Network+

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Caleb has just installed an open-source application on a web server to host a wiki for the customer service department. What should he do to harden the application after installation?

Change the default password.

Sandra is attempting to resolve an issue on her company's network: several users are unable to access one of the company's intranet web servers. She has developed a theory and tested it to determine the causes. What steps should she complete next?

Establish a plan to for resolving the problem

What provides SSO capabilities for a system?

Kerberos

Gary has been tasked with ensuring that the sales team can use their laptops from as many places as possible - even when there is not a Wi-Fi or wired network available at customer sites. What, if included as part of a laptop, would allow them to access the systems, applications, and information they need while on the go?

LTE

Bert is a network admin for a company that has just acquired another smaller company. Upon doing an inventory of on e of the branch offices of the acquired company he finds an unmanaged switch in one of the IDFs. At what layer does this device operate?

Layer 2

Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the OSI model layers would it be necessary to categorize the device int?

Layer 3

Homer is revising some internal documentation at his company. He has been asked to verify whether a certain key performance indicator is currently being met in regard to the average amount of time it takes to repair a device or service after it has experienced a non-fatal error. What is the term which best describes this KPI?

MTTR

Terrance has been tasked with upgrading his company's Wi-Fi network that provides network access for several devices that are located somewhat far apart from each other. He knows that they all need to stream a large amount of data simultaneously. What capabilities should he look for when shopping for new hardware?

MU-MIMO

Pieter is a network admin for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a ticket granting system that relies on time synchronization in order to prevent replay attacks. What protocol might he implement to ensure that kerberos will work correctly?

NTP

Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individual VLANs appear to be tagging the traffic correctly. However, there are still some frames being transmitted across the network that are not tagged to any particular VLAN. What describes the term by which a switch will categorize these frames?

Native VLAN

Genghis wants to develop a new application that requires a database. He does not, however, want to be responsible for managing the patching and security of the operating system for yet another server. What would best serve his needs?

PaaS

Ava is unable to pull up her comany's website in her web browser. She wants to check that the server is online and responding to requests. What could she try?

Ping the IP address of the webserver

What types of transceivers can be used for connections that require a data rate of 400 Gbps?

QSFP+

Ghar is looking to deploy two new network-based cameras in a location that does not currently have power. What, if performed, would still not allow him to deploy these new cameras to the selected location?

Replace the unmanaged switch with a managed switch.

All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. What type of physical topology most likely is being used?

Star

Kaleb is looking at a list of WiFi devices currently connected to the network. He sees a lot of devices that all appear to be made by the same manufacturer, even though the manufacturer name is not listed on the screen. How could he determined that they were made by the same manufacturer?

There are a large number of devices that have the same OUI.

At which OSI model layer is the protocol data unit referred to as a segment?

Transport layer

What ports are used by the Simple Network Management Protocol?

UDP 161

Valerie is designing the network for the new HQ2 location of her company. HQ2 is located on the United States east coast, but the primary headquarters is located in the United States Pacific northwest. She wants to ensure that file servers in both locations can be accessible by all users, regardless of location. What types of connections might she choose to include in the configuration?

WAN

Ehred is a network technician for a hotel chain and has been notified that one of the locations is having issues with the guests' ability to join the Wi-Fi network. Guests are usually prompted to enter their room number and last name on the reservation, but this does not appear to be happening. What might best describe the issue occurring in this hotel?

captive portal issues

Carlos currently manages an 802.11n wireless network. He has been asked to see if there is a way to increase the speed of the network without upgrading to another Wi-Fi standard. What would allow him to do this if supported by the current technologies in use?

channel bonding

Carolina wants to determine which services are running on the Linux servers in a certain subnet. What tool would best perform this task?

nmap

What expresses the subnet mask 255.255.255.224 in CIDR notation?

/27

What is the default subnet mask for a class C network?

255.255.255.0

Beri is analyzing some network traffic statistics and sees a metric that appears to indicate that frames are being corrupted as they're being sent across the network. What might be the metric that causes her to believe that is the case?

CRC

Dilan is a network administrator for a large company. On a couple of different occasions, he noticed that users were getting odd IP addresses when attempting to join the corporate network. He found that the development team had created virtual machines that were offering out IP addresses. What, if enabled, would have prevented this from happening?

DHCP snooping

Lisa is a network administrator and has been reviewing the types of data being transmitted over the network. She discovers that there are a number of email attachments and files being uploaded to a remote server via FTP that potentially contain PII. What might help her to prevent these files and confidential information from being transmitted outside the organization?

DLP

Anosh needs to deploy a new web application that is publicly accessible from the Internet. The web application depends on a database server to provide dynamic webpages, but he does not want to put the database server in a subnet that is publicly accessible for security reasons. What devices would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filter traffic moving between networks, and is publicly accessible while still allowing the database server to remain in a private subnet?

Firewall

Kumail wants to check his bank account balance to see if a transaction has cleared form a purchase he made the previous day. What protocol would most likely be used to do this?

HTTPS

Bryan has just purchased a new firewall for his organization and installed it in the datacenter. He spent many hours researching to find the best option with all the features his company needs. However, after installing the firewall, several items he needs are missing from the configuration options. What is the most likely cause?

He purchased the incorrect license type for this firewall.

Annette wants to expand her company's current on-premises cloud infrastructure by adding a well-known cloud service provider into the design, rather than building or leasing another datacenter. What cloud deployment models best describes the type of infrastructure that she wants to move towards?

Hybrid cloud

Sonja is a network engineer and has just installed a new device that she wants to manage through the network management station. What might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP?

MIB

What documents might a company use to solicit vendors to submit a solution of products and services that a company is looking to purchase?

RFP

What protocol might someone use to send an email?

SMTP

Toni needs to connect to a Cisco switch to make configuration changes. What protocols will most likely be used when she authenticates into the switch?

TACACS+

In what types of technologies would a network technician configure an ESSID?

WLAN controller

Tonia has been tasked with setting up a wireless network at a new branch office. She wants to make the network secure while requiring the least administrative effort. What might she choose to implement?

WPA2-Enterprise

Tevin has been tasked with ensuring that his company's web applications are always online - even when their data center loses power and network connectivity due to some unforeseen disaster. What is the most cost-effective solution that he could recommend that would meet this requirement?

cloud site

Aaron, a junior network technician, is troubleshooting a network. He seems to have tracked down the issue to the core router and connects to the line from the IPS, however, he's not sure where the core router might be located. What should he ask a senior technician for help locating?

demarcation point

Pano has just installed a switch for a new network segment at a branch office. What describes the traffic flow being sent from one computer on that network segment to another computer on the same network segment?

east-west

Savannah manages multiple wireless networks within her company's warehouse to ensure that certain devices are isolated and segmented off from each other. A junior technician has just added a new device to the network but cannot seem to get it to communicate with the other devices. What is the most likely reason that it cannot communicate with these devices?

incorrect SSID

Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down constantly. When the fiber status is up, the data rate is slower than what she expected. What might be a factor in the issues she is seeing?

low optical link budget

What type of cable might be used to run from cubicles into a a drop ceiling and then routed across to an IDF?

plenum

Jamie needs to subnet the network 192.168.3.0/24 into 4 equally sized subnetworks. What would be the subnet ID for the address 192.168.3.201?

192.168.3.192

Kali is wanting to edit the configuration of a web server running Linux. What port is the best choice for her to connect to the Linux web server?

22

Tobias needs to create a network for the sales department, which has 86 users, using the smallest subnet possible. What is the total number of usable IP addresses that will remain free after creating this subnet?

40

What port is used by a website that has implemented TLS certificates?

443

Bob wants to allow devices at a branch office to query publicly available DNS servers from a large cloud provider. What ports should he open in the firewall in order to enable this?

53

Jorge is analyzing the traffic statistics on one of the networking devices and sees a category for the number of Runts that the device has seen. Runts are packets that are smaller than _______ bytes.

64

Jorge has been tasked with purchasing a new wireless access point that provides the fastest access speeds and also operates on the 2.4 GHz spectrum. What specifications should he look for?

802.11ax

What IEEE standards defines how VLAN information is added to the header of frames being sent across a network?

802.1q

Jason has just been hired as the Director of IT. He is reviewing existing policies and procedures to determine how well the company has defined the roles of its employees in order to keep the organization secure and operating efficiently under any scenario. He finds that the company does not have an existing plan for how their offices in a hurricane-prone area will continue to operate during a hurricane. What plans should he consider implementing to ensure that employees at this location and supporting locations will be well prepared to both handle and continue to operate through whatever situations may arise as a result of natural disasters?

BCP

Jafar has just been hired as a junior network engineer for a large company. He has been advised that due to a pandemic he will be working remotely and needs to ensure he has a high-speed broadband Internet connection with low latency at home in order to connect by VPN. The local cable company has not yet built out his neighborhood, so he needs to look for an Internet service that meets the requirements. What would most likely best suit his needs?

DSL

What is not a technology used to connect servers to a SAN?

IR

Teri is a network administrator for a large company that is attempting to switch to a VoIP technology recommended by one of their vendors. She knows that this particular traffic can be sensitive to latency and jitter. What might she decide to do that incurs the least cost to ensure that there are no issues with this new technology?

Implement a voice VLAN for the VoIP traffic.

Giuseppe is architecting the network for a new headquarters building that is currently in design. He wants to ensure that there is redundancy built into the network while also ensuring that there are no routing loops. What methodologies can he make use of to ensure the configuration is free of routing loops?

Implement split horizon

Dahlia has just installed gigabit routers and switches at the company's headquarters. What might she need to do in order to allow the computers that came with 10/100 network ports to transfer data at the faster speeds?

Install a NIC on each of the computers

What types of cable might you expect to see connected to a cable modem from the ISP?

RG-6

Tevan cannot connect to the core router located in the MDF at his company. What might be useful in troubleshooting this connection?

rollover cable

Gino needs to be able to SSH to a Linux server on his network from his Windows workstation in order to modify the configuration of the web server service. What types of programs might he use to do so?

terminal emulator

Benjamin has been receiving reports from users at one of the rural branches of his company that their VoIP telephone conversations have been experiencing distortion and some lost connections. He pulls up the monitoring tool and sees that recently there has been a lot of video streaming from a popular social media site and that the bandwidth for the ISP connection to that office appears to be maxed out during the timeframe when users are experiencing issues. What could help resolve the issues with the telephone conversations without discarding any traffic?

traffic shaping

What concepts assumes all network traffic is potentially malicious until proven otherwise?

zero trust security model

Terrance is trying to troubleshoot an issue on his company's network. He has narrowed it down to a few segments of the overall larger network. He connects with a rollover cable to one of the routers and wants to check the status of the connection to another router. What commands might help him troubleshoot that connection?

show interface

Jan needs to connect two offices together that are approximately 21 km, or 13 miles, apart from each other. What would be the best choice of physical mediums that could be used to connect these locations?

single mode fiber

Antje has been asked to review the cybersecurity infrastructure deployed to ensure that they are looking at every layer in their defense in-depth strategy. He finds that there is adequate protection at the perimeter of each zone but is concerned that zero-day network-based attacks may still make it into the network segment. What should he recommend implementing?

host-based firewalls

Janvi is attempting to connect to one Linux server from another but is getting a message "destination host unreachable". What tools might he use next to determine the cause of the issue?

netstat

Cari is a system administrator for an organization that has been seeing large amounts of growth but has multiple legacy systems running on older hardware. There is a concern that there is not much physical space left in the data center. Her manager has asked her to come up with a way that the company could continue to expand the ability to deliver services to end users without having to grow into another data center. What might be a component of Cari's plan?

Hypervisor

Tuan is a network administrator for a large organization. The company currently has 4 T-1 lines providing Internet access at a manufacturing facility but is seeing issues with the newly deployed Voice over IP (VoIP) system. What might Tuan want to consider that will not require additional bandwidth?

Implement QoS

Mylinh manages a growing corporate network. As the network grows, it is getting more and more difficult to manage the configurations on the various routers and switches within the network. What might help centralize the approach to managing the traffic flows across the network?

SDN

Zachariah has been asked to assess whether the backup process at his organization is sufficient to meet all of the company's goals and objectives, which support their key performance indicators. One of the topics that he is analyzing is the frequency of backups to ensure that the company does not lose any more than 6 hours of data in the case of a hard drive or other system failure. What describes the particular metric that he is concerned about?

RPO

The helpdesk at a large company is looking for ways to increase the efficiency of their technicians. They have found that different technicians have different ways of doing the same task. Some of the technicians take twice as long as others. There is no documentation on how to perform tasks, so when a new helpdesk is hired it is up to the technician training them to pass on that knowledge. What might this company decide to implement to resolve these issues?

SOPs

Tan works for a telecommunications provider and noticed one of the communication links to a branch office 10 miles away has just gone down. What tools might help him determine what the problem could be?

Use an OTDR on the fiber optic cable.

Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet. What would be the best choice for him to implement?

VPN

Tijuan has just gotten back from a networking security seminar where he learned about a common concept that states that people should only be given the access that they need to do their job and nothing more. What concepts did he learn about?

principle of least privilege

Zara is having trouble accessing her company's website through her web browser. She has already pinged the static IP address of the web server and it appears to be online. What might she look at next?

Ensure that DNS for the domain is configured correctly

Toby is drafting the physical network topology plans for the new headquarters building for his company. What will there be the most of within the building?

IDF

Tejas wants to be able to manage a variety of devices on his network while ensuring that the communications of the management system are encrypted. What should he implement?

SNMPv3

Leonard has configured a switch with multiple VLANs and needs to route traffic between the different VLANS through a router on a stick. What does he need to configure on the router to enable this?

subinterfaces

Hobart has just created a network segment for a new group of file servers. These servers should only be accessible from the internal network. Connections coming in from the Internet should not be able to access these file servers. Additionally, the servers should be able to perform automatic updates from the operating system and software vendors. What should he consider implementing in order to accomplish this task?

stateful firewall

Priya is planning the cabling design for the company's new headquarters. One of the runs of cable needs to go behind the elevator bank's hydraulics and motors to the reception area computer. What type of cable would be the best choice?

STP

Varghese has just returned from a meeting with senior management. The management team is concerned that the current systems in place may not be identifying all of the weaknesses that exist in the current infrastructure and want to determine to what extent the company could be attacked. What might Varghese decide to employ in making this determination?

penetration test

Tabitha has been trying to connect to a server by FTP for the past two hours, but it says that the maximum number of connections are already established. She connects via SSH and sees a single IP address has all of the connections open. What describes the type of attack that is currently in progress against this server?

DoS

The network admin for an organization needs to install a network at his company's new branch office. The branch office will have 30 computers that will all connect to the Internet, where they will share a single public IP address. What device must the network admin install to ensure the devices are able to send traffic out to eh Internet and receive the corresponding traffic back?

Router

Cora is a network engineer for a large company and has been given instructions on how to configure a private fiber connection between her company's data center and the cloud service provider her company uses. She needs to configure an ASN on one of the core routers in the data center as part of the connection. What protocols is she most likely being instructed to configure for use with the CSP?

BGP

Jeni works for a company that has seen rapid growth, beginning as a very small startup and expanding into a large company with what is forecasted to be thousands of employees by the end of its second year. She is trying to ensure that the fast-paced growth doesn't overburden administrators when onboarding new employees. What would require the least administrative effort in their day-to-day jobs of onboarding employees and managing permissions for these users, groups, and departments while maintaining the highest level of security?

RBAC

At the beginning of a pandemic, a company has realized that they do not have enough Windows computers to ship out to employees in order to allow them to work from home. What might the company choose to implement to allow their users to continue to work from home until more computers can be purchased and shipped out to these employees?

remote desktop gateway

Tyler is a junior network engineer and has been reading about the ability to connect two ports on one switch to two ports on another switch using ethernet cables to double the amount of bandwidth available between the switches. He has not yet set up a port aggregation protocol and notices an increasing amount of broadcast traffic being sent back and forth between the two switches. What is likely not set up on these switches that would have prevented this until he configures some sort of port or link aggregation method?

STP

What is the best action a company can take to prevent social engineering attacks from being carried out against the organization successfully?

employee awareness training

Talia has just returned from a meeting with her manager where they discussed the various vulnerabilities that might impact the organization. They agreed that they were concerned that users might give out information or click on malicious links that they should not click. What types of testing might help to identify weak areas where the company could improve its employee awareness programs?

social engineering


संबंधित स्टडी सेट्स

CISSP Domain 7 Security Operations - 7.10 Managing Disaster Recovery Plan Maintenance Question & Answer

View Set

Old Testament Exam 1 Springer Study Guide

View Set

KNES 315 Care and Prevention for athletic Injuries (Section 1, 2) (Chapters 1, 2, 3, 4, and 6)

View Set

I Drive Smart Quiz Answers (Virginia)

View Set

Principles of Information Security (Sixth Edition): 1601

View Set