CIT 370 Final
The cooler in this image would be best suited as a _________fan.
(Zalman) processor
the cooler in this image would be best suited as a __________ fan.
(dynex blue) case
The cooler in this image would be best suited as a ______ fan.
(red fan) chipset
Your CPU fan operates on which voltage?
+12V
You are checking a Molex drive power connector. In addition to the +12V what other voltage should be present?
+5V
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
Cat 5e, Cat 6a, Cat 7
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
Cat 6a
You take a full backup of the source data on Monday. Rest of the week, you take differential backups. What would the differential backup of Friday contain?
Changes since the full backup
Which Bluetooth class has the highest power output?
Class 1
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Coaxial cable, F-connector
Which of the following are examples of Software As A Service (SaaS) cloud model? [Choose all that apply.]
Concur Google Apps Salesforce
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil Twin
You can use this type when you want to provide virtual machines with access to a physical network so they can communicate with externally located servers and clients
External virtual networks
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHSS
Refer to the exhibit. Which of the following configuration is being displayed?
Fault tolerance
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Fiber type mismatch
You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____
Full
Refer to the exhibit. Which of the following configuration is being displayed to increase the network uptime?
High availability
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Hypervisor
Which of the following is an example of a public cloud? [Choose all that apply.]
IBM Bluemix Amazon Web Services Microsoft Azure
Which tunneling protocol is a component of the IPsec protocol suite?
IKEv2
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
While troubleshooting an E-mail client issue on a user's system, you that the incoming mail server settings are configured to listen on port 143. How will the client be able to access E-mails if you continue to use port 143? [Choose all that apply].
Incoming E-mails will be stored on the server You can use multiple devices to access E-mails
When restoring a backup, which of them is likely to be most time consuming to restore?
Incremental
Which one of the following wireless transmission types requires a clear LOS to function?
Infrared
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Integrity
You can use this type when you want to oallow network communication between virtual machines on the same virtualization server and between virtual machines and the management operating system
Internal virtual networks
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
For which processor does Intel recommend using a liquid cooling system?
LGA2011
Intel recommends a liquid cooling system for processors that use which Intel socket, which is typically used on high-end gaming computers?
LGA2011
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 3
Which of the following types of authentication will continue to function even if network connectivity to any available AAA servers is lost?
Local authentication
Which fiber connector contains two strands of fiber in each ferrule?
MTRJ (Mechanical Transfer-Registered Jack)
What Windows utility can you use to test RAM?
Memory Diagnostics
With which network connection type does the VM obtain IP addressing information from its host?
NAT mode
In which of the following applications can a virtual IP address be used? [Choose all that apply].
NATGateway Redundancy Protocols
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
Which of the following is the correct use case for a public cloud? [Choose all that apply.]
Need for auto-scaling environment to host large Web applications Host of latency intolerant Web tiers
At which OSI layer does IP operate?
Network Layer
______________ in SONET are analogous to the ________________ of T-carriers.
OC levels, digital signal levels
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Online UPS
Using port 110, you have configured an E-mail client to retrieve E-mails from a remote server over a TCP/IP connection. Which protocol is the E-mail client configured with?
POP
During the boot process, what are error messages printed on a black screen likely caused by?
POST error
Which remote access protocol is used over an Ethernet network?
PPPoE
Which of the following is considered a secure protocol?
SSH
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
Which of the following cloud model is like thin-client model of software provisioning
SaaS
Refer to the exhibit. Which of the following approach to computer networking is being displayed?
Software Defined Networking (SDN)
You will see two types of fan headers for motherboards. There are 4-pin connector and 3-pin connector designs. Either will work, so what does the extra wire control?
Speed
Which of the following is true about Load balancing on a network? 1) Provides redundancy 2) Provides an increase in throughput 3) Increases CPU resources
Statements 1 and 2 are true
Which of the following statements is true about Fault tolerance? 1) It is a direct result of the design of the network itself. 2) It is the name of the feature that allows for dual layer 2 connections between switches. 3) Enables a network to continue functioning normally in case of a partial failure.
Statements 1 and 3 are true
Which of the following IP network configuration elements a DHCP server, running on Windows Server 2012, can provide to a Windows 10 system? [Choose all that apply.]
Subnet mask, IPv4 address
If you need to perform port scanning in your network, which of the following tool are you likely to use? [Choose all that apply].
Superscan Angry IP Scanner
Refer to the exhibit. Which authentication protocol is shown in this exhibit?
TACACS+
You are required to implement an AAA solution for several services found within the corporate network. Which of the following protocols would you use?
TACACS+
Which protocol's header would a Layer 4 device read and process?
TCP
What method does a GSM network use to separate data on a channel?
TDMA
A user complains of a dead laptop battery. You want to check that the system is operational. You get his AC adapter and plug it in to the wall socket. What do you check next?
The charger LED indicator
You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine?
Virtual NIC
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Virtual Switch
You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?
Virtual Switch
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
Wireshark
When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If this is not done correctly, which of the following can occur?
a VLAN mismatch
Which device in the computer case uses the least amount of wattage?
case fan
Which of the following is a round air duct that helps to pull and direct fresh air from outside the case to the cooler and processor?
chassis air guide
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
checksum
What kind of network is the PSTN?
circuit-switched
Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this?
client-to-site
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
cold site
Employees are complaining that the network seems to be slow. How could you quantitatively determine if this is the case?
compare network performance to baselines
What kind of firewall blocks traffic based on application data contained within the packets?
content-filtering firewall
A cooler made of which of the following will do the best job of conducting heat?
copper
When considering the metals used in your processor cooler, which is the best overall choice?
copper with aluminum fins
You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?
network-to-network
ou just purchased a CPU upgrade retail box set. This is a way for the manufacturer to guarantee that the fan and CPU are paired efficiently. When you examine the parts you see the ATX12V1 motherboard connector is white. the connector on your CPU is black. They have the same configuration otherwise. Is this a problem?
no
When you looked at the power cable connection point and On/Off switch on the back of the unit, what was different?
no voltage selector
Your system is overheating. Which of these should you try?
none of these choices
What type of cooler contains pipes filled with liquid that helps draw heat away from the CPU toward the fins on the cooler?
passive CPU cooler
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
penetration testing
You encounter a system that does nothing when power button is pressed. What do you check first?
power to the unit
Which would be the LEAST likely application for the heat sink in this image?
processor
The cooler in this image would be best suited as a ______ fan.
processor (intel)
When the processor overheats and the system restarts, what type of error has occurred?
processor thermal trip errors
What term is used to describe each circuit provided by the power supply?
rail
You are troubleshooting a hard drive with intermittent problems. You have talked to the user and backed up the drive. What is your next step
run manufacturers diagnostics
Some laptops contain a second battery. What is this battery called?
sheet battery
You have noticed over the past two days your phone is running hot. It's always on but never got hot before. What should you do first?
shut down then restart the phone
What is the main obstacle to using passive heat sinks?
size
What kind of device can monitor a connection at the demarc but cannot interpret data?
smartjack
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
speed
A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the network Which of the above statements is true?
statements 2 and 3
When uninstalling a device from Windows Device Manager you have the option of removing the driver software. This is known as deleting the driver ___________.
store
Your system crashes displaying a blue screen and a long error number. What is the common term for this condition?
BSOD
When checking the SATA power connector which voltage should NOT be present?
-3.3V
How many beeps does startup UEFI/BIOS give to indicate a successful POST?
1 beep
What is the Internet standard MTU?
1,500 bytes
What option should be selected on a voltage selector for a power supply being used in the United States?
115V
If one of the 12V rails required 150 and the second needed 350, how much wattage would the first rail get? in the space provided, enter only the numeric value
150
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?
200 GB
What is the approximate wattage rating of a motherboard, processor, memory, keyboard, and mouse?
200-300 watts
How many bits of a Class A IP address are used for host information?
24
Which formulas can be used to calculate the magic number? Choose two.
256 - the interesting octet 2h
What is the formula for determining the number of possible hosts on a network?
2h - 2 = Z
To know what size power supply you need, add up the wattage requirements of all components and add how much more?
30%
When calculating your power requirements the power supply should be rated ____ higher than your expected needs.
30%
How many pins does the CPU fan header on a motherboard have?
4 pins
when calculating the wattage for a power supply by estimating its needs, how much wattage would you allow for a fan?
5W
since you've determined that the power supply is a 700W dual rail, what does that make the maximum output power?
700
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11n
Which IEEE standard determines how VLANs work on a network?
802.1Q
Good processor coolers maintain a temperature of what range?
90 -110 degrees
Refer to the exhibit. Which of the following networking device is being shown in the middle in red color?
A UTM or Unified Threat Management is a hardware device, a software, or a cloud service that is capable of running multiple services at once. It has all the functionality of a firewall, a VPN server, content filtering and much more. Mostly, a UTM is deployed as a firewall to prevent any unauthorized entry into the network.
A routing protocol's reliability and priority are rated by what measurement?
AD
Which of the following are examples of Platform as a Service (PaaS)?
Apprenda
Your network comprises of multiple switches and a single router. Currently, all users of finance and marketing on the third floor are connected to a flat switch. You must segregate traffic between your finance and marketing groups. You need to ensure that critical finance information can flow without delay to the finance users and ensure additional level of security. What should you do?
Configure VLANs on the switch
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?
DHCP relay agent
What specifications define the standards for cable broadband?
DOCSIS
You are asked to perform an analysis on the network that will allow you to deduce information from patterns in communication. Which of the following types of analysis are you asked to perform?
Data traffic analysis
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
DirectAccess
The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?
Distributed switching
Which cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
What port do SNMP agents listen on?
Port 161
Which of the following can be prevented if DHCP snooping is implemented on a switch? [Choose all that apply].
Preventing the malformed DHCP traffic, Preventing the rogue DHCP servers
You can use this type when you want to allow network communication between virtual machines on the same virtualization server. A private virtual network is not bound to a physical network adapter. This type of network is useful if you want to create an isolated network environment
Private virtual network
Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?
Privileged user agreement
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
Rogue AP
Which remote file access protocol is an extension of SSH?
SFTP
An E-mail client application uses port 25 to connect to the outgoing E-mail server. Which protocol is being used in this scenario?
SMTP
You have recently installed a new firewall on network. After the firewall is installed, you review the firewall logs and notice that port 25 incoming traffic is blocked. Which of the following protocol is impacted with this?
SMTP
Which of the following are characteristics of the MTU when applied to IP and Ethernet networks? [Choose all that apply.]
The default MTU is 1500 bytes The MTU is the largest size an encapsulated segment can have
If users in your organizations use laptops and mobile to access online E-mail accounts. You are using IMAP as the protocol. What will happen if a user, using both mobile and a laptop, deletes one E-mail using either of the device?
The deletion of the E-mail will occur on both the devices
Identify the correct statement for a switch's MAC Address Table. It is possible to have more than one MAC address corresponding to a single port. It is possible to have more than one port corresponding to a single MAC address.
The first is true, the second is false
You have been experiencing connectivity with various websites. The response time to open these websites is high. You tested the same websites from your home and could open them much faster. You assume that the slow access to the Websites might be due to high latency. Which of the given utility is likely to help you in finding the source that may be causing the latency issue?
Traceroute
Which of the following protocols is a centralized Authentication, Authorization and Accounting protocol?
UTM appliance
Which DSL standard has the fastest speeds immediately outside the CO?
VDSL
Your colleague has configured a trunk between two switches. You notice that the configuration on each end is inconsistent. On one of the switch, your colleague has configured VLAN 10 and on the second switch, no VLAN is configured. With this configuration, which problem are you likely to face?
VLAN mismatch
Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?
VPN concentrator
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address
access-list acl_2 permit http any any
Your machine beeps once during boot. What does this indicate?
all is well
The CPU cooler in this image uses several methods of heat dissipation. What are they? select the best answer from the choices provided.
all these choices are correct (heat pipes, fan, fins, copper)
You are configuring two switches of different vendors such that they connect to each other via a single link that will carry multiple VLANs. What kind of trunk link must you configure for the two devices to successfully function in this manner?
an IEEE 802.1q trunk
A user's hard drive is making a whining noise when powered up. What should you do after talking to them?
back up the data
A user complains of a dead laptop battery. You want to check that the system is operational. You get his AC adapter and plug it in to the wall socket and then the PC. It doesn't boot. You remove the battery and the laptop boots. Your diagnosis?
bad battery
Which transmission characteristic is never fully achieved?
bandwidth
The bottom of a CPU cooler is shown in this image. Why would copper be used here over the more widely seen aluminum?
better heat conductor
A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
bluejacking
An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
dedicated line, virtual circuit
You have a system that will not boot. What would be the first step in trying to resolve the issue?
disconnect all unnecessary peripherals
What common household element can, over time, reduce airflow, insulate components, reduce heat exchange or even cause the system to hang or reboot?
dust
Which of the following is true about the OSPF routing protocol?
each router has complete knowledge of the network topology
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
eight
You have just upgraded your case fan. When installing it you notice that the old fan used 3 pins and that your new one has 4 pins. this isnt a problem because the intended fan header has four pins. What is the extra pin for?
fan control
What is another term for a passive heat sink?
fanless
You are working on a system that is displaying intermittent signs of a power problem. When you check the system there is no air blowing out of the power supply. What do you do?
get a new power supply
When troubleshooting, a clicking noise might indicate which of the following?
hard drive is failing
Active coolers require power for the fan. In most cases this is supplied by a motherboard component called a ___________.
header
What is the first step in the six-step model for computer troubleshooting?
interview the user
Battery packs today use which of the following technologies?
lithium ion
A short might occur if some component on the motherboard makes improper contact with the chassis. What is the most likely cause of this improper contact?
missing standoff
You want to run the Windows memory Diagnostic from a Command Prompt. What command would you type?
msched
What do well-chosen subnets accomplish?
network documentation is easier to manage
To troubleshoot a network problem, you are required to use a packet analyzer on a Unix based system. Which of the following command line interface commands will provide you with the required functionality?
tcpdump
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
the fourth one
What kind of information would you expect to find within a network device's event log? [Choose all that apply].
time of events, event descriptions
Why would an attacker perform a brute force attack?
to gain access to a protected system
Which of the following is not a good reason to segment a network?
to increase the number of networking devices on a network
Why would a network administrator implement vulnerability scanning on a network?
to reveal vulnerabilities in the network
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
tone locator
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
top listeners
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
trunk
You have what looks like a failing audio card. What is a good way to diagnose this?
try another known good card
Which of the choices provided would best utilize the slim design of the cooler in this image?
video card
Your system is running slow and not always responding to key strokes immediately. What would cause this?
virus
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
white/green
During a service call what is the last thing you do?
write down the events and steps you took
Looking at the motherboard in this image, you see the SYS_FAN connector. Will the connector support a 4 pin connector?
yes
How many channels are in an ISDN PRI connection?
23B+D
You need to implement high availability in your network. One implementation company ensures that their implementation will provide 99% of availability in a period of one year. With the mentioned availability, what would be the total downtime in a year?
3.65 days
What feature of Windows Server allows for agentless authentication?
AD (Active Directory)
Refer to the exhibit. Which of the following type of attack is being depicted?
ARP poisoning
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Access Control
RADIUS provides AAA services. What does AAA stand for?
Authentication, Authorization and Accounting
Which routing protocol does an exterior router use to collect data to build its routing tables?
BGP
When a switch receives data on one of its ports, what is the next step does it perform?
Checks the MAC table for the destination system
A DNS server is tricked into returning incorrect IP addresses for specific domain names
DNS poisoning
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNS poisoning
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection DoS) attack
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
DiffServ
Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. However, you receive a security message from the operating system stating that this service is blocked on your workstation. What could be the probable cause?
Host-based firewall settings are those that are configured on each individual workstation. The firewall may be provided by the operating system itself or may be a standalone software package that provides security features and functionalities to the network connection of the device. If there are incorrect settings on this firewall, legitimate services may be blocked, and if so, a message usually informs the user of such a violation. In such cases, firewall settings should be adjusted to allow for desired services to function.
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?
Load balancer
You have added a new device to the network management application. What else should you add to the network management application to be able to control it?
MIB
A network administrator is implementing a ping from one end of the network to the other, records the average round-trip time and archives the results. What is most likely being prepared?
Network performance baseline
Which of the following networking protocols provide a centralized authentication, authorization and accounting management system for users that connect and use network services?
RADIUS
A password policy as part of a network user agreement may require users to do which of the following? [Choose all that apply].
Require a minimum number of characters Require at least one of different kinds of characters (numbers, capital letters)
You are asked to monitor a network which has a network monitoring system. Using the monitoring server, you notice that it is listening on port number 161 for network events. Which network monitoring protocol is in use?
SNMP
You want to monitor the routers for their performance. In case of a performance bottleneck, you need to be alarmed. Which of the following protocol should you use?
SNMP
What command requests the next record in an SNMP log?
SNMP Get Next
Refer to the following statements. Within the operation of the SNMP protocol, which of the following describes a MIB correctly? a database used for managing the entities in a communications networkit has a hierarchical structureprovides connectivity via SQL database queries and web interface capabilities
Statements 1 and 2
While examining frames on the network using a packet analyzer, you observe several frames that are double tagged. What kind of attack could a host on the network be performing that may result in this?
VLAN hopping
What software might be installed on a device to authenticate it to the network?
agent
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
application awareness
By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?
bandwidth and delay
You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?
baseline review
Where does an MPLS label go in a PDU?
between layers 2 & 3
If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?
by implementing a limit on the number of hops allowed in a path
A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?
default route
You would like to determine the domain name of a specific IP address that exists on the Internet without using a web browser. Which of the following tools could you use for this?
dig
Refer to the exhibit. Which of the following type of attack is being depicted?
evil twin
When a router can't determine a path to a message's destination, where does it send the message?
gateway of last resort
When shopping for a new router, what does the MTBF tell you?
how long devices like this one will last on average until the next failure
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols? layer 3
layer 3
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
insider threat
You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?
it will continue to route traffic on the same path
At what layer of the OSI model do proxy servers operate?
layer 7
Which of the following types of authentication and access control does not need an external AAA server to verify credentials inputted by users?
local authentication
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
logic bomb
Which OSI layer is responsible for directing data from one LAN to another?
network layer
To reduce any kind of network congestion bottleneck, you have configured client-side caching. Which of the following is likely to use this configuration?
offline folders
You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?
password policy
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
phishing
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following types of attacks is this?
phishing
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
posture assessment
A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rather than the legitimate network server. What kind of attack is this?
spoofing
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
static route
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
switchport port-security
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
traffic shaping
You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?
upgrade the firmware on the wireless router
Which of the following features is common to both an NGFW and traditional firewalls?
user authentication