Ch. 5-12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function? 2 3 Correct. Pin number 3 is used for white/orange T568A color Fast Ethernet function. 6 1

3

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224. 24 30 Correct. Using the formula 2h - 2 = Z, in this problem, the total number of hosts is 30 . 16 32

30

Mr. X wants to use cellular technology that offers at least 5 Mbps of download speed. He consults you about this. Which of the following cellular technologies will you suggest? CDMA GSM 5G 4G-LTE

5g

How many bits are used in a network with a subnet of 255.0.0.0? 16 64 8 Correct. There are 8 bits in this subnet mask. 32

8

Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files? BCP A disaster recovery plan An incident response plan Hot site

A disaster recovery plan

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? Go-back-n sliding window Choke packet Selective repeat sliding window Stop-and-wait

Selective repeat sliding window

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited? Defense in depth Principle of least privilege Shared responsibility model Separation of duties

Separation of duties

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario. Interference Attenuation Refraction Fading

fading

Identify the current name of a DMZ (demilitarized zone). ANDing Host ID Screened subnet Correct. Screened subnet (formerly called a DMZ, or demilitarized zone) can provide an area of the network with less stringent security policies that allow traffic from website visitors, while other portions of the network cannot be accessed from the Internet. Network ID

screened subnet

Which of the following is not one of the AAA services provided by RADIUS and TACACS+? Authentication Administration Authorization Accounting

Administration

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? Traffic Class Priority Code Point Time to Live Diffserv

Diffserv

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second? Mega Tera Kilo Giga

Giga

Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port? Wireless monitoring Port mirroring Reporting In-line monitoring

Port mirroring

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots? FDM STDM WDM TDM

TDM

Which of the following steps of an incident response plan includes the act of limiting the damage by the team, where affected systems or areas are isolated, and response staff are called in as required by the situation? Remediation Recovery Review Containment

Containment

Which of the following is not a social engineering strategy? Quid pro quo Phishing Baiting DoS

DOS

Identify which router connects an autonomous system with an outside network, also called an untrusted network. Edge router Routing table Exterior router Core router

Edge router

You have recently been appointed as a network analyst at Hayle Communications. Your first assignment requires you to limit the traffic between a single receiver and a single sender. Which of the following bandwidth management techniques will you use in this scenario? Congestion control DiffServ QoS Flow control

Flow control

Who is responsible for the security of hardware on which a public cloud runs? It depends The cloud customer Both the cloud customer and the cloud provider The cloud provider

The cloud provider

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space? VLSM Correct. VLSM (Variable Length Subnet Mask) allows subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space. VTP Site prefix Classless addressing

VLSM

While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? Spiceworks Wireshark iPerf NetFlow

Wireshark

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. A. Red-team Blue-team B. Vulerability assessment C. Security audit D. Pen Testing

A & D

In which of the following phases of the social engineering attack cycle will an attacker require the most time investment? Exit Building trust Research Exploit

Research

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 dB. What is the throughput that is being received at the moment as per your calculations, keeping the 3-dB rule in mind? 250 watts Correct. A loss of 3 dB between the transmitter and receiver indicates that the signal has lost half its power. Here, since the loss was 6 dB, it would mean 75 percent loss of the original strength, which adds up to 250 watts. 500 watts 125 watts 750 watts

250 Watts

Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario. A proxy server An HIDS A network-based firewall A host-based firewall

A host-based firewall

You are employed as a network administrator of Vincent Motors. An unreleased blueprint of a new car model of Vincent Motors has been leaked on the Internet. You assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. Which of the following access control techniques will you use so that such an activity can be detected in the future? Accounting SoD Geofencing Authentication

Accounting

As a network analyst, you want the ACL (access control list) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. Which of the following commands will you use in this scenario? A. access-list acl_2 permit icmp any any B. access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5 C. access-list acl_2 permit tcp host 2.2.2.2 host 3.3.3.3 eq www D. access-list acl_2 deny icmp any any

B

Josh is a new trainee at TT&P who has been sent to a client location to patch up cables connecting the switch to the data center. While doing so, Josh is unable to decide which connector to consider while connecting the ferrules of an SMF cable that measures 1.25 mm. Analyze and suggest which of the following connectors Josh should opt for under the circumstances so that there are minimum back reflections. MT-RJ ST LC SC

LC

Which KPI (key performance indicator) indicates delayed network communications while devices wait for responses or resend transmissions? Utilization Packet drops error rate jitter

Packet drops

At a security training exercise, you had to devise a strategy to penetrate into an organization's data room by accessing one of their employee's ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario? Tailgating Quid pro quo Baiting Phishing

Quid pro quo

You are working as one of the network administrators of Wells & Welsh Associates. The company wants to provide network administrators with more centralized control of network settings and management. For this reason, the department has decided to use an SDN (software-defined networking) controller to allow network administrators to remotely manage network devices and monitor data collected about these devices. Which plane of the SDN will enable you to allow such a feature? The management plane Correct. While not a typical layer for network communication, this plane could be considered as a part of the control plane. It allows network administrators to remotely manage network devices, monitor those devices, and analyze data collected about the devices. The data plane The control plane The application plane

The management plane

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? Online UPS Generator Dual power supplies Standby UPS

Online UPS

What port do SNMP agents listen on? Port 161 Port 21 Port 162 Port 20

Port 161

Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele's password to a sensitive database in the law firm. What kind of password attack did she use? A rainbow table attack A zero-day attack A brute-force attack A dictionary attack

A brute-force attack

Game Zone is a well-known games park located in Manhattan that allows gamers to engage in multiplayer competitions. The competitions function smoothly on the opening day, but on the following days, there are multiple instances of the computers getting disconnected temporarily from the wireless network. These connections however function normally when they are reconnected. Which type of attack is this most likely to be? Deauth attack Friendly DoS attack PDoS attack DRDoS attack

Deauth attack

Which of the following refers to any router outside an organization's AS(autonomous system), such as a router on the Internet backbone? Exterior router Core router Routing table Edge router

Exterior router

The IT department of Mascom Telecom has requested you to fix an error that seems to have been associated with a possible malware attack. This particular malware file seems to have attacked the operating system files on the computer. Which of the following should you use to avoid or alert such an attack in the future? HIPS SPAN FIM TAP

FIM

Which of the following technologies selectively filters or blocks traffic between networks? Proxy server IPS Firewall IDS

Firewall

Which authorization method allows a network administrator to receive from a user's supervisor a detailed description of the roles or jobs the user performs for the organization? RBAC MAC SoD DAC

RBAC

You are working as a technical specialist for an ISP. The network administrator has asked you to set up a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use? OSPF RIPv2 BGP EIGRP

RIPv2

You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available so that the path to the destination can be shortened. Which of the following will help you in doing so? Convergence time Overhead Routing cost AD

Routing cost

Which of the following anti-malware software will slow down your network performance considerably? Cloud-based Host-based Network-based Server-based

Server-based

An IDS (intrusion detection system) has been installed in your organization as a stand-alone device to monitor network traffic and to generate alerts about suspicious activities. You as a network analyst have been assigned to check the effectiveness of the device. You notice that the effectiveness of the IDS has significantly come down since its installation because it has not been updated. Which of the following processes will you use in updating the IDS? Port mirroring Signature management FIM TAP

Signature management

The managing director of Seviicco Laminates wants to secure certain financial documents that can only be accessed by him and the finance team of the organization. He wants to install a sophisticated authentication process so that the documents are extremely safe. You have been contracted as a network analyst for this project. After having an overview of the office premises, you decide to provide this security via a specific barcode that will be used as a key to access the documents. Which of the following access control technologies will you install in this scenario? Access badge Smart locker Locking cabinets Biometrics

Smart locker

Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections? Stateless firewall Stateful firewall Packet-filtering firewall Host-based firewall

Stateless firewall

As a network administrator, a client has approached you to set up the network for MKV, a software company. The company requires sufficient amounts of data for both uploading and downloading purposes; however, it prefers a connection that has better download speed. Which of the following DSL varieties do you think is best suited for such a requirement? VDSL SDSL DWDM ADSL

VDSL

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access? Exploit Data breach Vulnerability Hacking

Vulnerability

You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario? ACL DAI RA guard DHCP snooping

DAI

You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario? PTSN Broadband DSL DIA

DIA

LTE (Long-Term Evolution) and LTE-A (LTE advanced) are variations of which generation of cellular network? Second generation Third generation Fifth generation Fourth generation

Fourth Generation

As a network administrator, you have asked one of the contracted vendors of the company to ship a consignment of spare parts and components of all the network devices. You have decided to place this order to store the devices for a rainy day. Now, as the consignment has been received by your organization, you want to store these devices in a secure location. Which of the following will you use in this scenario? Access control vestibule Cipher lock Biometrics Locking cabinets

Locking cabinets

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won't receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario? Proxy server IDS IPS Firewall

Proxy server

Which of the following versions is the most recent iteration of SHA (Secure Hash Algorithm), which was developed by private designers for a public competition in 2012? SHA-1 SHA-0 SHA-3 SHA-2

SHA-3

Which of the following will you use to monitor and analyze data stored in logs? RBAC DAC SIEM SoM

SIEM

You are the network engineer for Muhan Mobile Services. The network administrator has asked you to separate the authentication, auditing, and authorization process. Which of the following tools will you use in such a scenario? TACACS+ Kerberos RBAC RADIUS

TACACS+

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained? -30 dBm -70 dBm -80 dBm Correct. The RSSI level of -80 dBm with a not good rating is the minimum signal strength required for basic connectivity, so one must ensure that there is at least a reading of -80 dBm. -50 dBm

-80 dBm

What is the downtime per day for a system showing 99.9% availability? 14 minutes and 23 seconds 1 minute and 26 seconds Correct. A system showing 99.9% availability will have a downtime of 1 minute and 26 seconds per day. 8 seconds 0.4 seconds

1 minute and 26 seconds

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address? 255.255.255.255 255.255.0.0 255.255.255.0 255.0.0.0

255.0.0.0

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario? 255.254.0.0 Correct. The total number of subnets required is 100; hence, 27 = 128 will give us the maximum number of hosts. Counting the value of bits borrowed will add up to 254, so 255.254.0.0 is the subnet mask that should be chosen in this scenario. 255.252.0.0 255.248.0.0 255.240.0.0

255.254.0.0

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic? SYN flags Destination IP address ICMP message Application data

Application data

In which of the following modes will a vNIC access a physical network using the host machine's NIC? NAT mode Isolation mode Host-only mode Bridged mode

Bridged mode

Which of the following power flaws is also called a sag? Blackout Noise Brownout Surge

Brownout

Which of the following protocols allows a pool of computers or interfaces to share one or more IP addresses? LACP CARP Correct. CARP (Common Address Redundancy Protocol) allows a pool of computers or interfaces to share one or more IP addresses. TRILL SPB

CARP

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? Warm site Standby site Hot site Cold site

Cold site

Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network? Flow control Congestion control QoS Traffic shaping

Congestion control

For over a decade, Ramanathan has been working as a network engineer in an MNC that uses FC (Fibre Channel) networking architecture. His primary duty is to ensure that there are no issues in the network connections between servers and SAN (storage area network) devices, so that maximum throughput is achieved at all times. Recently, one of the connections of the FC device to the network malfunctioned, which Ramanathan has to fix. Analyze which of the following Ramanathan should do in this scenario. Use the iSCSI protocol Use NICs to connect the FC devices to the network Install CNAs to connect to network servers Connect the FC devices to the network through HBAs

Connect the FC devices to the network through HBAs

Which device would allow an attacker to make network clients use an illegitimate default gateway? DHCP server Proxy server Network-based firewall RA guard

DHCP server

Which of the following carries user-generated traffic, such as email, web browsing, or database updates? Management VLAN Data VLAN Correct. Data VLAN (or user VLAN) carries user-generated traffic, such as email, web browsing, or database updates. Voice VLAN Private VLAN

Data VLAN

A network connection is congested as a result of which there are multiple network fluctuations and latency issues. You as a network administrator plan on solving this issue by using a network device to send signals to the sender or receiver of the data packets that the network is congested. Which of the following will you use in this scenario? Implicit signaling Backpressure Admission policy Explicit signaling

Explicit signaling

Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario? Two 9s Five 9s Correct. Five 9s or 99.999% offers a downtime of 0.4 seconds per day and 5 minutes and 15 seconds per year, so this should be used in this scenario. Three 9s Four 9s

Five 9s

BNB Group of Institutions has been facing a lot of issues with its network ever since it decided to adopt online classes as a medium to impart education. The IT department analyzes the issue and is of the opinion that the problems are related to the high amount of traffic due to students trying to log in from various locations; as a result, the network devices are overloaded. The IT department has requested your help as a network administrator. Which of the following bandwidth management techniques will you suggest in this scenario? Flow control Congestion control QoS CoS

Flow control

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario? Four bits Correct. By applying the 2n = Y formula to calculate the number of bits required to divide a network into nine subnets, four bits will be sufficient. Five bits Three bits Two bits

Four bits

You are working as a network engineer for an ISP. A ticket has been raised that states that the SMF (single mode fiber) and the MMF (multimode fiber) cables have come apart at the FDP (fiber distribution panel). On checking the situation, you realize that you will need to melt the tips of the two fibers together so that light can pass cleanly through the joint. Which of the following kits will you require in this scenario? Fiber cleaver Fiber stripper Fusion splicer Ferule

Fusion Splicer

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose? ESS IBSS Correct. IBSS (independent basic service set), using an ad hoc topology, uses a small number of nodes positioned closely to transmit directly to each other without an intervening connectivity device. BSS SSID

IBSS

Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host? HIDS TAP NIDS IPS

IPS

Which policy ensures messages are discarded when they don't match a specific firewall rule? Explicit allow Implicit allow Explicit deny Implicit deny

Implicit deny

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation? VLAN isolation Double tagging Incorrect VLAN assignment Correct. This can happen due to a variety of situations, including plugging a device into the wrong switch port or misconfigurations of the client authentication process in which a VLAN is assigned to a device before the authentication process is complete. Incorrect port mode

Incorrect VLAN assignment

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation? Incorrect VLAN assignment VLAN isolation Double tagging Incorrect port mode

Incorrect port mode

Which of the following backs up only the data that has changed since the last backup? Full backup Incremental backup Differential backup Cloud backup

Incremental backup

Your network administrator has asked you to change the subnet mask of the Cisco router used in the organization. Which of the following Cisco CLI modes would you apply in this scenario? Interface configuration Global configuration Privileged Exec User EXEC

Interface configuration

Which of the following issues keys to clients during initial authentication? SSO AS KDC TGS

KDC

You, as a network engineer, have recently established a network connection for three separate department buildings in a university. One of the departments has complained that the signal strength it receives is not the same as the signal strength the other two buildings receive. Which of the following will you use in this scenario? NIU Line drivers DTE CSU/DSU

Line drivers

Crom Breweries is an old client of HW Internet Solutions. Crom's IT department calls HW Solutions to inform that the interface is down. HW Solutions sends a network analyst to check the situation. The network analyst assumes that an employee must have shut down the interface. He applies the show interface command to get an overview of all the devices interfaces. Analyze which of the following will help the network analyst to know whether the interface was shut down. MTU Traffic statistics Link state Bandwidth

Link state

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? Ransomware Logic bomb virus worm

Logic bomb

Which authorization method grants access to a user when the user's classification and category match those of a resource? MAC DAC SoD RBAC

MAC

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? AUP NDA MDM BYOD

NDA

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use? RFID ZigBee ANT+ NFC

NFC

As a network administrator, you want to modernize your network with modular software running on standard server platforms. You want to start by replacing traditional, custom-designed network equipment. You also wish to have flexible, cost-saving options for many types of network devices, including virtual servers, data storage, load balancers, and firewalls. Which of the following will you use in such a scenario? vSwitch SDN NFV Correct. NFV provides flexible, cost-saving options for many types of network devices, including virtual servers, data storage, load balancers, and firewalls. FCoE

NFV

MNT Enterprises has hired you as a network administrator to help the organization design a more comprehensive traffic analysis and protection tool to protect the entire network from hackers trying to flood the network with traffic. Which of the following will you use in this situation? NIDS HIDS NIPS HIPS

NIPS

Which of the following VLANs receives all untagged frames from untagged ports? Data VLAN Native VLAN Correct. Native VLAN receives all untagged frames from untagged ports. Management VLAN Voice VLAN

Native VLAN

You, as a network engineer, want to have an insight into your network's weaknesses that need attention. You want to search for devices with open ports indicating which insecure service might be used to craft an attack and identify unencrypted sensitive data. Which of the following scanning tools will you use in this scenario? Nmap Metasploit Honeypot Nessus

Nesus

Which of the following is used to create flow records that show relationships among various traffic types? NetFlow SNMP sFlow Syslog

Netflow

Which of the following monitors network traffic and might receive data from monitored devices that are configured to report their statistics? Network monitor Protocol analyzer Reporting Port mirroring

Network monitor

You are working as a network administrator, and you want to conduct simulated attacks on a network to determine its weaknesses. To do so, you want to check for open ports so that you can remote in using that port and craft an attack. Which of the following software will you use to scan for open ports in this scenario? Metasploit Nmap Honeypot Nessus

Nmap

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario? MIMO MU-MIMO Channel bonding OFDMA

OFDMA

Which of the following tools measures the amount of light power transmitted on a fiber-optic line? Tone locator Multimeter OPM Correct. An OPM (optical power meter) measures the amount of light power transmitted on a fiber-optic line. Tone generator

OPM

Which of the following IGPs supports large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops? EIGRP IS-IS OSPF BGP

OSPF

In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur? Back doors Deauth attack On-path attack DNS poisoning

On-path attack

Which of these DoS (denial-of-service) attacks damages a device's firmware beyond repair? DDoS Amplified DRDoS PDoS DRDoS

PDOS

Bryden is a network analyst who has been recruited into Big Bay Burger's security management. Which of the following terminologies must he use to explain to the company's employees about the possibility of someone using a deception in following them into a restricted area? Piggybacking Baiting Phishing Tailgating

Piggybacking

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? Data breach Security audit Exploit Posture assessment

Posture assessment

Which of the following cloud models makes resources available to users through a WAN connection? Hybrid cloud Public cloud Private cloud Correct. In a private cloud model, service is established on an organization's own servers in its own data center or established virtually for a single organization's private use and made available to users over a WAN connection through some type of remote access. Community cloud

Private cloud

Francine, a new network administrator at an online thrift store, is required to use an application that monitors traffic on the interface between a single device and the network. The application must be able to see the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the one computer. Which of the following methods should Francine use to monitor the network traffic? Protocol analyzer Port mirroring Network monitor Reporting

Protocol analyzer

Trevor is working as a network engineer at Spring Oaks High School. The school's management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion? Congestion control QoS Flow control Traffic shaping

QOS

You are the network administrator in Jolene Consultancy Pvt. Ltd., a small consultancy in Missouri. You have been assigned the task of monitoring network traffic in the systems. You must ensure that many devices can be configured to report their traffic and other statistics to a network monitor. Which of the following would you use in this scenario? Port mirroring Reporting Wireless monitoring In-line monitoring

Reporting

You are a network analyst who has been tasked with managing the volume of network traffic across an organization in order to prevent network congestion. On analyzing the current network, you notice that one of the primary reasons for congestion is that the switches used in the network keep resending data packets that have been lost in the transmission far too quickly. Which of the following do you think should be implemented to solve this issue? Retransmission policy Acknowledgment policy Discarding policy Admission policy

Retransmission Policy

Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often? Retransmission policy Window policy Discarding policy Admission policy

Retransmission policy

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer? Straight-through cable Rollover cable Correct. Rollover cables, also called console cables, are used to connect a computer to the console port of a router. Fiber-optic cable Crossover cable

Rollover cable

You have been working as a network administrator at Yong Solutions, which is an ISP (Internet service provider). The switches used in the storage network of the ISP essentially use the STP (Spanning Tree Protocol) for detecting link failures. You have been asked to upgrade the STP because repeated reports of network transmissions being bogged down have been received. Which of the following will you use in this scenario? RSTP SPB Correct. Protocols designed to replace STP, such as SPB, operate at layer 3 instead of or in addition to layer 2, making them more compatible with various types of technologies like the connection protocols used on storage networks. TRILL iSCSI

SPB

Which of the following is considered a secure protocol? FTP SSH Telnet HTTP

SSH

Which of the following is a device or an application that stores or generates information known only to its authorized user? Kerberos SSO Security token MFA

Security token

You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network? Full-duplex Half-duplex RTT Simplex

Simplex

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario? Incorrect port mode Switch spoofing Correct. An attacker connects to a switch and then makes the connection look to the switch as if it's a trunk line. The switch might auto-configure its port into trunk mode when it detects trunk mode on the other end of the connection. A hacker can then feed their own VLAN traffic into that port and access VLANs throughout the network. VLAN isolation Double tagging

Switch spoofing

Which of the following can capture all traffic traversing a network connection? NIDS TAP HIDS IPS

TAP

You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network? The aggregation layer The core layer Correct. The core layer consists of highly efficient multilayer switches or routers that support the network's backbone traffic. Typically, no filtering or routing is performed at this layer so as to minimize the processing required of these switches. Surprisingly, this layer is considered the simplest layer and doesn't need switches with lots of ports. These switches simply need to pass traffic in and out of a few backbone ports as quickly as possible. The access layer The distribution layer

The core layer

Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations? The application plane The control plane The management plane The infrastructure plane

The infrastructure plane

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? Top talkers Top listeners Giants Jabbers

Top listeners

Agar is a network analyst at BMV, a mobile network. He efficiently manages the network's QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario. Traffic policing DiffServ CoS Flow control

Traffic Policing

You have been invited to the University of Bert to deliver a lecture on network security. In your presentation, you want to focus solely on malware that can harm a system or its resources by disguising itself as something useful. Which of the following categories of malware would be best suited to demonstrate such an example? Virus Bot Trojan horse worm

Trojan horse

Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario. Use the EXEC mode to apply the changes Use the global configuration mode to apply the changes Use the privileged EXEC mode to apply the changes Use the interface configuration mode to apply the changes

Use the privileged EXEC mode to apply the changes

Which of the following transceivers supports up to 10 Gbps? XFP SFP QSFP SFP+

XFP

You as a network engineer have finished setting up local security policies for your Windows 10 operating system. Which of the following commands will you use to implement your changes in this scenario? gpudate gpresult floodguard access-list

gpupdate

You are working as a network engineer at Krofter Securities. The organization uses Cisco's Linux OS in all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario? show running-config show ip route route print route

route

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____. a router-on-a-stick Correct. When one router connects to a switch that supports multiple VLANs, it is sometimes called a router-on-a-stick. ICS a native VLAN trunking

router-on-a-stick

Which of the following commands lists a router's routing table information? ip default-network s default-gateway show ip route ip interface brief

show ip route

As a network administrator of Wheeling Communications, you have to ensure that the switches used in the organization are secured and there is trusted access to the entire network. In order to maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which of the following commands will you use to bring your plan to action? disable port-security switchport port-security shutdown

shutdown

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity? Remote wipe Site survey Correct. A site survey helps you determine an AP arrangement that will ensure reliable wireless connectivity within a given area. OS update requirements Trusted access

site survey

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch? set port-mode trunk switchport trunk native vlan Correct. The command switchport trunk native vlan can be used to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. set native-vlan-id ip dhcp snooping

switchport trunk native vlan

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check? Sequence Control Data Frame Control Trailer

trailer

As a network engineer, you have been tasked to form a Gigabit Ethernet for connecting a data center with a data closet in an office building. Identify which of the following fiber Ethernet standards would you apply in this situation. 10GBASE-LR 1000BASE-FX Correct. 1000BASE-SX is a form of Gigabit Ethernet and uses short wavelengths of 850 nanometers. 1000BASE-SX is best suited for short network runs like connecting a data center with a data closet in an office building. 10GBASE-SR 1000BASE-LX

1000BASE-FX

Mr. Anderson had to set up an Ethernet network segment that can transmit data at a bandwidth of 1000 Mbps and cover a distance of 2000 m per segment. The available fiber-optic cable in the market was an SMF cable. Analyze and discuss which of the following fiber Ethernet standards he should follow under such circumstances. 100BASE-SX 1000BASE-SX 1000BASE-LX Correct. A 1000BASE-LX would be ideal in this situation because the maximum transmission bandwidth is 1000 Mbps and the maximum distance per segment is 5000 m for SMF. 100BASE-FX

1000BASE-LX

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you? 64 62 Correct. A /26 mask is the same as 255.255.255.192, essentially leaving 6 host bits. This implies that there are 6 host bits, which means there are 64 possible IP addresses. However, one address represents the subnet number, and one address represents the broadcast address. Thus, 62 addresses can be assigned to network hosts. 30 32

62

Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement? 10BASE-T 10GBASE-T 100GBASE-T Correct. 100GBASE-T is currently the fastest Ethernet standard, which achieves dramatic transmission rates on twisted-pair cabling that is comparable to fiber-optic cabling and is less expensive than fiber-optic. 100BASE-TX

100GBASE-T

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask? 126 62 14 Correct. There will be 14 hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask. 30

14

Identify the core of an RG-6 coaxial cable. 18 AWG Correct. RG-6 cables are made from 18 AWG solid copper. 22 AWG 20 AWG 28 AWG

18 Awg

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address? 192.168.50.255 192.168.50.0 192.168.50.120 192.168.50.118

192.168.50.118

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection? 5.1 GHz-5.8 GHz 1850 MHz-1990 MHz 2.4 GHz-2.4835 GHz Correct. Bluetooth devices operate in the frequency range of 2.4 GHz-2.4835 GHz, so this range should be used in this scenario. 824 MHz-896 MHz

2.4 GHz-2.4835 GHz

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select? 255.255.224.0 255.255.240.0 Correct. The slash notation /20 represents a subnet mask with 20 1s. This would translate to 11111111.11111111.11110000.0000, which in turn would convert to 255.255.240.0. 255.255.255.192 255.255.255.248

255.255.240.0

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario? 255.255.255.240 255.255.255.252 255.255.255.248 255.255.255.224

255.255.255.224

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use? 255.255.255.224 255.255.255.192 255.255.255.248 255.255.255.240

255.255.255.240

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation? 802.11n 802.11ax Correct. The most current Wi-Fi standard at the time of this writing is 802.11ax, which operates in both the 2.4 GHz and 5 GHz frequency ranges. 802.11ax can support higher speeds for more network clients at the same time, which is particularly important for a conference center environment with hundreds or thousands of Wi-Fi clients. 802.11a 802.11g

802.11ax

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps? 802.11n 802.11b Correct. 802.11b has a theoretical throughput of 11 Mbps. 802.11a 802.11ax

802.11b

Fred works as the network administrator at Globecomm Communications. The HR team at Globecomm has come up with a new working policy for the employees. This policy allows the employees to freely work at any time of the day as long as they submit the work within 24 hours. Keeping this policy in view, Fred has to work on strengthening the security of the network by adding additional authentication restrictions. Analyze which of the following Fred should do in this scenario. A.Restrict some user accounts to a specific number of hours of logged-on time B. Specify a particular geographic location C. Specify a particular time of the day for the users D. Specify that user accounts may log on only from certain workstations or certain areas of the network

A

James, a network engineer, has been contracted by a company to monitor network performance. In order to know and analyze any problem in a network, James will need to understand how the network functions in a normal state. Analyze which of the following will be of use to James in this scenario. A. Checking the network's performance baseline B. Checking the interface statistics of the network C. Checking if the network is operating at maximum capacity D. Checking if the connection has jitter

A

Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (Spanning Tree Protocol) features that will block BPDUs (Bridge Protocol Data Units) on any port serving network hosts. Which of the following will he use for such purposes? A BPDU filter A root bridge A BPDU guard Correct. A BPDU guard blocks BPDUs on any port serving network hosts, such as workstations and servers, and thereby ensures these devices aren't considered as possible paths. A root guard

A BPDU guard

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation? A root port A layer 3 switch Correct. Layer 3 switches are less expensive than routers and are designed to work on large LANs, providing faster layer 3 traffic management within the confines of a known network architecture. Storm control An SDN controller

A layer-3 switch

Which of the following switches can be configured via a command-line interface or a web-based management GUI (graphical user interface)? Leaf switches A managed switch Correct. Managed switches can be configured via a command-line interface or a web-based management GUI, and sometimes they can be configured in groups. Spine switches An unmanaged switch

A managed switch

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with? A more negative RSSI value indicates a higher quality of signal. Correct. An RSSI value closer to zero indicates better signal quality. Directional antennas transmit wireless signals along a single direction. The geographical area that an antenna or wireless system can reach is known as its range. TV and radio stations use omnidirectional antennas.

A more negative RSSI value indicates a higher quality of signal.

You have been hired as an assistant to the head network administrator in an ISP (Internet service provider). While setting up the network for one of your clients, he wants you to check whether sufficient security precautions have been taken to ensure none of the customer's switches becomes the ISP's root bridge. Which of the following will you use in this scenario to ensure that the appropriate security measures have been taken? A root guard Correct. A root guard prevents switches beyond the configured port from becoming the root bridge; hence, this will ensure the security measures have been taken. A BPDU filter A root bridge A BPDU guard

A root guard

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address? 2608 1 AA Correct. The fourth hexadecimal block in the site prefix can be altered to create subnets within a site. FE10

AA

Which wireless technology is used to track fitness activity levels and geographic movement? Bluetooth Infrared NFC ANT+

ANT+

Which of the following is not a technique used in a closed-loop response to an existing congestion? Implicit signaling Backpressure Admission policy Explicit signaling

Admission policy

Analyze which of the following can be used to establish a static VLAN assignment for a device. All WLAN traffic grouped within the same VLAN Assigning a VLAN based on the switch port the device is connected to Correct. Devices can be assigned to a VLAN based on the switch port the device is connected to. This is called a static VLAN assignment. Client device information, such as MAC address or location Authentication processes in cooperation with a RADIUS server

Assigning a VLAN based on the switch port the device is connected to

One of the employees in your organization is suspected of hacking into the network. You as a network administrator want to check the user's activity for the last week. Which of the following will you use in such a scenario? Logging level Syslog Audit log Jitter log

Audit log

In order to achieve the utmost fault tolerance, as a network administrator, you want to ensure that critical devices are all equipped with redundant NICs, routers, and processors, which are able to immediately assume the duties of an identical component in case one of the components fails. Which of the following will help you ensure these devices contain the necessary components you require? Hot-swappable parts Clustering Automatic failover Load balancing

Automatic failover

The 3-2-1-1 Rule defines backup principles to follow to reliably recover lost data under a wide variety of adverse conditions. What does the "2" in the second part of the principle denote? A. Keep at least two complete copies of the data B. Save backups on at least two different media types C. Store at least two backup copies offsite D. Ensure that at least two backup copies are stored offline

B

You have been working as the network administrator for JP Steels. In order to cut down on operating costs, you plan to install a firewall's OS (operating system) in a VM on an inexpensive server, instead of purchasing an expensive hardware firewall to protect a LAN. Hence, you no longer require a firewall that runs on its own OS. Which of the following firewalls will you purchase in this scenario? A Fortinet firewall device A firewall device by Palo Alto Networks Barracuda's Cloudgen firewall device Correct. Barracuda's Cloudgen firewall is a virtual firewall that emulates a hardware firewall, and it's hosted in a virtualized environment and should ideally be used in this scenario. A Cisco firewall device

Barracuda's Cloudgen firewall device

Johnathan is the network engineer of an organization that restricts the use of certain webpages. As he does not have any pending work, he decides to take a break and watch a movie online until a task is assigned to him. Analyze which of the following actions is best suited for him in this situation so that the IP address of the organization is not compromised. A. Use a network-based firewall for this purpose B. Use a packet-filtering firewall for this purpose C. Use proxy servers to mask Internet activities D. Use IDS to bypass security protocols

C

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? A. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www B. access-list acl_2 deny tcp any any C. access-list acl_2 permit https any any D. access-list acl_2 permit icmp any any

C

You are working as a network engineer for an ISP. You have successfully set up a home Internet connection for a client. The ISP requires the network engineers to provide a document with specifications and tests that the customer can run on their own to check various aspects of their connectivity. However, in the document that you provided you forgot to mention the functionality of speedtest.net in the document. So, the client calls you with a query about the use of speedtest.net. Which of the following will be your reply to the client in this scenario? A. It is used to test the router's stability. B. It is used to identify Internet access. C. It is used for bandwidth speed tests. D. It is used for broadband cable tests.

C

You have been getting complaints about slow speed from one of your clients. You decide to visit the site to have a look, and you notice that the RJ-45 connector has been tampered with as a result of which there are network fluctuations. These fluctuations are taking place as the pins in the connectors are bent. Which of the following tools will you use to push the pins inside the RJ-45 connector? Cable stripper Snips Wire cutter Cable crimper

Cable Crimper

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes? Cat 5e Cat 6 Cat 5 Cat 6a

Cat 6a

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario? Cat 6 Cat 7 Correct. For a 10GBASE-T standard, Cat 7 is generally preferred. Cat 5e Cat 5

Cat7

An Internet Service Provider has hired you to frame cables for a network connection using TIA/EIA standards so that it can transmit up to 10 Gbps or 40 Gbps at short distances. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes? Cat 8 Correct. A Cat 8 cable is optimized for short-distance backbone connections within the data center and supports up to 40 Gbps over 30 meters. Cat 8 Class I offers the advantage of using connectors that are backward compatible with Cat 5e and Cat 6 standards, which reduces the cost and complexity of installation. Cat 7a Cat 7 Cat 6e

Cat8

Bruno is a network engineer who is tasked with adding a separate layer of protection to the control plane of a router. He wants messages with a bps (bits per second) rate below the threshold 7000 to be transmitted and the messages with a threshold above 7000 to be dropped. Analyze which of the following commands Bruno should use in pmap configuration mode in this scenario. A. match access-group 8000 conform-action transmit exceed-action drop B. policy-map copp-test 8000 conform-action transmit exceed-action drop C. class limit-icmp 8000 conform-action transmit exceed-action drop D. police 8000 conform-action transmit exceed-action drop

D

Kristen has plans of starting an online food delivery company. She plans on making the company one of the most secured portals for online food delivery. She hires Brad, a network consultant, to guide her through the necessary security protocols. Brad conducts all the necessary security checks and involves a white hat hacker too to point out any vulnerability that might be overlooked. Analyze if Brad needs to conduct any other risk assessment procedures in this scenario. A. He should conduct a posture assessment. B. He should conduct a security risk assessment. C. He should conduct a process assessment. D. He should conduct a vendor risk assessment.

D

Nathan has plans of opening a call center. He will require a network connection that will have a bare minimum of 3 Gbps upstream and at least 8 Gbps downstream throughput. Analyze which of the following will provide a solution to Nathan. A. Using a DOCSIS 3.0 for maximum throughput B. Using a DOCSIS 3.1 for maximum throughput C. Using a DOCSIS 2.x (2.0 and 2.0 1 IPv6) for maximum throughput D. Using a DOCSIS 4.0 for maximum throughput

D

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels. TDM FDM WDM DWDM

DWDM

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels. TDM WDM DWDM Correct. DWDM (dense wavelength division multiplexing) increases the number of channels provided by normal WDM (wavelength division multiplexing) to between 80 and 320 channels. Dense WDM can be amplified en route and is typically used on high-bandwidth or long-distance WAN links, such as the connection between a large ISP and its (even larger) NSP (network service provider). FDM

DWDM

What type of attack relies on spoofing? Deauth attack Friendly DoS attack Tailgating Pen testing

Deauth attack

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization? Private VLAN Default VLAN Correct. A default VLAN cannot be renamed or deleted; however, ports in the default VLAN can be reassigned to other VLANs. Voice VLAN Management VLAN

Default VLAN

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario? VLANs Departmental boundaries Correct. Departmental boundaries will include the Accounting, Human Resources, and Sales departments. Geographic locations Device types

Departmental boundaries

You have been hired as a systems analyst by an online food delivering service. Your job requires you to keep the network congestion free during peak hours and to ensure that important traffic can survive the congestion while less sensitive frames are discarded. Which of the following techniques will you use in such a scenario? Window policy Acknowledgment policy Discarding policy Admission policy

Discarding policy

Jilead Inc. is a software development company that is preparing an incident response plan to prepare for possible events such as a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale environmental disaster that shuts down businesses throughout the city or state. The response plan has identified the members of the response team and the responsibilities have been assigned and clearly spelled out to each team member. Stanley Hudson has been entrusted with the responsibility of being the person on call who first notices or is alerted to the problem. He has to create a record for the incident, detailing the time it began, its symptoms, and any other pertinent information about the situation. He must remain available at all times to answer calls from clients or employees. What is the role that Stanley has been assigned? Public relations specialist Technical support specialist Dispatcher Manager

Dispatcher

A fraudulent financial deal has just taken place in the company where you are working as a network administrator. The data of the company will be collected in such a way that it can be presented in a court of law for the purpose of prosecution. Some of the forensic data available for analysis may be damaged or destroyed if improperly handled. You have been assigned the duty to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence. To prevent contamination of evidence, you have made sure that each device involved is isolated-that is, the device is disconnected from the network and secured to ensure that no one else has contact with it until the response team arrives. What is the next step that you will take in the event of such an illegal activity? Monitor evidence and data collection. Protect the chain of custody. Document the scene. Monitor transport and data

Document the scene

You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case? FDM TDM WDM STDM

FDM

Jasper Infotech have an issue with their network system-a malfunctioning NIC on a router caused network outages. They have hired you specifically to ensure that the network system does not collapse when there is an unexpected hardware or software malfunction. Which of the following terms will you refer to while fixing this issue for Jasper Infotech? SDN Fault tolerance Correct. A key factor in maintaining the availability of network resources is fault tolerance, or the capacity of a system to continue performing despite an unexpected hardware or software malfunction. Redundancy SAN

Fault Tolerance

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue? He should check if the antenna has been misplaced. He should check for guest network preferences. He should check whether captive portal user reminders have been set up. He should check whether the geofencing security option has been enabled.

He should check whether captive portal user reminders have been set up.

James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario. EoR switches ToR switches Layer 4 switches Correct. Layer 4 switches operate anywhere from layer 4 to layer 7, and they're known as content switches or application switches. Moreover, the ability to interpret higher-layer data enables switches to perform advanced filtering, keep statistics, and provide security functions. A layer 4 switch should be presented to the client in this scenario. Layer 3 switches

Layer 4 switches

You are hired as a network administrator to monitor an organization's network status on an ongoing basis and to make changes to best meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that one of the modems is repeatedly power cycling to reset network activity. Which of the following KPIs will help you in getting a better understanding of the situation? Utilization Interface statistics Error rate jitter

Interface statistics

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error. Attenuation might lead to loss in signals. Insufficient wireless coverage might be the cause. Interference seems to be the cause. Correct. If intermittent and difficult-to-diagnose wireless communication errors occur, interference might be the culprit. This is the issue in this scenario. Lack of firmware updates might be the cause.

Interference seems to be the cause

At what layer of the OSI model do proxy servers operate? Layer 7 Layer 5 Layer 4 Layer 3

Layer 7

In the formula 2n = Y, what does n represent? It equals the number of bits remaining in the host portion. It equals the number of hosts available in each subnet. It is the number of subnets that result. It is the number of bits that must be switched from the host address to the network ID.

It is the number of bits that must be switched from the host address to the network ID.

You are working as a network engineer at IBV Solutions. The network administrator tells you to prepare a report of all the bad NICs that have been retransmitted, leading to a bad network. Which of the following will you use to state this in your report? Runts Giants Jabbers Ghosts

Jabbers

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here. Noise Jitter Correct. If packets experience varying amounts of delay, they can arrive out of order, which is also known as jitter, or more precisely, PDV (packet delay variation). This might cause streaming video or voice transmissions to pause repeatedly, jump around, or stall out completely. Attenuation RTT

Jitter

Active Directory and 389 Directory Server are both compatible with which directory access protocol? LDAP RADIUS Kerberos AD DS

LDAP

JW Communications has hired you to install a Wi-Fi network on its floor. To provide a seamless network connection, you have decided to install a centralized wireless controller to manage AP redundancy by directing wireless traffic to alternate APs when an AP fails. Which of the following protocols will you apply in order to direct all the wireless frames to the controller? LWAPP Correct. LWAPP (Lightweight Access Point Protocol) is a protocol that directs all access points to the controller by adding an extra header to the frames. EAP ICMP POP3

LWAPP

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator? WPA MAC filtering Correct. MAC filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator. Authentication Encryption algorithms

MAC filtering

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets. MIL Ltd. can create only one single subnet. MIL Ltd. can create up to 65,536 subnets. Correct. An organization with a /48 site prefix can use all 16 bits to create up to 65,536 subnets. MIL Ltd. can create up to 256 subnets. Rodri should use the 2n = Y formula to calculate the subnet.

MIL Ltd. can create up to 65,536 subnets.

Identify which of the following designations can be associated with a member who coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation? Technical support specialist Dispatcher Manager Public relations specialist

Manager

Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers? Broad network access Rapid elasticity Resource pooling Measured service

Measured Service

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable? Fiber transceiver Fiber connector Tone generator Media converter

Media Converter

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation. Use APC ferrules Order a switch with the current demand number Order media convertors Order switches that allow upgradeable interfaces

Order switches that allow upgradeable interfaces

You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation? PAM NDA MDM PUA

PAM

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario? EAP-FAST EAP-MSCHAPv2 PEAP Correct. PEAP (Protected EAP) creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. So, this should be used in this scenario. EAP-TLS

PEAP

What is the service that offers a central authentication point for wireless, mobile, and remote users called? AES EAP RADIUS Correct. RADIUS (Remote Authentication Dial-In User Service) is an open source authentication service used to offer a central authentication point for wireless, mobile, and remote users. WPA

RADIUS

You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily? Broad network access Measured service Resource pooling Rapid elasticity

Rapid elasticity

Which of the following steps of an incident response plan involves the process of repairing affected systems and putting them back in operation to ensure the smooth running of operations? Remediation Recovery Preparation Review

Recovery

Goldwin Enterprises has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. To monitor the entire network, you will require a device that will display sensor data on your configurable dashboard. Which of the following software will you request from the management? Room Alert Monitor by AVTECH PRTG Network Monitor by Paessler Spiceworks Wireshark

Room Alert Monitor by AVTECH

What is an Ethernet packet that is smaller than 64 bytes called? Giant Runt Jabber Ghost

Runt

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation? MTU VLAN hopping Stack master SAID

SAID

An ISP's headquarters is located in Philadelphia, and it has a branch office in Canada. The ISP wants to ship an edge device to the branch location where a non-technical person can plug in the device without any configuration needed on-site. Which of the following should be used in this scenario? Cable broadband MPLS SD-WAN Leased line

SD-WAN

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project? MMF SMF Correct. Laser-generated light travels a single path over the core, reflecting very little. Because it reflects little, the light does not disperse as the signal travels along the fiber. This continuity allows SMF (single mode fiber) to accommodate the highest bandwidths and longest distances (without requiring repeaters) of all wired network transmission media. The Internet backbone depends on single mode fiber. Twisted-pair cable Coaxial cable

SMF

An organization determined that there was an increase in network latency, and it approached you, a network administrator, to solve the issue. You decide that the extra demand on the network device's CPU and memory should be lessened to solve this issue. You also plan on getting a comprehensive view of the network traffic and sample traffic as well. Which of the following will you use in this scenario? Syslog NetFlow SNMP sflow

SNMP

What command requests the next record in an SNMP log? SNMP Get Request SNMP Get Next SNMP Trap SNMP Get Response

SNMP Get Next

You as a network administrator plan on using an NIDS (network-based intrusion detection system) to protect your network. You plan on doing this by monitoring the traffic that will be carried by a switch. Which of the following will you use in such a scenario? FIM HIPS SPAN TAP

SPAN

Which of the following is a more intelligent version of an NIU (network interface unit)? DCE Smartjack modem DTE

Smartjack

Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources? SoD RBAC DAC MAC

SoD

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation? RADIUS Spectrum analyzer Correct. A spectrum analyzer can assess the quality of a wireless signal by scanning a band of frequencies for signals and noise. Wi-Fi analyzer Captive portal

Spectrum analyzer

Which of the following will you use to assign a VLAN based on the switch port the device is connected to? Static VLAN assignment Correct. Devices can be assigned to a VLAN based on the switch port the device is connected to. This is called a static VLAN assignment. Subinterface Dynamic VLAN assignment SAID

Static VLAN assignment

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue? A BPDU guard A root guard A BPDU filter Storm control

Storm Control

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch? Crossover cable Fiber-optic cable Straight-through cable Correct. The straight-through cables are designed for most connections you will need in a network, such as connecting a workstation to a switch or a switch to a router. Rollover cable

Straight-through cable

Which power device prevents momentary increase in voltage due to lightning strikes, solar flares, or electrical problems? PDU Generator Surge protector UPS

Surge protector

The IT department at Zatar Airways has complained of a faulty fiber-optic cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected? Tone locator TDR Correct. A TDR (time domain reflectometer) issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR. Bad connectors, crimps, bends, short circuits, cable mismatches, bad wiring, or other defects modify the signal's amplitude before it returns to the TDR, thus changing the way it reflects. Tone generator OPM

TDR

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus? The default VLAN should not be used. Correct. The default VLAN should not be used because it reduces the risk of VLAN hopping. The native VLAN should be changed to a used VLAN ID. Auto-trunking on switches that do not need to support traffic from multiple VLANs should be enabled. All VLAN ranges should be accepted on each trunk.

The default VLAN should not be used

You are working with an ISP, and you have to impose a maximum cap limit to each client so that your company can predict and purchase accordingly from the network provider. Which of the following terms will you associate with this process? Buffering CoS Traffic policing Flow control

Traffic policing

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? Power management Congestion control Flow control Traffic shaping

Traffic shaping

You, as a network administrator, plan on running a trial for a beta version of an application. The idea is to install the application on a guest machine. You plan on doing this because you would rather have the untested software cause errors on the guest machine than on the host. Which of the following will you use in this instance? FCoE A BPDU guard VirtualBox Correct. You will need to run it on a virtual machine and so VirtualBox seems to be the ideal choice for this scenario. VirtualBox allows up to eight vNICs per VM. CARP

VirtualBox

Robert has been working as a network security expert for Indus Grow Wealth Management, which allows its clients to view their current loan status online. With the recent cases of attempted hacks in banking systems, Robert has decided to test the security systems by hiring hackers to try and analyze the security risks at Grow Wealth Management. Analyze who among the following would best suit Robert's requirement in this scenario. Black hat hackers CVE Gray hat hackers White hat hackers

White hat hackers

Monica, a network engineer at J&K Infotech Solutions, has been contracted by a small firm to set up a network connection. The requirement of the network backbone for the connection is of a couple of switches needing fiber-optic connections that might be upgraded later. Which of the following transceivers should Monica use when the maximum transmission speed is of 8 Gbps? SFP+ XFP QSFP SFP

XFP

Which of the following commands is used to assign a statement to an ACL on Cisco routers? class ip dhcp snooping raguard access-list

access-list

A system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events is called _____. an audit report a backup an audit trail An e-discovery

an audit trail

Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL. policy-map match access-group class limit-icmp class-map limit-icmp

class-map limit-icmp

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario? Isolated VLAN Management VLAN Community VLAN Correct. Hosts within the same community VLAN can communicate with each other but not with hosts in other secondary VLANs. Voice VLAN

community VLAN

A special kind of DoS (denial of service) attack has attacked an AAA server with authentication requests that must all be processed and responded to. The network administrator has analyzed the situation and requested you, a network engineer, to use a command by which you can reclaim compromised resources in case of a similar attack in the future. Which of the following commands will you use in this scenario? access-list floodguard gpudate.exe gpresult

floodguard

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters? Two hops One hop Three hops Four hops

four hops

You are working as a network engineer for an ISP. A ticket has been raised that states that the SMF (single mode fiber) and the MMF (multimode fiber) cables have come apart at the FDP (fiber distribution panel). On checking the situation, you realize that you will need to melt the tips of the two fibers together so that light can pass cleanly through the joint. Which of the following kits will you require in this scenario? Fiber cleaver Ferrule Fiber stripper Fusion splicer

fusion splicer

Which of the following commands can be used to change a device's name? hostname no shutdown ip name-server ip addr address subnet

hostname

You have been assigned the role of a network administrator, and your first task requires you to measure the throughput between network hosts. Which of the following tools will you use in this scenario? NetFlow Spiceworks Wireshark iPerf

iPerf

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet? IB iSCSI Correct. iSCSI (Internet SCSI) is a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet. FC FCoE

iSCSI

Suppose you notice a sudden decrease in network performance and suspect malware is hogging network resources. Which of the following commands will you use to display the PID (process identifier) associated with your network connection? netstat -o netstat -b taskill/f takedown/f

netstat -o

Which of the following will act as a filter to instruct the router to permit or deny traffic from travelling through the network? DHCP snooping ACL CoPP RA guard

ACL

Which of the following will act as a filter to instruct the router to permit or deny traffic from travelling through the network? DHCP snooping CoPP ACL RA guard

ACL

You are a network engineer at BHMS Ltd. The network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. Which of the following will you use in such a scenario? DHCP snooping DAI RA guard ACL

ACL

Which form of communication is well suited to users who receive more information from the network than they send to it? xDSL ADSL SDSL VDSL

ADSL

An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards? NDA Password policy AUP PUA

AUP

Examine the following circumstances as a network analyst and analyze in which of the following conditions MANs (metropolitan area networks) cannot be useful. A. Connecting a hospital with its regional medical centers B. Connecting a clothing manufacturer to sell its products to customers worldwide C. Connecting a city's police stations D. Connecting a home office with its branch offices and a warehouse location

B

Global ISP has received the tender for a project that requires the company to run a fiber connection to provide Internet connection to 120 families in an area simultaneously. Analyze which of the following would be feasible for Globe ISP in this scenario. A. Providing the connection using MON B. Providing the connection using FTTN C. Providing the connection using FTTC D. Providing the connection using FTTB

B

William has been working as a senior networking professional at Mediaworks Ltd. The company has a very strict policy regarding employees' access to certain key rooms in the organization. The company wants William to provide a specific access technology to only a few selected employees so that they can access those certain rooms. Which of the following options are best suited for William in this scenario? Access badges Biometrics Access control vestibule Cipher Lock

Cipher Lock

Which of the following methods requires the entry of a code to open a door? Access control vestibule Biometrics Locking cabinets Cipher lock

Cipher lock

Which of the following methods requires the entry of a code to open a door? Locking cabinets Access control vestibule Biometrics Cipher lock

Cipher lock

Gary is a freelance network analyst. A client approaches him to provide a solution for his firm wherein employees have been found to carry sensitive information out of the office premises. This data breach has led to a lot of market speculations as a result of which there has been a significant drop in the share market prices of the company's stocks. Gary is contracted to find a solution to this issue. Analyze which of the following options should be carried out by Gary keeping in mind the sensitivity of the situation. A. Enforce the principle of least privilege B. Provide social engineering awareness training C. Maintain checks and balances on employee's behavior D. Deploy a DLP solution

D

Identify and analyze whether the implicit deny rule be applied to the following statements or not. A. When the incoming packet is denied in the first test by the ACL B. When the incoming packet is denied in the second test by the ACL C. When the incoming packet is accepted in the second test by the ACL D. When the incoming packet is denied in the third test by the ACL

D

Must Eat is a company that allows online food delivery. Must Eat rolls out updates every month for better user interface. Recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. On inspection, the team notices that there has been no breach of sensitive data. What kind of cybersecurity exploitation was attempted by the hackers in this scenario? A. It could have been an attempted hack by a white hat hacker. B. It could have been an evil twin exploit. C. It could have been an attempted hack by a gray hat hacker. D. A zero-day attack might have been the cause.

D

You as a network administrator want a switch to determine if the message's source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. Which of the following switch security configurations will you use alongside DAI on a network switch in this scenario? CoPP DHCP snooping RA guard ACL

DHCP snooping

You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario? DIA DSL Broadband PTSN

DIA

Huey Dewey Ltd. is a talent management company with over a hundred employees. Gary has been appointed as a system analyst to ensure security across the office networks during and after the period of employment. Some user accounts are given privileged access, which allows the users to perform more sensitive tasks, such as viewing or changing financial information, making configuration changes, or adjusting access privileges for other users. Analyze which of the following security precautions Gary should implement so that he can avoid users logging into the accounts even after their termination. Limited access Limited use Limited privacy Limited duration

Limited duration

Andy Bryant is a network analyst at Freewoods Centre for Policy Research. There are approximately 35 employees currently working on various issues of policy making and research, and this requires access to the network's resources. He has been asked to set a list of dos and don'ts for all the employees to clarify what is acceptable use of company IT resources and what is not. He also needs to explain penalties for violations and describe how these measures protect the network's security. Analyze which of the following security policies Andy should implement in this scenario. An anti-malware policy A PUA (privileged user agreement) An NDA (non-disclosure agreement) An AUP (acceptable use policy)

An AUP

The HR manager of Veep Communications notices a lot of employees waste valuable time surfing social media websites. The HR manager requests you (a network administrator) to prevent the employees' access to these websites. Which of the following firewalls will you use in this scenario? Host-based firewall Application layer firewall Packet-filtering firewall Stateless firewall

Application layer firewall

Question 81 / 1 pts Hilary is an employee of Munich Securities. The HR manager has received a complaint from one of her fellow employees about her misusing her account. You as a network administrator want to conduct a user configuration check to ensure that there are no vulnerabilities to the network configuration. Which of the elements of the AAAA acronym will you use to apply this security measure? Authorization Auditing Authentication Accounting

Auditing

Identify which of the following terms defines the process of verifying a user's credentials. Authentication Auditing Authorization Accounting

Authentication

You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization's resources. Which of the elements of the AAAA acronym will you use to apply this security measure? Accounting Authentication Auditing Authorization

Authentication

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this. A. Multi-vendor routers B. Low overhead, fast convergence C. Shared data D. Stability

B

As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context. A. Specify a particular time of the day for users to be logged in B. Set a limit on consecutive login attempts C. Specify a geographic location D. Specify the maximum hours that a user can be logged in

B

Browski is a company that deals with SD-WAN (software-defined wide area network) units. The management of Browski wants to present an audio-video presentation at one of the network exhibitions to demonstrate its new product. As a network administrator working there, you have been asked to go through a few pointers in the presentation to verify the accuracy of the content. Analyze if any of these aspects do not apply to SD-WAN. A. SD-WAN has zero-touch provisioning. B. SD-WAN can be more expensive than leased lines. C. SD-WAN is transport agnostic. D. SD-WAN provides better intent-based management.

B

Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer? DTE CSU/DSU NIU Line driver

CSU/DSU

Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems? CVE Phishing Quid pro quo Zero-day exploit

CVE

The University of Claudine plans on opening a new IT division for underprivileged students so that it can offer education free of cost to them. However, the university wants to ensure that there are no data breaches, so it has requested the network administrator to handle the configurations of the computers in order to comply with the organizational policies. Analyze which of the following practices the university should adopt in this scenario so that the network securities are not compromised. BYOA CYOD BYOC BYOT

CYOD

Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target? PDoS attack Amplified DRDoS attack DRDoS attack DDOS attack

DRDoS attack

Which of the following devices contains ports to connect both to an incoming telephone line and to a computer or network connectivity device? NIU Local loop DSL modem PSTN

DSL modem

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administrator to determine the best solution to this problem. Which type of routing path will you use to solve this problem? Dynamic route Gateway of last resort Static route Default route

Dynamic route

You are working as an executive for a cable company. A client raises a request to set up a network that uses fiber-optic cabling to connect your company's distribution center to distribution hubs and then to optical nodes near its customers. From the following network options, which one would you recommend in the given scenario? DOCSIS Cable broadband Cable modem HFC

HFC

Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario? Metasploit Nmap Honeypot

Honeypot

Michelle has been inducted into an organization as a trainee. Which of the following firewall software should she use to protect only the computer on which it is installed? Host-based firewall Packet-filtering firewall Stateful firewall Stateless firewall

Host-based Firewall

Bradley has been running a business in his garage for over a period of 10 years. He plans on expanding the business by opening up three new offices in three different cities. Since he has accumulated sufficient profits to move to a larger office space, he plans to upgrade his network connection to one with a dedicated and symmetrical bandwidth. Bradley approaches Mantle Solutions, an ISP. Which of the following options should be offered by the ISP in this scenario? Cable broadband MPLS SD-WAN Leased lines

Leased Lines

The organization where you have been working as a network analyst decides to provide BYOD (bring your own device) options to the employees to cut down on its operating costs. The company has asked you to handle the BYOD policies and the necessary documentation. You have decided to install a software that will automatically handle the configuration process for the wireless clients when they require network access. Which of the following will you use in such a scenario? PUA MDM AUP NDA

MDM

Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes? Nessus Nmap Metasploit

Metasploit

You are working as a network analyst at BBM Infotech. The entire network of computers in the organization had recently been at the receiving end of an attempted hack that eventually turned out to be unsuccessful. However, certain computer systems have sustained sufficient damages. After inspection, it has been found that the firmware in few of the switches has been completely damaged because of the attack. What kind of an attack is this most likely to be? PDoS attack Friendly DoS attack Deauth attack DRDoS attack

PDOS attack

As a network administrator, you are already aware of the possible option of using a default trust relationship between a network device and another by a hacker to access an entire network. Which of the following security measures will you use to prevent a possible DoS attack that can be induced by sending high volumes of router advertisement messages? RA guard CoPP DHCP snooping DAI

RA guard

XYZ Ltd. is a company that has 12 regional offices around the world. All the major operations of the company are carried out from the headquarters based in New York. XYZ Ltd. has approached you, a network facilitator, to install a WAN service that can manage network configurations at multiple locations throughout the world. Which of the following WAN services would you advise to XYZ Ltd. in this scenario? DSL Fiber broadband Cable broadband SD-WAN

SD-WAN

As a network analyst, you have to separate the digital communication of data in a GSM network. Which of the following will you use in this scenario? TDM CDMA SIM TDMA

TDMA

Which of the following is used to issue tickets to an authenticated client for access to services on the network? TGS SSO AS KDC

TGS

Hammond Industries has appointed Gavin as the network administrator to set up a complete secured and flawless network throughout the office premises. One of the employees has come to him to fix an error message that keeps popping up every time he tries to open the web browser. He also states that this error started popping up after the external hard drive had been used to transfer some of the necessary documents to the HR's office. Analyze what kind of malware might possibly be behind this error. Trojan horse Worm Ransomware Virus

Virus

You are working as a network analyzer for an ISP. A client has approached you to set up a network connection for a bank with offices around the state. The network needs to connect these offices with each other in order to gather transaction and account information into a central database. Which of the following connections will you provide in this scenario? WAN MAN CAN LAN

WAN

In which of the following do the bits work opposite of how bits in a subnet work? CoPP Wildcard mask ACL RA guard

Wildcard mask

You are employed as a network engineer. While setting up a client's connection, the client requests you to display the concise network layer information of the device interface that is being installed. Which of the following commands will you use in this scenario? a. sh ip int br b. sh int sw c. sh int tr d. sh int

a

You are employed as a network engineer. While setting up a client's connection, the client requests you to display trunks configured on a switch. Which of the following commands will you use in this scenario? sh int sw sh int tr sh ip int br sh int

sh int tr


Set pelajaran terkait

Computer Forensics Chapter 1 Review Questions

View Set

Chapter 17: Sustainability and the Supply Chain

View Set