4 d. CPU

DHCP

Which of the following is used for automated assignment of IP addresses?

DHCP

You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

DHCP

Which of the following services use UDP? (Choose three.)

DHCP SNMP TFTP

A network technician needs to ensure that the duplicate IP addresses do not occur when IP addresses are assigned from a DHCP scope. Also, it is not necessary that specific IP addresses are assigned to a particular client. Which of the following will help to accomplish this?

DHCP exclusion

Ann, a network technician, wants that certain servers always receive the same IP address from the DHCP pool. Which of the following should she configure?

DHCP reservation

At a company, users arriving at work on Monday morning are finding that when they boot up their machine, they cannot connect to the Internet or any servers. On the other hand, users who did not shut down their machine over the weekend are not having this problem. Where can the problem be?

DHCP server

A company has asked the network administrator to ensure that sensitive data is not exfiltrated from the system electronically. Which of the following policies should the network administrator implement?

DLP

A company has noticed increased incidents of malicious theft of sensitive data. Internal users are also involved in some of the cases. The company wants to implement a policy that can restrict data exfiltration. Which of the following policies should be implemented to achieve this goal?

DLP

Which of the following could be configured as a network segment located outside the firewall?

DMZ

Which of the following uses both TCP and UDP?

DNS DNS uses TCP for zone exchanges between servers and UDP when a client is trying to resolve a hostname to an IP address.

Spread-spectrum technology is used in wireless networks. What spread-spectrum modulation technique does 802.11b use?

DSSS

When you connect a cell phone to a network, it is considered a. DTE b. DCE c. SPT d. TCP

DTE

Bridge

Data Link Layer

Which of the following are functions of the presentation layer of the OSI model?

Data compression Data encryption Character-code translation

Which layer of the OSI model is the functioning layer for ATM?

Data link Layer

Brouter

Data link and Network Layers

MIMO

Data transmission technique in which several frames are sent by several antennae over several paths and are then recombined by another set of antennae

Static route

Default administrative distance of 1

A host on a network needs to send a packet to a remote network. Which of the following device's address should be the destination address in the frame?

Default gateway router

A remote user cannot connect to the central office with his VPN client; however, this user can get to the Internet. What should be the first step to troubleshoot this problem?

Determine if the user has the correct VPN address and password.

PPTP

Developed by Microsoft, features clients added as virtual nodes on the LAN VPN protocols allows for high levels of compatibility and user level authentication that does not require a certificate infrastructure

Which backup strategy contains the changes in data since the last full backup?

Differential

WEP | 64 bit or 128 bit | Uses RC4 and Static Keys WPA | 128 bit | Uses RC4 adds longer IV's WPA2 | 256 bit | Uses CCMP and AES

Drag and drop the correct labels onto the table provided Wireless Protocol | Encryption Level (Key Size) | How it Works ___________ | ____________ | Uses RC4 and Static Keys ___________ | ____________ | Uses RC4 adds longer IV's ___________ | ____________ | Uses CCMP and AES

Left- NMS: Management Station Listen for traps and informs UDP 162 Right- SNMP Agent Listens to UDP 161

Drag and drop the labels onto the SNMP image provided. Port numbers need to be placed below the component labels. Left- NMS: _______________ Listen for traps and informs: _______________ Right- _______________ Listens to: _______________

Implement an IDS

Due to specific security concerns of your company you need to prevent sensitive data from being sent out of your network without authorization. You've blocked and monitored ports on your firewall and run anti spy ware package which is another step you should take

Dynamic Host Configuration Protocol/Bootstrap Protocol (67/68)

Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts with information provided by a server. It allows easier administration and works well in small to even very large network environments. Many types of hardware can be used as a DHCP server, including routers. DHCP differs from Bootstrap Protocol (BootP) in that BootP assigns an IP address to a host but the host's hardware address must be entered manually in a BootP table. You can think of DHCP as a dynamic BootP. But remember that BootP is also used to send an operating system that a host can boot from. DHCP can't do that. But there is a lot of information a DHCP server can provide to a host when the host is requesting an IP address from the DHCP server. Here's a partial list of the information a DHCP server can provide: IP address Subnet mask Domain name Default gateway (routers) DNS Windows Internet Naming Service (WINS) information

AUP

Employees are asked to sign a document that details the methods of accessing a company's network and servers. Which of the following documents is being signed?

An attacker after gaining access to a facility, places a wireless access point to make it look as though it belongs to the network. He then begins eavesdropping on the wireless traffic. Which of the following attacks has he performed?

Evil twin

WPA

Encryption methods secures wireless communications using the temporal key integrity protocol tkip

An organization has been facing an increased number of successful social engineering attacks. Which of the following can help in reducing these attacks in the near future?

End-user awareness training

An organization, running at two sites, has the same company image and has implemented same group policy. Users at one site notice a large amount of malware and virus incidents but hardly any at another. Which of the following has most likely been implemented at the site with the least security incidents?

End-user awareness training

DNS

Examining ____________ reports and logs can uncover unauthorized zone transfers and other malicious or inadvertent activity.

In an organization, it is found that a bad module in a core switch results in an outage. What is the correct order of the steps of the troubleshooting methodology in solving the problem?

Establish a plan of action, implement the action plan, verify problem resolution, and documentation.

What is the fastest type fo Internet access plan available from telephone networks? a. dial-up b. FTTH c. DSL d. ISDN

FTTH

Which type of cable does EMI have the least effect on?

Fiber Optic.

Which of the following types of media converter should be used for connecting a newly installed multimode connection to an existing CAT5e infrastructure?

Fiber to Ethernet

Which of the following types of media converters should be used for connecting a newly installed multimode connection to an existing CAT5e infrastructure?

Fiber to Ethernet

You work as a Network Administrator for Net World International. The Sales office and head office of the company are located in different buildings. You want to connect the Sales office network to the Head office network. The company's management is concerned about the electromagnetic interference (EMI) in the surrounding locality. Which of the following cables will you use?

Fiber-optic

The Process/Application Layer Protocols

File Transfer Protocol (20, 21) Secure File Transfer Protocol (22) Secure Shell (22) Telnet (23) Simple Mail Transfer Protocol (25) Domain Name Service (53) Trivial File Transfer Protocol (69) Dynamic Host Configuration Protocol/Bootstrap Protocol (67/68) Hypertext Transfer Protocol (80) Post Office Protocol (110) Network Time Protocol (123) NetBIOS (137-139) Internet Message Access Protocol, Version 4 (143) Simple Network Management Protocol (161) Lightweight Directory Access Protocol (389) Hypertext Transfer Protocol Secure (443) Server Message Block (445) Transport Layer Security/Secure Sockets Layer (995/465) H.323 (Video) (1720) MGCP (Multimedia) (2427/2727) Remote Desktop Protocol (3389) SIP (VoIP) (5060/5061) RTP (VoIP) (5004/5005) Internet Group Management Protocol Serial Line IP

File Transfer Protocol (20, 21)

File Transfer Protocol (FTP) is the protocol that actually lets you transfer files across an IP network, and it can accomplish this between any two machines that are using it. But FTP isn't just a protocol; it's also a program. Operating as a protocol, FTP is used by applications. As a program, it's employed by users to perform file tasks by hand. FTP also allows for access to both directories and files and can accomplish certain types of directory operations, such as relocating files into different directories. Accessing a host through FTP is only the first step, though. Users must then be subjected to an authentication login that's probably secured with passwords and usernames implemented by system administrators to restrict access. Even when employed by users manually as a program, FTP's functions are limited to listing and manipulating directories, typing file contents, and copying files between hosts. It can't execute remote files as programs. The problem with FTP is that all data is sent in clear text, just as with Telnet. If you need to make sure your FTP transfers are secure, then you'll use SFTP.

A network technician wants to install a device that can use ACLs to prevent unauthorized access into the company's systems. Which of the following devices should the network technician use?

Firewall

Which of the following devices should a network administrator configure on the outermost part of a network?

Firewall

Which of the following should be performed to add new features to existing hardware devices?

Firmware updates

High Availability

First hop redundancy protocols (FHRPs) works by making more than 1 physical router to appear as if they were only a single logical one. Clients are presented a virtual router in which they interact with virtual MAC and IP. Hot Standby Router protocol (HSRP) - Cisco proprietary protocol that provides a redundant gateway for hosts on a local subnet, but this isn't a load-balanced solution. HSRP allows you to configure 2 or more routers into a standby group that shares an UP address and MAC address and provides a default gateway. When IP and MAC addresses are independent from the routers' physical addresses, they can swap control of an address if the current forwarding and active router fails. But there is actually a way you can sort of achieve load balancing with HSRP - by using multiple VLANs and designating a specific router for one VLAN, then an alternate router as active for VLAN via trunking Virtual Router Redundancy Protocol (VRRP) - Almost identical to HSRP.

If a frame is received on a switch port and the source MAC address is not in the forward/filter table, what will the switch do?

Flood the frame out all ports except the port it was received on

It will add the source MAC address to the forward/filter table

Frame is received on a switch port and the source MAC address is not in the forward/filter table what will the switch do

Address learning Loop avoidance Forward/filter decisions

Functions of layer 2 switching

H.323 (Video) (1720)

H.323 is a protocol that provides a standard for video on an IP network that defines how real-time audio, video, and data information is transmitted. This standard provides signaling, multimedia, and bandwidth control mechanisms. H.323 uses the RTP standard for communication.

HSRP >> Virtual MAC Address

HSRP MAC address has only one variable piece in it. The 1st 24 bits still identify the vendor who manufactured the device ( the organizationally unique identifier, or OUI). The next 16 bits in the address tells us that the MAC address is a well-known HSRP MAC address. Finally, the last 8 buts of the address are the hex representation of the HSRP group number. Example 0000.0c07.ac0a * The 1st 24 bits (0000.0c) are the vendor ID of the address; in the case of HSRP being a Cisco protocol, the ID is assigned to Cisco. * The next 16 bits (07.ac) are the well-known HSRP ID. This part of the address was assigned by Cisco in the protocol, so it's always easy to recognize that this address is for use with HSRP. * The last 8 bits (0a) are the only variable bits and represent the HSRP group number that you assign. In this case, the group number is 10 and converted to hex when placed in the MAC address, when it becomes the 0a that you see.

Ann, on her regular business trip connects to a hotel's wireless network to send emails to customers. Next day she notices that emails have been sent from her account without her consent. Which protocol is used to compromise her email password utilizing a network sniffer?

HTTP

Web proxy

Handles HTTP requests on behalf of the sending workstation

SMTP proxy

Handles Internet email and allows network virus protection software to scan inbound mail.

FTP proxy

Handles the files uploading and downloading from a server on behalf of a workstation.

What are the advantages of using a layer 2 switch over a hub?

Has more collision domains Prevents broadcast storms

Which of the following techniques helps in providing integrity to data transmissions crossing a network?

Hashing

Select the appropriate PDUs from the lists.

Here are the steps of data encapsulation : The Transport layer turns the data into segments and adds headers (Segment) The Network layer receives segments and converts them into packets and adds logical addressing (Packet) The Data Link layer receives packets and converts them into frames and adds physical source and destination addresses (Frame) The Physical layer receives frames and converts them into bits to be put on the network medium (Bits)

A disaster prone company has asked a network technician to keep the company's systems uptime running in the event of a disaster. Which of the following should the technician implement?

High Availability

A network administrator is setting up a web-based application that needs to be continually accessible to the end users. Which of the following concepts would best ensure this requirement?

High Availability

A disaster prone company has asked a network technician to keep the company's systems uptime running in the event of a disaster. Which of the following should the technician implement?

High availability

Why would a network administrator use plenum-rated cable during an installation?

High combustion temperature, reduces toxic gas released during a fire.

A crossover cable is used to connect all of the following except ___________________.

Host to switch; all devices that are pinned the same for transmit and receive require a crossover cable to communicate directly.

What layer in the IP stack is equivalent to the Transport layer of the OSI model?

Host-to-Host The four layers of the IP stack (also called the DoD model) are Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.

A network administrator has configured RIPv2 as the routing protocol for the company's network. What metric will be in use for deciding the best path to the network?

Hop count

Deny

How does an ACL treat any traffic type by default

A network technician in a company has to assist a security team that wants to capture all traffic on a single subnet between the router and the core switch. The team has to ensure that there are only a single collision and a broadcast domain between the router and the switch to collect the traffic easily. Which of the following should the technician install to best meet the goal?

Hub

A network technician is having an issue of loss in signal strength after a certain point in the company's local network infrastructure. There are more than one devices to which the same signal needs to be transmitted. Which of the following devices should the technician most likely use to resolve this problem?

Hub

Which of the following is a network device that is used to connect multiple devices without segmenting a network?

Hub

You want to inspect network traffic flowing through your TCP/IP network. Which of the following combinations of device and feature will you use to accomplish this? Each correct answer represents a complete solution. Choose two.

Hub, network sniffer Switch, network sniffer, port mirroring

What device is an example of an Ethernet technology implemented as a star topology?

Hub.

Why are switches better than hubs in your network by default? Because they break up broadcast commands by default Because each port on a switch is a broadcast domain Because each port on a switch is a collision domain Because all ports on a hub are broken into broadcast domains by default

Hubs create one collision domain and one broadcast domain. Switches break up collision domains but the network is one large broadcast domain by default.

If a router's memory buffer for receiving incoming datagrams is full, it will use:

ICMP to send out this message until the congestion abates

Which protocol dynamically reports errors to source hosts by using IP directly to build packets?

ICMP uses IP directly to build error-reporting packets that are transmitted back to the originating source host when issues arise during the delivery of data packets. ICMP is also used during Ping and some Traceroute operations.

A network technician has to implement a system that detects and reports attempts of unauthorized access to the network. What system should the network technician install?

IDS

WI-FI bluetooth wimax

IEEE has developed standards for wireless networking

802.11

IEEE standard describes a wireless LAN

802.1d 802.1w

IEEE versions of STP

Distance Vector Protocol

IGRP (Interior Gateway Routing Protocol) RIPv1 & 2 Passes complete routing table contents to neighboring routers

An organization on changing the ISP for its network has been assigned a new address range of 192.168.16.0/26. Which of the following represent the correct configuration of the gateway router if all communications to the Internet are possible without having any issue?

IP address - 192.168.16.1 Duplex - Auto Default gateway - 192.168.16.62

A network administrator wants a device that will actively defend the network by detecting threats and shutting down ports or changing configurations to prevent attacks. Which of the following devices will he use?

IPS

A network administrator wants a device that will actively defend the network by detecting threats and shutting down ports or changing configurations to prevent attacks. Which of the following devices will he use?

IPS (NOT IDS, because the system should also take action)

The Internet's supply of ___ addresses ran out in 2011.

IPv4

An IP address that contains 84a3 would be ___ a. IPv4 address b. IPv6 address c. corrupted address d. static address

IPv6 address

netstat -a

Identify the Command that yields the output displayed below

MTU

If a packet exceeds an interface's ________ size and its "don't fragment" bit is set, the router will drop the packet.

2

If an organization takes a full backup every Sunday morning and a daily differential backup each morning, what is the fewest number of backups that must be restored following a disaster on Friday?

MTBF (Mean Time Between Failures)

If the _________ for a network device is 2 years, you should be prepared to replace or rebuild the device every few years.

Lightweight Directory Access Protocol (389)

If you're the system administrator of any decent-sized network, odds are you have a type of directory in place that keeps track of all your network resources, such as devices and users. But how do you access those directories? Through the Lightweight Directory Access Protocol (LDAP), that's how. This protocol standardizes how you access directories, and its first and second inceptions are described in RFCs 1487 and 1777, respectively. There were a few glitches in those two earlier versions, so a third version-the one most commonly used today-was created to address those issues and is described in RFC 3377.

WPA2 Enterprise

In addition to encrypting wireless traffic, you configure your wireless router to require connecting users to authenticate against a RADIUS server. What type of security have you configured?

You connect your host to a switch that is running network analyses software. However, you are not seeing any packets from the server. What do you need to implement on the switch to see all the packet information? VLANs STP Port Mirroring Authentication

In order to see all frames that pass through the switch and read the packets with a network analyzer, you need to enable port mirroring on the port your diagnostic host is plugged into.

A network technician has recently installed a new wireless access point on the company's wireless network. All the settings for the new access point were copied from the baseline. Due to this change, the network technician is getting reports from the sales department that they are having irregular wireless connectivity, while other departments are having no such problem. What can be the possible cause of this issue?

Incorrect AP placement

The hosts on a company's network are unable to access the Internet. The IP range assigned to the company by the ISP is 192.168.132.0/27. The network administrator checks the company's gateway router and found its configuration as follows: IP address: 192.168.132.0 Subnet Mask: 255.255.255.224 Default gateway: 192.168.132.32 Duplex: Auto State: No shutdown Which of the following can be the reasons for this issue?

Incorrect IP address Incorrect default gateway

Ann, a user on a company's network, is not able to access the shared printer and other resources. However, she can reach the Internet. Other users are not having any such problem. What can be the cause of this issue?

Incorrect VLAN assignment

Internet Group Management Protocol

Internet Group Management Protocol (IGMP) is the TCP/IP protocol used for managing IP multicast sessions. It accomplishes this by sending out unique IGMP messages over the network to reveal the multicast-group landscape and to find out which hosts belong to which multicast group. The host machines in an IP network also use IGMP messages to become members of a group and to quit the group, too. IGMP messages come in seriously handy for tracking group memberships as well as active multicast streams. IGMP works at the Network layer and doesn't use port numbers, same as our next one: SLIP.

Internet Message Access Protocol, Version 4 (143)

Internet Message Access Protocol (IMAP) is more used than POP3 because you get control over how you download your mail, with it, you also gain some much-needed security. It lets you peek at the message header or download just a part of a message. With it, you can choose to store messages on the email server hierarchically and link to documents and user groups, too. IMAP even gives you search commands to use to hunt for messages based on their subject, header, or content. As you can imagine, it has some serious authentication features-it actually supports the Kerberos authentication scheme that MIT developed. And yes, IMAP4 is the current version.

Drag the Internet layer protocols to match them with their descriptions.

Internet Protocol (IP) ==> Receives segments from the Host-to-Host layer and fragments them into packets. ICMP (Internet Control Message Protocol) ==> Provides host with information about network problems. ARP (Address Resolution Protocol) ==> Finds the hardware address of a host from a known IP address. RARP (Reverse Address Resolution Protocol) ==> Discovers the identity of the IP address for diskless machines by sending out a packet that includes its MAC address and a request for the IP address assigned to that MAC address.

What is the result of segmenting a network with a bridge (switch)? (Choose two.) It increases the number of collision domains. It decreases the number of collision domains. It increases the number of broadcast domains. It decreases the number of broadcast domains. It makes smaller collision domains. It makes larger collision domains.

It increases the number of collision domains. It makes smaller collision domains. Bridges break up collision domains, which would increase the number of collision domains in a network and also make smaller collision domains.

What term defines a variation in the delay of packets in the network?

Jitter

A company has just implemented VoIP. The users are complaining about call chopping and call dropping. Which of the following issues are likely to be the cause of these problems?

Jitter Packet drop

A network administrator wants to allow increased throughput over an FCoE network. Which of the following Ethernet features will allow this as long as all network devices recognize its specific size?

Jumbo frame

Link State Routing Protocols >> Intermediate System-to-Intermediate System (IS-IS)

L1 - Level 1 intermediate systems route within an area. When the destination is outside an area, they route toward a Level 2 system. L2 - Level 2 intermediate systems route between areas and toward other AS's. IS-IS uses Dijkstra's algorithms to discover shortest path. It uses Connectionless Network Service (CLNS) to provide connectionless delivery of data packets between routers, and it also doesn't require an area 0 like OSPF does. An advantage to having CLNS around is that is can easily send information about multiple routed protocols (IP and IPv6). OSPF must maintain a completely different routing database for IP and IPv6, respectively, for it to be able to send updates for both protocols. IS-IS is preferred by ISPs because of its ability to run IP and IPv6 without creating a separate database for each protocol as OSPF does.

A network administrator has configured a VLAN across multiple switches. The connections between switches have to be made such that they provide increased bandwidth and prevent a single point of failure. Which of the following should the network administrator configure?

LACP

A university that offers wireless Internet access to students in classrooms is operating what type of network? a. PAN b. LAN c. IoT d. WAN

LAN

What is a logical grouping of network users and resources called?

LAN: a logical grouping of hosts grouped by connecting to a switch.

What is an example of a LAN?

LANS generally have a geographic scope of a single building or smaller. Range from two hosts to thousands.

At which layer of OSI is the Frame Check Sequence for error detection performed?

Layer 2

A network technician has to perform maintenance on many of the company's web servers during a scheduled change window. This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?

Load balancer

A company has three servers with the same application hosted on them. Users can download the application from any of these three servers. However, the network technician is asked to find a design where the traffic is shared between the three servers to provide greater throughput and reliability. Which of the following should the network technician implement?

Load balancing

A network technician in a company is troubleshooting an issue with a new T1 connection. While diagnosing the issue, he confirms that the router is configured, the cable is connected, but the T1 is down. Which of the following tools should the network technician use to verify the configuration of the router?

Loopback adapter

What are the effects of having a CSMA/CD network that has sustained heavy collisions?

Low throughput Delay Congestion

Switches/bridges use what type of addresses to segment a LAN?

MAC

Which of the following transmission methods is used for the network using the 802.3 standard?

MAC

Which of the following transmission methods is used for the network using the 802.3 standard?

MAC All other answers are incorrect. These are the transmission methods used for WLANs and are governed using the IEEE 802.11 standards.

In addition to an IP address, devices on a LAN have a physical ___ address that uniquely identifies them

MAC, media access control

A network technician while troubleshooting a Layer 1 issue finds that two switches connected through a straight-through cable are unable to communicate. What can be the possible cause of this issue?

MDIX is enabled on both the switches

A network technician is troubleshooting a company's network that is experiencing very slow network speeds of 54 Mbps. After assessing the existing wireless network, he recommended an 802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?

MIMO

Mark, a network administrator, is in the process of cleaning network equipment for resale. Accidently, he splashes the cleaning agent in his eye and needs to know the procedure of cleansing his eye. Which of the following should he quickly refer to?

MSDS

`What term defines a variation in the delay of packets in the network?

MTRJ

Which of the following should a technician configure to allow jumbo frames on a network?

MTU

Which of the following is required to be configured on a network to allow jumbo frames?

MTU (Maximum Transmission Unit)

Which of the following are characteristics of jumbo frames?

MTU > 1500 Used in SAN Improve network performance

deletes an arp entry from arp cache: -d displays both IP and MAC addresses and whether they are static or dynamic: -a adds a static address to the arp table: -s

Match the arp parameters with the statements that best describe them deletes an arp entry from arp cache: __________ displays both IP and MAC addresses and whether they are static or dynamic: __________ adds a static address to the arp table: __________

uses a single AP between wireless devices so it operates in infrastructure mode--BSS uses more than one AP between wireless devices to allow wireless roaming--ESS does not use an AP between wireless devices so it operates in ad hoc fashion--IBSS

Match the WLAN configurations with the statements that best describe them uses a single AP between wireless devices so it operates in infrastructure mode--_________ uses more than one AP between wireless devices to allow wireless roaming--_________ does not use an AP between wireless devices so it operates in ad hoc fashion--_________

achieved through packet dropping when queue fills up--congestion avoidance requires addition of a value to the packet header and devices that receive the packet look at this field--marking applied to inbound and outbound traffic and enforces a configured traffic rate--policing determines category of traffic to which packets of frames belong--classification used on outbound traffic and is intended to "smooth out" traffic--shaping

Match the QoS mechanisms with the statements that BEST describe them. achieved through packet dropping when queue fills up--___________ requires addition of a value to the packet header and devices that receive the packet look at this field--___________ applied to inbound and outbound traffic and enforces a configured traffic rate--___________ determines category of traffic to which packets of frames belong--___________ used on outbound traffic and is intended to "smooth out" traffic--___________

does not perform reordering of packets but uses FIFO approach--Best Effort differentiates between traffic flows and assigns policies to those traffic flows--DiffServ makes a strict bandwidth reservation for an application--IntServ

Match the QoS traffic mechanisms with the statements that BEST describe them. does not perform reordering of packets but uses FIFO approach--_________ differentiates between traffic flows and assigns policies to those traffic flows--_________ makes a strict bandwidth reservation for an application--_________

establishes a secure connection that can be initiated using a browser--SSL VPN ensures secure authentication, integrity, and confidentiality--IPSec establishes a secure connection to a network site using network management software on a client system--Client-to-site VPN

Match the VPN concepts with the statements that BEST describe them establishes a secure connection that can be initiated using a browser--__________ ensures secure authentication, integrity, and confidentiality--__________ establishes a secure connection to a network site using network management software on a client system--__________

displays active connections and the TCP/UDP ports on which the computer is listening-- /a displays the contents of an IP routing table-- /r displays the names of applications that are accessing the network-- /b

Match the netstat parameters with the statements that best describe them displays active connections and the TCP/UDP ports on which the computer is listening--_______ displays the contents of an IP routing table--_______ displays the names of applications that are accessing the network--_______

determines the number of new and unique passwords associated with a user account before an old password can be reused--Password history prevents users from repeatedly changing their passwords and getting back to their original and preferred password--Minimum password age prevents hackers from using cracked passwords and gaining permanent access to a system--maximum password age

Match the password policy settings with the statements that best describe them determines the number of new and unique passwords associated with a user account before an old password can be reused--__________________ prevents users from repeatedly changing their passwords and getting back to their original and preferred password--__________________ prevents hackers from using cracked passwords and gaining permanent access to a system--__________________

detective security control in which the location of network objects can be tracked--Asset Tags detective security control--Video Surveillance preventative security control once reserved for the most sophisticated of environments--Biometrics preventative security control that aids security by forcing a user to possess something--Smart Cards

Match the physical security methods with the statements that best describe them detective security control in which the location of network objects can be tracked--______________ detective security control--______________ preventative security control once reserved for the most sophisticated of environments--______________ preventative security control that aids security by forcing a user to possess something--______________

You are upgrading wireless access points in your company. Your manager has asked that you purchase equipment that will increase wireless transmission speeds.--MIMO You are a network infrastructure technician for a university. Your colleague is tweaking wireless connectivity between two buildings on campus and needs a way to cover the long distance between the two buildings.--Directional Antenna To adhere to corporate security policies and needs, you must ensure that authenticated Wi-Fi devices can access corporate network resources--wireless VPN

Match the security term with the correct use case scenario You are upgrading wireless access points in your company. Your manager has asked that you purchase equipment that will increase wireless transmission speeds.--__________ You are a network infrastructure technician for a university. Your colleague is tweaking wireless connectivity between two buildings on campus and needs a way to cover the long distance between the two buildings.--__________ To adhere to corporate security policies and needs, you must ensure that authenticated Wi-Fi devices can access corporate network resources--__________

occurs due to errors in transmission or network congestion--Drops uneven arrival of packets--jitter measure of the amount of time it takes for data to move from one endpoint to another--delay

Match the transmission quality issues with the statements that BEST describe them. occurs due to errors in transmission or network congestion--___________ uneven arrival of packets--___________ measure of the amount of time it takes for data to move from one endpoint to another--___________

A network technician has recently installed a new router on the company's wireless network. The users connected to the new access point on the inside network can communicate with each other and utilize the network printer also. But they are not able to connect to the Internet. What can be the most likely cause of the issue?

Misconfigured default gateway

In a computer lab, a network technician while troubleshooting a connectivity issue founds that some computers are unable to connect to the Internet. However, they can ping each other. Which of the following is the most likely cause of the issue?

Misconfigured default gateway

Users on a network are reporting issues of intermittent connectivity and missing communication while connecting to a remote network. What can be the possible cause of this issue?

Mismatched MTU

Users on a network are reporting issues of intermittent connectivity and missing communication while connecting to a remote network. What can be the possible cause of this issue?

Mismatched MTU (Maximum Transmission Unit)

Which type of WAN technology uses labels, which enables priority of voice through the network?

MultiProtocol Label Switching.

A user is experiencing an issue in his media device that is unable to stream media to the LAN. The device is visible on the network and all PCs on the LAN can ping the device. All firewalls are turned off. Which of the following TCP/IP technologies is not implemented properly?

Multicast

What common WAN topology often results in multiple connections to a single site (leading to ahigh degree of fault tolerance) and has one-to-many connections?

Multiprotocol Label Switching (MPLS).

You need to make sure that the time is consistent across all your network devices. What protocol do you need to run on your network?

NTP Network Time Protocol will ensure a consistent time across network devices on the network.

EIGRP Tables

Neighbor Table-IP - Contains *Next Hop Router* and *Interface* >> Topology Table-IP - Contains *Destination 1, Destination 1* and *Successor* and *Feasible Successor* >> Routing Table-IP - Contains *Destination 1* and *Successor*

Which protocol only works in upper layers of an OSI model?

NetBIOS

Users on a network are unable to connect to the Internet though the default gateway is working fine. Users are also able to ping each other. Which of the following OSI layers' problem is being addressed?

Network

NetBIOS (137-139)

Network Basic Input/Output System works only in the upper layers of the OSI model and allows for an interface on separate computers to communicate over a network. It was first created in the early 1980s to work on an IBM LAN and was proprietary. Microsoft and Novel both created a NetBIOS implementation to allows their hosts to communicate to their servers, but Microsoft's version became the de facto version. Server Message Block (SMB) can run on UDP port 137 and 138, and TCP port 137 and 139 using NetBIOS.

Which of the following are common optical carrier levels (OC-x)?

OC-1 OC-192 OC-12

Which of the following WAN protocols provides bandwidth of 622 Mbps?

OC-12

Which of the following circuits has the highest possible bit rate?

OC-12

As part of a transition from a static to a dynamic routing protocol on an organization's internal network, the routing protocol must support IPv4 and VLSM. Based on these requirements, which of the following should the network administrator use?

OSPF IS-IS

Which two routing protocols use bandwidth in their calculation of metric by default?

OSPF EIGRP (NOT BGP)

Link State

OSPF IS-IS creates 3 tables for each router

Link State Routing Protocols

OSPF and IS-IS are 2 examples. For a protocol to be a classless protocol, the subnet mask information must be carried with the routing update so routers can identify the best path. All neighbor routers know the cost of the network route that's being advertised. Link state routing maintains 2 other tables other than routing table. The 1st table is the neighbor table. It is maintained through hello packets by all routers to determine which other routers are available to exchange routing data with. All routers can share routing data are stored in the neighbor table. The 2nd table is the topology table, which is built and sustained through the use of link state advertisements or packets (LSAs or LSPs). In the topology table you'll find a listing for every destination network plus every neighbor (route) through which it can be reached. Essentially, it's a map of the entire internetwork. Once all of that raw data is shared and each one of the routers has the data in its topology table, the routing protocol runs the Shortest Path First (SFP) algorithm to compare it all and determine the best paths to each of the destination networks.

A company is unable to provide network connectivity to its remote site. The two sites are connected using fiber- optic cabling. A network technician determines that the issue is due to a break in the cable. Which of the following tools should the network technician use to exactly identify the point of break in a fiber-optic cable?

OTDR

A technician is troubleshooting a point-to-point fiber-optic connection at a remote site of a company that has no connectivity to the main site. The technician verifies that the switch and the send-and-receive light levels are within an acceptable range. Also, both fiber SFPs are confirmed as working. Which of the following should the technician use to reveal the location of the fault?

OTDR

A network administrator needs to disable active services running on the company's network. Which of the following tools will be most helpful in identifying these services?

Port scanner

Here's how to create a remote access VPN connection:

Open Network and Sharing Center. show steps × Here are two ways to open Network and Sharing Center: In the notification area of the taskbar, click the Network icon and click Open Network and Sharing Center. Click Start > Control Panel > Network and Internet > Network and Sharing Center. Set up a new connection by connecting to a workplace. show steps × Click Set up a new connection or network to choose a connection option. Select Connect to a workplace, and click Next to advance to the next step. Verify that "No, create a new connection" is selected, and click Next to advance to the next step. Provide the Internet address and destination name to connect to the workplace. show steps × Click Use my Internet connection (VPN) to connect to the workplace. Type 158.56.0.0 as the Internet address, UC_Demo_VPN as the destination name Check Don't connect now; just set it up so I can connect later, and click Next to advance to the next step. Type uCertify as the user name, p@$$w0rd as password, and click Create. Close all the windows.

Link State Routing Protocols >> Open Shortest Path First (OSPF)

Open Shortest Path First (OSPF) is an open standard routing protocol. It works by using Dijkstra algorithm. 1st, a shortest-path tree is constructed, and then the routing table is populated with the resulting best paths. OSPF converges quickly (not as fast as EIGRP), and it supports multiple, equal-cost routes to the same destination. Like EIGRP, it supports both IP and IPv6 routed protocols, but OSPF must maintain a separate database and routing table for each IP and IPv6. OSPF provides the following features: * Consists of areas and autonomous systems * Minimizes routing update traffic * Allows scalability * Supports VLSM/CIDR * Has unlimited hop count * Allows multi-vendor deployment (open standard) * Uses a loopback (logical) interface to keep the network stable One of OSPF's most noteworthy features is that after a network change, such as when a link changes to up or down, OSPF converges with serious speed. Convergence refers to when all routers have been successfully updated with the change. OSPF is supposed to be designed in a hierarchical fashion, which means you can separate the larger internetwork into smaller internetworks called areas. The reason you want to create OSPF in a hierarchical design: * To decrease routing overhead * To speed up convergence * To confine network instability to single areas of the network OSPF must have an area 0, and all other areas should connect to this area. ROuters that connect other areas to the backbone area within an AS are called area border routers (ABRs). Still, at least one interface of the ABR must be in area 0. The router that connects multiple AS's is called an autonomous system border router (ASBR). Typically, in today's networks, BGP is used to connects between AS's not OSPF.

OSPF

Open Shortest Path First link state routing protocol provides the fastest convergence of the routing information and that uses a metric cost based on the link speed between two routers

Here's how to configure Windows firewall settings

Open Windows Firewall and change notification settings. show steps × Click Start > Control Panel, then click System and Security > Windows Firewall. In the left pane, click Change notification settings. Turn on Windows Firewall to notify you when it blocks a new program. show steps × In both the private and public network location settings, select Turn on Windows Firewall. Under both the private and public network location settings, check Notify me when Windows Firewall blocks a new program, and click OK. Customize logging settings for the domain profile tab and verify that the size limit is 4096 KB. show steps × In the left pane, click Advanced settings to open the "Windows Firewall with Advanced Security" window. In the Overview pane, under "Public Profile is Active", click Windows Firewall Properties to display the Profile tabs. On the Domain Profile tab, under Logging, click Customize to open the "Customize Logging Settings for the Domain Profile" window. Verify that the file size is 4096 KB, and click OK twice to exit the properties. Close all the windows.

How to configure SSID

Open the dlink website. show steps × On the taskbar, click the Internet Explorer icon to open it. In the address bar, type http://support.dlink.com/emulators/dir655/133NA/login.html and press Enter. Login to the router's settings and navigate to the wireless settings. show steps × Click Log in to login to the router's settings. On the menu bar, click SETUP. In the left pane, click WIRELESS SETTINGS to open the settings. Configure the wireless settings. show steps × Scroll down and click Manual Wireless Network Setup to configure the wireless settings for your D-Link Router manually. Type ucertify_net as Wireless Network Name, and from the 802.11 Mode list, select 802.11n only. Clear Enable Auto Channel Scan that enables the Wireless Channel list; from the Wireless Channel list, select 2.462 GHz - CH 11. From the Channel Width list, select Auto 20/40 MHz; at the bottom, from the Security Mode list, select WPA-Personal to protect your privacy. To achieve better wireless performance, in the WPA section, from the WPA Mode list, select WPA2 Only, and from the Cipher Type list, select AES. Type P@$$w0rd as Pre-Shared Key. This is the pass-phrase that clients need to enter to connect to the WLAN. Save settings and then reboot later. show steps × Scroll up and click Save Settings. After the changes are saved, click Reboot Later. Select Invisible for Visibility Status, so that no new connections are allowed to the WAP unless the person knows the SSID name. Close Internet Explorer.

NESSUS

Operates by performing a port scan

A network technician is receiving complaints from the management board that they are unable to do meetings from the conference room. The network is too slow and there are frequent disconnections. The network technician finds that the conference room and cafeteria are located on either side of a single hallway where there is only one access point. He also observers that there are large number of people in the cafeteria. Which of the following best describes the cause of this issue?

Overcapacity

Which of the following is a cloud delivery model where a cloud provider grants an environment for constructing applications that will run from the client's environment?

PaaS

The DoD model: Host-to-Host layer

Parallels the functions of the OSI's Transport layer, defining protocols for setting up the level of transmission service for applications. It tackles issues such as creating reliable end-to-end communication and ensuring the error-free delivery of data. It handles packet sequencing and maintains data integrity.

In a TCP/IP-based network, you have installed two WAPs (wireless access points). Which of the following documents will you update?

Physical network diagram

Ann, a network technician is replacing the existing cables in her company's remote location. She has to re-install a new cabling solution that will have 10 Gbps speed and can also be run between the structural and drop-down ceilings providing safety in case of fires. Which of the following will best meet this requirement?

Plenum, Cat 6a

A network technician is configuring a managed switch. Which of the following should he enable so that he can enable 802.3af?

PoE

A network technician has recently replaced a hub with a switch in the network. He hasn't changed the port on which the network sniffer was attached. As a result of this, he is unable to view traffic passing through other ports. What can be the solution to solve the problem?

Port mirroring

The TCP/IP protocol suite uses ____ to identify for which service a certain packet is destined.

Port numbers

Learning

Port populates the MAC address table but doesn't forward data frames

Listening

Port prepares to forward data frames without populating the MAC address table

The Chief Information Officer (CIO) has noticed that the corporate wireless signal is available in the parking lot. Management requests the network administrator to change the wireless network so that it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should the network administrator change on the network?

Power levels

You need to power a device, such as an access point or IP phone. What protocol can provide power to these devices over an Ethernet cable?

Power over Ethernet (PoE)

RADIUS

Protocols is an industry standard providing centralization of AAA for all remote access clients and wired hosts user client server authentication software system combines user authentication and authorization into one central database and maintains user profiles

SMTP

Protocols will you allow in the firewall to enable users to send emails to the internet

A network technician has to provide a firmware update for one of the company's products to the clients. The clients before downloading want to make sure that the file does not contain any kind of virus. What should the technician do to provide a proper validating method to the clients?

Provide a hash digest along with the file.

Ann, a network technician, has set up an FTP server for a company to distribute software updates for the company's products. For security reasons, each customer is provided with a unique username and password. Several customers have discovered a virus in one of the security updates. The network technician tested all files before uploading them but on retesting the file, found the virus. Which of the following could the technician do for the customers to validate the proper security patch?

Provide an MD5 hash for each file.

VRRP

Provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts

A network administrator wants to block the availability to nonwork-type websites. Which type of server should the network administrator use for this purpose?

Proxy server

Identify the Problem Establish a Theory Test the Theory Establish a Plan of Action Verify Full System Functionality Document Findings, Actions, and Outcomes

Put the steps of the Troubleshooting Theory in order Identify the Problem Establish a Theory Test the Theory Establish a Plan of Action Verify Full System Functionality Document Findings, Actions, and Outcomes

A network administrator wants to have a centralized server to manage credentials for all network devices on the company's network. Which of the following types of servers are the most likely to be used?

RADIUS TACACS+

On which of the following types of cabling is an F-connector used?

RG-6

In which of the following coaxial cables is implementation of Ethernet not applicable?

RG-6 RG-59

Which RG rating of coax is used for cable modems?

RG-6.

Which of the following is a routing protocol used for the devices operating at the Layer 3 of the OSI model?

RIP

Which of the following protocols is used by a device operating at Layer 3 of the OSI model to determine the path to a different network?

RIP

Which routing protocol uses only hop count as a metric?

RIP

Update RIP to OSPF using link state

RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP has to converge. Which can you implement to improve convergence on the network

What does RIP use for a metric?

RIP is not a sophisticated routing protocol. It does not consider bandwidth when it is using its metric. The metric is a simple hop count. OSPF uses cost, which is based on bandwidth. EIGRP uses a composite metric using bandwidth and delay by default.

Routing protocols

RIP, RIPv2, and EIGRP are all examples of

RTP (VoIP) (5004/5005)

Real-time Transport Protocol (RTP) describes a packet-formatting standard for delivering audio and video over the Internet. Although initially designed as a multicast protocol, it's now used for unicast applications, too. Commonly employed for streaming media, videoconferencing, and push-to-talk systems-all things that make it a de facto standard in Voice over IP (VoIP) industries.

Remote Desktop Protocol (3389)

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft. It allows you to connect to another computer and run programs. RDP operates somewhat like Telnet, except instead of getting a command-line prompt as you do with Telnet, you get the actual graphical user interface (GUI) of the remote computer. Clients exist for most versions of Windows, and Macs now come with a preinstalled RDP client. Microsoft currently calls its official RDP server software Remote Desktop Services; it was called Terminal Services for a while. Microsoft's official client software is currently referred to as Remote Desktop Connection, which was called Terminal Services Client in the past. RDP is an excellent tool for remote clients, allowing them to connect to their work computer from home, for example, and get their email or perform work on other applications without running or installing any of the software on their home computer.

A network administrator on vacation was asked by the management to come online for few minutes to complete some documentation work. The network administrator tried to log into the corporate server from his hotel room, but the login prompt was not appearing. Which of the following policies is making this constraint?

Remote access policy

A company is setting up a VoIP network. Which of the following protocols are likely to be used?

SIP and RTP (Session initiation protocol and Real-time Transmission Protocol)

In a small office, the Internet connection drops out about two times a week. A vendor does come out and fixes the issue, but it almost takes a day. Which of the following should the office implement to reduce this downtime?

SLA

Which of the following protocols is used by email servers to exchange messages with one another?

SMTP SMTP is used by a client to send mail to its server and by that server to send mail to another server. POP3 and IMAP are used by clients to retrieve their mail from the server that stores it until it is retrieved. HTTP is only used with web-based mail services.

Simple Mail Transfer Protocol (25)

Simple Mail Transfer Protocol (SMTP), answering our ubiquitous call to email, uses a spooled, or queued, method of mail delivery. Once a message has been sent to a destination, the message is spooled to a device-usually a disk. The server software at the destination posts a vigil, regularly checking the queue for messages. When it detects them, it proceeds to deliver them to their destination. SMTP is used to send mail; POP3 is used to receive mail.

You need a protocol that will help you simplify the process of setting up a network and administering it. Which of the following will you use?

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (161)

Simple Network Management Protocol (SNMP) collects and manipulates valuable network information. It gathers data by polling the devices on the network from a management station at fixed or random intervals, requiring them to disclose certain information. When all is well, SNMP receives something called a baseline-a report delimiting the operational traits of a healthy network. This protocol can also stand as a watchdog over the network, quickly notifying managers of any sudden turn of events. The network watchdogs are called agents, and when aberrations occur, agents send an alert called a trap to the management station. In addition, SNMP can help simplify the process of setting up a network as well as the administration of your entire internetwork.

Which provides the longest cable run distance?

Single-mode fiber.

A company wants to implement an 802.11n wireless network for one of its newly opened office. A network engineer has been asked to conduct an assessment and estimate the number of WAPs needed for the network. Which of the following should the network engineer refer to before making the estimate?

Site survey

Why are there recommended upload speeds only for Skype? a. Skype doesn't use uploads b. Skype requires 2way communication, whereas the other services use most of the bandwidth only for downloads c. Skype is the slowest service of those listed d. Amazon, YouTube, and Netflix offer different levels of service, so the upload speed cannot be specified

Skype requires 2way communication, whereas the other services use most of the bandwidth only for downloads

A company's authentication servers perform two-factor authentication before allowing anyone onto the company's network. However, due to security concern, the management has decided to add one more authentication factor to the authentication servers that will authenticate users on the basis of what they have. Which of the following is an example of this factor?

Smart card

Which of the following combinations will form a two-factor authentication process?

Smart card, PIN

A hospital has installed CCTVs on all the entrance and hallways to monitor the people entering and leaving the facility. The camera feeds go to the surveillance room where security personnel monitor the activities. One of the security personnel notices a man wearing a doctor's lab coat whose identity cannot be verified by looking through the video feed. The man is seeing interacting and mobilizing other people around him. What kind of attack is the security personnel witnessing?

Social engineering

Which of the following technologies allows for redundant links within a Layer 2 segment?

Spanning Tree

What is used at Layer 2 to prevent switching loops?

Spanning Tree Protocol (STP)

A network technician while troubleshooting a Layer 2 issue finds that two switches supporting MDIX and connected through a crossover cable are unable to communicate. What can be the possible cause of this issue?

Speed Mismatch The two switches are unable to communicate due to a speed mismatch. Mismatched parameters between devices like incorrect MDIX settings or speed mismatch can result in no communication.

A network technician while troubleshooting a Layer 2 issue finds that two switches supporting MDIX and connected through a crossover cable are unable to communicate. What can be the possible cause of this issue?

Speed mismatch

Which of the following are networking concepts designed to prevent routing loops? Each correct answer represents a complete solution. Choose all that apply.

Split horizon Poison reverse

Which of the following are networking concepts designed to prevent routing loops?

Split horizon Poison reverse

Fraggle

Spoofed UDP packets are sent to a networks broadcast address

Discovery

Stage of PPPoE are the MAC addresses of each of the endpoints of the connection given to each other so that a PPP connection can be made

A network administrator has been performing a scheduled maintenance of a network on a weekly basis. He wants to have all the steps documented so that it helps any other network technician in future. Which of the following should be updated to achieve this goal?

Standard operating procedure

Host A sends a frame to Host B. The switch receives the frame on the EO/O interface and places the source address in the MAC address table The frame is forwarded out all interfaces except the source port Host B receives the frame and responds to Host A Host A and Host B can now make a point to point connection

Steps of forward/filter table

switch antenna types from omnidirectional to directional

Study the image below. The image shows a WLAN antenna radiation pattern in the vertical and horizontal direction. Your network has experienced recent unauthorized traffic and you suspect the attacks are coming from hackers just outside the walls of your organization's building. What can be done to prevent additional network attacks?

active-active NIC teaming

Study the image below. What redundancy technique is illustrated in the picture?

the user would be unable to browse the Internet using domain names

Study the image below. What would be the result of the issue identified by the Windows Network Diagnostics troubleshooter?

A network technician is setting up a DHCP server on a LAN segment. Which of the following options should the technician configure in the DHCP scope to allow hosts, on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers?

Subnet mask DNS server Default gateway

RIPv2

Supports discontiguous networks and VLSM Periodic multicast default administrative distance of 120

Kerberos

Supports mutual authentication between a client and a server

In the modern LAN, what type of device is typically used at the center of a star topology?

Switch

Which of the following devices must be used to have full duplex communication between two host devices?

Switch

Which of the following devices operate at the Data Link layer of the Open Systems Interconnection (OSI) model?

Switch Bridge

A company has provided kiosks to employees within the organization boundaries. However, some of the kiosks are in close proximity with a shopping center. The management is concerned about someone accessing the Internet via the kiosk's wireless network. The network technician has been asked to implement a solution that will provide wireless access only to the employees working at the kiosk. Which of the following should the network technician implement?

Switch port security

You want to inspect network traffic flowing through your TCP/IP network. Which of the following combinations of device and feature will you use to accomplish this?

Switch, network sniffer, port mirroring Hub, network sniffer

You have multiple departments all connected to switches, with cross‐over cables connecting the switches together. However, response time on the network is still very slow because you have upgraded from hubs to switches. What technology should you implement to improve response time on the networks? STP VLANs Convergence OSPF

Switches break up collision domains by default, but the network is still one large broadcast domain. In order to break up broadcast domains in a Layer 2 switched network, you need to create Virtual LANs.

Which of the following statements is true? A switch creates a single collision domain and a single broadcast domain. A router creates a single collision domain. A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain. A switch creates a single collision domain and separate broadcast domains. A router provides a separate broadcast domain as well. A switch creates separate collision domains and separate broadcast domains. A router provides separate collision domains.

Switches break up collision domains, and routers break up broadcast domains.

What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table? Forwards the switch to the first available link Drops the frame Floods the network with the frame looking for the device Sends back a message to the originating station asking for a name resolution

Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device.

Which of the following digital circuits is composed of 24 DS0s?

T1

Which of the following leased line has a maximum data rate of 1.544Mbps?

T1

Which WAN technology transfers at a rate of 44.7 Mbps?

T3

Which data transport protocol includes robust error-checking? a. TCP b. UDP c. ARPANET d. Circuit switching

TCP

___ and UDP are two of the main protocols used to transport data over the Internet.

TCP

You need to check the speed and condition of the signal on a copper cable. Which device should you use?

TDR

Which of the following Application layer protocols is not connection-oriented?

TFTP

Which of the following protocols is used for transferring files with a remote host in a non-secure fashion and without requiring user credentials?

TFTP (Trivial File Transfer Protocol)

Which of the following statements are true about UDP?

TFTP uses a UDP port for communication UDP is an unreliable protocol UDP is a connectionless protocol

Which of the following TCP/IP protocols are used at the Application layer of the OSI model? (Choose three.)

Telnet FTP TFTP

Telnet (23)

Telnet is the chameleon of protocols-its specialty is terminal emulation. It allows a user on a remote client machine, called the Telnet client, to access the resources of another machine, the Telnet server. Telnet achieves this by pulling a fast one on the Telnet server and making the client machine appear as though it were a terminal directly attached to the local network. This projection is actually a software shell-a virtual terminal that can interact with the chosen remote host. Users begin a Telnet session by running the Telnet client software and then logging into the Telnet server. Telnet offers no security or encryption and is replaced by Secure Shell (SSH) when security across the remote-configuration session is needed or desired.

logic bomb

The Michelangelo virus would overwrite the first 100 hard disk sectors with null data each year on March 6, the date of the artist's birthday. This type of virus is known as a ____________.

Frames

The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer. What is the encapsulation named at each layer?

- tracert - ping

The PathPing tool in Windows combines features from which of the following two commands? Select one or more: - tracert - netstat - route - ping

Which of the following is a Layer 2 protocol used to maintain a loop‐free network? VTP STP RIP CDP

The Spanning Tree Protocol is used to stop switching loops in a switched network with redundant paths.

You work as a network administrator for SoftTech Inc. The company has a Windows 2000-based Active Directory network. All users in the network have Windows XP Professional computers. You have installed DHCP on the network to automatically assign IP addresses to client computers. You install a new computer for a new user Alice. She complains that she is unable to access the network resources. You run IPCONFIG on her computer and receive the following IP configuration information: IP address 169.254.75.182 Subnet Mask 255.255.0.0 Default Gateway NA Other users are not facing the same problem. What is the most likely cause?

The computer is not able to connect to the DHCP server.

The DoD model: Network Access layer

The equivalent of the Data Link and Physical layers of the OSI model, the Network Access layer oversees hardware addressing and defines protocols for the physical transmission of data. Monitors the data exchange between the host and the network.

implement STP

The following image represents a layer 2 networking issue. What can be done to prevent this issue? (Circle of switches)

DHCP exhaustion and as a result create a denial of service

The following is a script that is initiated by a network attack tool. What is the goal of this tool?

A router will not send a broadcast looking for the remote network-the router will discard the packet.

The router receives a packet for a network that is not listed in the routing table

The purpose of the demarcation point is to separate the customer from whom?

The service provider.

You need to connect three access points running the 802.11b/g frequency range into the same office area. In which channel should you place these access points?

The three APs should be in different channels: 1, 6, and 11.

Access Trunk

The types of ports that can be found on a switch are

You work as network administrator for Tech Perfect Inc. The company has a TCP/IP-based network. The network is configured on the ring topology. What will happen if a cable break occurs?

The whole network will collapse.

Classes Of Routing Protocols

There are 3 mentioned but there are more Distance Vector - Finds best path to a remote network distance. Each time a packet goes through a router, it equals a hop. The route with the fewest hops to the destination network will be chosen as the best path. The vector indicates the direction to the remote network. RIP, RIPv2 and Interior Gateway Routing Protocol (IGRP) are distance vector routing protocols. These protocols send the entire routing table to all directly connected neighbors. Link State - also known as shortest path 1st protocols. The routers each create 3 seperate tables. 1 of these tables keeps track of directly attached neighbors, 1 determines the topology of the internetwork, and 1 is used as the actual routing table. Link state routers know more about the internetwork than any distance vector routing protocol. OSPF and IS-IS are IP routing protocols that are completely link state. Link state protocols send updates containing the state of their own links to all other routers on the network. Hybrid - uses aspects of both distance vector and link state. EIGRP, BGP (when used as iBGP but commonly used as an EGP) .

Which of the following allows a server to distinguish among different simultaneous requests from the same host?

They use different port numbers.

Which statements are true regarding ICMP packets? (Choose two.)

They can provide hosts with information about network problems. They are encapsulated within IP datagrams. Internet Control Message Protocol (ICMP) is used to send error messages through the network, but ICMP does not work alone. Every segment or ICMP payload must be encapsulated within an IP datagram (or packet).

Routing Convergence time

Time required by Protocols to update their forwarding tables after changes have occured

In an organization, many users are reporting that they are unable to access the Internet in the evening. Users working in the day shift are not having such problem. Which of the following can be the cause of this issue?

Time-based ACL

In what instance would you use T1 crossover cable?

To connect two CSU/DSUs.

You work as a network administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You have configured a firewall on the network. A filter has been applied to block all ports. You want to enable sending and receiving of emails on the network. Which of the following ports will you open?

To enable email communication, you will have to open ports 25 and 110. Port 25 is used by SMTP to send emails. Port 110 is used by POP3 to receive emails.

What does trunking provide?

Trunking allows you to make a single port part of multiple VLANs at the same time

Which of the following allows a secure communication between a private network and a public network, such as the Internet?

Tunneling

Wireless access point

Used by wireless devices to connect to a network

SSID

Used in wireless networks to identify a wireless access point and its associated network WLAN you're connected to

Administrative Distances (AD)

Used to rate the trustworthiness of routing information received on once router from its neighboring router. An AD is an integer from 0 to 255, where 0 equals the most trusted route and 355 the least. A value of 255 essentially means, "No traffic is allowed to be passed via this route." If a router receives 2 updates listing the same remote network, the 1st thing the router checks is the AD. If one of the AD is lower than the other it will get placed in the routing table. If both AD are the same then routing protocol metrics like hop count or the amount of bandwidth on the lines will be used to find the best path to the remote network. AD with lowest metric will be placed in routing table. If both ADs have same AD and same metric then the routing protocol will load-balance to the remote network.

Arp inspection

Used to verify IP to MAC address bindings on the network as a security mechanism to prevent man-in-the-middle attacks

Distance Vector Routing Protocols >> VLSM and Discontiguous Networks

VLSM works with assigning addresses to group(s) which has most users and works up the subnet addresses to least amount of users. If you have a /24 you can break that down smaller subnets which adds back up to your /24 and this just helps with saving address space. VLSM works with routing protocols like RIPv2, EIGRP, OSPF. Does Not work with RIPv1 or IGRP A discontiguous network is one that has 2 or more subnetworks of a calssful network connected together by different classful networks. Works with OSPS by default because it does not auto-summarize like RIPv2 and EIGRP. Does NOT work with RIPv1. By default it won't work with RIPv2 or EIGRP * Route aggregation is essentially combining multiple subnets into one larger subnet, and it's also known as supernetting. You would implement this type of route summarization if you required more efficient routing tables in large networks.*

A company's headquarter is connected to its remote branch offices by creating secure tunnels across the Internet. The terminating end at the headquarter requires heavy data processing. Which of the following devices should be used for this purpose?

VPN concentrator

What technology is an IETF version of HSRP?

VRRP VRRP is an IETF open standard that operates almost identically to HSRP from Cisco Systems. GLBP is another Cisco-specific technology for Layer 3 redundancy. NAT and PAT are for translating IPv4 addresses.

Many users on a company's network are reporting an increase in ransomware. Which of the following should a network technician implement to reduce the occurrences?

Web content filtering

When an unknown error has occurred

When are you most likely to see a request timed out message

- cordless phones can interfere with wireless devices - on some APs signal strength can be adjusted to avoid some interference - physical obstacles such as appliances may cause wireless signal degradation

Which of the following statements are TRUE as it relates to wireless interference? Select one or more: - most RFI occurs in the 5GHz frequency band - cordless phones can interfere with wireless devices - on some APs signal strength can be adjusted to avoid some interference - physical obstacles such as appliances may cause wireless signal degradation - microwave ovens and security systems will cause significant interference with devices using the 5GHz band

Wi-Fi Analyzer

Which of the following tools would be helpful in determining the optimal placement of a WAP?

- password complexity - password length

Which of the following two password characteristics are considered the MOST important when creating strong passwords? Select one or more: - password complexity - maximum password age - password length - minimum password age

- 802.11b - 802.11n - 802.11g

Which of the following wireless protocols use the 2.4GHz frequency band? Select three - 802.11ac - 802.11b - 802.11n - 802.11a - 802.11g

arp -s 157.55.85.212 00-aa-00-62-c6-09

Which of the following would successfully add a static entry to the ARP table on a Windows system?

punchdown tool

Which of the tools listed below (and pictured) is used for attaching wires to a patch panel or wall plate?

Steganography

Which term describes the process of concealing messages within a file?

Static Routing

Which type of routing are you performing if you have to go to each router and type in each network and the path that the IP will use to send packets

enable MAC filtering

While reviewing wireless router logs, you notice wireless network usage by unfamiliar systems. How can you control which systems can connect to your wireless network. Choose the BEST answer.

loopback plug

While troubleshooting problems with a Network Interface Card (NIC) you need to select the tool that will be the most helpful in determining the cards functionality. Which of the following tools listed below should you choose?

What does WAN stand for?

Wide Area Network.

- mandate security awareness training and follow up testing for users - provide security user awareness training

You and your IT team have completed drafting security policies for e-mail acceptable use and for remote access through the company VPN connection. Users currently use both e-mail and the VPN. Which of the following should be done next as it relates to the new policies? Choose two Select one or more: - mandate security awareness training and follow up testing for users - update VPN appliance firmware - encrypt all user mail messages - provide security user awareness training

Generate a file hash for the download file and make it available on the website

You are a developer for a software development firm. Your latest software build must be made available on the corporate website. Internet users require a method of ensuring that they have downloaded the authentic version of the software. What should you do?

war driving

You are a hacker and you decide to drive through an industrial park late at night while scanning for improperly secured wireless networks using your laptop and NetStumbler software. What is this called?

MTTR

You are a website administrator. You need to minimize website downtime in the event of a disaster or security compromise. Which of the following terms best describes how quickly hard disks can be returned to normal functionality?

The wireless router should be placed away from the edge of the building and the transmit power levels should be decreased

You are conducting a wireless site survey at a client site. The client expresses a desire to keep wireless transmissions secure. There is a single 802.11n wireless router with an omnidirectional antenna in the server room at the edge of the building. WPA2 Enterprise and MAC filtering have already been configured on the router. What additional security issue should you address as it relates to the information provided and the image below?

DES, 3DES, RSA

You are configuring a network encryption device and must account for other devices that may not support newer and stronger algorithms. Which of the following lists encryption standards from weakest to strongest?

to ensure the data has not been altered or tampered with

You are part of a data forensics investigation. What is the most important reason for you to verify the integrity of acquired data?

symmetric

You are the IT director for a company with military contacts. An employee, Sandra has left the company and her user account was removed. A few weeks later, you require access to Sandra's old files but you're denied access. After investigating the issue, you determine that Sandra's files are encrypted with a key generated from a passphrase. What type of encryption is this?

open Event Viewer and/or run performance monitor on the server

You are the Windows server administrator for your network. You determine that a Windows file server is performing much slower than it normally does. The server is fully patched and has an up-to-date virus scanner running on it. You make a remote connection to the server to investigate the problem further. Which of the following should you do first?

NFC

You are the owner of Coffee Spot, a coffee shop providing customers with international coffee flavors. To collect payment, you would like to implement a technology whereby clients can pay for drinks by holding their smart phone very close to a payment terminal (pictured). Which of the following should you employ?

chain of custody

You are told by your manager to keep digital evidence for later use at a court proceeding. Which of the following should you document?

The Mac address of your default gateway router

You are trying to reach a server on another subnet. What will be the destination hardware address of a frame sent from your host?

- router has been configured to not respond to ICMP messages for security reasons -A failed link exists between routers 5 and 6 ' - router configuration issue

You are trying to use the tracert command to determine the route a packet takes. You receive five successful hops, followed by several asterisks (*). Which of the following could be the problem? Select one or more: - router has been configured to not respond to ICMP messages for security reasons - A failed link exists between routers 4 and 5 -A failed link exists between routers 5 and 6 ' - router configuration issue

customer contracts tolerate no more than 8 hours of downtime

You are working with management to justify the cost of a warm site versus a cold site. What two factors can help justify the cost of a warm site over a cold site?

Port Mirroring

You connect your host to a switch that is running network analyses software however you are not seeing any packets from the server what do you need to implement on the switch to see all the packet information

ACL

You have been asked to implement a router-based solution that allows inbound SSH traffic from a specific subnet. What should you configure?

Configure on your router a static route that temporally reroutes traffic through another office

You need to perform maintenance on a router in your corporate office. It is important that the network does not go down. What can you do to accomplish your goal.

review the security logs

You want to see how many failed logon attempts there were in one day to help determine how an intruder has gained access to your network. Which of the following might you do next?

Firewall

You work in a company that accesses the internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which will help you achieve your aim. Use to pass or block packets from specific IP addresses and ports the device that you'll install between your LAN and the internet to protect your company's network against external access and misuse used to prevent external intruders from accessing a network

802.11n

You're installing a wireless network solution and you require a wireless standard that can operate in a mixed environment supporting both 2.4GHz and 5GHz frequencies. Which of the following standards would you choose?

ifconfig

You're troubleshooting a client connectivity problem in which a system cannot log onto the network. The client system uses the Linux operating system. Which of the following commands would you use to view the current TCP/IP configuration?

One with destination, one with X

You're troubleshooting a new firewall and want to block all IP traffic originating from network 10.0.0.0/8 that is destined for network 192.168.1.0/24. However, you do not want to block traffic originating from network 192.168.1.0/24 that is destined for 10.0.0.0/8 or block either network from accessing other remote networks such as the Internet. Select a network image AND a firewall rule set that BEST represents your network security goals? Select one or more:

- by using a crossover cable - use network interface cards that support MDIX

You're trying to connect two computers directly for the purpose of sharing files between them. You've determined that by connecting them together directly with a standard patch cable the transmit signals are colliding and the receive wire pair are not receiving any signals (as shown in the image below). How could this issue be resolved? Select one or more: - by using a crossover cable - use network interface cards that support PoE - by using a rollover cable - use network interface cards that support MDIX

- check the user's workstation time and date as it could be set to a date and time after the website certificate was set to expire - close the web page if there is any reason to believe the website the user is trying to connect to is malicious - contact the website owner and they can purchase a certificate from a certificate authority that will validate the owner and website domain Correct - if you trust the website the user is trying to connect to, choose "proceed anyway" to the website

You've connected to a user's desktop remotely to troubleshoot an error (pictured) that they are getting when using the Internet. Which of the following could be done to try and fix the issue? Choose all that apply: - check the user's workstation time and date as it could be set to a date and time after the website certificate was set to expire - close the web page if there is any reason to believe the website the user is trying to connect to is malicious - contact the website owner and they can purchase a certificate from a certificate authority that will validate the owner and website domain Correct - if you trust the website the user is trying to connect to, choose "proceed anyway" to the website

containment

You've just identified a malware incident. Which of the following describes what you should do next according to the incident response process?

If you are putting together an IoT network of home control sensors, what is the most efficient configuration? a. sensors equipped with Wi-Fi to transmit data to a web site b. sensors with IP addresses to communicate with your LAN c. ZigBee or Z-Wave sensors that send results to a base station, which communicates with your LAN's router d. RFID tags and a dedicated RFID reader

ZigBee or Z-Wave sensors that send results to a base station, which communicates with your LAN's router

FTP ___ a. a cloud hosting service b. a file sharing protocol c. LAN-based secure file sharing d. a permission-free file sharing service

a file sharing protocol

CHAP

asked to implement password based authentication that is supported on windows and non windows clients for your remote access solution which password based authentication protocols should you choose

man in the middle attack

attack occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts someone intercepts traffic on your network thats intended for a different destination computer

zero day

attacker exploits actual code of an application and uses a security hole to carry out an attack before the application vendor knows about the vulnerability which types of attacks is this

man in the middle

attacker gets in the direct path between a client and a server and eavesdrops on their conversation

FTP bounce

attacker sends a port command specifying the ip address of a third party

Prevents unauthorized users on the internet from accessing an internal network

function of a firewall

Blocks unwanted traffic hides vulnerable computers exposed to the internet logs traffic to and from the private network enhances security through various methods including packet filtering circuit level filtering and application filtering

functions performed by a firewall

AUP

is a document that stipulates the behavior to be followed by users of computers, networks, and associated resources.

Dynamic Routing Protocol

is a networking technique in which a protocol one router communicates with the same protocol running on neighbor routers. The routers then update each other about all the networks they know and place this information automatically into the routing table. OSPF.

The Internet backbone a. became the ARPANET in 1985 b. is maintained by ISPs c. has IXPs where data can get sidetracked d. is operated by the NSA

is maintained by ISPs

What is unique about BitTorrent? a. it doesn't supply files from a central server b. it has a logical topology c. it uses FTP protocols d. it uses encryption instead of permissions

it doesn't supply files from a central server

An Internet connection can be fast and have an acceptable ping rate but still have poor quality due to excessive ___ and packet loss

jitter

The problem with satellite Internet service is excessive ___

latency

What is the main problem with satellite Internet service? a. speed b. latency c. traceroute d. cost

latency

Torrents exchange segments of files over a distributed network using a logical ___ topology

mesh

A typical home network with Internet access would have a. single DTE b. multiple DCEs, but no DTEs c. modem and a router d. multiple routers

modem and a router

Drag the TCP utilities to match them with their descriptions.

mtr Combines the functionality of ping and traceroute netstat Displays a list of a computer's active incoming and outgoing connections telnet Allows you to communicate with another computer on the network remotely getmac Displays the NIC's MAC address ifconfig Displays the host's IP addressing information

A user reports an issue to a network technician that he is unable to connect to the server. The user has Linux OS installed on his system. Which of the following commands should the network technician use to test the connectivity?

ping

Which command determines whether a particular IP host is responding?

ping

A local ISP advertises a modem that you can carry to any location and plug in to access the Internet. This device would be used for ___ Internet access. a. fixed b. portable c. mobile d. none of the above

portable

IPv6 Routing Protocols >> EIGRPv6

similar to EIGRP is terms of features and how it operates. EIGRPv6 multicast address is FF02::0 vs 224.0.0.10 is EIGRP.

Communication ports ___ a. include USB and audio ports b. simulate the dedicated circuits that exist on circuit-switching networks c. are designed to increase the download speed of video data d. do not recognize packets

simulate the dedicated circuits that exist on circuit-switching networks

Which of the following is most likely to affect the maximum speed of a Wi-Fi hotspot? a. the hotspot's Internet service provider b. your Internet service provider c. the number of people who are suing the hotspot d. whether the hotspot is secured or not

the hotspot's Internet service provider

The connection gets a grade of D for bad performance. What are the problems? a. the speed is too low and packet loss is too high b. the ping rate is too low and packet loss is too high c. the ping rate and the jitter rate are too high d. the ping rate is too high, but the jitter rate is too low

the ping rate and the jitter rate are too high

What tells you that the HolidayInn-FREE! network is not secured? a. the misspelled SSID b. the word FREE! c. the shield icon d. the number of bars

the shield icon

On the cellular network, how are text messages handled? a. they are combined with Internet data, but extra charges apply b. they use the same channels as voice data but are routed by SMS service centers c. they are sent from tower to tower rather than being transmitted by land lines d. they take priority over voice and Internet data in order to arrive faster

they use the same channels as voice data but are routed by SMS service centers

A local network's router uses an address ___ table to keep track of private IP addresses a. IP b. routing c. translation d. dynamics

translation

SSL

tunneling protocol is based on RSA public key encryption

on demand and on access virus scans

two different types of virus scans are

Definition files

type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses

Heuristic scan

type of scanning allows an antivirus program to search for a virus even if there is no definition for it

Mulipartite

type of virus affects both the boot sector and files on a computer

file viruses

type of virus impacts files with the filename extensions .com .exe and .dll

a macro virus

type of virus uses Microsoft visual basic scripting language

Suppose you want to collect data from your fitness wristband. What is the most secure way to get that data to your laptop? a. use a USB cable to plug the band directly into your laptop b. collect the data at a ZigBee base station, which will relay it to your LAN, where you can access it from your laptop c. plug the wristband into your laptop to automatically open your browser and send the data to a web site that you can access at any time from your latop

use a USB cable to plug the band directly into your laptop

Which of the following is true about LTE? a. it is 3G tech b. it is not affected by weather like earlier mobile techs were c. users can expect faster speeds than with basic cable Internet plans d. it uses circuit-switched networks for data

users can expect faster speeds than with basic cable Internet plans

Ping of death

uses oversized icmp datagram to crash ip devices

What virtual network device allows Microsoft Active Directory (AD) services, UNIX-based web services, and DNS services to be co-resident on the same network device?

virtual server

ping of death stacheldraht syn flood

which are types of denial of service attacks

tcp/syn flood

which network attacks is used to flood a server with many half open tcp connections to prevent the server from accepting other connections

Network based ids nids

which types of IDS is used for port mirroring

Strong encryption software should be used to store credit card information only authorized users that must have access to such information should be allowed to credit card information

you want to host an e-commerce website on your network. You want to ensure that storage of credit card information is secure which conditions should be met to accomplish this

When network discovery is on ___ a. you can see the SSIDs of all the available networks b. all of the files on your computer are automatically shared c. your computer will look for and list all the other computers on the local network d. your computer will broadcast its name so that computers on the Internet can share your files

your computer will look for and list all the other computers on the local network


संबंधित स्टडी सेट्स

Chapter 23 emergency medical procedures

View Set

My Missed Questions (IA Life Ins)

View Set

Management Exam 3 In Class Quiz Questions

View Set

WGU Academy - Intro to Sociology - Final Exam

View Set

- Geography Terms Set #2 - drainage basin-irrigated land

View Set

14.3 Internet Protocol Version 6 (IPv6) Review

View Set

Neural Networks and Distributed Information Processing

View Set

2 : ALLOCATION BASE, PREDETERMINED OVERHEAD RATE, OVERHEAD APPLICATION

View Set

Unit 2: Becoming an Entrepreneur

View Set

MOVED TO ANKI JavaScript Interview Questions

View Set