Networking + Post-Assessment Quiz
Varghese has just returned from a meeting with senior management. The management team is concerned that the current systems in place may not be identifying all of the weaknesses that exist in the current infrastructure and want to determine to what extent the company could be attacked. Which of the following might Varghese decide to employ in making this determination? a. penetration test b. vulnerability scan c. honeypot d. security audit
a. penetration test
At the beginning of a pandemic, a company has realized that they do not have enough Windows computers to ship out to employees in order to allow them to work from home. Which of the following might the company choose to implement to allow their users to continue to work from home until more computers can be purchased and shipped out to these employees? a. remote desktop gateway b. VPN c. TFP d. SSH
a. remote desktop gateway Since the company uses Windows, SSH would not be the best choice, as it is typically used for Linux and UNIX systems.
Dahlia has just installed gigabit routers and switches at the company's headquarters. Which of the following might she need to do in order to allow the computers that came with 10/100 network ports to transfer data at the faster speeds? a. Configure the routers to push out updates to the computers advertising the new speeds b. Install a NIC on each of the computers c. Issue new tokens to each user d. Install a hub at each user's workstation
b. Install a NIC on each of the computers Computers do not typically connect directly to a port on a router. Even if they did, the router can only negotiate a speed that is supported by the computers. The computers will still need a network interface card that supports gigabit speeds.
Bert is a network administrator for a company that has just acquired another smaller company. Upon doing an inventory of one of the branch offices of the acquired company he finds an unmanaged switch in one of the IDFs. At which of the following layers does this device operate? a. Layer 1 b. Layer 2 c. Layer 3 d. Layer 4
b. Layer 2
Which of the following documents might a company use to solicit vendors to submit a solution of products and services that the company is looking to purchase? a. MSA b. RFP c. SOW d. MOU
b. RFP
Tejas wants to be able to manage a variety of devices on his network while ensuring that the communications of the management system are encrypted. Which of the following should he implement? a. SMTPv4 b. SNMPv3 c. SAMLv2 d. STPv2
b. SNMPv3 Version 3 added authentication, validation, and encryption for messages exchanged between the SNMP
Tan works for a telecommunications provider and noticed one of the communication links to a branch office 10 miles away has just gone down. Which of the following tools might help him determine what the problem could be? a. Connect a multimeter to the fiber optic cable. b. Use an OTDR on the fiber optic cable. c. Attach an attenuator to the fiber optic cable. d. Use a tone generator on the fiber optic cable.
b. Use an OTDR on the fiber optic cable. An optical time domain reflectometer can tell the technician where or if there may be a break or cut in a fiber optic cable.
Cari is a system administrator for an organization that has been seeing large amounts of growth but has multiple legacy systems running on older hardware. There is a concern that there is not much physical space left in the data center. Her manager has asked her to come up with a way that the company could continue to expand the ability to deliver services to end users without having to grow into another data center. Which of the following might be a component of Cari's plan? a. Leased Line b. MTBF c. Hypervisor d. VPN
c. Hypervisor
Ghar is looking to deploy two new network-based cameras in a location that does not currently have power. Which of the following, if performed, would still not allow him to deploy these new cameras to the selected location? a. Have an electrician run power to the selected location. b. Use a switch that includes POE or POE+ capabilities. c. Replace the unmanaged switch with a managed switch. d. Use a power injector on the ethernet cabling running to the cameras.
c. Replace the unmanaged switch with a managed switch.
Kaleb is looking at the list of WiFi devices currently connected to the network. He sees a lot of devices that all appear to be made by the same manufacturer, even though the manufacturer name is not listed on the screen. How could he have determined that they were made by the same manufacturer? a. There are a large number of devices that have addresses ending in the same 24 bits. b. There are a large number of devices using the same WiFi Channel. c. There are a large number of devices that have the same OUI. d. The first four characters are the same for a large number of the device MAC addresses.
c. There are a large number of devices that have the same OUI. first 24 bits
Bryan has just purchased a new firewall for his organization and installed it in the datacenter. He spent many hours researching to find the best option with all the features his company needs. However, after installing the firewall, several items he needs are missing from the configuration options. Which of the following is the most likely cause? a. He has not yet loaded the features from the included CD. b. He needs to roll back the firmware to the previous version that included these features. c. He needs to perform a hard reset on the firewall. d. He purchased the incorrect license type for this firewall.
d. He purchased the incorrect license type for this firewall.
Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individual VLANs appear to be tagging the traffic correctly. However, there are still some frames being transmitted across the network that are not tagged to any particular VLAN. Which of the following describes the term by which a switch will categorize these frames? a. Management VLAN b. Voice VLAN c. Data VLAN d. Native VLAN
d. Native VLAN
Carlos currently manages an 802.11n wireless network. He has been asked to see if there is a way to increase the speed of the network without upgrading to another Wi-Fi standard. Which of the following would allow him to do this if supported by the current technologies in use? a. 802.11ac b. ANT+ c. IR d. channel bonding
d. channel bonding
Antje has been asked to review the cybersecurity infrastructure deployed to ensure that they are looking at every layer in their defense in-depth strategy. He finds that there is adequate protection at the perimeter of each zone but is concerned that zero-day network-based attacks may still make it into the network segment. Which of the following should he recommend implementing? a. layer 3 switch b. STP c. network-based firewalls d. host-based firewalls
d. host-based firewalls Since the scenario states that the perimeter of each zone is already well protected, they have already most likely implemented network-based firewalls of some sort. In order to cover every layer possible, a host-based firewall should also be considered.
Savannah manages multiple wireless networks within her company's warehouse to ensure that certain devices are isolated and segmented off from each other. A junior technician has just added a new device to the network but cannot seem to get it to communicate with the other devices. Which of the following is the most likely reason that it cannot communicate with these devices? a. improper antenna placement b. encryption protocol mismatch c. RF attenuation d. incorrect SSID
d. incorrect SSID
Janvi is attempting to connect to one Linux server from another but is getting a message "destination host unreachable". Which of the following tools might he use next to determine the cause of the issue? a. ping b. tracert c. tcpdump d. netstat
d. netstat The netstat command can be used with the -r switch in order to display the routing table to ensure that there is a route to the remote network or a default gateway as a gateway of last resort.
Terrance is trying to troubleshoot an issue on his company's network. He has narrowed it down to a few segments of the overall larger network. He connects with a rollover cable to one of the routers and wants to check the status of the connection to another router. Which of the following commands might help him troubleshoot that connection? a. disp conn b. show start c. disp duplex d. show interface
d. show interface
Which of the following IEEE standards defines how VLAN information is added to the header of frames being sent across a network? a. 802.1q b. 802.15.4 c. 802.3af d. 802.11n
a. 802.1q
Tabitha has been trying to connect to a server by FTP for the past two hours, but it says that the maximum number of connections are already established. She connects via SSH and sees a single IP address has all of the connections open. Which of the following describes the type of attack that is currently in progress against this server? a. DoS b. Phishing c. DDoS d. Baiting
a. DoS coming from 'Single' IP
Teri is a network administrator for a large company that is attempting to switch to a VoIP technology recommended by one of their vendors. She knows that this particular traffic can be sensitive to latency and jitter. Which of the following might she decide to do that incurs the least cost to ensure that there are no issues with this new technology? a. Implement a voice VLAN for the VoIP traffic. b. Create an ACL to only allow VoIP traffic when latency and jitter are at a minimum. c. Create a separate network for the VoIP technology. d. Install additional WAPs throughout the building.
a. Implement a voice VLAN for the VoIP traffic.
Sonja is a network engineer and has just installed a new device that she wants to manage through the network management station. Which of the following might best describe the database file provided by the vendor that she needs to load into the NMS in order to manage this device on the network with SNMP? a. MIB b. OID c. TTF d. TRAP
a. MIB The management information base is the database of objects and capabilities of devices that may be managed by an SNMP network management station
Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a ticket granting ticket system that relies on time synchronization in order to prevent replay attacks. Which of the following protocols might he implement to ensure that Kerberos will work correctly? a. NTP b. FTP c. HTTPS d. STP
a. NTP
Which of the following provide SSO capabilities for a system? a. RADIUS b. Kerberos c. Diameter d. TACACS+
b. Kerberos
Terrance has been tasked with upgrading his company's Wi-Fi network that provides network access for several devices that are located somewhat far apart from each other. He knows that they all need to stream a large amount of data simultaneously. Which of the following capabilities should he look for when shopping for new hardware? a. CSMA/CA b. MU-MIMO c. RSSI d. Z-Wave
b. MU-MIMO
Mylinh manages a growing corporate network. As the network grows, it is getting more and more difficult to manage the configurations on the various routers and switches within the network. Which of the following might help centralize the approach to managing the traffic flows across the network? a. STP b. SDN c. NFV d. InfiniBand
b. SDN
Which of the following protocols might someone use to send an email? a. RDP b. SMTP c. HTTP d. FTP
b. SMTP
At which of the following OSI model layers is the protocol data unit referred to as a segment? a. Physical Layer b. Transport Layer c. Network Layer d. Data Link Layer
b. Transport Layer
Ceejay needs to find a way to allow users to work from home using company owned laptops during a pandemic so that they are able to access resources on the intranet. Which of the following would be the best choice for him to implement? a. IP Spoofing b. VPN c. VNC d. RDP
b. VPN
Which of the following is the best action a company can take to prevent social engineering attacks from being carried out against the organization successfully? a. timer activated lighting systems b. employee awareness training c. DLP d. motion activated cameras
b. employee awareness training
Gino needs to be able to SSH to a Linux server on his network from his Windows workstation in order to modify the configuration of the web server service. Which of the following types of programs might he use to do so? a. remote desktop gateway b. terminal emulator c. virtual desktop infrastructure d. virtual private network
b. terminal emulator
Which of the following expresses the subnet mask 255.255.255.224 in CIDR notation? a. /25 b. /26 c. /27 d. /28
c. /27
Kali is wanting to edit the configuration of a web server running Linux. Which of the following ports is the best choice for her to connect to the Linux web server? a. 23 b. 443 c. 22 d. 80
c. 22
Which of the following ports is used by a website that has implemented TLS certificates? a. 389 b. 1433 c. 443 d. 80
c. 443
Beri is analyzing some network traffic statistics and sees a metric that appears to indicate that frames are being corrupted as they're being sent across the network. Which of the following might be the metric that causes her to believe that is the case? a. Runts b. Jumbo Frames c. CRC d. Giants
c. CRC
Which of the following is not a technology used to connect servers to a SAN? a. Fibre Channel b. iSCSI c. IR d. FCoE
c. IR
All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. ring b. mesh c. star d. bus
c. star A switch is considered a logical and physical star network.
Which of the following concepts assumes all network traffic is potentially malicious until proven otherwise? a. NICE model b. extended validation security model c. zero trust security model d. noncompliance security model
c. zero trust security model
Jamie needs to subnet the network 192.168.3.0/24 into 4 equally sized subnetworks. Which of the following would be the subnet ID for the address 192.168.3.201? a. 192.168.3.224 b. 192.168.3.128 c. 192.168.3.0 d. 192.168.3.192
d. 192.168.3.192 network ID ? A subnet mask of 255.255.255.192, expressed in CIDR notation as /26, would create the 4 subnetworks required by this scenario. Each subnetwork would have 64 IP addresses in total. Thus, the last network in that range would be from 192.168.3.192 to 192.168.3.255, which would make the subnet ID the first address in the range, 192.168.3.192.
Which of the following is the default subnet mask for a class C network? a. 255.255.255.255 b. 255.255.0.0 c. 255.0.0.0 d. 255.255.255.0
d. 255.255.255.0
Jorge is analyzing the traffic statistics on one of the networking devices and sees a category for the number of Runts that the device has seen. Runts are packets that are smaller than _______ bytes. a. 192 b. 128 c. 18 d. 64
d. 64
Zara is having trouble accessing her company's website through her web browser. She has already pinged the static IP address of the web server and it appears to be online. Which of the following might she look at next? a. Ensure that the server's NTP settings are correct. b. Verify that the DHCP settings are correct on the server. c. Check that the LDAP server is also online. d. Ensure that DNS for the domain is configured correctly.
d. Ensure that DNS for the domain is configured correctly.
Toby is drafting the physical network topology plans for the new headquarters building for his company. Which of the following will there be the most of within the building? a. IDS b. demarcation point c. MDF d. IDF
d. IDF
Tuan is a network administrator for a large organization. The company currently has 4 T-1 lines providing Internet access at a manufacturing facility but is seeing issues with the newly deployed Voice over IP (VoIP) system. Which of the following might Tuan want to consider that will not require additional bandwidth? a. Implement PoE b. Open port 53 on the perimeter firewall c. Convert the network from RIPv2 to OSPF d. Implement QoS
d. Implement QoS
Which of the following types of cable might you expect to see connected to a cable modem from the ISP? a. RJ-45 b. RG-11 c. RJ-11 d. RG-6
d. RG-6
The helpdesk at a large company is looking for ways to increase the efficiency of their technicians. They have found that different technicians have different ways of doing the same task. Some of these technicians take twice as long as others. There is also no documentation on how to perform tasks, so when a new helpdesk technician is hired it is up to the technician training them to pass on that knowledge. Which of the following might this company decide to implement to resolve these issues? a. TOPs b. GAPs c. PLCs d. SOPs
d. SOPs
Tyler is a junior network engineer and has been reading about the ability to connect two ports on one switch to two ports on another switch using ethernet cables to double the amount of bandwidth available between the switches. He has not yet set up a port aggregation protocol and notices an increasing amount of broadcast traffic being sent back and forth between the two switches. Which of the following is likely not set up on these switches that would have prevented this until he configures some sort of port or link aggregation method? a. EIGRP b. BPDU guard c. RIP d. STP
d. STP
The network administrator for an organization needs to install a network at his company's new branch office. The branch office will have 30 computers that will all connect to the Internet, where they will share a single public IP address. Which of the following devices must the network administrator install to ensure the devices are able to send traffic out to the Internet and receive the corresponding traffic back? a. router b. switch c. token ring d. hub
a. router
Hobart has just created a network segment for a new group of file servers. These servers should only be accessible from the internal network. Connections coming in from the Internet should not be able to access these file servers. Additionally, the servers should be able to perform automatic updates from the operating system and software vendors. Which of the following should he consider implementing in order to accomplish this task? a. stateful firewall b. layer 3 switch c. media converter d. stateless firewall
a. stateful firewall
Tobias needs to create a network for the sales department, which has 86 users, using the smallest subnet possible. Which of the following is the total number of usable IP addresses that will remain free after creating this subnet? a. 168 b. 40 c. 42 d. 170
b. 40 2^h - 2 = Z
Jason has just been hired as the Director of IT. He is reviewing existing policies and procedures to determine how well the company has defined the roles of its employees in order to keep the organization secure and operating efficiently under any scenario. He finds that the company does not have an existing plan for how their offices in a hurricane-prone area will continue to operate during a hurricane. Which of the following plans should he consider implementing to ensure that employees at this location and supporting locations will be well prepared to both handle and continue to operate through whatever situations may arise as a result of natural disasters? a. IRP b. BCP c. DRP d. NDA
b. BCP
Zachariah has been asked to assess whether the backup process at his organization is sufficient to meet all of the company's goals and objectives, which support their key performance indicators. One of the topics that he is analyzing is the frequency of backups to ensure that the company does not lose any more than 6 hours of data in the case of a hard drive or other system failure. Which of the following describes the particular metric that he is concerned about? a. RTO b. RPO c. MTBF d. MTTR
b. RPO
Kumail wants to check his bank account balance to see if a transaction has cleared from a purchase he made the previous day. Which of the following protocols would most likely be used to do this? a. FTP b. HTTP c. HTTPS d. RDP
c. HTTPS
Giuseppe is architecting the network for a new headquarters building that is currently in design. He wants to ensure that there is redundancy built into the network while also ensuring that there are no routing loops. Which of the following methodologies can he make use of to ensure the configuration is free of routing loops? a. Configure the ICMP routing protocol b. Create a DMZ c. Implement split horizon d. Implement RSTP
c. Implement split horizon ICMP is the Internet Control Message Protocol. It is not a routing protocol. The Rapid Spanning Tree Protocol is useful in preventing switching loops, but has no effect on routing loops. A DMZ is a de-militarized zone, which is a lightly protected network or subnetwork at the perimeter of the company's overall network. It would not have any effect on whether routing loops could exist.
Homer is revising some internal documentation at his company. He has been asked to verify whether a certain key performance indicator is currently being met in regard to the average amount of time it takes to repair a device or service after it has experienced a non-fatal error. Which of the following is the term which best describes this KPI? a. MTBF b. RPO c. MTTR d. RTO
c. MTTR
Genghis wants to develop a new application that requires a database. He does not, however, want to be responsible for managing the patching and security of the operating system for yet another server. Which of the following would best serve his needs? a. SaaS b. IaaS c. PaaS d. DaaS
c. PaaS
Toni needs to connect to a Cisco switch to make configuration changes. Which of the following protocols will most likely be used when she authenticates into the switch? a. STP b. BGP c. TACACS+ d. IGRP
c. TACACS+ TACACS+ is a proprietary AAA protocol developed by Cisco and is commonly used for network technicians to authenticate into switches and routers
In which of the following types of technologies would a network technician configure an ESSID? a. WPS Server b. rogue access point c. WLAN controller d. evil twin
c. WLAN controller A WLAN controller would use the extended service set. The controller would be configured with an ESSID which would then be used by the various lightweight wireless access points that it controls.
Tonia has been tasked with setting up a wireless network at a new branch office. She wants to make the network secure while requiring the least administrative effort. Which of the following might she choose to implement? a. WPA2-WPS b. WPA2-Personal c. WPA2-Enterprise d. WPA2-PSK
c. WPA2-Enterprise WPA2-Enterprise can make use of a RADIUS server whereby users are able to authenticate onto the wireless network using their LAN credentials
Ehred is a network technician for a hotel chain and has been notified that one of the locations is having issues with the guests' ability to join the Wi-Fi network. Guests are usually prompted to enter their room number and last name on the reservation, but this does not appear to be happening. Which of the following might best describe the issue occurring in this hotel? a. Geofencing misconfiguration b. SSID mismatch c. captive portal issues d. wardriving attack
c. captive portal issues
Ava is unable to pull up her company's website, theoretical.com, in her web browser. She wants to check that the server is online and responding to requests. Which of the following could she try? a. use the command: dig theoretical.com b. use the man command to look up the online status of the web server c. ping the IP address of the web server d. use the command: nslookup theoretical.com
c. ping the IP address of the web server
Which of the following is the most secure password that an administrator might choose to use? a. ALongPassword b. 9$&aB!g^ c. 76tLTBParade! d. YM100%oftheSH0tzUdontTakE!
d. YM100%oftheSH0tzUdontTakE!
Talia has just returned from a meeting with her manager where they discussed the various vulnerabilities that might impact the organization. They agreed that they were concerned that users might give out information or click on malicious links that they should not click. Which of the following types of testing might help to identify weak areas where the company could improve its employee awareness programs? a. denial-of-service b. black hat c. DLP d. social engineering
d. social engineering
Benjamin has been receiving reports from users at one of the rural branches of his company that their VoIP telephone conversations have been experiencing distortion and some lost connections. He pulls up the monitoring tool and sees that recently there has been a lot of video streaming from a popular social media site and that the bandwidth for the ISP connection to that office appears to be maxed out during the timeframe when users are experiencing issues. Which of the following could help resolve the issues with the telephone conversations without discarding any traffic? a. administrative distance b. traffic policing c. encapsulation d. traffic shaping
d. traffic shaping
Priya is planning the cabling design for the company's new headquarters. One of the runs of cable needs to go behind the elevator bank's hydraulics and motors to the reception area computer. Which of the following types of cable would be the best choice? a. STP b. Plenum c. Fiber d. UTP
a. STP
Which of the following ports are used by the Simple Network Management Protocol? a. UDP 161 b. TCP 161 c. TCP 514 d. UDP 514
a. UDP 161
Aaron, a junior network technician, is troubleshooting a network. He seems to have tracked down the issue to the core router that connects to the line from the ISP, however, he's not sure where the core router might be located. Which of the following should he ask a senior technician for help locating? a. demarcation point b. patch panel c. data room d. IDF
a. demarcation point There may be many IDFs throughout a building where distribution switches and patch panels are located, but this is not the specific term for where the line from the ISP comes into the building and responsibilities are split.
Pano has just installed a switch for a new network segment at a branch office. Which of the following describes the traffic flow being sent from one computer on that network segment to another computer on the same network segment? a. east-west b. side-to-side c. top-to-bottom d. north-south
a. east-west
Carolina wants to determine which services are running on the Linux servers in a certain subnet. Which of the following tools would best perform this task? a. nmap b. telnet c. ping d. ifconfig
a. nmap The ifconfig command can be used to set and view ip address information on a Linux, UNIX, or MacOS computer. It is not used to map a network.
Tijuan has just gotten back from a networking security seminar where he learned about a common concept that states that people should only be given the access that they need to do their job and nothing more. Which of the following concepts did he learn about? a. principle of least privilege b. minimum access requirement c. allowed actions list d. concept of total control
a. principle of least privilege
Leonard has configured a switch with multiple VLANs and needs to route traffic between the different VLANS through a router on a stick. Which of the following does he need to configure on the router to enable this? a. subinterfaces b. MTU c. duplex settings d. VLAN hopping
a. subinterfaces Subinterfaces must be configured for each VLAN. The router then needs to be configured to allow certain types of traffic to travel from one VLAN to another.
Bob wants to allow devices at a branch office to query publicly available DNS servers from a large cloud provider. Which of the following ports should he open in the firewall in order to enable this? a. 389 b. 53 c. 110 d. 68
b. 53
Cora is a network engineer for a large company and has been given instructions on how to configure a private fiber connection between her company's data center and the cloud service provider her company uses. She needs to configure an ASN on one of the core routers in the data center as part of the connection. Which of the following protocols is she most likely being instructed to configure for use with the CSP? a. EIGRP b. BGP c. RIPv2 d. OSPF
b. BGP RIPv2 is an interior gateway protocol that would not be used to connect a private cloud or data center to a public cloud service provider.
Lisa is a network administrator and has been reviewing the types of data being transmitted over the network. She discovers that there are a number of email attachments and files being uploaded to a remote server via FTP that potentially contain PII. Which of the following might help her to prevent these files and confidential information from being transmitted outside the organization? a. SLA b. DLP c. PHI d. OLA
b. DLP A data loss prevention system identifies sensitive data on the network and prevents it from being copied or transmitted off the network
Jafar has just been hired as a junior network engineer for a large company. He has been advised that due to a pandemic he will be working remotely and needs to ensure he has a high-speed broadband Internet connection with low latency at home in order to connect by VPN. The local cable company has not yet built out his neighborhood, so he needs to look for an Internet service that meets the requirements. Which of the following choices would most likely best suit his needs? a. Wi-Fi b. DSL c. EV-DO d. Satellite
b. DSL
Tevin has been tasked with ensuring that his company's web applications are always online - even when their data center loses power and network connectivity due to some unforeseen disaster. Which of the following is the most cost-effective solution that he could recommend that would meet this requirement? a. hot site b. cloud site c. warm site d. cold site
b. cloud site
Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down constantly. When the fiber status is up, the data rate is slower than what she expected. Which of the following might be a factor in the issues she is seeing? a. incorrect resistance fiber chosen b. low optical link budget c. attenuation factor inadequacy d. incorrect frequency calculation
b. low optical link budget It is unnecessary to calculate the frequencies used by fiber optic connections, as these types of calculations have already been made by the device and fiber manufacturers.
Which of the following types of cables might be used to run from cubicles into a drop ceiling and then routed across to an IDF? a. EMI b. plenum c. backbone d. SCADA
b. plenum
Tevan cannot connect to the core router located in the MDF at his company. Which of the following might be useful in troubleshooting this connection? a. patch panel b. rollover cable c. punchdown tool d. OTDR
b. rollover cable A patch panel is used to terminate bundles of cables coming in from various network drops out to cubicles, offices, or other similar locations. A punchdown tool is used to terminate a twisted pair cable into a punchdown block.
Jan needs to connect two offices together that are approximately 21 km, or 13 miles, apart from each other. Which of the following would be the best choice of physical mediums that could be used to connect these locations? a. twisted pair ethernet cabling b. single mode fiber c. coaxial cabling d. multimode fiber
b. single mode fiber Coaxial cabling is typically used for distances for up to a few hundred feet.
Jorge has been tasked with purchasing a new wireless access point that provides the fastest access speeds and also operates on the 2.4 GHz spectrum. Which of the following specifications should he look for? a. 802.11n b. 802.11a c. 802.11ax d. 802.11ac
c. 802.11ax 802.11n does operate in the 2.4 GHz spectrum, but it is not as fast as the speeds provided by 802.11ax
Annette wants to expand her company's current on-premises cloud infrastructure by adding a well-known cloud service provider into the design, rather than building or leasing another datacenter. Which of the following cloud deployment models best describes the type of infrastructure that she wants to move towards? a. Community cloud b. Private cloud c. Hybrid cloud d. Public cloud
c. Hybrid cloud A private cloud is used by a single organization and could be used to describe the on-premises cloud infrastructure already used by this organization.
Valerie is designing the network for the new HQ2 location of her company. HQ2 is located on the United States east coast, but the primary headquarters is located in the United States Pacific northwest. She wants to ensure that file servers in both locations can be accessible by all users, regardless of location. Which of the following types of connections might she choose to include in the configuration? a. MAN b. CAN c. WAN d. LAN
c. WAN
Caleb has just installed an open-source application on a web server to host a wiki for the customer service department. Which of the following should he do to harden the application after installation? a. Block port 443 on the firewall in front of the web server. b. Configure SNMPv1 on the server to help with automation and management. c. Disable SSH and enable telnet on the server for remote administration. d. Change the default password.
d. Change the default password. Some open-source applications come with a default password that should be changed immediately upon installation, as this password is widely known and published in documentation.
Dilan is a network administrator for a large company. On a couple of different occasions, he noticed that users were getting odd IP addresses when attempting to join the corporate network. He found that the development team had created virtual machines that were offering out IP addresses. Which of the following, if enabled, would have prevented this from happening? a. Mandatory Access Control (MAC) b. ARP spoofing c. RBAC d. DHCP snooping
d. DHCP snooping snooping is a feature on some switches that allows the switch to drop any DHCP offer messages that arrive on switchports that should not have a DHCP server connected to them.
Sandra is attempting to resolve an issue on her company's network: several users are unable to access one of the company's intranet web servers. She has developed a theory and tested it to determine the cause. Which of the following steps should she complete next? a. Document findings, actions, and outcomes b. Implement the solution or escalate the problem c. Identify the problem and its symptoms d. Establish a plan for resolving the problem
d. Establish a plan for resolving the problem
Anosh needs to deploy a new web application that is publicly accessible from the Internet. The web application depends on a database server to provide dynamic webpages, but he does not want to put the database server in a subnet that is publicly accessible for security reasons. Which of the following devices would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filer traffic moving between different networks, and is publicly accessible while still allowing the database server to remain in a private subnet? a. switch b. SQL Server c. DMZ d. firewall
d. firewall
Gary has been tasked with ensuring that the sales team can use their laptops from as many places as possible - even when there is not a Wi-Fi or wired network available at customer sites. Which of the following technologies, if included as part of a laptop, would allow them to access the systems, applications, and information they need while on the go? a. MTSO b. DSL c. LTE d. MSC
c. LTE
Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 6 b. Layer 4 c. Layer 3 d. Layer 2
c. Layer 3
Jeni works for a company that has seen rapid growth, beginning as a very small startup and expanding into a large company with what is forecasted to be thousands of employees by the end of its second year. She is trying to ensure that the fast-paced growth doesn't overburden administrators when onboarding new employees. Which of the following would require the least administrative effort in their day-to-day jobs of onboarding employees and managing permissions for these users, groups, and departments while maintaining the highest level of security? a. DAC b. CAC c. RBAC d. AAC
c. RBAC
Which of the following types of transceivers can be used for connections that require a data rate of 400 Gbps? a. QSFP+ b. CFP c. SFP+ d. XFP
a. QSFP+