Network+ practice test questions
A strong password that meets the password complexity requirement should contain: (Select best answer) Uppercase letters (A-Z) Digits (0-9) Non-alphanumeric characters if permitted (e.g. !, @, #, $) Lowercase letters (a-z) A combination of characters from at least 3 character groups
A combination of characters from at least 3 character groups
Which of the answers listed below refers to a technology designed to provide connectivity between servers and data storage devices over fiber-optic or copper cable links? FCoE Frame relay DMVPN Fibre Channel
Fibre Channel
A type of attack that relies on intercepting and altering data sent between two networked hosts is known as: Zero-day attack MITM attack Watering hole attack Replay attack
MITM attack
The arp command can be used to perform what kind of resolution? IP to FQDN MAC to IP IP to MAC FQDN to IP
IP to MAC
A type of layer 2 network switch with configuration features that can be modified through a user interface is referred to as: Virtual switch Multilayer switch PoE switch Managed switch
Managed switch
A network link consisting of two dissimilar transmission medium types requires an intermediary device known as: -Coupler -Patch panel -Content filter -Media converter
Media converter
Which type of network topology provides the highest level of redundancy? Ring Mesh Bus Star
Mesh
Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? AES PSK RC4 IKE
PSK
VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers) T1/T3 lines Site-to-site VPN PSTN E1/E3 lines Remote-access VPN POTS
PSTN POTS
Which type of agreement would be the most suitable for regulating responsibilities of users with administrative rights on a network? PUA NDA SOW AUP
PUA
A dedicated software tool used for monitoring and examining contents of a network traffic is called: (Select 2 answers) Port scanner Packet sniffer Vulnerability scanner Protocol analyzer Network mapper
Packet sniffer Protocol analyzer
Which of the following examples meets the requirement of multi-factor authentication? Password and biometric scan Username and PIN Smart card and ID badge Iris and fingerprint scan
Password and biometric scan
The two factors that are considered important for creating strong passwords are: (Select 2 answers) Password length Minimum password age Password history Password complexity Maximum password age
Password length Password complexity
An Ethernet straight-through cable is also commonly referred to as: Rollover cable Crossover cable Patch cable Yost cable
Patch cable
Which of the following answers refers to an SSL/TLS-based directory access protocol? -H.323(IP signaling with ITUnion, same as SIP) -PPTP(Point to point tunneling, uses MSCHAP) -Kerberos(uses secret-key cryptography) -LDAPS(Secure light directory access)
LDAPS(port 636)
Examples of technologies used for SAN connectivity include: FCoE InfiniBand iSCSI Fibre Channel All of the above
All of the above
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP(Transmissioncontrol protocol) DNS(Domain name service) SQL(Structured querylanguage) DHCP(Dyna host config protocol)
DNS, tcp and udp port 53
A wireless disassociation attack is a type of: Downgrade attack Brute-force attack Denial of Service (DoS) attack Cryptographic attack
Denial of Service (DoS) attack
Which of the following EAP methods offers the highest level of security? PEAP EAP-FAST EAP-TLS EAP-TTLS
EAP-TLS
POP3 is used for: Name resolution Sending email messages File exchange Email retrieval
Email retrieval
Domain information groper (dig) and nslookup are command-line tools used for DNS queries. Both utilities are available on Windows and Linux. Of the two, nslookup is the preferred tool on UNIX-like systems; dig is the default DNS query tool for MS Windows. True False
False
Which of the tools listed below is used for attaching wires to a patch panel? Cable crimper Punchdown tool Cable stripper Needle-nose pliers
Punchdown tool
A type of protocol used in network management systems for monitoring network-attached devices is called: SMB(Server message block) NTP(Network time protocol) SNMP(Simple network management) RDP(Remote desktop proto)
SNMP(UDP 161 manager, UDP 162 clients)
A metric that compares the amount of usable data and the background noise that is being sent over a transmission channel is known as: BRI SNR RFI SVC
SNR
Which of the answers listed below refers to a secure replacement for Telnet? CHAP(Chal handshake auth protocol) FTP (File transfer protocol) SNMP(Simp network manage protocol) SSH(Secure shell)
SSH, tcp and udp port 22)
A unique WLAN identifier (a.k.a. wireless network name) is commonly referred to as: EUI SSID OUI CNAME
SSID
Examples of copper cabling types used in Ethernet networks include: (Select all that apply) STP Multimode UTP Single-mode Coax
STP UTP Coax
Secure Shell (SSH) protocol runs on: TCP port 21 UDP port 22 TCP port 20 TCP port 22
TCP port 22
A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? TCP port 1720 TCP port 636 TCP port 3389 TCP port 445
TCP port 3389
Which of the following ports is used by HTTPS? TCP port 80 TCP port 443 UDP port 53 TCP port 143
TCP port 443
Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) UDP port 67 TCP port 5060 TCP port 389 UDP port 68 TCP port 5061 TCP port 3389
TCP port 5060 TCP port 5061
A single non-standard Ethernet frame that allows for much larger maximum payload size is commonly referred to as jumbo frame. True False
True
For a wireless client to be able to connect to a network, the security type (e.g. WEP, WPA or WPA2) and encryption type (e.g. TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP). True False
True
Optical Time-Domain Reflectometer (OTDR) is a type of specialized cable tester that allows for locating faults and breaks in fiber-optic cabling. True False
True
Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers) UDP port 53 UDP port 67 UDP port 68 UDP port 69 UDP port 161
UDP port 67 UDP port 68
Which of the following answers refers to a non-proprietary RDP alternative that enables control over another computer on the network with the use of a graphical user interface? VTP VRF VTC VNC
VNC
Which of the terms listed below refers to a solution that allows multiple operating systems to work simultaneously on the same hardware? Virtualization Clustering Hyperthreading Multitasking
Virtualization
Which network device enables centralized management of WAPs? VPN concentrator Load balancer Multilayer switch Wireless LAN controller
Wireless LAN controller
A command-line utility in MS Windows used for displaying protocol statistics and current TCP/IP network connections is called: tracert traceroute netstat nslookup
netstat
Which of the tools listed below can provide information on network latency problems? (Select 3 answers) ping Packet analyzer Network mapper tracert/traceroute netstat
ping Packet analyzer tracert/traceroute
A type of computer security solution that allows to define and enforce network access policies is referred to as: NAC NIDS NFC NAT
NAC
A cold site is the most expensive type of backup site for an organization to operate. True False
False
A forward DNS lookup zone returns a domain name for a given IP address. True False
False
A reverse DNS lookup zone is used for finding an IP address associated with a given domain name. True False
False
High MTBF value indicates that a component or system provides low reliability and is more likely to fail. True False
False
The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP network server. True False
False
Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP doesn't support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. True False
False
What is the function of a Time-Domain Reflectometer (TDR)? -Finding breaks in copper network cables -Locating the beginning and the end of a cable in a cabling bundle -Checking network installation for compliance with TIA or ISO standards -Finding breaks in fiber-optic network cables
Finding breaks in copper network cables
Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask? /25 /26 /27 /28
-/27 -/28
A network connecting computers within a small geographical area such as a building or group of buildings is known as: PAN(Personal area) LAN(Local Area) MAN(Metro area) WAN(Wide area)
-LAN
A type of cloud infrastructure available solely for a single organization is known as: Public cloud Community cloud Hybrid cloud Private cloud
-Private cloud
Network Time Protocol (NTP) runs on UDP port: 123 110 161 137
123
Which of the following answers refers to the maximum data transfer rate of E3 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
34.368 Mbps
QSFP offers data transfer rates of up to: 1 Gbps 1.6 Gbps 2 Gbps 4 Gbps
4 Gbps
21 28 36 45
45
Which part of the AAA security architecture deals with the verification of the identity of a person or process? Authentication Authorization Accounting
Authentication
Which of the answers listed below refers to the process of granting or denying access to resources? Authentication Authorization Accounting
Authorization
Which of the answers listed below refers to a special type of frame used by STPs? MTU Jumbo frame BPDU ATM cell
BPDU
Which of the following answers refers to a security policy enforcement software tool or service placed between cloud service users and cloud applications? UTM CASB NGFW DMVPN
CASB
What is the name of an AES-based encryption mode implemented in WPA2? CCMP ECB CBC TKIP
CCMP
Which of the following answers refers to the minimum requirement for twisted-pair copper cabling in modern Ethernet networks? Cat 3 Cat 5 Cat 5e Cat 6 Cat 6A
Cat 5e
A disaster recovery facility that provides only the physical space for recovery operations is called: Hot site Warm site Cold site Mirror site
Cold site
An application software used to selectively block access to certain websites is an example of: Captive portal Firewall Content filter Proxy server
Content filter
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as: Geofencing Quarantine network Geolocation GPS tagging
Geofencing
Which of the tools listed below would be used for attaching RJ-45 connectors to a twisted-pair Ethernet cable? Cable tester Needle-nose pliers Punchdown tool Crimper
Crimper
What type of Ethernet cable would be used for establishing a direct communication link between two PCs? Patch cable Crossover cable Rollover cable Straight-through cable
Crossover cable
A monitored host holding no valuable data specifically designed to detect unauthorized access attempts and divert attacker's attention from the actual corporate network is known as: Captive portal Honeynet UTM appliance Honeypot
Honeypot
Which alternate site allows for fastest disaster recovery? Cold site Hot site Warm site
Hot site
The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance. Router Switch Bridge Hub
Hub
In virtualization technology, a software program that manages multiple operating systems (or multiple instances of the same operating system) on a single computer system is called: Hypervisor Distributed switch ICS server Virtual router
Hypervisor
Which network protocol enables detection of packet loss? SMB ICMP ARP SNTP
ICMP
Which of the answers listed below refers to a means for executing reflective DOS attack? Phishing Logic bomb IP spoofing Man-in-the-middle
IP spoofing
Which of the following answers refers to a method for managing a network's IP address space? WMS SIEM UTM IPAM
IPAM
Which of the following actions should be the first step in the troubleshooting process? -Establishing a theory of probable cause of the problem -Conducting external or internal research based on problem symptoms -Identifying the problem -Establishing a plan of action to resolve the problem
Identifying the problem
Which term best describes disgruntled employees abusing legitimate access to company's internal resources? Script kiddies Insider threat Hacktivists Organized crime
Insider threat
Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of: SAML TOTP RADIUS Kerberos
Kerberos
While troubleshooting problems with a Network Interface Card (NIC), connector pins on the NIC's port can be tested with the use of: POST card Cable tester Multimeter Loopback plug
Loopback plug
A network access method whereby the 48-bit physical address assigned to each NIC is used to grant/deny network access is known as: MAC filtering Network Address Translation (NAT) Static IP addressing Network Access Control (NAC)
MAC filtering
Which of the following are hashing algorithms? (Select 2 answers) MD5 CCMP AES RC4 SHA
MD5 SHA
An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as: MIB DCS NMS SIEM
MIB
Which of the following is an example of active eavesdropping? Spoofing Zero-day attack Spear phishing MITM
MITM
What is the fastest way for validating a digital certificate? CRL Key escrow OCSP CSR
OCSP
EMI shielding protects the transferred data signals from: (Select 2 answers) Decryption Signal refraction Outside interference Eavesdropping Signal attenuation
Outside interference Eavesdropping
Which of the tools listed below would be used to identify running services on a networked host? Packet sniffer Loopback interface Protocol analyzer Port scanner
Port scanner
Which VPN type is used for connecting computers to a network? (Select all that apply) Remote-access Client-to-site Site-to-site Point-to-point
Remote-access Client-to-site
A device designed to filter and transfer data packets between dissimilar types of computer networks is called: Hub Load balancer Router Switch
Router
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: TFTP(Trivial FTP) SFTP(Secure FTP) Telnet FTPS (File transfer secure)
SFTP (port 22)
Which of the following protocols runs on TCP port 445? HTTPS(Secure hypertext translation) SMB/CIFS(Server message block IMAP(Internet message access) H.323
SMB/CIFS(CIFS uses UDP ports 137 and 138, and TCP ports 139 and 445.)
TCP port 25 is used by: SNMP(Simple network management) Telnet FTP(FIle transfer) SMTP(Simple mail transfer)
SMTP
Which type of VPN enables connectivity between two networks? Point-to-point Site-to-site Remote-access Client-to-site
Site-to-site
What type of backups are commonly used with virtual machines? Tape Incremental Snapshot Differential
Snapshot
Which of the answers listed below refers to a data link layer (layer 2) device designed to forward frames between network segments? Hub Switch Firewall Router
Switch
What kind of tool would be used for troubleshooting short/open circuits inside a copper cable? TDR Loopback adapter OTDR Spectrum analyzer
TDR
UDP port 69 is assigned to: TFTP(Trivial file transfer) SNMP(Siple net management) DHCP(Dynamic host config) LDAP(Light directory access)
TFTP
Which of the answers listed below refer to copper cabling termination specifications? (Select 2 answers) TIA/EIA 568a IEEE 802.3ab TIA/EIA 568b IEEE 802.3af
TIA/EIA 568a TIA/EIA 568b
A security protocol designed to strengthen WEP implementations is known as: PEAP TKIP CCMP WPA2
TKIP
Changing the native VLAN on all trunk ports to an unused VLAN ID is one of the countermeasures against VLAN hopping. True False
True
In computer security, the term "Exploit" refers to a any method that allows malicious users to take advantage of a vulnerability found in computer systems. True False
True
The general feature of all twisted-pair cabling types is that wires inside the cable are grouped into pairs and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk). True False
True
Switch spoofing and double tagging are attack methods used in: DDoS attacks Downgrade attacks VLAN hopping attacks Wireless disassociation attacks
VLAN hopping attacks
Which of the following answers lists an example of a modern network bridging device? -WAP -Active hub -VoIP endpoint -Wireless range extender
WAP
Which of the following would be the best solution for securing a small network lacking an authentication server? WPA-PSK WPA2-Enterprise WPA2-PSK WPA-Enterprise
WPA2-PSK
Which WAN technology takes advantage of cell towers that provide wireless signal coverage for mobile devices? WAP WWAN Satellite WLAN
WWAN
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: War chalking Spoofing War driving Insider threat
War driving
A type of network device used for improving wireless signal strength within homes and small offices is called: -Wireless hotspot -Distributed switch -Wireless range extender -Intermediate Distribution Frame (IDF)
Wireless range extender
Which of the answers listed below refer(s) to reversed TX/RX? (Select 2 answers) -Far end crosstalk -Wrong TIA/EIA cable standard type used -Frequency mismatch -Wrong pin/pair assignments on cable ends -Near end crosstalk
Wrong TIA/EIA cable standard type used Wrong pin/pair assignments on cable ends
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? arp -e netstat -n nslookup arp -a
arp -a
Which of the following answers refers to a lower-cost alternative to Fibre Channel technology? ATM iSCSI InfiniBand MPLS
iSCSI
Which of the following answers refers to a command-line packet capturing utility? netcat Zenmap tcpdump Nmap
tcpdump
A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called: ping traceroute nslookup tracert
tracert
Which of the answers listed below refer to the -10GBaseT Ethernet standard? (Select 3 answers) -Single-mode fiber-optic cable -10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 cable) -Multimode fiber-optic cable -10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6A and Cat 7 cable) -Twisted-pair copper cabling
-10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 cable) -10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6A and Cat 7 cable) ( Missed) -Twisted-pair copper cabling
What is the first valid host address that can be assigned to a node residing in the 10.119.136.143/20 network? 10.119.96.1 10.119.128.1 10.119.132.1 10.119.136.1
-10.119.128.1
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply) -Coaxial cabling -100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) -F-type connector -55-meter cable segment length -1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) -BNC connector -100-meter cable segment length -10 Gbps transfer rate over all 4 pairs of cables (10GBaseT networks) -Twisted-pair copper cabling -RJ-45 connector -Fiber-optic cabling
-100 Mbps transfer rate over 2 pairs of cables (100BaseT networks) -1 Gbps transfer rate over all 4 pairs of cables (1000BaseT networks) -100-meter cable segment length -Twisted-pair copper cabling -RJ-45 connector
Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5e (Cat 5e) cabling? (Select all that apply) -BNC connector -100-meter cable segment length -Coaxial cabling -Twisted-pair copper cabling -Fiber-optic cabling -1 Gbps transfer rate over 2 pairs of cables (1000BaseT networks) -RJ-45 connector -55-meter cable segment length -1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks) -F-type connector
-100-meter cable segment length -Twisted-pair copper cabling -RJ-45 connector -1 Gbps transfer rate over 4 pairs of cables (1000BaseT networks)
Which of the following answers refers to an IPv4 address range used for loopback addresses? 0.0.0.0 - 0.255.255.255 (0.0.0.0/8) 127.0.0.0 - 127.255.255.255 (127.0.0.0/8) 169.254.0.0 - 169.254.255.255 (169.254.0.0/16) 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
-127.0.0.0 - 127.255.255.255 (127.0.0.0/8)
What is the leading octet value range for an IPv4 address belonging to a class B network? 128 - 191 1 - 126 192 - 223 224 - 239
-128 - 191
What is the network address for a 154.24.67.147/22 host? 154.24.48.0 154.24.60.0 154.24.62.0 154.24.64.0
-154.24.64.0
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network? 192.168.31.255 192.168.47.255 192.168.63.255 192.168.79.255
-192.168.63.255
Which of the following answers refer to the IEEE 802.11b wireless standard? (Select 3 answers) -Maximum data signaling rate of 54 Mbps -5.0 GHz frequency range -Carrier Sense Multiple Access / Collision -Detection (CSMA/CD) network access method -2.4 GHz frequency range -Maximum data signaling rate of 11 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
-2.4 GHz frequency range -Maximum data signaling rate of 11 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method
The IEEE 802.11a standard specifies a channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz
-20 MHz
The IEEE 802.11g standard specifies a channel bandwidth of 20 MHz 22 MHz 40 MHz 80 MHz
-20 MHz
The IEEE 802.11n standard specifies available channel bandwidth options of: (Select 2 answers) 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz
-20 MHz -40 MHz
Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) 128 - 191 Class B range 192 - 223 Class C range 224 - 239 Class D range
-224 - 239 -Class D range
Which of the answers listed below refers to an IPv4 address range reserved for future use? 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
-240.0.0.0 - 255.255.255.254 (240.0.0.0/4)
Which of the following answers lists the default (classful) subnet mask for a class A network? 255.0.0.0 255.128.0.0 224.0.0.0 255.224.0.0
-255.0.0.0
Which of the following answers lists the default (classful) subnet mask for a class B network? 255.252.0.0 255.255.0.0 255.248.0.0 255.224.0.0
-255.255.0.0
Which of the answers listed below refers to the default (classful) subnet mask for a class C network? 255.255.192.0 255.255.224.0 255.255.255.0 255.255.252.0
-255.255.255.0
Frequency bands used by 802.11 networks include: (Select 2 answers) 5.0 GHz 5.4 GHz 2.0 GHz 2.4 GHz
-5.0 GHz -2.4 GHz
What are the characteristic features of WPA/WPA2 Enterprise mode? (Select 2 answers) Suitable for large corporate networks Does not require an authentication server Suitable for all types of wireless LANs Requires RADIUS authentication server
-Suitable for large corporate networks -Requires RADIUS authentication server
Which of the answers listed below refers to a channel access method used in 2G GSM networks? CSMA/CA TDMA CSMA/CD CDMA
-TDMA
Which WAP configuration setting allows for adjusting the boundary range of a wireless signal? SSID broadcast Power level controls Maximum Transmission Unit (MTU) Quality of Service (QoS)
-Power level controls
What are the characteristic features of RADIUS? (Select 3 answers) -Primarily used for network access -Encrypts the entire payload of the access-request packet -Combines authentication and authorization -Encrypts only the password in the access-request packet -Primarily used for device administration -Separates authentication and authorization
-Primarily used for network access -Combines authentication and authorization -Encrypts only the password in the access-request packet
What are the characteristic features of RADIUS? (Select 3 answers) Primarily used for network access Encrypts the entire payload of the access-request packet Combines authentication and authorization Encrypts only the password in the access-request packet Primarily used for device administration Separates authentication and authorization
-Primarily used for network access -Combines authentication and authorization -Encrypts only the password in the access-request packet
The IEEE 802.11ac standard specifies a maximum channel bandwidth of: 20 MHz 22 MHz 40 MHz 80 MHz 160 MHz
160 MHz
Which of the following allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask
-Subnet mask
SNMP runs on UDP port: 123 137 143 161
161
Which of the answers listed below refers to a rule-based network access control mechanism implemented on routers, switches, and firewalls that allows to filter network traffic by IP address or port number? ACL NAC WAF NAT
ACL
What is the most common type of a DSL Internet access? VDSL ADSL SDSL UDSL
ADSL
Which of the answers listed below refers to a possible symptom of exhausted DHCP scope? Duplicate IP addresses APIPA address Duplicate MAC addresses Loopback address
APIPA address
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker's IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? ARP poisoning Replay attack Cross-site request forgery DNS poisoning
ARP poisoning
A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as: SLA EULA AUP BPA
AUP
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called: Authentication Authorization Accounting
Accounting
A wireless networking topology in which client devices communicate directly with each other without the use of a controlling Access Point (AP) is called: IEEE 802.3af Star topology Ad hoc mode IEEE 802.3at Infrastructure mode
Ad hoc mode
Which of the following can be the source of RFI and cause disruptions in network connectivity? Cordless phones Fluorescent lights Microwave ovens Bluetooth devices All of the above
All of the above
A type of Ethernet interface that automatically detects the required cable connection type (straight-through vs. crossover) and configures the connection appropriately is known as: GBIC Basic-Rate Interface (BRI) UC gateway Auto MDI-X
Auto MDI-X
Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers) Jitter Signal attenuation Crosstalk EMI Signal latency
Crosstalk EMI
Which of the following attack types relies on amplification effect? Zero-day attack DDoS attack Brute-force attack MITM attack
DDoS attack
An expired IP address indicates a problem with: HTTP DNS DHCP ICMP
DHCP
A security feature of a network switch that provides countermeasures against rogue DHCP servers is called: DHCP scope DHCP reservation DHCP snooping DHCP relay agent
DHCP snooping
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS(Domain name service,53) SNMP(Simple net managemnt UDP161&UDP162) NAT(Network address translation,5351) DHCP(Dyna host config protocol)
DHCP(UDP 67 server, UDP 68 client.)
Which VPN type enables direct communication links between remote hosts on a WAN? Site-to-site VPN DMVPN Remote-access VPN Client-to-site VPN
DMVPN
A network admin can ping remote host by its IP address, but not by FQDN. Which of the following is the most probable source of the problem? ICMP DNS NetBIOS DHCP
DNS
Remapping a domain name to a rogue IP address is an example of what kind of exploit? DNS poisoning Domain hijacking ARP poisoning URL hijacking
DNS poisoning
Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers) DTLS bcrypt SCP IPsec SSL/TLS
DTLS IPsec SSL/TLS
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive? Quick format Overwriting data Degaussing Low-level format
Degaussing
Which of the following answers refers to a protocol used by routers, hosts and network devices to generate error messages and troubleshoot problems with delivery of IP packets? CCMP(Cipher block chaining msg auth) RSTP(rapid spanning tree) ICMP(Internet control message) SNMP(simple network management)
ICMP
Which of the following answers refers to a cable rack that interconnects wiring between an MDF and workstation devices? ICS MDI IDF MTU
IDF
Which of the answers listed below illustrates the difference between passive and active security breach response? HIPS vs. NIPS UTM vs. Firewall NIPS vs UTM IDS vs. IPS
IDS vs. IPS
Which of the answers listed below applies to a situation where an Ethernet switch acts as an authenticator for devices connecting to a network through one of its ports? IEEE 802.1X IEEE 802.11ac IEEE 802.1D IEEE 802.11x
IEEE 802.1X
Which of the solutions listed below would be used to provide redundant power source for datacenter server racks? Offline UPS Independent power circuits Backup generator Standby UPS
Independent power circuits
What is the function of archive bit? -Search indexing -Indicating whether a file has been modified since the last backup -Setting file attribute to read-only -Creating an additional copy of a file
Indicating whether a file has been modified since the last backup
Which of the answers listed below refers to a high-speed alternative to Fibre Channel technology? FCoE InfiniBand iSCSI PPPoE
InfiniBand
The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as: Option Reservation Scope Lease
Lease
An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests is known as: Spoofing MITM attack Phishing DoS attack
DoS attack
Which of the terms listed below refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of a hard drive failure? Repair installation Drive imaging Incremental backup Differential backup
Drive imaging
The term "Brownout" refers to what kind of situation? Power spike EMI Drop in voltage Power outage
Drop in voltage
Which of the following would add power redundancy on a server box? Standby UPS Backup generator Offline UPS Dual-power supply
Dual-power supply
Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? EAP-TLS PEAP EAP-TTLS EAP-FAST
EAP-TLS
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? SFTP(Secure file transfer) HTTPS(Secure hypertext transfer) FTPS SNMP(Simple network manage proto)
HTTPS(tcp 443)
Which of the following terms refers to a duplicate of the original site, with fully operational computer systems as well as near-complete backups of user data? Hot site Warm site Cold site
Hot site
TCP port 80 is assigned to: Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol over TLS/SSL (HTTPS) Internet Message Access Protocol (IMAP) Lightweight Directory Access Protocol (LDAP)
Hypertext Transfer Protocol (HTTP)
Which of the following password policy settings determines the number of unique new passwords that must be associated with a user account before an old password can be reused? Password history setting Maximum password age setting Account lockout threshold setting Minimum password age setting
Password history setting
Which of the following answers refer to common cabling type used for connecting workstations to network devices? (Select 2 answers) Patch cable RG-59 cable Crossover cable RG-6 cable Straight-through cable
Patch cable Straight-through cable
A simple device consisting of multiple connector blocks and ports used for cable management is known as: Media converter Demarc Main Distribution Frame (MDF) Patch panel
Patch panel
A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information they shouldn't have access to is commonly referred to as: Phishing Privilege escalation Backdoor access Shoulder surfing
Phishing
A fraudulent email requesting its recipient to reveal sensitive information (e.g. username and password) used later by an attacker for the purpose of identity theft is an example of: (Select 2 answers) Phishing Watering hole attack Social engineering Bluejacking Vishing
Phishing Social engineering
A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as: -Plenum -Main Distribution Frame (MDF) -HVAC system -Intermediate Distribution Frame (IDF)
Plenum
What does the term "Blackout" refer to? Power outage Drop in voltage EMI Power spike
Power outage
A type of server used for collecting diagnostic and monitoring data from networked devices is known as: Proxy server UC server Syslog server ICS server
Syslog server
Which of the solutions listed below add(s) redundancy in areas identified as single points of failure? (Select all that apply) RAID Dual-power supply Virtualization Failover clustering Load balancing
RAID Dual-power supply Failover clustering Load balancing
Which type of RAID does not offer fault tolerance? RAID 5 Disk duplexing RAID 0 Disk mirroring RAID 1
RAID 0
Which of the answers listed below refers to an encryption algorithm used in TKIP? DES 3DES AES RC4
RC4
Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? RDP SSH VNC Telnet
RDP
Which of the following answers refer(s) to authentication protocol(s) providing the AAA functionality? (Select all that apply) CHAP TACACS+ PAP RADIUS MS-CHAP
TACACS+ RADIUS
Which port enables the FTP's Data Connection for sending file data? UDP port 20 TCP port 20 UDP port 21 TCP port 21
TCP port 20
The File Transfer Protocol (FTP) Control Connection for administering a session is established through: TCP port 20 UDP port 20 TCP port 21 UDP port 21
TCP port 21
A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as: RDP(Remote desktop proto) SSH(Secure shell) Telnet rsh(Remote shell)
RDP(TCP and UDP port 3389)
Which type of network documentation would be of help in determining the physical location of a network server? Network diagram IDF documentation Rack diagram MDF documentation
Rack diagram
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is called: Grayware Adware Ransomware Spyware
Ransomware
In computer networking, the term "Attenuation" refers to a loss in signal strength during transmission caused by increasing distance and obstacles encountered on the signal path. The problem of attenuating circuit on the network can be solved by adding a device that boosts the signal strength. This type of device is known as: Repeater Media converter Inverter Load balancer
Repeater
In the Kerberos-based authentication process, the purpose of the client's timestamp is to provide countermeasure against: Replay attacks Dictionary attacks Birthday attacks Downgrade attacks
Replay attacks
Which of the protocols listed below enables secure remote access to another computer on the network via command line? VNC Telnet SSH RDP
SSH
Unblocking TCP port 22 enables what type of traffic? (Select 2 answers) FTPS(File transfer secure) SSH(secure Shell) SFTP(Secure file transfer) FTP(File transfer) HTTP(Hypertext translation)
SSH SFTP
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: TFTP (Trivial File Transfer Protocol) SSH (Secure Shell) Telnet (Terminal emulation program) RDP (Remote desktop protocol)
SSH tcp and udp port 22
An authentication subsystem in which a single set of authentication credentials provides access to multiple systems within a single organization is referred to as: NAC SSO RBAC DAC
SSO
A special type of cabling with fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling. True False
True
Which of the following destruction tools/methods allows for secure disposal of physical documents? Shredder Hard drive sanitization Low-level formatting Degaussing
Shredder
Which preventive physical security control would provide basic means for securing door access? Motion detection Warning signs Video surveillance Smart card reader
Smart card reader
Which of the answers listed below refer to implementations of certificate-based authentication? (Select 2 answers) CHAP 802.3at Smart cards 802.3af PAP 802.1X
Smart cards 802.1X
A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as: OTDR Line tester Loopback adapter Smart jack
Smart jack
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as: Shoulder surfing Privilege escalation Social engineering Penetration testing
Social engineering
A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS. True False
True
Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent (a.k.a. IP helper). True False
True
Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps. True False
True
NTP enables: Allocation of IP addresses Synchronization of clocks over a computer network Retrieving contents of an Internet page from a web server Monitoring of network-attached devices
Synchronization of clocks over a computer network
A range of IP addresses that a DHCP server can lease out to DHCP clients is known as: Lease Reservation Pool Scope
You left the correct answer unselected. Scope
A DHCP server's IP exclusion configuration option allows network administrators to remove a single IP address or a range of IP addresses from the pool of addresses being assigned automatically to the requesting DHCP client computers. IP exclusion prevents other DHCP clients from requesting an IP address statically assigned to other essential network hosts (e.g. servers, or a wireless printers) via DHCP reservation. True False
You left the correct answer unselected. True
Which of the choices listed below would allow for setting up three Wireless Access Points (WAPs) on non-overlapping channels? 1 5 6 9 11
1 6 11
What is the typical cable segment length for a copper twisted-pair Ethernet cable? 33 meters 55 meters 100 meters 250 meters
100 meters
An OC-3 line supports transmission rates of up to: 1.544 Mbps 44.736 Mbps 51.84 Mbps 155.52 Mbps
155.52 Mbps
Compared to SFP, SFP+ offers enhanced data transfer rates of up to: 10 Gbps 16 Gbps 20 Gbps 40 Gbps
16 Gbps
Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection? 622.08 Mbps 1244.16 Mbps (1.24 Gbps) 2488.32 Mbps (2.49 Gbps) 9953.28 Mbps (9.95 Gbps)
9953.28 Mbps (9.95 Gbps)
Establishing a theory of probable cause of the problem is a troubleshooting step that apart from conducting research based on symptoms may also involve asking for assistance of a more experienced tech. True False
False
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. True False
False
Plenum-rated cabling features a fire-retardant jacket made of polyvinyl chloride (PVC). True False
False
User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). True False
False
Which type of cabling provides the best protection against EMI/RFI? Fiber-optic cabling STP cabling Coaxial cabling UTP cabling
Fiber-optic cabling
What is the function of FTP? Mail services Serving of web pages Directory access File exchange
File exchange
Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? HIDS Firewall Packet filter Vulnerability scanner
Firewall
Which of the answers listed below refers to a type of software embedded into a hardware chip? Adware Background app Device driver Firmware
Firmware
What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses? BPDU guard UTM Flood guard Root guard
Flood guard
Which of the following passwords is the most complex? T$7C52WL4SU GdL3tU8wxYz @TxBL$nW@Xt G$L3tU8wY@z
G$L3tU8wY@z
Which of the following would require troubleshooting if a network connectivity problem originates from mismatched transceiver types? (Select 2 answers) SPF GBIC ASIC SFP MDI-X
GBIC SFP
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? SMB(Server message block) H.323(IP Signaling standard for ITUnion) SCP(Secure copy protocol) IGP(Interior gateway)
H.323(port 1720)
Which protocol allows for retrieving contents of an Internet page from a web server? SNMP(Simple net management protocol) HTTP(Hypertext transfer protocol) SMTP(Simple mail transfer protocol) IMAP(Internet message access proto)
HTTP(tcp 80)
Which of the protocols listed below enables remote access to another computer on the network via web browser? RDP HTTPS SSH VNC
HTTPS
Which of the following authentication protocols can be used to enable SSO? PAP LDAP MS-CHAP Kerberos
Kerberos
Which of the following solutions enables combining several physical ports of a switching device into a single logical channel? RSTP VRRP LACP HSRP
LACP
A dedicated storage appliance that can be added to a local network is known as: SPS NAS SAN NFS
NAS
A legal contract between the holder of confidential information and another person to whom that information is disclosed prohibiting that other person from disclosing the confidential information to any other party is known as: ISA NDA BPA SLA
NDA
A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers) Packet filter Layer 4 firewall NGFW Second-generation firewall Layer 7 firewall
NGFW Layer 7 firewall
The process of combining multiple physical network adapters into a single logical interface for increased throughput and redundancy is known as: Route aggregation Virtualization NIC teaming Device pairing
NIC teaming
DNS record that specifies a list of additional name servers on a domain is called: SPF NS PTR SRV
NS (Name Server)
Which protocol ensures the reliability of the Kerberos authentication process? EAP NTP IPsec RTP
NTP
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? NTP(Network time protocol) VTP(VLAN Trunk protocol) NNTP(Network news transfer proto) RTP(Real time transport proto)
NTP(servers use TCP 123, clients use random ports above 1023)
Which of the following command-line tools is used for discovering hosts and services on a network? Nmap netcat Zenmap tcpdump
Nmap
Which of the answers listed below refers to a permanent assignment of an IP address? Static IP address Private IP address Dynamic IP address Public IP address
Static IP address
Spanning Tree Protocol (STP) provides protection against: DNS poisoning Switching loops VLAN hopping Replay attacks
Switching loops
A network device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. True False
True
A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is referred to as demarcation point, or demarc. True False
True
The process of securing networking devices should include the practice of disabling unused physical ports. True False
True
The shape and angle of the tip of a fiber-optic connector can have an impact on the performance of a fiber-optic communication link. The two basic types of fiber end are Ultra Physical Contact (UPC) and Angled Physical Contact (APC). In the UPC-type connector, the connector end is polished with no angle, while APC connectors feature a fiber end polished at an 8-degree angle. Besides additional labeling (UPC or APC) that helps in identifying further details about a given connector type, fiber-optic connectors can also have different colors. The rule of thumb is that a UPC-type connector typically would be blue while APC connector would have a green color. True False
True
The term "Channel bonding" refers to a technique that allows for combining adjacent channels to increase the amount of available bandwidth. True False
True
The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts. True False
True
The term "Intrusion Detection System" (IDS) refers to a device or software application designed to detect malicious activities and violations of security policies on a network or computer host. An IDS designed to monitor networks is known as Network Intrusion Detection System (NIDS). A type of IDS installed on a host monitoring only that host is called Host Intrusion Detection System (HIDS). IDSs do not take any active steps to prevent or stop the intrusion relying only on passive response which may include sending an alert to a management console or saving information about the event in logs. True False
True
The term "Metropolitan Ethernet" refers to an Ethernet-based Metropolitan Area Network (MAN). True False
True
Which of the cabling types listed below is the most susceptible to EMI/RFI? UTP cabling Coaxial cabling STP cabling Fiber-optic cabling
UTP cabling
Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address? MX CNAME AAAA PTR
CNAME
Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard? (Select all that apply) Data signaling rate of up to 600 Mbps -5.0 GHz frequency band -Carrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method -Maximum data signaling rate of up to 6.77 Gbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -Multi-User Multiple Input / Multiple Output (MU-MIMO) -2.4 GHz frequency band
-5.0 GHz frequency band -Maximum data signaling rate of up to 6.77 Gbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -Multi-User Multiple Input / Multiple Output (MU-MIMO)
Which of the DNS database records listed below returns a 32-bit IP address? MX AAAA CNAME A PTR
-A
What are the characteristic features of ATM? (Select all that apply) -A network technology used for connecting devices on a WAN -Data transfer rates of up to 45 Mbps -Used in SONET networks -53-byte data transfer unit (a.k.a. ATM cell) -A network technology used for connecting devices on a LAN -Data transfer rates of up to 10 Gbps
-A network technology used for connecting devices on a WAN -Used in SONET networks -53-byte data transfer unit (a.k.a. ATM cell) -Data transfer rates of up to 10 Gbps
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as: ACL(access control list) CSR(Certificate signing request) DLP(Data loss prevention) AUP(Authorized use policy)
-ACL
Which of the following answers refers to a wireless connectivity technology used for monitoring sensor data collected from low-powered sports and fitness equipment? CAN(control area network, cars) WTLS(wireless transport layer security) UAV(unmanned aerial vehicles) ANT+(health tracking)
-ANT+
According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed: -After documenting findings, actions and outcomes -As the first step of the troubleshooting process -After implementing the solution -As the last step of the troubleshooting process
-After implementing the solution
Restoring data from an incremental backup requires: (Select 2 answers) Copy of the last incremental backup All copies of differential backups made since the last full backup Copy of the last differential backup All copies of incremental backups made since the last full backup Copy of the last full backup
-All copies of incremental backups made since the last full backup -Copy of the last full backup
A network device hardening process should include: -Changing default credentials / Avoiding common passwords -Firmware upgrades / Patching and updates -File hashing -Disabling unnecessary services and unused ports (physical and virtual) -Implementation of secure protocols -Cryptographic key renewal -All of the above
-All of the above
A popular, short-range wireless technology used for connecting various personal devices in a WPAN is called: 802.11 NFC(near field comms) Bluetooth Z-Wave
-Bluetooth
Star Full mesh Bus Partial mesh
-Bus
Penetration testing: (Select all that apply) -Bypasses security controls -Only identifies lack of security controls -Actively tests security controls -Exploits vulnerabilities -Passively tests security controls
-Bypasses security controls -Actively tests security controls -Exploits vulnerabilities
Which of the following answers refers to a bus topology network first developed for use in vehicles? CAN PAN VNC SAN
-CAN
Which of the following answers refers to a channel access method used in 3G cellular networks? CDMA CSMA/CD TDMA CSMA/CA
-CDMA
Which of the answers listed below refers to a solution that replaces the classful network design? VLAN(Virtual LAN) RSTP(Rapid spanning tree) SNAT(Source network address translation) CIDR(Classless inter domain routing)
-CIDR
In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space
-Class A address space
Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range
-Class A range -Non-routable (private) IP address range
In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: Class A address space Class B address space Class C address space Class D address space
-Class C address space
What are the characteristic features of the 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range
-Class C range -Non-routable (private) IP address range
Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers) -Twisted-pair copper cabling -Suitable for short-distance cable runs -Used for analog video and CCTV installations -Coaxial cabling -Suitable for long-distance cable runs -Used for cable television, satellite television and cable modems
-Coaxial cabling -Suitable for long-distance cable runs -Used for cable television, satellite television and cable modems
Which of the following devices would be used for connecting a router to a T1 line? CSU/DSU Media converter IDF F-type connector
CSU/DSU
What are the characteristics of the RG-59 cabling specification? (Select 3 answers) -Coaxial cabling -Suitable for short-distance cable runs -Used for analog video and CCTV installations -Twisted-pair copper cabling -Suitable for long-distance cable runs -Used for cable television, satellite television and cable modems
-Coaxial cabling -Suitable for short-distance cable runs -Used for analog video and CCTV installations
Bayonet Neill-Concelman (BNC) connector is used with: -Twisted-pair copper cabling -Single-mode fiber-optic cabling -Coaxial copper cabling -Multimode fiber-optic cabling
-Coaxial copper cabling
Which of the answers listed below refer to the characteristic features of a modem? (Select 3 answers) -Converts digital data into analog signal -Allows a computer to send and receive information over telephone lines -Forwards frames between network segments -Converts analog signal into digital data -Filters and transfers data packets between dissimilar types of computer networks
-Converts digital data into analog signal -Allows a computer to send and receive information over telephone lines -Converts analog signal into digital data
Which of the following connector types are used for RS-232 serial communications? (Select 2 answers) DE-9 RG-59 RJ-45 DB-25 RG-6 RJ-11
-DE-9 -DB-25
APIPA addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to: SNMP(Simple network management) DNS(Domain name system) SMTP(Simple mail transfer) DHCP(Dyna host config)
-DHCP
Which DNS records are commonly used with the DNS TXT record? (Select 2 answers) PTR CNAME -SPF MX -DKIM
-DKIM -SPF
Which DNS records are used to protect a domain from being wrongfully identified as a source of email spam? (Select 2 answers) NS SPF CNAME DKIM SRV
-DKIM -SPF
In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? ICS server Web server DNS server DHCP server
-DNS server
Which of the following antenna types provide a 360-degree horizontal signal coverage? (Select 2 answers) Unidirectional antenna Dipole antenna Yagi antenna Omnidirectional antenna Dish antenna
-Dipole antenna -Omnidirectional antenna
Which of the following enables automatic configuration of an IPv6 address? EUI-64(Extended Unique Identifier-64) UEFI(Unified Extensible Firmware Interface) APIPA(Auto private IP addressing) MAC-48(Replaced by EUI 48)
-EUI-64
Which of the answers listed below refer(s) to MPLS? (Select all that apply) -Circuit-switching method -Used for connecting devices on a LAN -Enables delivery of various data packet types over the same network link -Packet-switching method -Used for connecting devices on a WAN -Designed to simplify and improve the performance of routing process
-Enables delivery of various data packet types over the same network link -Packet-switching method -Used for connecting devices on a WAN -Designed to simplify and improve the performance of routing process
What are the characteristics of TACACS+? (Select 3 answers) -Encrypts only the password in the access-request packet -Combines authentication and authorization -Encrypts the entire payload of the access-request packet -Primarily used for device administration -Separates authentication and authorization -Primarily used for network access
-Encrypts the entire payload of the access-request packet -Primarily used for device administration -Separates authentication and authorization
A dedicated communication channel used exclusively between two connected hosts is a characteristic feature of packet-switching networks. True -False
-False
Circuit-switching networks move data divided into small blocks over a shared connection. True False
-False
A network topology in which each node has a direct physical connection to every other node is known as: Star Partial mesh Bus Full mesh Ring
-Full mesh
What are the characteristic features of satellite Internet connections? (Select 3 answers) -High signal latency -Lack of signal interference -Cheaper in comparison to terrestrial links -Interference (weather dependent) -Low signal latency -Relatively high cost in comparison to terrestrial links
-High signal latency -Interference (weather dependent) -Relatively high cost in comparison to terrestrial links
Which IEEE standard provides the implementation basis for most modern WLANs? IEEE 802.11 IEEE 802.1x IEEE 802.3 IEEE 802.1q
-IEEE 802.11
The DNS database AAAA record creates a pointer that maps a hostname to: IPv4 address Mail server IPv6 address Canonical name
-IPv6 address
Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls? NFC 802.3 IR Z-Wave
-IR
Which of the answers listed below refers to a cloud computing delivery model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software? SaaS MaaS PaaS IaaS
-IaaS
Vulnerability scanning: (Select 3 answers) Identifies lack of security controls Actively tests security controls Identifies common misconfigurations Exploits vulnerabilities Passively tests security controls
-Identifies lack of security controls -Identifies common misconfigurations -Passively tests security controls
Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to: -Conduct research based on symptoms -Test the theory to determine problem cause -Implement the solution -Establish a theory of probable cause of the problem
-Implement the solution
Which of the following typically applies to a request that doesn't match the criteria defined in an ACL? Group policy Implicit deny rule Transitive trust Context-aware authentication
-Implicit deny rule
A wireless networking topology consisting of at least one Access Point (AP) is referred to as: IEEE 802.3at Infrastructure mode IEEE 802.3af Ad hoc mode Peer-to-peer mode
-Infrastructure mode
An emerging field of new technologies, such as wearable tech or home automation is known as: SoC(security ops center) NFC(near field comms) IoT(internet of things) ESN(enterprise social networking)
-IoT
Which of the answers listed below refer(s) to example(s) of fiber-optic connectors (Select all that apply) LC DB-25 ST SC MT-RJ RG-6
-LC -ST -SC -MT-RJ
A computer network connecting multiple LANs over an area of a city or campus is referred to as: PAN LAN -MAN WAN
-MAN
What are the characteristic traits of a network switch? (Select all that apply) -Makes forwarding decisions in hardware (ASIC) -Typically capable of connecting more network segments than bridge (more physical ports) -Older and less effective type of network device in comparison to network bridge -Makes forwarding decisions in software -Sometimes referred to as multiport bridge -Newer and more effective type of network device in comparison to network bridge -Typically capable of connecting fewer network segments than bridge (fewer physical ports)
-Makes forwarding decisions in hardware (ASIC) -Typically capable of connecting more network segments than bridge (more physical ports) -Sometimes referred to as multiport bridge -Newer and more effective type of network device in comparison to network bridge
Which of the following answers describe the features of a network bridge? (Select 3 answers) -Makes forwarding decisions in hardware (ASIC) -Newer and more effective type of network device in comparison to network switch -Typically capable of connecting more network segments than switch (more physical ports) -Makes forwarding decisions in software -Typically capable of connecting fewer network segments than switch (fewer physical ports) -Older and less effective type of network device in comparison to network switch
-Makes forwarding decisions in software ( Missed) -Typically capable of connecting fewer network segments than switch (fewer physical ports) ( Missed) -Older and less effective type of network device in comparison to network switch
Which of the following answers refer to the 1000BaseSX Ethernet standard? (Select 2 answers) -Single-mode fiber-optic cabling -Maximum cable segment length between 220 and 500 meters -Multimode fiber-optic cabling -Maximum cable segment length of 185 meters -Twisted-pair copper cabling
-Maximum cable segment length between 220 and 500 meters ( Missed) -Multimode fiber-optic cabling
What are the characteristic features of the 100BaseTX Ethernet standard? (Select 3 answers) -Twisted-pair copper cabling (Category 3 or higher) -Maximum cable segment length of 100 meters -Transfer rate of 100 Mbps over two-pair Cat 5 or better cable -Maximum cable segment length of 55 meters -Twisted-pair copper cabling (Category 5 or higher) -Transfer rate of 1000 Mbps (1 Gbps) over four-pair Cat 5 or better cable
-Maximum cable segment length of 100 meters -Transfer rate of 100 Mbps over two-pair Cat 5 or better cable -Twisted-pair copper cabling (Category 5 or higher)
What are the characteristic features of the 1000BaseT Ethernet standard? (Select 3 answers) -Maximum cable segment length of 185 meters -Single-mode fiber-optic cabling -Maximum cable segment length of 100 meters -Twisted-pair copper cabling (Cat 5 or higher) -Uses two pairs of wires in a cable for data transmission -Multimode fiber-optic cabling -Uses all four pairs of wires in a cable for data transmission
-Maximum cable segment length of 100 meters -Twisted-pair copper cabling (Cat 5 or higher) -Uses all four pairs of wires in a cable for data transmission
Which of the answers listed below refer to the 1000BaseLX Ethernet standard? (Select 3 answers) -Twisted-pair copper cabling -Transfer rate of 1 Gbps over two-pair Cat 5e or better cable -Maximum cable segment length of up to 5 km over single-mode fiber -Fiber-optic cabling -Maximum cable segment length of 100 meters -Transfer rate of 1 Gbps over four-pair Cat 5e or better cable -Maximum cable segment length of up to 500 m over multimode mode fiber
-Maximum cable segment length of up to 5 km over single-mode fiber ( Missed) -Fiber-optic cabling -Maximum cable segment length of up to 500 m over multimode mode fiber
What are the characteristics of the IEEE 802.11g wireless standard? (Select 3 answers) -Carrier Sense Multiple Access / Collision -Detection (CSMA/CD) network access method -Maximum data signaling rate of 54 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -2.4 GHz frequency range -Maximum data signaling rate of 11 Mbps -5.0 GHz frequency range
-Maximum data signaling rate of 54 Mbps -Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method -2.4 GHz frequency range
What are the characteristic traits of GBIC? (Select all that apply) Data transfer of 10 Gbps Modular (hot swappable) interface Converts optical signals to electrical signals Fixed physical interface Converts electrical signals to optical signals Data transfer of 1 Gbps
-Modular (hot swappable) interface -Converts optical signals to electrical signals -Converts electrical signals to optical signals -Data transfer of 1 Gbps
What are the characteristic traits of single-mode fiber optics? (Select 3 answers) -Transmission distances of up to 2 km -More expensive than multimode fiber optics -Uses LED as the source of light -Transmission distances of up to 100 km -Uses laser as the source of light -Less expensive than multimode fiber optics
-More expensive than multimode fiber optics -Transmission distances of up to 100 km -Uses laser as the source of light
Which of the following answers refers to the new feature introduced with the IEEE 802.11ac standard? Multiple Input / Multiple Output (MIMO) 40 MHz channel width Multi-User MIMO (MU-MIMO) Maximum data signaling rate of up to 600 Mbps
-Multi-User MIMO (MU-MIMO)
Which type of technology enables contactless payment transactions? NFC SDN PED WAP
-NFC
Which of the answers listed below refer(s) to PPP? (Select all that apply) -Network protocol used for connecting devices on a WAN -Transport layer (layer 4) protocol -Enables encapsulation of IP traffic -Used for establishing a direct connection between two networked devices -Application layer (layer 7 protocol)
-Network protocol used for connecting devices on a WAN -Enables encapsulation of IP traffic -Used for establishing a direct connection between two networked devices
Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) IPv4 address space? (Select 2 answers) Class A range Public IP address range Class B range Non-routable (private) IP address range Class C range
-Non-routable (private) IP address range -Class B range
What is the function a DNS TXT record? (Select 2 answers) -Resolves an IP address to a hostname for reverse lookups -Maps a domain name to a list of mail servers for that domain -Provides outside services with additional information about a domain -Not used to direct any traffic -Allows multiple domain names to resolve to the same IP address
-Not used to direct any traffic -Provides outside services with additional information about a domain
Which of the answers listed below refer to IMAP4? (Select 2 answers) -Offers improved functionality in comparison to POP3 -Serves the same function as POP3 Enables sending email messages from client devices Offers less functions than POP3 Enables email exchange between mail servers
-Offers improved functionality in comparison to POP3 -Serves the same function as POP3
Which of the answers listed below refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? Omnidirectional antenna Dish antenna Unidirectional antenna Yagi antenna
-Omnidirectional antenna -Unidirectional antenna
A type of limited-range computer network used for data transmission among various types of personal devices is generally referred to as: PAN LAN SAN MAN
-PAN
Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) -PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. -The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. -PTR record resolves an IP address to a hostname for reverse lookups. -The functionality provided by a PTR record is the opposite of A and AAAA DNS records. -PTR record maps a domain name to a list of mail servers for that domain.
-PTR record resolves an IP address to a hostname for reverse lookups. -The functionality provided by a PTR record is the opposite of A and AAAA DNS records.
Which of the following cloud service types would provide the best solution for a web developer intending to create a web app? MaaS SaaS PaaS IaaS
-PaaS
Which of the following answers refer(s) to frame relay? (Select 3 answers) -A network technology used for connecting devices on a LAN -Data transfer rates of up to 10 Gbps -Packet-switching method -Data transfer rates of up to 45 Mbps -A network technology used for connecting devices on a WAN -Circuit-switching method
-Packet-switching method -Data transfer rates of up to 45 Mbps -A network technology used for connecting devices on a WAN
Which of the following network topologies is most commonly used in contemporary Ethernet LANs? Bus topology Star topology Ring topology Mesh topology
-Star topology
What are the characteristics of SMB/CIFS? (Select 2 answers) -Used mainly by computers running Linux distributions -Provides shared access to files, directories, and devices -Used mainly by computers running Microsoft Windows operating systems -Enables voice and multimedia communications over IP networks
-Provides shared access to files, directories, and devices -Used mainly by computers running Microsoft Windows operating systems
Telnet: (Select 3 answers) -Encrypts network connection -Provides username & password authentication -Transmits data in an unencrypted form -Does not provide authentication -Enables remote login and command execution
-Provides username & password authentication -Transmits data in an unencrypted form -Enables remote login and command execution
Setting up a wireless connection in Network and Sharing Center Control Panel applet in MS Windows requires: (Select 3 answers) Typing in the network's subnet mask Providing the wireless network name Selecting security/encryption type Providing IP address of the Wireless Access Point (WAP) Typing in the network security key (Wi-Fi password)
-Providing the wireless network name -Selecting security/encryption type -Typing in the network security key (Wi-Fi password)
Which of the following answers refers to a cloud computing delivery model in which the cloud infrastructure is provisioned for open use by the general public? Hybrid cloud Private cloud Community cloud Public cloud
-Public cloud
Which of the following wireless technologies enables identification and tracking of tags attached to objects? WAF RFID GPS WTLS
-RFID
Which of the terms listed below refers to permanent IP address assignment from a DHCP server? Scope Reservation DHCP relay Lease
-Reservation
A network topology in which each node connects to exactly two other nodes is referred to as Partial mesh topology Ring topology Full mesh topology Star topology
-Ring topology
A dedicated local network consisting of devices providing data access is called: SDN NAS iSCSI SAN
-SAN
Which of the answers listed below refers to a technology designed to simplify network infrastructure management? SAN(Storage area network) SDN(Software defined networking) SSP(Service switching point) SEH(Structured encryption handling)
-SDN(Software-defined networking (SDN) technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring,)
Which DNS record specifies a host and port information that allow to find specific services on a network? SRV NS PTR DKIM
-SRV
Which of the answers listed below refer to methods for creating secure connections between clients and cloud service providers? (Select 3 answers) Telnet IPsec PAP SSL/TLS encryption VPN
-SSL/TLS encryption -VPN -IPsec
Which of the protocols listed below provide protection against switching loops? (Select 2 answers) RTP (Real time transport protocol) SRTP(Secure real time transport protocol) RDP(Remote dektop protocol) STP(Spanning tree protocol) RSTP(Rapid spanning tree protocol)
-STP(Spanning tree protocol) -RSTP(Rapid spanning tree protocol)
A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called: PaaS SaaS IaaS MaaS
-SaaS
Which of the answers listed below refer(s) to the feature(s) of SFP? (Select all that apply) -Small form factor transceiver -Converts electrical signals to optical signals -Data transfer of 10 Gbps -Newer transceiver type that replaces GBIC -Modular (hot swappable) interface -Converts optical signals to electrical signals -Fixed physical interface -Data transfer of 1 Gbps
-Small form factor transceiver -Converts electrical signals to optical signals -Newer transceiver type that replaces GBIC -Modular (hot swappable) interface -Converts optical signals to electrical signals -Data transfer of 1 Gbps
A network topology in which each node connects to a central switching device is called: Bus topology Ring topology Star topology Mesh topology
-Star topology
What are the characteristic features of FCoE? (Select all that apply) -Requires separate cabling infrastructure -Takes advantage of copper cabling -Enables connectivity between servers and data storage devices -Does not require any specialized hardware -Takes advantage of fiber-optic cabling -Requires specialized hardware -Does not require separate cabling infrastructure
-Takes advantage of copper cabling -Enables connectivity between servers and data storage devices -Does not require any specialized hardware -Does not require separate cabling infrastructure
Once the theory of probable cause of the problem has been established, the next troubleshooting step should be: -Verifying full system functionality -Testing the theory to determine the problem cause -Implementing the solution -Establishing a plan of action to resolve the problem
-Testing the theory to determine the problem cause
Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) -Uses laser as the source of light -Transmission distances of up to 2 km -More expensive than single-mode fiber optics -Transmission distances of up to 100 km -Less expensive than single-mode fiber optics -Uses LED as the source of light
-Transmission distances of up to 2 km -Less expensive than single-mode fiber optics -Uses LED as the source of light
A cloud delivery model consisting of two or more interlinked cloud infrastructures (private, community, or public) is referred to as a hybrid cloud. True False
-True
A logical network diagram is a document that describes the detailed layout of the building and the way devices are connected to the network through the actual cabling that transmits data. True False
-True
An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). True False
-True
Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4. True False
-True
In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets. True False
-True
In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network). True False
-True
Long Term Evolution (LTE) is a wireless communications standard for mobile devices and wireless hotspots. LTE offers significant improvements in terms of speed when compared to the older generation of 3G cellular networks. LTE and its later revision LTE-Advanced (LTE-A) are often marketed as 4G standards. True False
-True
Multiple Input / Multiple Output (MIMO) is a wireless technology that allows for significant increase in data throughput due to the use of multiple antennas and multiple data streams. True False
-True
One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping. True False
-True
Setting up a wireless network to operate on a non-overlapping channel allows multiple networks to coexist in the same area without causing interference. True False
-True
The Internet is an example of a large public WAN. True False
-True
Which of the answers listed below refer(s) to UTP cabling? (Select all that apply) -Twisted-pair copper cabling -Used in Ethernet networks and telephone systems -Low cost and ease of installation -Takes advantage of additional protective cover reducing signal interference from outside sources -Coaxial cabling -Not surrounded by any shielding that would provide protection against interference from outside sources -Fiber-optic cabling -In Ethernet networks, installed with RJ-45 connector type
-Twisted-pair copper cabling -Used in Ethernet networks and telephone systems -Low cost and ease of installation -Not surrounded by any shielding that would provide protection against interference from outside sources -In Ethernet networks, installed with RJ-45 connector type
Which of the following answers refer to the characteristics of copper-based networks? (Select 3 answers) -More expensive in comparison to optical fiber -Used for last-mile cable runs -Higher bandwidth and maximum cable segment length in comparison to fiber-optic links -Used for network backbone cabling -Less expensive in comparison to optical fiber -Limited bandwidth and maximum cable segment length in comparison to fiber-optic links
-Used for last-mile cable runs -Less expensive in comparison to optical fiber -Limited bandwidth and maximum cable segment length in comparison to fiber-optic links
What are the characteristics of fiber-optic cabling? (Select all that apply) -High signal attenuation -Used for network backbone cabling -Immunity to electromagnetic interference -Less suitable for carrying digital information than copper cabling -Limited bandwidth and maximum cable segment length in comparison to copper cabling -Used for last-mile cable runs -Provides higher level of security than copper cabling (difficult to tap into) -More suitable for carrying digital information than copper cabling
-Used for network backbone cabling -Immunity to electromagnetic interference -Provides higher level of security than copper cabling (difficult to tap into) -More suitable for carrying digital information than copper cabling
What are the characteristic features of the RJ-45 connector? (Select 2 answers) -Used with telephone cabling -Coaxial cabling connector -Used with Ethernet network cabling -Copper cabling connector -Fiber-optic cabling connector
-Used with Ethernet network cabling -Copper cabling connector
Which of the answers listed below refer to the RJ-11 connector? (Select 2 answers) -Used with telephone cabling -Copper cabling connector -Used with Ethernet network cabling -Fiber-optic cabling connector -Coaxial cabling connector
-Used with telephone cabling -Copper cabling connector
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes? DNAT( Destination network address translation) VLSM (Variable length subnet masks) MPLS (muliprotocol label switching) VLAN(Virtual LAN)
-VLSM
A computer network connecting multiple smaller networks over very large geographical areas is known as: PAN LAN MAN WAN
-WAN
Which of the following tools would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? -Protocol analyzer -WAP power level controls -Logical network diagram -Network mapper
-WAP power level controls
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called: MAN WLAN LAN VLAN
-WLAN
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: Penetration testing Wireless site survey Vulnerability scanning End user awareness and training
-Wireless site survey
Which of the answers listed below refer to highly directional antenna type used for long-range point-to-point bridging links? (Select 3 answers) Yagi antenna Omnidirectional antenna Dish antenna Non-directional antenna Parabolic antenna Dipole antenna
-Yagi antenna
Which of the answers listed below refers to a wireless protocol designed to provide communication between appliances in a home automation network? FCoE(Fiber channel over Ethernet) SDN(software defined networking) Z-Wave(wireless comm protocol) SIEM(security info and event management)
-Z-Wave
Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening? -a -p -e -r
-a
Which netstat parameter allows to display the names of applications and executable file components that are accessing the network? -a -n -b -p
-b
Which of the netstat utility parameters listed below allows to display the contents of an IP routing table? -a -p -e -r
-r
Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)? -S srcaddr /all -i address eth_addr
/all
Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? -a /? /all /-a
/all
T1 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
1.544 Mbps
Which of the answers listed below refers to the maximum data transfer rate of E1 connection? 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
2.048 Mbps
Which of the answers listed below refers to a channel bandwidth used in 802.11b networks? 20 MHz 22 MHz 40 MHz 80 MHz
22 MHz
Which of the TCP ports listed below is used by Telnet? 20 21 22 23
23
The answers below have been arranged to represent the DNS hierarchy, from the highest level of the DNS tree (1), to the lowest level (5). Which of these answers are out of order? (Select all that apply) 1. Root domain (".", e.g. the optional trailing dot in "example.com.") 2. Top level domain (e.g. ".com", ".org", or ".edu") 3. Subdomain (e.g. "department" in "department.example.com") 4. Second level domain (e.g. "example.com") 5. Host or resource name (e.g. "a" in "a.department.example.com")
3. Subdomain (e.g. "department" in "department.example.com") 4. Second level domain (e.g. "example.com")
T3 lines support data transfer rates of up to: 1.544 Mbps 2.048 Mbps 34.368 Mbps 44.736 Mbps
44.736 Mbps
Which of the following UDP ports is assigned to the Domain Name System (DNS)? 53 67 110 389
53
The IEEE 802.11g standard is backwards compatible with: 802.11n 802.11a 802.11b 802.11ac
802.11b
The IEEE 802.11n standard offers backward compatibility with which of the following standards? (Select all that apply) 802.11g 802.11ac 802.11b 802.11a
802.11g 802.11b 802.11a
Which of the acronyms listed below refers to a policy of permitting employees to bring personal mobile devices and to use those devices for accessing privileged company information and applications? BSOD BYOD JBOD BYOB
BYOD
A type of historical network data kept as a reference for resolving future performance issues is referred to as: Audit log Baseline Change management documentation Template
Baseline
Which of the following answers refers to a fiber transceiver equipped with the capability to transmit and receive signals over a single fiber strand? Simplex Bidirectional Half duplex Unidirectional
Bidirectional
Which of the following terms does not fall into the category of detective physical security controls? Motion sensors CCTV Biometrics Asset tracking tags
Biometrics
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is referred to as: Replay attack Brute-force attack Dictionary attack Birthday attack
Brute-force attack
The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as: Dial-up Cable broadband Frame relay Metro-Ethernet
Cable broadband
A type of tool used for verifying correct electrical connections of wires in a cable is known as: Loopback plug Tone generator Cable tester Multimeter
Cable tester
Which tool would be used for detecting incorrect cabling pin-out assignments? Multimeter Cable tester Tone generator Fiber termination kit
Cable tester
Which of the following answers refers to a solution allowing administrators to block network access for users until they perform required action? Honeypot Quarantine network Captive portal Firewall
Captive portal
Which of the following Internet access types takes advantage of the traditional analog telephone lines? WiMAX Ethernet Mobile broadband Dial-up
Dial-up
LDAP(Lightweight directory access) is an example of: Authentication protocol Address resolution protocol Directory access protocol File exchange protocol
Directory access protocol
Which type of switch simplifies virtual network configuration by enabling an option to configure switching for the entire network from a single interface? Managed switch Distributed switch Stackable switch Aggregation switch
Distributed switch
CRC allows for collecting metrics that provide information on: Error rates Network utilization Packet drops Bandwidth/throughput
Error rates
A type of wiring closet that interconnects WAN links coming into the building with the internal network is known as Intermediate Distribution Frame (IDF). True False
False
type of coaxial connector commonly used for cable television and cable modems is called: RG-6 F-type DB-9 MT-RJ
F-type
Which of the following remote file-access protocols do not offer encryption? (Select 2 answers) FTP FTPS SCP SFTP TFTP
FTP TFTP
A network protocol that allows for secure file transfer over SSL is called: TFTP SCP SFTP FTPS
FTPS
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP(User data gram) IP TCP(Transport control) NetBIOS(Net basic I/O, port 137)
IP
Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN? WiMAX PoE ISDN HSPA+
ISDN
A type of diagnostic tool that allows to measure signal strength in fiber-optic cabling is called: Light meter Tone generator Multimeter Loopback adapter
Light meter
Which of the answers listed below refer to iptables? (Select 2 answers) Packet capturing utility MS Windows command-line tool Packet tracing utility Linux command-line tool Packet filtering utility
Linux command-line tool Packet filtering utility
A network device designed for managing the optimal distribution of workloads across multiple computing resources is referred to as: Content filter Network Attached Storage (NAS) Load balancer Domain controller
Load balancer
Which of the actions listed below can be taken by an IDS? (Select 2 answers) Firewall reconfiguration Closing down connection Logging Terminating process Sending an alert
Logging Sending an alert
Malicious code activated by a specific event is known as: Backdoor Logic bomb Rootkit Trojan horse
Logic bomb
A document describing procedures for safe handling, use, storage and disposal of potentially hazardous materials is called: AUP MSTSC MAU MSDS
MSDS
Which of the following answers refers to a connector type not used with copper cabling? -RJ-11/RJ-45 -BNC -MT-RJ -DB-9/DB-25 -F-type
MT-RJ
Which of the following terms is used to describe an average time required to repair a failed component or device? MTBF RPO MTTR SLA
MTTR
Disabling SSID broadcast: -Is one of the measures used in the process of securing wireless networks -Makes a WLAN harder to discover -Blocks access to a WAP -Prevents wireless clients from accessing the network
Makes a WLAN harder to discover
Which of the password policy settings listed below prevents attackers using cracked passwords from gaining permanent access to a Windows workstation? Login time restrictions Password complexity setting Account lockout threshold setting Maximum password age setting
Maximum password age setting
Which password policy setting prevents users from repeatedly changing their passwords to bypass the password history policy setting and get back to their original/preferred password? Minimum password age setting Password complexity setting Account lockout threshold setting Login time restrictions
Minimum password age setting
Which of the tools listed below would be used for testing power supply voltage output? Torx screwdriver Toner and probe kit Loopback plug Multimeter
Multimeter
Which of the answers listed below refer to a very basic UPS type commonly used for protecting a single PC? (Select 2 answers) Offline Standby Line-interactive Online Double-conversion
Offline Standby
Which type of UPS provides the best power outage protection? (Select 2 answers) Online Double-conversion Standby Line-interactive Offline
Online Double-conversion
Which network protocol enables encapsulation of PPP frames within 802.3 frames? FCoE PPPoE EAP IPsec
PPPoE
Which of the answers listed below refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems? BRI N-ISDN PRI B-ISDN
PRI
What are the characteristic features of TFTP? (Select 2 answers) -Provides no security features -Typically used for exchanging files over the Internet -A very basic form of file sharing protocol -Provides authentication and encryption -Directory access protocol
Provides no security features A very basic form of file sharing protocol
In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as: Bridge Active hub Server Proxy
Proxy
Which of the following answers refers to a dedicated local network consisting of devices that provide data access? SDN NAS iSCSI SAN
SAN
Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications? LACP DSCP SIEM HIDS
SIEM
Which of the following enables VoIP calls between PBXs? VTP PSTN SIP trunk PPPoE
SIP trunk
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? L2TP(layer two tunneling) BGP(Border gateway) RSTP(Rapid spanning tree, update of STP) SIP(Session initiation)
SIP(tcp or UDP port 5060 or 5061)
An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is referred to as: SOW MSA SLA MOU
SLA
Which of the following terms refers to an agreement that specifies performance requirements for a vendor? MSA SLA MOU SOW
SLA
Which of the answers listed below refers to a network protocol used in the most common types of spoofing attacks? SMTP RDP SNMP Telnet
SMTP
Which of the following answers refers to a set of bug fixes or code enhancements available in the form of a single installable package? Hotfix Service pack Software distribution System update
Service pack
A type of diagnostic tool used for measuring the strength of a wireless signal is referred to as: Tone generator Multimeter Spectrum analyzer Network mapper
Spectrum analyzer
An email sent from unknown source disguised as the source known to the message receiver is an example of: (Select 2 answers) Spoofing Dictionary attack Trojan horse Brute forcing Social engineering Tailgating
Spoofing
An IPv4 packet header field that specifies how many more hops a packet can travel before being discarded is called: SPB TTL MTU DSCP
TTL (Time to live)
Which unencrypted remote-access method enables control over another computer on the network via command line? Telnet RDP VNC SSH
Telnet
Which of the following tools would be used for locating a cable in a cabling bundle or tracing individual wires in a cable? Spectrum analyzer Toner and probe kit Time Domain Reflectometer (TDR) Multimeter
Toner and probe kit
Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces (e.g. copper and fiber, or vice versa)? Bridge Transceiver Active hub Managed switch
Transceiver
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet. True False
True
Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or user names and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns, such as keyboard typing style ("something you do"). Multi-factor authentication systems require implementation of authentication factors from two or more different categories. True False
True
Category 3 (Cat 3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring and older Ethernet (10BaseT) networks. True False
True
Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6A, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBaseT networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling hasn't seen a widespread market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6A standard which offers similar performance and takes advantage of the traditional RJ-45 connector. True False
True
Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature). Coupled with a hardware sensor mounted inside the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot. True False
True
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS. True False
True
Hash functions allow for mapping large amounts of data content to a small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the main content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied, the resulting hash value calculated after content modification will be different from the original hash. In computer forensics procedures, comparing hashes taken at different stages of evidence handling process ensures that the evidence hasn't been tampered with and retains its integrity. True False
True
In 10GBaseT networks, Category 6 (Cat 6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. True False
True
In STP network topology, the term "Root guard" refers to a security mechanism designed to protect integrity of the designated main switch. True False
True
In computer networking, the term "Out-of-band management" refers to a network device management technique that enables device access through a dedicated communication channel separate from the network where a given device operates. Managing access can be established either locally by installing an out-of-band management card on the device, or remotely by establishing a dedicated connection to the device with the use of a modem or console router. True False
True
In computer security, the term "Biometrics" refers to physical characteristics of the human body that can be used for identification and access control purposes. True False
True
In the patch management process, an unwanted change introduced by an update can typically be reverted via rollback feature which allows for restoring an application or system to a state prior to the update. True False
True
Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles or protocols that are in use on the network. True False
True
Private Branch Exchange (PBX) is an internal telephone exchange or switching system implemented in a business or office. PBX allows for handling of internal communications without the use of paid Public Switched Telephone Network (PSTN) service. A Voice over Internet Protocol (VoIP) PBX, which takes advantage of existing LAN cables, can further reduce costs by removing the need for separate telephone cabling infrastructure in a building or office. True False
True
Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell protocol (SSH) and runs by default on TCP port 22. True False
True
The 66 block (older type/primarily used in analog telephone systems) and the 110 block (newer type/used in computer networks) are examples of punch-down blocks used for connecting sets of wires. True False
True
The importance of changing default user names and passwords can be illustrated on the example of certain network devices (e.g. routers) which are often shipped with default and well-known admin credentials that can be looked up on the web. True False
True
The main difference between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources. True False
True
The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection. True False
True
The term "VoIP endpoint" refers to a dedicated hardware device or an application program that enables Voice over Internet Protocol (VoIP) telephone calls from computing devices. True False
True
The very last step of the troubleshooting process involves documenting findings, actions and outcomes. This step comes after verification of full system functionality and implementation of applicable preventive measures. True False
True
Transmission carried out in one direction only is described as simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes. True False
True
Wi-Fi Protected Setup (WPS) is a network security standard which simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network. WPS has known vulnerabilities and disabling this functionality is one of the recommended ways of securing wireless networks. True False
True
Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. True False
True
Which of the following answers refers to a dedicated device designed to manage encrypted connections established over an untrusted network, such as the Internet? VPN concentrator Proxy server Distributed switch UTM appliance
VPN concentrator
Which of the terms listed below does not fall into the category of preventive physical security controls? ID badges Biometrics Video surveillance Smart cards Key fobs Hardware locks
Video surveillance
NS SPF -MX PTR
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
Which of the following tools would be of help in determining the optimal placement of a WAP? War driving Optical power meter Network mapper Wi-Fi analyzer
Wi-Fi analyzer
Which of the tools listed below enable troubleshooting of problems related to name resolution? (Select 2 answers) ipconfig dig netstat ifconfig nslookup
dig
What is the name of a Linux command-line utility that can be used to display TCP/IP configuration settings? ifconfig netstat nslookup ipconfig
ifconfig
What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings? ifconfig nslookup ipconfig netstat
ipconfig
Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers) ifconfig eth0 down ipconfig /release ifconfig eth0 up ipconfig /renew
ipconfig /release ipconfig /renew
A command-line utility used for checking the reachability of a remote network host is called: ping tracert dig netstat
ping
Which of the following network administration command-line utilities can be used for DNS queries? tracert nslookup ping pathping
nslookup
Which of the software tools listed below allows for obtaining a domain name to IP address mapping? netstat nslookup tracert pathping
nslookup
Which network command-line utility in MS Windows combines the features of ping and tracert? nbtstat pathping nslookup netstat
pathping
Which command-line command in MS Windows is used to display the contents of a routing table? netstat -a route print ipconfig /all print route
route print
A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as: nbtstat traceroute netstat tracert
traceroute