13.1.4 - Practice Questions, 16.1.8 - Practice Questions, 16.2.5 - Practice Questions, 15.8.4 - Practice Questions, 15.7.4 - Practice Questions, 15.6.8 - Practice Questions, 15.5.7 - Practice Questions, 14.3.9 - Practice Questions, 15.1.4 - Practice...

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which Class of Service (COS) priority value should be assigned to a video conference call? - 7 - 2 - 0 - 5 - 4 - 3 - 1 - 6

4

A user reports that can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next? - Fix the problem. - Document the problem. - Create an action plan. - Determine if escalation is needed

Create an action plan.

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed? - Layer 2 switch - Layer 1 switch - Multilayer switch - Unmanaged switch

Multilayer switch

You are in the process of implementing a network access protection (NAP) infrastructure to increase your network's security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. The remediation network needs to be isolated from the secure network. Which technology should you implement to accomplish this task? - Virtual private networking (VPN) - Port security - Network segmentation - Data encryption using PKI

Network segmentation

Which of the following is not an example of a physical barrier access control mechanism? - Mantraps - Biometric locks - Fences - One-time passwords

One-time passwords

You manage a network that uses switches. In the lobby of your building are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers into the free network jacks and connect tot he network, but you want employees who plug into those same jacks should be able to connect to the network. What feature should you configure? - Bonding - Mirroring - VLANs - Port authentication - Spanning tree

Port authentication

Which type of security uses MAC addresses to identity devices that are allowed or denied a connection to a switch? - Port security - Traffic shaping - MAC spoofing - Secure Sockets Layer

Port security

You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement? - Line conditioner - Positive pressure system - Backup generator - UPS - Negative pressure system

Positive pressure system

A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called? - Posture assessment - Remediation - Quarantine - Port security

Posture assessment

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation, not other devices. Which feature should you configure? - Bonding - Mirroring - Promiscuous mode - Spanning tree

Promiscuous mode

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. What tool should you use? - Protocol analyzer - TDR - Toner probe - Multimeter - Certifier

Protocol analyzer

Which of the following protocols or services would you associate with Window's Remote Desktop Services network traffic? - NNTP - WPA - RDP - WTSP

RDP

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use? - SSH - RDP - TFTP - FTP - Telnet

RDP

You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan? - Security guards - Low LUX or infrared camera - PTZ camera - Sufficient lighting

Security guards

Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port? - Switch - Bridge - Router - Hub

Switch

Consider the following log message generated on a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message? - FastEthernet0/0 - -5- - UPDOWN - %LINEPROTO

%LINEPROTO

You have a company network with a single switch. ll devices connect to the network through the switch. You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download. Which of the following components will be part of you solution? (Select two.) - Honeypot - DMZ - 802.1x authentication - Extranet - Remediation servers

- 802.1x authentication - Remediation servers

Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% , and the temperature is 80 degrees. What should you do to help reduce problems? - Add a separate A/C unit in the server room. - Add line conditioners in the server room. - Add a humidifier to the server room. - Add a de-humidifier to the server room.

- Add a separate A/C unit in the server room.

You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.) - Use TFTP to back up the router configuration to a remote location. - Change the default administrative user name and password. - Use a web browser to access the router configuration using an HTTP connection. - Use an SSH client to access the router configuration. - Use encrypted type 7 passwords.

- Change the default administrative user name and password. - Use an SSH client to access the router configuration.

Beside protecting a computer from under-voltages, a typical UPS also performs which two actions? - Prevents electric shock - Conditions the power signal - Protects from over-voltages - Prevents ESD

- Conditions the power signal - Protects from over-voltages

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: • When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. • The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. • She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. • You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. • You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two.) - Control access to the work area with locking doors and card readers. - Use separate dedicated network perimeter security devices instead of an all-in-one device. - Replace the USB hard disks used for server backups instead of an all-in-one device. - Replace the key lock on the server closet with a card reader. - Relocate the switch to the locked server closet.

- Control access to the work area with locking doors and card readers. - Relocate the switch to the locked server closet.

Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.) - Hashing of the community name - Encryption of SNMP messages - Use of SFTP for transferring SNMP data - Authentication for agents and managers.

- Encryption of SNMP messages - Authentication for agents and managers.

Which of the following media types can you save backup files on? (Select two.) - Tape drives - The system disk - External hard drives - Network attached storage (NAS)

- External hard drives - Network attached storage (NAS)

Which of the following are reasons to use a protocol analyzer? (Select two.) - Identify when a network is slow. - Identify users that are connected to unauthorized websites. - Measure the amount of data that can be transferred through a network. - Simulate a large number of client connections to a website. - Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS.

- Identify users that are connected to unauthorized websites. - Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS.

You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.) - Install two-post 48U racks. - Install racks with locking doors. - Install a humidifier within the data center - Install a biometric lock on the data center door. - Install two-post 24U racks.

- Install racks with locking doors. - Install a biometric lock on the data center door.

What is the purpose of using Ethernet bonding? (Select two.) - Enables Dual Remote Access (DRA) over a WAN link. - Provides increased bus speeds. - Provides a fallover solution for network adapters. - Increases network performance. - Increases read and write operations between the system bus and network adapters.

- Provides a fallover solution for network adapters. - Increases network performance.

You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: • When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. • The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. • She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. • You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. • You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two.) - Relocate the switch to the locked server closet. - Control access to the work area with locking door and proximity readers. - Use separate dedicated network perimeter security devices instead of a UTM device. - Replace the USB hard disks used for server backups with a tape drives. - Replace the key lock on the server closet with a card reader.

- Relocate the switch to the locked server closet. - Control access to the work area with locking door and proximity readers.

// This question includes an image to help you answer the question. http://prntscr.com/se0550 A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of you network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.) - Enable port security on each switch port. - Connect the patch panel to the switches with red cross-over cables. - Remove the patch cable connecting the first switch to the third switch. - Consolidate all patch cables from the patch panel to a single switch. - Enable STP on each switch. - Replace the patch cables connecting the switches together with red cross-over cables.

- Remove the patch cable connecting the first switch to the third switch. - Enable STP on each switch.

Which of the following are solutions that address physical security? (Select two.) - Scan all floppy disks before use. - Implement complex passwords. - Disable guest accounts on computers. - Require identification and name badges for all employees. - Escort visitors at all times.

- Require identification and name badges for all employees. - Escort visitors at all times.

Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Auto-duplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 [...] 5 minute input rate 0 bits/sec, 0 packet/sec 5 minute output rate 0 bits/sec, 0 packet/sec 15387 packets input, 1736263 bytes, 0 no buffer Received 15241 broadcasts, 0 runts, 0 giants 0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast 0 input packets with dribble condition detected 607 packets output, 6141 bytes, 0 underruns 4 output errors, 10 collisions, 3 interface resets, 0 restarts 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Which of the following statements are true about the fa0/0 interface? (Select three.) - No input or output errors have occurred. - The interface is running in half-duplex mode. - Several collisions have occurred. - One cyclic redundancy check error has occurred. - The interface is dropping incoming packets. - There have been no interface resets.

- Several collisions have occurred. - One cyclic redundancy check error has occurred. - The interface is dropping incoming packets.

Which of the following statements about DSCP are true? (Select two.) - Classification occurs at Layer 2 - The DiffServ field is used to add precedence values. - Classification occurs at Layer 3. - Priority values are assigned by the network switch. - A priority value between 0 and 7 is used.

- The DiffServ field is used to add precedence values. - Classification occurs at Layer 3.

You have been struggling to keep the temperature in your server room under control. To address this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.) - The hot aisle should face the air conditioner's output ducts. - The cold aisle should face the air conditioner's return duct. - The front of your servers should face the hot aisle. - The rear of your servers should face the cold aisle. - The rear of your servers should face the hot aisle. - The front of your servers should face the cold aisle.

- The rear of your servers should face the hot aisle. - The front of your servers should face the cold aisle.

Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two.) - Anti-passback system - Mantrap - PTZ CCTV - Turnstile - Double-entry door

- Turnstile - Double-entry door

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a cross-over UTP plenum cable that will run through the suspended tile ceiling of the data center. To provide power for the new devices, you had an electrician install several new 20-amp wall outlets near the new rack. Each device in the rack will be plugged directly into one of these new wall outlets. What is wrong with this configuration? (Select two.) - You should not run a plenum cable through a suspended tile ceiling. - You should implement a UPS between the wall outlet and the network devices. - You should not connect networking equipment to a 20-amp wall circuit. - You should implement redundant power supplies for the network devices. - You must use a straight-through cable to connect the two switches together.

- You should implement a UPS between the wall outlet and the network devices. - You should implement redundant power supplies for the network devices.

Match the class of service (COS) priority on the left with its corresponding value on the right. Drag - Video (< 100 ms latency) - Network control - Critical applications - Excellent effort - Best effort (default) - Internetwork control - Voice (< 10ms latency) - Background Drop - 0 - 1 - 2 - 3 - 4 - 5 - 6 - 7

0 - Best effort (default) 1 - Background 2 - Excellent effort 3 - Critical applications 4 - Video (< 100 ms latency) 5 - Voice (< 10ms latency) 6 - Internetwork control 7 - Network control

You've just installed a new 16U wall-mounted rack in your data center. You need to install the following equipment in this rack: - A 4U redundant power supply - A 4U sever - A 4U switch - A 2U router Which of the following equipment will also fit in this rack along with the above equipment? - 2U UPS - 4U UPS - 3U server - 4U firewall

2U UPS

Match the port security MAC address type on the left with its description on the right. Drag - SecureConfigured - SecureDynamic - SecureSticky Drop - A MAC address manually identified as an allowed address. - A MAC address that has been learned and allowed by the switch. - A MAC address that is manually configured or dynamically learned that is saved in the config file.

A MAC address manually identified as an allowed address. - SecureConfigured A MAC address that has been learned and allowed by the switch. - SecureDynamic A MAC address that is manually configured or dynamically learned that is saved in the config file. - SecureSticky

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software? - A caching engine - An application-specific integrated circuit - A traffic shaper - Ethernet bonding

An application-specific integrated circuit

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem? - Load tester - Application log - Throughput tester - Packet sniffer

Application log

Which of the following is the best recommendation for applying hotfixes to your servers? - Apply all hotfixes before applying the corresponding service pack. - Apply hotfixes immediately as they are released. - Apply only the hotfixes that apply to software running on your systems. - Wait until a hotfix becomes a patch, then apply it.

Apply only the hotfixes that apply to software running on your systems.

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week you noticed unusual activity on your network coming from the Windows 2000 workstations. After further examination, you discover that the Windows 2000 workstations were the victim of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. The organization still needs to use the Windows 2000 workstations, which need to be connected to the internet, but you want to make sure the network is protected from future events. Which solution should you implement to protect the network while also allowing operations to continue as normal? - Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN. - Install anti-virus software on the Windows 2000 workstations and configure Windows to automatically download and install updates. - Create a dedicated network for the Windows 2000 workstations that is completely isolated from the rest of the network, including a separate internet connection. - Implement a host-based firewall on each Windows 2000 workstation and configure Windows to automatically download and install updates.

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

You are the network administrator for a city library. Throughout the library, there are several groups of computers that provide public access ot the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into he library and disconnecting the network cables from the library computers to connect their laptops to the internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the internet. What can you do to fix this problem? - Create a VLAN for each group of four computers. - Remove the hub and place each library computer on its own access port. - Create static MAC addresses for each computer and associate them with a VLAN. - Configure port security on the switch.

Configure port security on the switch.

You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage and a single connection to your ISP. You want to provide redundancy so that a failure in a single component does not cause the website to become unavailable. What should you add to your configuration to accomplish this? - On each server, add a second network connection to the internet. - On each server, add a second network connection to connect the server to there shared storage device. - Reconfiguration the disk array in a RAID 1+0 configuration. - Connect one server to the internet through a different ISP.

Connect one server to the internet through a different ISP.

You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions. Which type of device should you choose? - Proxy server - Bandwidth shaper - Content switch - Circuit-level gateway

Content switch

A network switch detects a DHCP frame on the LAN that appears to have come from a DHCP server that is not located on the local network. In fact, it appears to have originated from outside the organization's firewall. As a result, the switch drops the DHCP message from that server. Which security feature was enabled on the switch to accomplish this? - DHCP snooping - Dynamic ARP inspection - IGMP snooping - Port security

DHCP snooping

Which of the following can be used to stop piggybacking from occurring at a front entrance where employees swipe smart cards to gain entry? - Use weight scales - Use key locks rather than electronic locks - Install security cameras - Deploy a mantrap

Deploy a mantrap

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next? - Determine if escalation is needed. - Fix the problem. - Create an action plan. - Document the problem.

Determine if escalation is needed.

A user reports that she can't connect to a server on your network. You check the problem and find out that all users hare having the same problem. What should you do next? - Create an action plan. - Determine what has changed. - Established the most probable cause. - Identify the affected areas of the network.

Determine what has changed.

Which of the following functions can a port scanner provide? - Automatically close open ports on the network - Testing virus definition design for false positives. - Auditing IPsec encryption algorithm configuration. - Determining which ports are open on a network.

Determining which ports are open on a network.

Which of the following actions should you take to reduce the attack surface of a server? - Install anti-malware software. - Install a host-based IDS. - Disable unused services. - Install the latest patches and hotfixes.

Disable unused services.

A network switch is configured to perform the following validation checks on its ports: - All ARP requests and responses are intercepted. - Each intercepted request is verified to ensure that it has a valid IP-to-MAC address binding. - If the packet has a valid binding, the switch forwards the packet to the appropriate destination. - If the packet has an invalid binding, the switch drops the ARP packet. Which security feature was enabled on the switch to accomplish this task? - Dynamic ARP Inspection - IGMP snooping - DHCP snooping - Port security

Dynamic ARP Inspection

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy? - Establish the symptoms. - identify the affected area. - Recognize the potential effects of the problem. - Establish what has changed.

Establish the symptoms.

A web server on your network hosts the public website for your company. You want to make sure that a failure of the NIC in the server does not prevent the website from being accessible on the internet. Which solution should you implement? - Ethernet bonding - QoS - Traffic shaping - Spanning tree

Ethernet bonding

You manage a firewall that connects your private network to the internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use? - Throughput tester - Packet sniffer - Event log - Load tester

Event log

You have heard about a Trojan horse program where the compromised systems sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log would you monitor? - Security - System - Firewall - Application

Firewall

Match the network access protection (NAP) component on the left with its description on the right. Drag - NAP client - NAP server - Enforcement server (ES) - Remediation server Drop - Generates a statement of health (SoH) that reports the client configuration for health requirements. - Runes the System Health Validator (SHV) program. - Is clients' connection point to the network. - Contain resources accessible to non-compliant computers on the limited-access network.

Generates a statement of health (SoH) that reports the client configuration for health requirements. - NAP client Runs the System Health Validator (SHV) program. - NAP server Is clients' connection point to the network. - Enforcement server (ES) Contain resources accessible to non-compliant computers on the limited-access network - Remediation server

Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all. Drag - Perimeter barrier - Door locks - Physical access control - Safety - Protected cable distribution Drop - Hardened carrier - Biometric authentication - Barricades - Emergency escape plans - Alarmed carrier - Anti-passback system - Emergency lighting - Exterior floodlights

Hardened carrier - Protected cable distribution Biometric authentication - Door locks Barricades - Perimeter barrier Emergency escape plans - Safety Alarmed carrier - Protected cable distribution Anti-passback system - Physical access control Emergency lighting - Safety Exterior floodlights - Perimeter barrier

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a short-term, periodic basis (typically monthly)? - Targeted software patch - Kernel fix kit - Service pack - Hotfix

Hotfix

Drag the broadcast domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once. Drag - Single broadcast domain - Multiple broadcast domains Drop - Hub - Unmanaged switch - 802.11n wireless access point - Router - Bridge - Repeater - Layer 3 switch

Hub - Single broadcast domain Unmanaged switch - Single broadcast domain 802.11n wireless access point - Single broadcast domain Router - Multiple broadcast domains Bridge - Single broadcast domain Repeater - Single broadcast domain Layer 3 switch - Multiple broadcast domains

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next? - Identify the affected areas. - Document the problem and the solution. - Identify possible effects of the solution. - Apply the patch to the router.

Identify possible effects of the solution.

A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next? - Establish the most probable cause. - Determine if anything has changed. - Determine if escalation is necessary. - Identify the affected areas of the network.

Identify the affected areas of the network.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next? - Create an action plan. - Determine if escalation is necessary. - Identify the results and effects of the solution. - Document the problem and solution.

Identify the results and effects of the solution.

You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do? - Use SSH instead of SNMP. - Combine SNMP with SSL. - Implement a RADIUS solution. - Implement version 3 of SNMP.

Implement version 3 of SNMP.

Which of the following CCTV types would you use in areas with little or no light? - C-mount - Infrared - A camera with a high LUX rating - PTZ

Infrared

Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president to reduce internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection without decreasing performance. What is the best way to do this? - Implement NAT. - Install a packet-filtering firewall. - Install modems in employees' computers. - Install a proxy srever.

Install a proxy srever.

You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. The power supplies in the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical devices should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center? - Transformer - Transistor - Inverter - Capacitor

Inverter

Which of the following statements is true? A system image backup: - Does not include user profile settings. - Can be saved to a Bitlocker-enabled volume. - Is saved as a .vhd file. - Is the only type of backup supported by the backup and restore console.

Is saved as a .vhd file.

Which of the following is the most important way to prevent console access to a network switch - Implement an access list to prevent console connections. - Keep the switch in a room that is locked by a keypad. - Disconnect the console cable when not in use. - Set console and enable secret passwords.

Keep the switch in a room that is locked by a keypad.

Which of the following devices accepts incoming client requests and distributes those requests to specific servers? - Caching engine - Media converter - CSU/DSU - Load balancer - IPS

Load balancer

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. What tool should you use? - System log - Baseline - Load tester - Packet sniffer - Throughput tester

Load tester

Which of the following controls is an example of a physical access control method? - Locks on doors - Access control lists with permissions - Passwords - Hiring background checks - Smart cards

Locks on doors

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to the same hub that is connected with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you see frames addressed to the four workstation, but not to the router. Which feature should you configure? - Spanning tree - Bonding - Mirroring - Promiscuous mode

Mirroring

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? - Change the default administrative username and password. - Use a Telnet client to access the router configuration. - Move the router to a secure server room. - Use encrypted type 7 passwords. - Use TFTP to back up the router configuration to a remote location.

Move the router to a secure server room.

Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connection to your network unless anti-virus software and the latest operating system patches have been installed. Which solution should you use? - VLAN - NAC - NIDS - DMZ - NAT

NAC

You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to connect a trunk port on each switch and connect them with a straight-through UTP cable that will run across the floor of the data center. To protect equipment from power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. Will this configuration work? - No. You must use a cross-over cable to connect the two switches together. - Yes. This configuration complies with data center best practices. - No. You should not use blade servers for virtualization. - No. You should not run a cable across the floor of the data center. - No. You must implement the UPS and power supplies to the rack externally.

No. You should not run a cable across the floor of the data center.

Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rock-mounted environment monitoring device within the rack. Currently, the device shows the temperature within the rack to be 70 degrees Fahrenheit (21 degrees Celsius). What should you do? - Re-orient the cold aisle within the server room so that it is directed toward the air conditioner's return duct. - Install a humidifier to increase the humidity within the server room. - Install an additional air conditioning unit for the server room. - Nothing. The temperature within the rack is within acceptable limits.

Nothing. The temperature within the rack is within acceptable limits.

You want to use CCTV to increase the physical security. You want to be able to remotely control the camera position. Which camera type should you choose? - PTZ - C-mount - Dome - Bullet

PTZ

You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall . Which tool should you use? - Event log - Packet sniffer - Throughput tester - Load tester - System log

Packet sniffer

You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use? - IDS - Port scanner - IPS - Throughput tester - Packet sniffer

Packet sniffer

You suspect that your web server has been the target of a denial-of-service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine? - Security - Performance - Firewall - System

Performance

Is addition to performing regular backups, what must you do to protect your system from data loss? - Restrict restoration privileges to system administrators. - Write-protect all backup media. - Store the backup media in an on-site fireproof vault. - Regularly test restoration procedures.

Regularly test restoration procedures.

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do? - Manually set the MAC address of Host C to the MAC address of Host A. - Run the packet sniffer application on Host B. - Connect host A and B together on the same switch port through a hub. - Configure the default gateway address on hosts A and B with the IP address of Host C.

Run the packet sniffer application on Host B.

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem? - IPX - SMTP - SNMP - TCP/IP - The primary protocol of your network

SNMP

Which protocol uses traps to send notifications from network devices? - SNMP - ICMP - IMAP4 - SMTP - IGMP

SNMP

When troubleshooting network issues, it's important to carry out tasks in a specific order. Drag the trouble shooting task on the left to the correct step on the right. Drag - Establish a plan of action. - Implement the solution or escalate. - Test the theory to determine the cause. - Establish a theory of probable cause. - Identify the problem. - Document findings, actions, and outcomes. - Verify full system functionality. Drop - Step 1 - Step 2 - Step 3 - Step 4 - Step 5 - Step 6 - Step 7

Step 1 - Identify the problem. Step 2 - Establish a theory of probable cause. Step 3 - Test the theory to determine the cause. Step 4 - Establish a plan of action. Step 5 - Implement the solution or escalate. Step 6 - Verify full system functionality. Step 7 - Document findings, actions, and outcomes.

Which of the following is the least effective power loss protection for computer systems? - Secondary power source - Backup power generator - Uninterruptible power supply - Surge protector

Surge protector

Which of the following is a standard for sending log messages to a central logging server? - Syslog - LC4 - Nmap - OVAL

Syslog

You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix? - Test the hotfix, then apply it to the server that had the problem. - Apply the hotfix immediately to the server; apply the hotfix to other devices only as the security threat manifests itself. - Apply the hotfix immediately to all servers. - Test the hotfix, then apply it to all servers.

Test the hotfix, then apply it to all servers.

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go tot he office and see that one of the user's stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy? - Establish what has changed. - Recognize the potential effects of the solution. - Document the solution. - Test the solution.

Test the solution.

Match each troubleshooting command on the left with its function on the right. Each utility may be used once, more than once, or not at all. Drag - pathping - ping -6 - traceroute6 - ping - tracert Drop - Tests connectivity between two network hosts by sending IPv4 ICMP Echo Request packets without modifying the TTL parameter. - Computes lost/sent packet statistics for each hop in the route between two hosts. - Used on Linux systems to identify the route between two IPv6 hosts. - Used on Windows systems to identify the route between two IPv4 hosts. - Tests connectivity between two network hosts by sending IPv6 ICMP Echo Request packets without modifying the TTL parameter.

Tests connectivity between two network hosts by sending IPv4 ICMP Echo Request packets without modifying the TTL parameter. - ping Computes lost/sent packet statistics for each hop in the route between two hosts. - pathping Used on Linux systems to identify the route between two IPv6 hosts. - traceroute6 Used on Windows systems to identify the route between two IPv4 hosts. - tracert Tests connectivity between two network hosts by sending IPv6 ICMP Echo Request packets without modifying the TTL parameter. - ping -6

You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use? - Packet sniffer - Baseline - Throughput tester - Load tester

Throughput tester

Why should you store backup media off site? - To make the restoration process more efficient. - To comply with government regulations. - To prevent the same disaster from affecting both the network and the backup media. - To reduce the possibility of theft.

To prevent the same disaster from affecting both the network and the backup media.

Five salesmen who work out of your office. They frequently leave their laptops laying on the desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best way to address your concerns? - Require strong passwords in the local security policy. - Use cable locks to chain the laptop to the desks. - Encrypt all company data on the hard drives. - Implement screen saver passwords.

Use cable locks to chain the laptop to the desks.

You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do? - Use a remote access utility such as SSH to access router and switch consoles remotely. - Hire additional resources to help monitor and manage your network infrastructure. - Use syslog to implement centralized logging. - Consolidate network resources down to one or two switches.

Use syslog to implement centralized logging.

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented. - Spanning tree - Port security - VPN - VLAN

VLAN

Which of the following CCTV camera types lets zoom the focus in and out? - Fixed - C-mount - Varifocal - Infrared

Varifocal

In which of the following situations would you use port security? - You want to control the packets sent and received by a router. - You want to restrict the devices that could connect through a switch port. - You want to prevent MAC address spoofing. - You want to prevent sniffing attacks on the network.

You want to restrict the devices that could connect through a switch port.

Each of the following tools are used to check the health of a network. Which of these is typically used for managing and sending messages from one computer system to another? - Packet sniffer - Protocol analyzer - syslog - Load tester

syslog


Set pelajaran terkait

Test 3 - Chapter 11 - Vaccination

View Set

Ch 5: Practical Applications of Classical Conditioning

View Set

AMSCO Chapter 24, AMSCO Chapter 18, Chapter 23 Multiple Choice, Chapter 24 Multiple Choice Questions

View Set

CS: Benign Prostatic Hyperplasia

View Set

CompTIA Security+ Practice Test #2

View Set

CIS 3343 Exam 2 Review (Chapter 8)

View Set

Present Simple and Present Progressive

View Set

Trivia Murder Party 2 Questions and Answers

View Set