Network +

Ace your homework & exams now with Quizwiz!

A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. Compose the MAC-derived address for the Extended Unique Identifier (EUI) 64.

0272:8bff:fe31:8bcb

A network engineer at a major company is measuring the error rate of the network during a monthly network review. They calculate the error rate to be almost 9%. List the maximum tolerable error rate in most situations.

1%

A network manager adds a power injector to a switch that does not support Power over Ethernet (PoE). The only option available to the network manager is to use phantom power for the injector. Evaluate the characteristics of PoE and decide which pairs the network manager will use. (Select two).

1/2 3/6

A network uses a 10GBASE Ethernet solution. A switch on the network does not support Power over Ethernet (PoE). A network manager adds a power injector. Analyze POE and determine which pairs the network manager can use for the power injector. (Select two)

1/2 3/6

A licensed wiring professional runs Cat 6A cable in lengths under 55 meters in an office building. What specification of cabling does the professional install?

10GBaseT

An Internet Protocol (IP) address is 192.156.32.49. Calculate the binary representation of the first octet.

11000000

A company has 350 hosts that connect to the network. All of the hosts use a public Internet Protocol (IP) address. Consider public address classes to determine which of the following may represent the first octet in the IP address range.

132

Select the Internet Protocol (IP) address that is in the Class B private address range.

172.20.105.003

A site survey is executed on the office floor to determine the amount of wireless Access Points (APs) to install and what channels to use. The APs will operate in the 2.4 gigahertz (Ghz) frequency band. What deployment options can the technician propose without overlapping channels? (Select all that apply)

2 APs; Channel 1 and 6 3 APs; Channel 1, 6, and 11

A service provider is negotiating a Service Level Agreement (SLA) with a client involving the repair of broken server nodes when failure occurs. The service provider mentions a prior contract that included about 20 billable hours a month, which involved the repair of about five servers a month. Calculate the MTTR (Mean Time To Repair).

20 hours / 5 repairs = 4 hours

An Internet Protocol (IP) address in binary form is 11001101100011111100011111010101. Convert the binary IP address to dotted decimal notation.

205.143.199.213

A network technician is designing a wireless Access Point (AP) architecture for an entire office floor. These APs will operate in the 5.0 gigahertz (Ghz) frequency band. What deployment options can the technician use without overlapping channels? (Select all that apply)

4 APs; Channel 36, 40, 44, and 48. 1 AP; channel 50

An Information Technology (IT) engineer recently hired at a high-performance computing facility (HPC), notes that the system, which models climate changes, is a critical system running 24x7 with two-nines availability. Based on an understanding of high availability systems, determine the Maximum Tolerable Downtime (MTD) of the system in hh:mm:ss format.

87:36:00

A network technician installed an application on a standalone laptop to showcase a list of multiple devices and their respective channels. A signal meter is also available to gauge signal strength. Determine which tool the technician is most likely using on the laptop.

A Wi-Fi analyzer

A network admin notices network congestion affecting two web servers configured for load balancing. Users are experiencing slow download times and periodic web service interruptions. Identify which examples could cause network congestion and affect web services. (Select all that apply)

A broadcast storm Denial of Service attack

After replacing the network cable with a patch cable, a network connection cannot be established between a server and a switch. After noticing differences in the pin-out, which of the following is most likely the cause of the issue?

A crossed pair

Describe the diagram found on the Physical layer.

A diagram of cable links, their connections, and asset IDs.

Describe the diagram found on the Logical layer (layer 3) of the Open Systems Interconnection (OSI) model.

A diagram showing IP addresses of router interfaces, firewalls, and DHCP scopes.

A blinking amber light appears on a port after an IT employee re-configures the port on a switch connected to a new server. Determine the likely cause of the appearance of the amber light.

A duplex mismatch

Compare and differentiate the features of tagged and untagged ports. (Select two)

A frame with an address to a port in the same Virtual Local Area Network (VLAN) is untagged. A frame will get tagged if it goes over a trunk port.

Simulate the use of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).

A node waits until media is clear before transmitting packets.

A wireless access point (WAP) resides in the middle of an office area. A network administrator wants to gather information about data packets coming through the WAP for subsequent examination. Which of the following will provide the minimum level of support for completion of this task?

A packet sniffer

A group of users need to connect to a secure network. However, the network administrator needs to ensure that only valid users are connecting to it. Which of the following authentication methods meets the needs of the administrator for encrypted communications? (Select all that apply)

A pre-shared key (PSK) Group authentication Media Access Control (MAC) filtering

What authentication methods should be implemented in order to ensure only an authorized collection of users are connecting securely to a network? (Select all that apply)

A pre-shared key (PSK) Group authentication Media Access Control (MAC) filtering

Simulate the use of port forwarding on a network.

A router, configured like a web server, accepts incoming packets and changes the destination address to a designated host.

A system administrator identifies an issue with a server. The administrator believes the problem is with the Network Time Protocol (NTP). Analyze the NTP and determine what symptoms would lead the administrator to believe there is an NTP issue.

A server cannot access network resources and authentication is failing.

A network security administrator wants to implement a way to authenticate users based on the "something you have" authentication factor. Which of the following would satisfy this need, and create two-factor authentication when combined with an integrated fingerprint reader?

A smart card

A windows server has a newly upgraded network interface card (NIC) rated for higher speeds. An admin manually configures the Internet Protocol (IP) and NIC settings, then connects the Ethernet cable. The server is unable to receive a network connection and the switch port is appearing to be down. The cable and port on the switch were previously used by the same server. Analyze the scenario to determine the most likely cause of the issue.

A speed mismatch

A gamer is using a wireless AC router connected to a fiber optic network from the local Internet Service Provider (ISP). The gamer must ensure the ISP is providing close to advertised network speeds. Which is the most appropriate tool to gauge the available bandwidth?

A speed testing website

Analyze the following scenarios to determine which does NOT violate licensing restrictions.

A user installing open-source software

What is the difference between an exploit and a vulnerability?

A vulnerability is a security weakness; an exploit is a means of utilizing a vulnerability.

A user remotely connects to a company firewall to gain network access while traveling. What purpose does a RADIUS server provide for the connection?

AAA (authentication, authorization, and accounting)

A campus student in charge of administering the school network, relabeled ethernet cables after some changes to the network. The student notices that a cable originally going to Meeting Room B on the second floor of the administration building, now goes to Computer Lab A on the third floor. The student decides to relabel the cable. Determine which labeling is most fitting in terms of port naming conventions.

AB01-03A-D01

A user reports the company workstation is not connecting to the new internal file server via File Transfer Protocol (FTP). Other users in the same department are reporting the same issue. However, users in another department are able to download files via FTP. Which of the following may explain the issues the first department is experiencing?

ACLs (Access Control Lists) did not update

A consumer configures a new fitness device to communicate with a mobile phone by using very low power consumption. Which protocol does the consumer use with the devices?

ANT+

An office installed a wireless Access Point (AP). A network technician is in the area, surveying the signal from the AP and other background noises. The technician is looking for an above average Signal-to-Noise ratio (SNR) to approve use of the AP. Given the criteria, which of the following options would the technician consider the most desirable reading? (Select all that apply)

AP signal decibel is high. SNR is high.

A company retires a network connection that utilizes cell switching technology and individual connections called virtual channels. Based on the provided characteristics, the company discontinues using which of the following technologies?

ATM

A company implements a network connection that utilizes cell switching technology and individual connections called virtual channels. The connection will handle both voice and video. Based on the provided characteristics, which technology does the company implement?

ATM (Asynchronous Transfer Mode)

A network administrator is working directly with programmers on a new project at a manufacturing plant. The project involves installing modules that a Linux server monitors, that sends "heartbeat" messages of the status of the press molds connected to the modules. Before the installation process, the programmers require the network administrator's assistance establishing network performance baselines. Which of the following would NOT be a tool or method the administrator would use to institute performance baselines?

Access the server via command line and use the ifconfig terminal command to display IP information.

Which of the following best describes a topology where an adapter allows connections to and from other devices?

Ad hoc

A user visits the company's Intranet SharePoint portal using Internet Explorer and receives the following message: "There is a problem with this website's security certificate." What actions can a network administrator execute to resolve the user's workstation issue?(Select all that apply)

Add the issuer's certificate to the store. Restart Internet Explorer.

What type of attack involves broadcasting unsolicited gratuitous reply packets with spoofed source addresses followed by launching a man-in-the-middle (MitM) attack?

Address Resolution Protocol (ARP) cache poisoning

Which of the following is a common way of perpetrating a man-in-the-middle (MitM) attack by broadcasting unsolicited gratuitous reply packets with a spoofed source address?

Address Resolution Protocol (ARP) cache poisoning

Which type of encryption cipher is used in Wi-Fi Protected Access 2 (WPA2)? (Select all that apply)

Advanced Encryption Stand (AES) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

Security Information and Event Management (SIEM) software matches predetermined patterns or filters. This software records and highlights when it encounters a security event of a given severity. What term matches this occurrence?

Alerts

An organization experiences an increase in malicious email activity. As a result, the IT administrator configures some safety measures, including a DKIM DNS record. Evaluate the given descriptions and conclude which one relates to the record.

Allow received email from a given source

An organization tightens email security by placing a DNS record for mail servers, as a method to verify that messages are authentic. Evaluate the given descriptions and conclude which one relates to the record.

Allow received email from a given source

Following a security breach at a company from unauthorized personnel, physical site security policies need to be reviewed to mitigate repeated similar threats from occurring. Which of the following options can be implemented as a preventive measure to control users' physical access to specific authorized access zones? (Select all that apply)

An ID badge A lock mechanism

Which physical security policies should security personnel implement to mitigate threats and act as a preventative measure to control users' physical access to specific authorized access zones? (Select all that apply)

An ID badge A lock mechanism

A network administrator is testing a remote server's network configuration and decides to ping the Internet Protocol (IP) address of a familiar office Windows workstation. No replies were received, but the admin confirms DHCP settings are enabled on the workstation and can successfully browse the Internet. Analyze the scenario to determine why the client workstation did not respond to a ping request.

An IP address from another subnet is being used.

Any website or Internet service that involves, or potentially involves, US-EU (United States-European Union) connections are required to conform to the EU's General Data Protection Regulation (GDPR) framework. This ensures private user data is stored, processed, and transmitted in accordance with privacy laws. Evaluate the following forms of data to determine which form of personal data is NOT protected by GDPR laws.

Anonymized browsing habits

A network administrator wants to ensure passwords are strong and secure within a corporate environment. To effectively enforce password complexity rules, which of the following practices should the admin NOT recommend? (Select all that apply)

Any password that is a dictionary term Any default password A backdoor password reset mechanism

Tier 1 network support identified an issue requiring a review and creation of a new VLAN (Virtual LAN). The VLAN will pass through data from a VMware virtual switch to the physical switch. After establishing a plan of action, which of the following reasons will most likely justify an escalation to Tier 2?

Approve the new changes.

Identify which of the following an advanced cable tester can test for. (Select two)

Attenuation Crosstalk

Choose the acronym associated with the policy that outlines rules and expectations for users that opt to use personal devices on the company network.

BYOD

A wiring professional terminates the ends of some coaxial cables. Which one of these connectors can the professional use?

Bayonet Neill-Concelman (BNC)

Which of the following makes it difficult for an individual to gain access to sensitive data, supports local authentication, and can be combined with a smart card ID?

Biometrics

Which of the following is spoofing associated with? (Select all that apply)

Biometrics Deauthentication Phishing

What is the name of a data unit used at the Open Systems Interconnection (OSI) physical layer?

Bit

After several possible internal security breaches, a network administrator is instructed by the administrator's employer, a government agency, to use Data Loss Prevention (DLP) software to prevent leaks of confidential data. Apply knowledge of DLP software to determine what action the software can execute to identify confidential data.

Block transfer of content to removable media

Which of the following communications technologies does not require line-of-site and can operate at a distance of up to 30 feet?

Bluetooth

A web server on the internal network is not performing as expected. A systems administrator is running command-line tools such as pathping and mtr to gather utilization statistics about the server. What is the admin most likely trying to identify in this situation?

Bottleneck on the network

A newly deployed stack with servers, network switches, a KVM (Key, Video, Mouse), storage unit, and uninterruptible power supplies has just been fully cabled. After powering on the stack, there seems to be a network connectivity issue between the switch and servers. What is the best approach when trying to resolve this type of network issue?

Bottom-to-top

Which type of approach is applied by looking at each layer of the OSI (Open Systems Interconnection) model, starting from Layer 1, to establish a theory of probable cause?

Bottom-to-top

A Windows server with multiple network interface utilizes a configuration to join multiple subnets as one. Which configuration do the network cards use?

Bridge

Which of the following is NOT typically associated with a denial of service (DoS) attack?

Brute force

Which of the following is spoofing NOT associated with?

Brute force

Identify which type of attack a rogue access point (AP) CANNOT be coupled with when an attacker sends spoofed frames to disconnect a client from the AP. (Select all that apply)

Brute force Virtual local area network (VLAN) hopping Man-in-the-middle (MitM)

An administrator for a new company is reviewing the Standard Operating Procedures (SOP). Assess the following options and determine which are most likely on an SOP document. (Select three)

Budget considerations for equipment replacement Security protocols Procedures for dealing with customer contacts

A company issues employees a mobile phone for company use. One user has an older phone that will not accept a subscriber identity module (SIM) card. Which technology does this phone support?

CDMA (Code Division Multiple Access)

A company has 725 hosts on the network that utilize public Internet Protocol (IP) addresses. The company has three contiguous class C addresses for the hosts. The company implemented Classless Inter-Domain Routing (CIDR) to assist with the maintenance of the three networks. What will CIDR provide to the network?

CIDR will use bits normally assigned to the network ID to mask the complexity of the subnet and host address scheme.

A network manager for ABC company in Seattle, WA adds host Advert20 to Active Directory. Advert20 is a client in the Advertising department. Compile this information to design the distinguished name of the client.

CN=Advert20, OU=Advertising, O=ABC, L=Seattle, ST=WA, DC=ABC, DC=com

A network manager for CBA company in Dallas, TX adds host Manage30 to Active Directory. Manage30 is a client in the Management office. Utilize this information to design the distinguished name of the client.

CN=Manage30, OU=Management, O=CBA, L=Dallas, ST=TX, DC=CBA, DC=com

A user requests that a company web host have two different names for the same Internet protocol (IP) address. The user requests jobs.companyname.com and careers.companyname.com. Which domain name system (DNS) record does an IT tech configure to accomplish this?

CNAME (Canonical Name)

An IT engineer cleans a network rack and removes unused equipment. The engineer finds an old device used with a leased line install. Which device did the engineer find and remove as its functionality is obsolete?

CSU/DSU (Channel Service Units)/ (Data Service Units)

A company is cleaning their facility and discarding anything considered unusable. An employee finds a spool of RG-59 cable. IT informs the employee that the cable is outdated. Determine the type of technology used with the cable.

Cable broadband

A new company renovates an older office space. Part of the renovation includes replacing all data cabling, such as exchanging RG-59 cable with RG-6 cable. Considering the purpose of these cable types, which service benefits from the replacement?

Cable broadband

An engineer runs RG-6 cable through a crawl space. Which type of service does this type of cabling support?

Cable broadband

An organization plans to move a data closet from one end of a building to another. As a result, IT rewires certain areas of the building. In doing so, IT uses RG-6 cabling. Considering cable types and functionality, which solution should use RG-6?

Cable broadband

Which of the following items are on a physical network diagram?

Cable links and asset IDs

A company updates an Internet use policy for employees to follow. In addition, a server engineer applies a proxy server to safeguard and enhance online use by users. What functional features does the proxy server provide? (Select two)

Caching of web content Content filtering

At the request of management, a senior server engineer deploys a proxy server for all users in the organization. The proxy provides many benefits for a uniform user experience and for IT management. Of the choices, which statements describe features the proxy provides? (Select two)

Caching of web content Content filtering

A .pcap file was copied over to a temporary network share. A security administrator examined the contents to verify the network's security protocol use. Analyze the scenario to determine how the file was captured.

Captured by a packet sniffer

A network administrator used a network tool to configure a mirrored port on a switch, and set it to promiscuous mode to capture all types of data traffic. The admin captured the data and saved it to local disk. How is this data captured?

Captured by a packet sniffer

The same hub has Host A1 and Host B1 connected. Host A1 sends a request to communicate with Host C2. Host B1 is communicating with Host C3. There is a delay in communications between Hosts A1 and C2, until the media is clear. Which Ethernet Protocol is providing this function?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

A wiring expert runs new Ethernet cabling in an office. The chosen cable type allows for distances of 100 meters (328 feet) with speeds of 10 Gbps, fully screened and shielded. Based on the characteristics of the standard Ethernet cable categories, which should the expert install?

Cat 7

An engineer has a task to survey an old building and determine the current network infrastructure. Building owners state that some cabling is from a recent install. The engineer achieves a speed of 10 Gbps while testing the cable up to 100 meters and also determines the cable to be well shielded. Based on the engineer's findings, the cabling meets what specification?

Cat 7

What action should a network administrator execute after acquiring and installing a new access point (AP), switch, or router?

Change the default credentials

To increase wireless bandwidth in a large building, an engineer researches solutions. Which of the following implementations refers to using 40 MHz as a solution?

Channel bonding

To increase wireless bandwidth in an office space, an engineer tests a few configurations. In doing so, the engineer learns that by manipulating the 20 MHz frequency a wireless product will obtain more bandwidth. Which of the following implementations refers to using this approach as a solution?

Channel bonding

A network admin spent several hours troubleshooting a network connectivity issue on a Windows server. The admin utilized common software tools such as ping but was unable to successfully diagnose the issue, and the server is unable to connect to the network. The admin is now considering possible hardware issues. Assess the issue to determine appropriate actions the admin can execute to test this theory. (Select all that apply)

Check out-of-band management logs. Check network cables. View the Windows Device Manager.

A network administrator has identified a network misconfiguration on a host and has prepared a plan to resolve it. After implementing the solution, what course of action should the administrator execute next?

Check system functionality.

Network diagram symbols, designed by which of the following companies, are known as the standard in the Information Technology (IT) industry?

Cisco

The hosts on a company's network all use a public Internet Protocol (IP) address. The first octet in the IP range is 132. Determine which class the network belongs to after comparing the octet ranges of the following classes of addresses.

Class B

A company has 725 hosts on the network that utilize public Internet Protocol (IP) addresses. The company has three contiguous class C addresses for the hosts. Instead of maintaining three routing tables, the company has one single entry. What feature allows the company to consolidate the routing tables?

Classless Inter-Domain Routing (CIDR)

Company XYZ is using a form of fault tolerance strategy to prevent disruption of network services that involves multiple servers organized into redundant nodes. Identify the technique utilized.

Clustering

Name the method of fault tolerance used when a group of servers, consisting of redundant nodes, prevents disruption of network services.

Clustering

A technician installs a cable modem for business grade internet access at a small remote office. Connecting the modem requires using RG rated cabling. Evaluate the media options. Which type satisfies the requirement for connecting the modem?

Coaxial

An engineer removes all wiring from a computer closet as part of a renovation project. In doing so, the engineer identifies RG-6 and RG-59 cabling. When considering different cable properties, which type of cable did the engineer remove?

Coaxial

End-users on the network regularly flood the company's help desk support department with complaints about managing multiple user accounts and passwords. Analyze and determine the possible disadvantage of upper management implementing single sign-on (SSO) as a solution to the end-users' complaints.

Compromising the account compromises multiple services.

The help desk support team of a company is being inundated with tickets regarding user requests for a solution to better manage the need to enter multiple passwords in different web portals. Analyze and explain the disadvantage of the network administrator implementing single sign-on (SSO) as a solution.

Compromising the account compromises multiple services.

An employee at a large company notices high levels of traffic originating from a single unknown Internet Protocol (IP) address. The employee decides to report the suspicious activity as a safety precaution. Given the scenario, which authority should the employee notify about the suspicious activity?

Computer Security Incident Response Team (CSIRT)

A server contains two ethernet cards. Two departments on separate networks need access to the server and resources on either side. A systems administrator configures a bridge with the interfaces. The administrator utilizes a bridge configuration to achieve which of the following?

Connecting different networks as if they were one

A technician surveys an office space to document the network. Upon discovering a network closet, the technician finds a network bridge. After examing the possibilities, what description satisfies the technician's notes regarding the bridge?

Connecting different networks as if they were one

Which delivery method and protocol may send data out of order and over different paths? (Select two)

Connectionless UDP

A network in a building suffers from severe impedance. Based on this issue, which connectivity medium is the network using?

Copper

Which of the following tools would a network admin use to make new network cables for the communications closet?

Crimper

An IT support technician installs two new devices at a customer site. To connect the two devices via the medium dependent interface (MDI) ports, the technician uses a spare patch-panel cable with no success. Considering the details of the connectivity, which type of cable does the technician use with success?

Crossover

An engineer connects two network devices together. The devices each have a medium dependent interface (MDI) port. For the devices to properly communicate with one another, the engineer uses which type of cable?

Crossover

Which of the following provides an automatic method for allocating an Internet Protocol (IP) address, subnet mask, default gateway, and Domain Name System (DNS) server addresses?

DHCP

Internet access options for a small remote office are not robust. At minimum, IT looks for an "always on" connection. Which options are appropriate for this solution? (Select two)

DSL (Digital subscriber line) PPoE (Point-to-Point Protocol over Ethernet)

A working physical server cannot get a network connection after a newly terminated Ethernet cable has been connected to it. Which of the following may be the reason for the faulty connection? (Select all that apply)

Damaged cables Bent pins

A network engineer is adding a bridge into the network design. Where in the Open Systems Interconnection (OSI) model will this bridge operate? (Select two)

Data Link layer of the OSI model Layer 2 of the OSI model

Identify which type of attack a rogue access point (AP) can be coupled with when an attacker sends spoofed frames to disconnect a client from the AP.

Deauthentication

Which routing protocol uses the destination address 0.0.0.0/0?

Default

What is the Internet Protocol (IP) address of a router on the same IP network as the host?

Default gateway

A user goes to the website www.shopping.com. A bastion host reviews the request to enter the site to verify the safety of the request. What has the company established to enable clients access to data on the private system without compromising the security of the internal network?

Demilitarized Zone (DMZ)

A network administrator implemented video surveillance mechanisms to provide a layer of defense in the event prevention-based controls fail to work. If this security mechanism is effective, it ensures which of the following options? (Select all that apply)

Detecting attempts to penetrate a barricade Improving resilience of perimeter gateways Recording of movement and access

Prevention-based security controls failed at a company. Now, a network administrator wants to implement video surveillance cameras to mitigate the impact of this threat in the future. Determine which actions are ensured by installing this security mechanism. (Select all that apply)

Detecting attempts to penetrate a barricade Improving resilience of perimeter gateways Recording of movement and access

Which of the following issues can be prevented by adding another wireless AP (access point) to an already working, but growing, office floor that regularly uses the wireless network?

Device saturation

If Aggressive Mode is used during the first phase of the Internet Key Exchange (IKE) protocol, which attacks can a snooper perform on the authentication information? (Select all that apply)

Dictionary attack Brute-force

Identify the types of attack an eavesdropper could perform if Aggressive Mode is used during the first phase of the Internet Key Exchange (IKE) protocol. (Select all that apply)

Dictionary attack Brute-force

There are advantages and disadvantages of different backup methods in terms of which backup method takes less time to backup. Which of the following methods represents a balance of time, for both restoring and backing up, in the process of restoring the system to operational status?

Differential backup

A packet passes through a router and the router classifies the packet using the Type of Service field. The classification prioritizes delivery. What framework provides this service?

Differentiated Services (DiffServ)

An enterprise-class server installation has one of its hot-plug PSUs (power supply units) burn out. Describe the replacement process for the PSU. (Select three)

Disable the PSU through software and wait for the LED indicator. Pull the lever to remove faulty PSU. Slide replacement PSU into slot until it clicks into place.

An attacker is attempting to remotely connect to a company's system. What action should a network security engineer take to reduce a system attack surface and harden it to limit the ways the attacker can connect to the system? (Select all that apply)

Disable unused IP ports Close unused device ports Disable unnecessary services

A network administrator wants to prevent unauthorized devices from connecting and gaining access to the network. Conclude which options are effective ways to ensure this type of security on the switch. (Select all that apply)

Disabling the switch port using management software Isolating the ports to a black hole VLAN Configuring MAC filtering on a switch

Which of the following are effective ways to ensure the security of physical switch port access, and help prevent unauthorized client devices from attaching to the network? (Select all that apply)

Disabling the switch port using management software Isolating the ports to a black hole VLAN Configuring MAC filtering on a switch

An attacker compromised multiple machines and installed backdoors on them. Then, the attacker triggered the compromised victim machines to all launch at the same time. What type of attack does this situation describe?

Distributed Denial of Service (DDoS) Distributed Reflection Denial of Service (DRDoS) Amplification attack

An attacker installs a backdoor application on multiple compromised machines. Determine which types of attacks can trigger the zombies to launch simultaneously. (Select all that apply)

Distributed Denial of Service (DDoS) Distributed Reflection Denial of Service (DRDoS) Amplification attack

After resolving a network issue, what is the last step performed when closing out the incident?

Documentation

Which of the following best describes an attack used for pharming, denial of service (DoS), traffic interception, and corrupting clients' caches? (Select all that apply)

Domain Name System (DNS) poisoning Address Resolution Protocol (ARP) poisoning

Which types of attacks can utilize pharming, denial of service (DoS), traffic interception, and client cache corruption? (Select all that apply)

Domain Name System (DNS) poisoning Address Resolution Protocol (ARP) poisoning

A network administrator is collecting configuration baselines by capturing Configuration Items (CI) and storing them in the Configuration Management Database (CMDB) available in the Configuration Management System software. The administrator's next task is to identify the relationships between the various CIs and how they affect each other and the network. Describe the ideal method for capturing the relationships between CIs.

Draw network diagrams.

What technology uses a router to rewrite an Internet Protocol version 6 (IPv6) packet to an Internet Protocol version 4 (IPv4) packet within the same network?

Dual-stack

A network link offers simultaneous communications in each direction. Of the following choices, which defines this functionality?

Duplex

Which technology offers a mode for simultaneous two-way communication?

Duplex

Two Windows hosts connected to a switch are contending to respond to ARP (Address Resolution Protocol) queries. Only one of the hosts is receiving network traffic. Determine the most likely cause of this issue.

Duplicate MAC address

A systems administrator replaced the virtual network adapter of a virtual machine (VM) hosted on a multi-server cluster with other running VMs. After manually configuring the VM's adapter settings, the server experienced consistent packet loss when communicating with other VMs on the same virtual switch (vSwitch). The management network of the virtual host has no issues. Evaluate the following options to determine the likely cause of the issue.

Duplicate virtual MAC (Media Access Control) address

What provides additional options, rather than only leases, for host Internet Protocol (IP) addresses?

Dynamic Host Configuration Protocol version 6 (DHCPv6)

A company utilizes wireless access points (AP) throughout a large building where the installer did not efficiently place them for maximum speed. As a result, throughput varies for clients. IT engineers plan to reposition the APs. Considering the current situation, which solution is helpful for functionality?

Dynamic Rate Switching (DRS)

A building offers extremely poor wireless connectivity and IT support staff routinely deal with user complaints. The lead IT engineer plans to reposition all access points (AP) for better coverage. Of the given choices, which can immediately improve wireless connectivity?

Dynamic rate switching (DRS)

Distinguish between Extensible Authentication Protocol Transport Layer Security (EAP-TLS) and Protected Extensible Authentication Protocol (PEAP) in an 802.1X enterprise authentication environment.

EAP-TLS uses public key certificates on the client and server. With PEAP, the client does not require a certificate.

Within an 802.1X enterprise authentication environment, how do Extensible Authentication Protocol Transport Layer Security (EAP-TLS) and Protected Extensible Authentication Protocol (PEAP) differ?

EAP-TLS uses public key certificates on the client and server. With PEAP, the client does not require a certificate.

The IT floor of a bank building contains servers that hold confidential data and the bank needs to regulate access to sensitive areas within the building. Analyze the scenario to determine which options can be implemented to allow employees to authenticate through locked barriers. (Select all that apply)

Electronic key fobs Proximity smart cards

The physical security department of a bank wants to require employees to authenticate through a locked barrier before accessing the sensitive areas of the building, such as the IT department. If implemented, which of the following will best help regulate such physical access? (Select all that apply)

Electronic key fobs Proximity smart cards

A network uses a dynamic routing protocol that requires the administrator to provide weighted elements such as reliability, bandwidth and load. Which routing protocol is in use?

Enhanced Interior Gateway Routing Protocol (EIGRP)

A network issue has been reported to Tier 1 support regarding a web server that was working normally an hour ago. Tier 1 is under contract to work an issue for 15 minutes before other processes are initiated. After gathering as much information as possible from the user who reported the issue, support personnel established and tested a theory of the cause. The test results came back negative. Analyze the scenario to determine what the next course of action should be and why. (Select TWO)

Escalate the issue to the next tier. Not enough time and resources.

A regular user from a remote branch office is requesting a new switch, since the network is too slow for their work requirements. Tier 1 support takes approximately 15 minutes to gather information, including network statistics. A theory was tested and failed. Explain which actions are most likely to take place next and why. (Select two)

Escalate to Tier 2 for support. Perform advanced troubleshooting.

Previously configured web services stopped working after a new host-based firewall on a Windows Server 2016 web server template was installed. After identifying the issues and reconfiguring the firewall settings, it will be useful to document any findings, actions, or outcomes. What would NOT be a benefit of this documentation?

Estimate purchases on new firewall software

An attacker implemented a malicious access point (AP) with the same name as a legitimate one. The result was a Denial of Service (DoS) and a Wiphishing attack on a corporate WiFi. Which of the following did the attacker most likely execute in this scenario? (Select all that apply)

Evil twin spoofing

Which of the following relates to a private hosted cloud delivery model?

Exclusively secure

A network security specialist is assisting the administrator of a corporate network set up a file transfer protocol (FTP) server secured with secure sockets layer (SSL) encryption. The administrator mentions there are multiple firewalls between the client and server. Consider the information provided to recommend the preferred method of accomplishing the task.

Explicit TLS (FTPES)

A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. One identifier for this host is 0272:8bff:fe31:8bcb. Consider Internet Protocol version 6 (IPv6) addressing schemes to determine what this identifier represents.

Extended Unique Identifier (EUI) 64

A security engineer must select and implement a new type of security mode for a company's enterprise network. Consider the possible options and determine the type of security mode the engineer should select in order to utilize the strongest authentication possible.

Extensible Authentication Protocol Transport Layer Security (EAP-TLS)

A security engineer wants to implement the strongest authentication possible when users connect to the wired and wireless local area network (LAN). Analyze and determine which type of security mode should be implemented for an enterprise network so both servers and clients can perform mutual authentication.

Extensible Authentication Protocol Transport Layer Security (EAP-TLS)

An engineer researches connectivity options and chooses a technology that does not experience interference. Which technology does the engineer choose?

Fiber

A network technician is using Network Mapper (Nmap) to gather port information. Select the term that describes the process of identifying the operating system (OS) through probing when Nmap discovers a host.

Fingerprinting

An IT engineer needs to configure content filtering for an organization. Which device does the engineer configure?

Firewall

When a change to configuration items is reactive, the change initiated is due to which of the following?

Forces outside of the organization

A company uses a connection that requires an upgrade. IT currently uses an X.25 protocol that provides packet forwarding services over a leased line. Evaluate the connection types, then determine which service is being used by the company.

Frame Relay

An organization acquires a smaller business. The CIO plans to integrate and connect both businesses. The acquired company requires an upgrade as it uses an X.25 protocol over a fractional T1 line for outside connectivity. Based on the technology in use, what implementation does the small business use?

Frame Relay

A wireless AP (access point) is placed on a table on the corner of an office floor with many furniture items and cubicles. Which of the following is most likely causing a weak or loss of signal in some areas of the office? (Select all that apply)

Furniture is absorbing the signal AP is in the wrong location

A company offers paid mobile phone plans or reimbursement for personal phones used for company business. A user purchases a phone that supports a variety of carriers. Which technology does the handset use?

GSM (Global system for mobile Communication)

Which of the following are the best ways to identify a network problem? (Select all that apply)

Gather information Question users

A company wants to implement a method for configuring policies at their physical stores to push ads to customers based on the user's mobile device location services. Determine which technology allows ads to be sent to a customer's mobile device if the device comes within a specified proximity to the store.

Geofencing

A network technician is attempting to use an SNMP (Simple Network Management Protocol) monitor to collect performance metrics from devices throughout the network. They set up the monitoring software to poll the SNMP agents about specific Object Identifiers (OID) to record in the Management Information Base (MIB) at regular intervals. Interpret which SNMP command is being applied to accomplish this polling.

Get

Which of the following relates to a private cloud delivery model?

Greater control

What protocol is an alternative to the Session Initiation Protocol (SIP)?

H.323 Protocol

Which of the following protocols reside at the application layer of the Open Systems Interconnection (OSI) model? (Select two)

HTTP SMTP

A working physical server is experiencing network connectivity issues after switching connections to another physical port on a basic layer 2 switch. Identify the most likely problem with the switch.

Hardware failure

An administrator determined a network providing critical services to an organization is experiencing severe packet drops. Analyze and select the possible causes of packet drops. (Select three)

High load Mismatched MTU Checksum errors

A network cable has been dropped into a communications room on the top floor to support new offices. A 98 meter Category 6 cable was cut and terminated on each end to suport a 1 gigabit link. The cable is connected to a switch on the top floor. What should the admin be most worried about when installing the network cable?

Higher insertion loss

A large internet company is developing a disaster recovery plan (DRP). The plan includes protocols for services to automatically switch to the company's recovery server site. Which of the following terms most accurately describes the recovery site?

Hot site

A systems administrator installs a connectivity device that results in a high number of data collisions. Which device did the administrator install?

Hub

Management at an online retailer meet to discuss delivery options for an online shopping experience. IT proposes using a method of offloading a percentage of transactions to the cloud during peak shopping seasons. Which delivery model does IT suggest as a solution?

Hybrid

Management at an online retailer meet to discuss delivery options for an online shopping experience. IT proposes using a method where transactions take place in a cloud environment, but using a back-end locally. Which delivery model does IT suggest as a solution?

Hybrid

Which protocol allows for a protected dialog between the client and server by assigning the web server a digital certificate issued by a Certificate Authority?

Hypertext Transfer Protocol Secure (HTTPS)

A systems administrator plans a virtual computing environment. What does the administrator configure first?

Hypervisor

The CIO asks an IT systems administrator to configure a passive threat management solution. IT utilizes which type of technology?

IDS (Intrusion Detection System)

What provides mapping of a Media Access Control (MAC) address to a specific Internet Protocol (IP) address within the Dynamic Host Configuration Protocol (DHCP) server's address pool?

IP reservation

After manually setting the IP address to a Windows server's NIC (network interface card), what happens when a duplicate IP (Internet Protocol) address is recognized?

IP service is disabled

Which of the following acronyms relates to a procedure to document network addressing?

IPAM (IP address management)

A firewall configuration handles threat management with an active approach. Which feature operates this way?

IPS (Intrusion Prevention System)

Company LMNO is using an encrypted remote access protocol, Authentication Header (AH), and Encapsulation Security Payload (ESP). Decide which protocol and mode is utilized in this scenario.

IPSec in Transport mode

Which of the following low-power communication technologies uses line-of-sight for reliable communication?

IR

An organization has a location with limited Internet access options. Which option allows for on-demand connectivity?

ISDN (integrated services digital network)

The Endpoints report in Wireshark provides a list of top talkers and top listeners. Packet count and total Byte sizes are also provided. How can this information be used to improve the network?

Identify bottlenecks.

A network administrator is upgrading systems. He wants to ensure the system is as secure as possible against attacks resulting from flaws in software. Anaylze and determine which procedures the admin should implement to best manage the installation of updates such as hardware, firmware and software.

Implementing patch management

A network administrator configured a virtual host and connected it to an Ethernet port on the switch. The port status indicator light turned green. Using built-in troubleshooting tools, the admin tried to ping the default gateway and it failed. The admin then noticed a virtual local area network (VLAN) mismatch on the management port. Determine the possible result of this mismatch.

Improperly tagged data packets

An engineer configures a wireless distribution system (WDS) in bridged mode. As a result, which of the statements are true regarding access point functionality?

In bridged mode, access point functionality does not support wireless clients.

An engineer troubleshoots a wireless access point. IT does not function as expected. The engineer learns that the configuration is set for bridged mode to cabled segments. Based on the configuration type, which choice describes the access point's configuration limitation?

In bridged mode, access point functionality does not support wireless clients.

A Windows operating system has recently been installed on a virtual machine (VM). Static Internet Protocol (IP) settings are configured on the VM's network adapter. The systems administrator is unable to join the server to the domain and receives the following error message: "The specified domain either does not exist or could not be contacted". Determine the likely cause of this issue.

Incorrect default gateway

There are advantages and disadvantages of different backup methods in terms of time it takes to restore versus time it takes to back up. Which of the following methods requires less time to back up but takes several archive sets to restore the system to full operation?

Incremental backup

A department uses a new shared network device for company files. IT admits the implementation took some time as there were difficulties configuring target channel adapters. The department is grateful nonetheless. What switching fabric did IT implement based on the adapters used?

InfiniBand

A systems administrator configures a new network storage device. The administrator discovers that an intended host system does not have a host channel adapter (HCA). The project is on hold as there are no budget funds left to purchase the adapter. Based on the requirements of the implementation, the administrator plans to use which technology?

InfiniBand

A company policy mandates establishing a proxy server for Internet use. An IT engineer responsible for the deployment, chooses a transparent approach to reduce configuration efforts. Considering how the IT engineer establishes the proxy server, what does a transparent configuration type utilize?

Inline network appliance

A systems administrator deploys a proxy server for an organization. The administrator chooses to use a transparent approach to the configuration. Considering how the systems administrator deploys the proxy server, what does this configuration type utilize?

Inline network appliance

Consider and determine what risk must be considered when administrators working for a service provider gain privileged access to customer data due to ineffective security mechanisms, such as a lack of separation of duties?

Insider threat

A company that provides Artificial Intelligence (AI) inference services in the cloud has hired a new Information Technology (IT) team to expand its services. As the company has increased the number of inference servers, it gives the new IT team the objective of reducing service bottlenecks by managing service routing to available servers, by combining each server address into one virtual Internet Protocol (IP) address. The solution must also make routing decisions based on Application-level data and retain session data. How should the team accomplish this task?

Install a layer 7 load balancer.

In order to help prevent unauthorized devices from connecting to a network, a network security engineer needs to implement a solution where the switch authenticates devices and then activates the port. Determine which of the following options uses this functionality to help safeguard against this type of unwarranted access. (Select all that apply)

Institute of Electrical and Electronics Engineers (IEEE) 802.1X Port-based Network Access Control (PNAC)

The security network administrator of a company wants to ensure only authorized hosts are connecting to the network. Which options would an administrator utilize on routers and switches to provide port-based authentication for network access to devices? (Select all that apply)

Institute of Electrical and Electronics Engineers (IEEE) 802.1X Port-based Network Access Control (PNAC)

A network admin uses a standalone laptop to update the Windows HOSTS file and test a web server's connectivity to the internal network. The following line was added to the file: 10.22.100.25 intranet.company.co. Evaluate the reason the admin made this change to the file.

Internal DNS (Domain Name System) servers are unavailable.

A Windows Active Directory (AD) domain uses companyname.com. An external ftp server uses ftp.companyname.com. Users on the corporate network cannot reach the ftp server when using an ftp prefix. An IT engineer modifies which of the following to remedy the issue?

Internal DNS zone

A Windows Active Directory (AD) domain uses companyname.com. An external web server uses www.companyname.com. Users on the corporate network cannot reach the web server when using a www prefix. An IT engineer modifies which of the following to remedy the issue?

Internal DNS zone

When using geolocation services, which of the following will measure the user's geographic location for authentication, and can help identify a logical network segment? (Select all that apply)

Internet protocol (IP) address Global Positioning System (GPS) Indoor Positioning System (IPS)

A network user asks an administrator for assistance after the user's password was rejected. The user's password is 'password'. The network password policy states passwords must include alphanumeric characters, symbols can be used, minimum of twelve characters, and at least one capital letter. Identify the issues with the user's password. (Select two)

It is less than 12 characters. It is an obvious phrase or word.

A tech configures a medium sized business to utilize an ad hoc approach when connecting wireless devices. These devices allow connections to and from each other. Review the following properties and determine which applies to an ad hoc topology.

It uses an independent basic service set (IBSS).

Users at a medium sized business utilize an ad hoc approach when connecting wireless devices. Review the following properties and determine which applies to an ad hoc topology.

It uses an independent basic service set (IBSS).

A network manager cannot communicate with a system on the network that has an Internet Protocol (IP) address of 192.150.060.024. The network manager enters the command arp -a 192.150.060.024. What will be the result of this command?

It will display the Address Resolution Protocol (ARP) cache contents for the IP address.

A network implementation experiences a severe bottleneck. IT personnel suggest implementing which technology to allow increased data throughput?

Jumbo frame

An IT engineer experiences difficulty with the interoperability of devices. The IT engineer discovers that the issue relates to the maximum transmission unit (MTU) differences on each of the devices. Which configuration does the engineer need to evaluate for successful interoperability?

Jumbo frame

An engineer determines that a network switch is currently overwhelmed. Of the choices, which technology can improve the switch's performance?

Jumbo frame

Help desk complaints about user logins at a local company have recently risen within the past six months. A network security engineer wants to solve the problem of users needing to re-authenticate to access different web portals and network services. Which of the following would help reduce employee dissatisfaction? (Select all that apply)

Kerberos Single Sign-On (SSO)

The help desk department at a company has reported an increase in the number of user complaints. Specifically, the help desk tickets regarding user annoyance of requiring re-authentication with different credentials each time they access web portals or network services. What can the network team implement to help rectify this issue? (Select all that apply)

Kerberos Single Sign-On (SSO)

A tech configures three computers in an office so users can share files. Which type of network does the tech create?

LAN

A technician finishes running fiber optic cable across a large building to expand the internal network. The fiber connects to equipment in a rack with extremely limited space for a connector. Considering the situation and the types of available fiber connectors, which one will accomplish connectivity?

LC

A network administrator is using asset management database software to quickly reference asset information such as type, model, serial number, asset ID, location, user(s), value, service information, as well as links to vendor documentation. From the given options, choose the software the network administrator is most likely using.

Lansweeper

A laptop connects to a web server on the Internet, and the service provider then assigns the laptop an IP (Internet Protocol) address. Similarly, the web server to which the laptop is communicating, has an IP address. At which layer of the Open Systems Interconnection (OSI) model are these two devices functioning?

Layer 3

A wireless mobile device is unable to obtain a dynamic host configuration protocol (DHCP) address. An IT engineer discovers that a large number of offline devices are assigned an address. The engineer adjusts which of the following to remedy the issue?

Lease time

Fiber cables are being prepared to connect new hyperconverged server racks into an advanced data center. The cables must be tested thoroughly to ensure there are no faults or excessive attenuation on the physical network. Identify the appropriate tools a technician could use to test the new fiber cables before use. (Select all that apply)

Light meter OTDR (Optical Time Domain Reflector)

A security engineer is adding a new Learning Management System (LMS) to the corporate environment, and monthly training will be mandatory for end-users. Analyze and determine how the engineer can automate updating the user directory database of the training platform to coincide with Windows Active Directory updates.

Lightweight Directory Access Protocol (LDAP)

Mandatory monthly training needs to be implemented to educate all employees at a company about phishing and social engineering. The goal is to mitigate the risks associated with these types of attacks. What can a security engineer implement so the web training user directory database updates at the same time as Windows Active Directory?

Lightweight Directory Access Protocol (LDAP)

A company uses multiple internet providers to maintain a reliable network. The wide area network (WAN) interfaces on a firewall handle the traffic with policies. Considering the approach to Internet access, what does this company utilize?

Load balancer

A network engineer configures a secondary wide area network (WAN) interface on a firewall for a large company. With the new configuration, each WAN interface will now handle specific network traffic. Evaluate the new configuration and determine its purpose.

Load balancer

What is the primary authentication method used when users of a network or host are considered on-site?

Local authentication

A systems administrator wrote a malicious script that runs once their account is deleted or disabled as retalation for being terminated from their position. What type of malware attack does this action describe?

Logic bomb

A manager has reported a network outage at a remote branch office. After gathering some information and asking the manager and local IT personnel about the issue, a theory of probable cause cannot be established. Consider and determine what else the network support personnel can do to eventually resolve the issue? (Select two)

Look at system logs. Verify LED status indicators.

A network port does not seem to be working properly. Which of the following tools can be used to test if the the port is sending out data?

Loopback plug

After surveying a wireless connection from the manager's office, the network technician moves the access point (AP) closer to the manager's office and slightly increases the power levels. Determine why the network technician is likely performing these changes.

Lower attenuation

A user routinely has difficulty printing to a network printer. While troubleshooting, a tech discovers that the printer uses a discovery port. The tech fixes the issue by using which method?

MAC reservation

A tech configures a network to use an E-lines service. Compare and evaluate the choices to determine which network type the tech configures.

MAN

A tech deploys a network using an E-LAN mesh approach. Compare and evaluate the choices to determine which network type the tech deploys.

MAN (Metropolitan area network)

A technician is on the job for a small local government office in a small town. The office resides in a single-office building with a single floor. The technician needs to troubleshoot connection issues experienced throughout the system. Determine where the technician will find the termination points of the access layer switch ports.

MDF (Main Distribution Frame)

An engineer configures constraint-based routing by using congestion and quality of service settings. Considering this approach, which technology is the engineer working with?

MPLS (Multiprotocol Label Switching)

A system has a network of Graphic Processing Units (GPUs) computing nodes organized into a cluster for statistical analysis. During installation, the service providers installing the nodes are negotiating a Service Level Agreement (SLA) with management. The team establishes baselines and calculates Key Performance Metrics (KPI) by using the calculation (48 hours * 64 nodes)/2 failures, to determine one of the metrics. Select which KPI the service providers calculated.

MTBF

The CEO of an organization informs IT that email is not working. Upon investigating the problem, an engineer discovers that the company's domain name system records are missing. Which record type does IT fix to solve the email issue?

MX (mail exchanger)

Company ABC must consider possible points of vulnerability when developing remote access policies. Analyze and conclude which considerations are most important for developing a viable remote access policy. (Select three)

Malware protection Misuse of local privileges Weak authentication

Which of the following types of attacks describe an attacker eavesdropping between two endpoints of communication or an attacker impersonating a legitimate company? (Select all that apply)

Man-in-the-middle Spoofing

Identify the most common in-band method of managing a modern commercial modem or router.

Management URL/IP

A Key Performance Indicator (KPI) is a network performance metric used to determine asset reliability. Which of the following is NOT an example of a KPI?

Maximum Tolerable Downtime (MTD)

An Ethernet frame is transmitting across the network. A network manager uses the Wireshark packet capture application to view the upper limit of the payload in the frame. Evaluate the format of an Ethernet frame and determine where the network manager will locate this information.

Maximum Transmission Unit (MTU)

Which of the following are examples of a Key Performance Indicator (KPI)? (Select two)

Mean Time Between Failures (MTBF) Mean Time to Repair (MTTR)

A network administrator configured a switch to only permit a select number of physical addresses to connect, and then to drop any additional traffic with different network adapter IDs trying to connect. Analyze and select which of the following options will enforce this type of switch port protection feature and act as a guard against flooding attacks.

Media Access Control (MAC) limiting

A network administrator configures a network to only allow only a certain number of devices to connect to it and prevent any other devices attempting to connect. Which of the following options will effectively enforce switch port protection and help guard against flooding attacks on the network?

Media Access Control (MAC) limiting

An engineer uses a type of network adapter to connect a fiber link to a router. The transceiver fits into an optical interface on a layer 3 Ethernet router. Of the choices, which layer 1 implementation does the engineer utilize?

Media converter

A new packet filtering firewall recently deployed onto the internal network and internal web services suddenly stopped working. Consider relevant firewall components to select the likely cause of the issue.

Misconfigured ACL (Access Control List) settings on network firewall

A major software corporation has a bring your own device (BYOD) policy. The company allows remote access, but requires users to install sandboxed applications and corporate workstations. The necessary enterprise management software requires Windows 10 Professional, an X86 CPU, and fully configured firewall and malware scanners. Analyze the following options to determine which devices are incompatible with the corporation's requirements. (Select three)

Mobile device running Android 7.0 Windows slate laptop/tablet running Windows 10 on ARM Chromebook running Chrome OS 76.0.3809

A user is traveling and requires Internet access. A facility the user visits only offers an analog line for connectivity. The user's laptop has an Ethernet port. Which option does the user require to connect?

Modem

A security engineer needs to install an alarm system that incorporates a way to alert on moving heat sources. If implemented, which of the following would satisfy this criterion?

Motion detection

Which of the following descriptions relates to a public cloud infrastructure?

Multi-tenant use

A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using.

Multicast

A junior-level systems administrator troubleshoots network connectivity. Results of the troubleshooting reveal a device that is new to the administrator. This device connects all hosts and routes network traffic. After evaluating the possibilities, and based on the device's characteristics, what does the network utilize for connectivity and traffic flow?

Multilayer switch

An engineer upgrades an organization's network. Part of the upgrade focuses on the consolidation of devices. In particular, planning to replace routers and switches is on the agenda. When evaluating how network appliances operate, which device is a suitable replacement that performs the required functions?

Multilayer switch

A network technician suspects a short in the network cable and wants to test it. Identify which of the following tools will provide this capability.

Multimeter

A company plans a network run to a warehouse behind its main office building. The distance is short and to save money, the IT engineer suggests using a specific type of fiber cabling. Which type does the engineer recommend implementing, based on the given criteria?

Multimode

An IT engineer chooses to use a fiber cable implementation that uses light emitting diode (LED) technology rather than one that uses lasers. Considering the optic technology in use, what does the engineer implement?

Multimode

An IT engineer considers optical mode OM1 or OM2 cables for a project. The project requires cables that are rated for applications up to 1 Gbps and use LED transmitters. Of the following choices, which type of cable does the engineer select to use?

Multimode

IT administrators evaluate deploying a network storage device rather than storing data on an aging Windows server. The storage device must support file sharing protocols. Consider the properties and features of the following choices and determine which type of storage device the network should utilize.

NAS

A shared storage solution uses a file-level method for data storage and sharing. Which solution is in place?

NAS (Network Attached Storage)

Identify the type of agreement or policy that defines the legal basis for acceptable use of sensitive or proprietary data, and outlines which distribution and storage restrictions must be enforced.

NDA (non-disclosure agreement)

A consumer uses a smartphone to pay for a purchase by momentarily placing it near a device. Which protocol is the smartphone using during the purchase transaction?

NFC

A new network configuration includes the ability to inspect packets at the application layer to identify potential threats. Which of the following choices uses the new configuration?

NGFW (Next generation firewall)

Identify the following term which describes a technique that constitutes a form of link aggregation.

NIC teaming

Which of the following options causes pinging a local IP address to produce a reply, but not when pinging the corresponding FQDN (fully qualified domain name)?

Name resolution not occurring

Company XYZ must obtain permission from several regulatory agencies prior to importing or exporting scanning and malware research tools. Determine which organization is NOT relevant to obtaining the necessary permissions in this scenario.

National Security Agency (NSA)

A host uses Internet Protocol version 6 (IPv6). The host sends a packet to another host and a router informs the host of a better route to take. Which protocol provides this function?

Neighbor Discovery Protocol (ND)

A company needs to implement an admission control policy that will either allow users access to the network, or restrict access to a quarantine network or captive portal via preadmission control. Which of the following will help enforce this policy by performing machine and user authentication, allocating the client an Internet Protocol (IP) address from a Dynamic Host Configuration Protocol (DHCP) server, and assigning it to a virtual local area network (VLAN) by the switch?

Network Access Control (NAC)

A company's users are not currently restricted by any admission control policy, via machine or user authentication. Which of the following is capable of assisting in implementation of such a policy using the client's assigned Internet Protocol (IP) address on a virtual local area network (VLAN)?

Network Access Control (NAC)

A system administrator notices a server cannot access network services. Authentication is also failing. The error is an invalid token message. Which of the following protocols should the system administrator verify early in the troubleshooting process?

Network Time Protocol (NTP)

New client workstations in a new office area are powered on to receive their Internet Protocol (IP) addresses from a Dynamic Host Configuration Protocol (DHCP) server. The DHCP scope is specifically for the new office area network. Some clients can reach network services, while others cannot. Examine the following options and identify the cause of this issue.

No available IP addresses

The Dynamic Host Configuration Protocol (DHCP) was set up with a new scope of Internet Protocol (IP) addresses to accommodate a new office area with new computers. After the IT department reboots the computers, some of the new Windows workstations are receiving network services, while others are not. What may be preventing some workstations from communicating on the network?

No available IP addresses

Security Information and Event Management (SIEM) software displays a message to the user to indicate that it encountered a security event of a given severity. What term matches this occurrence?

Notification

Management has tasked an Information Technology (IT) intern with collecting and skimming through all logs across the network to identify any problems with a particular host or application. Evaluate the following software and compile a list of the best tools for the task. (Select three)

OSSIM EventSentry pfSense using SYSLOG

A project manager for the research and development team of a major corporation has written a program to utilize Simple Network Management Protocol (SNMP) traps across a variety of Internet of Things (IoT) modules. The project manager records the statistics regarding the module's activity in a Management Information Base (MIB) database. Choose the term for each parameter stored in the MIB.

Object Identifier (OID)

A tech configures a new wireless network and strategically mounts access points on the ceiling throughout the building. Which component does the tech implement?

Omnidirectional antenna

Which of the following is a type of "something you have" authentication factor that permits users to connect to a corporate network for only a certain session duration?

One-time password (OTP)

Management has asked an Information Technology (IT) intern to examine an organization's systems, applications, and devices. The intern is expected to use the appropriate software tool to compare the scan results to configuration templates and lists of known vulnerabilities to identify all security flaws. Appraise the following software to determine which tool best meets the intern's needs to complete the task.

OpenVAS

A manager at a small organization tasked an Information Technology (IT) intern with monitoring the organization's network performance. Assess the following software choices and eliminate the tool least suited for the task.

OpenVPN

Distinguish the Virtual Private Network (VPN) software that can work in a network Test Access Point (TAP) (bridged) mode to tunnel layer 2 frames or in a network tunnel (TUN) (routed) mode to forward Internet Protocol (IP) packets.

OpenVPN

With a limited batch of fiber cables, a network admin decides to find the break in the failed cable in order to re-splice it and re-use on the network. Which of the following tools will help the admin find the location of the break?

Optical time domain reflector

An intern asks a network administrator to help identify a Cisco network diagram symbol. It looks like a three-dimensional cube object with a telephone symbol on the front and four arrows pointing in multiple directions surrounding the telephone. Identify the symbol.

PBX (Private Branch Exchange)

In an 802.1X enterprise authentication environment, what is the difference between Protected Extensible Authentication Protocol (PEAP) and Flexible Authentication via Secure Tunneling (EAP-FAST)?

PEAP uses a certificate to set up a tunnel, while EAP-FAST uses a Protected Access Credential (PAC).

Within an 802.1X enterprise authentication environment, distinguish between Protected Extensible Authentication Protocol (PEAP) and Flexible Authentication via Secure Tunneling (EAP-FAST).

PEAP uses a certificate to set up a tunnel, while EAP-FAST uses a Protected Access Credential (PAC).

A network technician received Ethernet cables rated for 10 gigabit speeds. After cutting the cable a certain length, the technician must test for crosstalk to ensure it is generally suitable for high bandwidth in the data center and can handle other noise. What crosstalk measurement is the technician most concerned about in this scenario?

PSACRF (Power Sum Attenuation-to-Crosstalk Ratio, Far End)

A company plans a move of all services to the cloud. These services include all servers, routers, switches, and databases. IT decides that migrating services over time would be the best approach. Which type of service does an engineer utilize to migrate database services to the cloud?

PaaS

A company uses several Windows Servers for Active Directory, SQL Server, RADIUS, DHCP, and DNS. Management pushes to move to the cloud. IT suggests moving services in a staggered fashion as to not cause disruption. IT moves SQL server instances to the cloud as a start. IT migrates this specific function to which of the following service types?

PaaS

Wireshark is an example of which of the following utilities?

Packet analyzer

What implementation will provide the ability for one host to forward information to another using any available path?

Packet switching

Select the types of policies that best instruct users about best practices for login and authentication. (Select two)

Password policy Credential management policy

Developers and manufacturers release security bulletins, version changes, and updates to prevent application compatibility problems resulting from service releases. Identify the term that accurately defines this process.

Patch management

In order to prevent application compatibility problems due to service releases, a network administrator needs to keep up to date with security bulletins, version changes, and updates released by developers and manufacturers. Which of the following options relates to this procedure?

Patch management

A wiring professional finishes wiring a building with twisted pair cabling for a new Ethernet network. Where do the wires running throughout the building centrally terminate?

Patch panel

A bank employee received an email from a customer with whom the the employee conducts regular business. Within the email it stated that the customer's account number changed and requested all funds to be transferred to the new account. The employee changed the account without any further verification. If the new account number is actually associated with a social engineer's account, what type of attack has the bank employee fallen victim to?

Phishing

Which of the following attacks combines exploiting basic human trust by manipulating people into performing actions they might not otherwise perform, and disguises one computer resource as another? (Select all that apply)

Phishing Social engineering spoofing

An attacker exploited basic human trust by manipulating victims into performing actions they otherwise would not perform. Then, the attacker was able to disguise the victim's computer resources as something else. Which of the following attacks execute these malicious techniques? (Select all that apply)

Phishing Social engineering spoofing

A network technician is viewing a network diagram that shows the locations of assets and the cable links that connect them. Describe this type of network diagram.

Physical (layer 1) network diagram

How can you identify symptoms to a network issue? (Select all that apply)

Physical inspection System logs Diagnostic software

A building inspector reviews the network cabling in a building. The inspector's report indicates that cabling found in the drop-ceiling is not fire retardant. To satisfy the requirements for replacement, which type of rated cable do wiring experts install?

Plenum

An IT manager drafts a wiring plan for a company's internal network overhaul. The plan corrects mistakes of the past and addresses all proper codes related to building wiring. In regards to standards and ratings, which option relates to fire retardant requirements?

Plenum

OSSIM is Security Information and Event Management (SIEM) software. The core function of an SIEMtool is to aggregate logs from multiple sources.

Plot logged metrics into a graph using a performance monitor.

Distinguish between the following Virtual Private Network (VPN) protocols and select the deprecated and now rarely used option.

Point-to-Point Tunneling Protocol (PPTP)

Select the port typically associated with Telnet.

Port 23

The manager of a server room orders a new rack system to reorganize the newly acquired state-of-the-art server blades, alongside the existing servers. Select the most important configuration information, including the labels, that the manager needs to update on the existing rack diagram. (Select three)

Port IDs and links Uninterruptible power supply (UPS) outlets with their respective power supply units (PSU) Servicing information

Host A communicates with Host B via a web application. A router on Host B's network is configured to accept incoming requests for this application. The router takes the request over port 80 and changes the destination address to route the packet to Host B. What does this scenario simulate?

Port forwarding

In reviewing network documentation during a large overhaul of their network, management of a growing Internet Service Provider (ISP) realize they must completely relabel their Main Distribution Frame (MDF) connections, rewrite network diagram maps, and re-document key information, such as Internet Protocol (IP) addresses and bandwidth. They must also add Intermediate Distribution Frames (IDFs) to their network infrastructure. Analyze the situation and demonstrate which forms of documentation need updating. (Select two)

Port location diagrams Physical diagram

Identify the function that copies packets sent to one or more source ports to a destination port.

Port mirroring

Host A is communicating with Host B. Host A uses the American Standard Code for Information Interchange (ASCII) and Host B uses Unicode. The clients agree to translate the communication to ASCII. What layer of the Open System Interconnection (OSI) model does the agreement and translation occur?

Presentation

A city government uses Internet Protocol Security (IPSec) in transport mode for its various offices. This ensures an interconnected file system using Secure File Transfer Protocol (SFTP). Correspond the types of network and implementation applied in this scenario.

Private network with end-to-end implementation

An employee responsible for managing network services for a large corporation is terminated after failing to respect the privacy of the network's users. Identify the type of policy or agreement the employee has violated in this scenario.

Privileged User Agreement (PUA)

An engineer plans to configure a device as transparent, rather than nontransparent, at an organization. Which device does the engineer configure?

Proxy server

A network admin must terminate phone lines onto a 66 block. Which tool would complete this task?

Punch down tool

Analyze and determine how one could remediate a device that is trying to connect to a corporate network, but does not meet the security profile and is non-compliant. (Select all that apply)

Put the device in a quarantine network Put the device in a captive portal

An engineer uses fiber optic cable for a run within a building. Which type of transceiver does the engineer use to achieve 40 Gbe speed?

Quad Small Form Factor Pluggable (QSFP)

What allows fine-grained control over traffic parameters?

Quality of Service (QoS)

Which of the following is an encryption cipher shared between both Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA)?

RC4

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) both utilize which of the following encryption ciphers?

RC4

A pre-shared key (PSK) passphrase generates a 256-bit master key (MK). Distinguish which types of packet encryption can utilize the 128-bit temporal key (TK) subsequently generated by the MK. (Select all that apply)

RC4/TKIP AES/CCMP

Which types of packet encryption use a pre-shared key (PSK) passphrase that generates a 256-bit master key (MK), and from the resulting MK, creates a 128-bit temporal key (TK)? (Select all that apply)

RC4/TKIP AES/CCMP

An employer asks a network manager to develop a solution to make inventory management easier, particularly tracking of assets. Predict which of the following is a viable solution for tracking assets.

RFID tags

An office installed a wireless Access Point (AP). A network technician is in the area, surveying the signal from the AP and other background noises. The technician is looking for an above average Signal-to-Noise Ratio (SNR) to approve use of the AP. Which of the following readings would the technician consider unsatisfactory? (Select all that apply)

RSSI (Received Signal Strength Indicator) decibel is low. Background noise decibel is high.

Identify the option asset tracking tags use to prevent the theft of assets.

Radio Frequency Identification (RFID)

Which of the following do asset tracking tags use to allow electronic surveillance of managed assets and help prevent theft of assets?

Radio Frequency Identification (RFID)

A criminal enacts a phishing scheme to trick a user into clicking a malicious link. As a result, the user is no longer able to access their work files. A popup message on the computer states that without paying a fee, the files are lost forever. Which attack type has the criminal executed on the user's files? (Select all that apply)

Ransomware Crypto-malware

An end-user's computer crashed. Upon rebooting the machine the user noticed popups while trying to access files. The popups read that the files were encrypted, and access to the data would not be granted without the private encryption key that is held by the attacker. Unfortunately, the victim did not backup any of the data to recover it. Analyze the scenario and determine what types of attacks the end-user may have fallen victim to. (Select all that apply)

Ransomware Crypto-malware

Users are reporting strange streaming feeds giving a fuzzy picture or noticeable delay over the wireless network. A network technician discovered the wireless access point (AP) is experiencing jitter. Evaluate the actions the technician can take to reduce jitter on the wireless network. (Select all that apply)

Reduce connection count on the same channel. Separate traffic of data and voice/video between two APs.

Glass or water cause radio waves to bend and take a different path to the receiver. Which term accurately describes this event?

Refraction

A virtual private network exists between two sites. The main site delivers Internet protocol (IP) addresses to the remote site. A configuration change places the remote site on a different subnet. An IT engineer reconfigures which of the following?

Relay

A security engineer for a company wants to implement an authentication, authorization, and accounting (AAA) server to validate user credentials so users can remotely access the network services via a virtual private network (VPN). Identify the protocol the security engineer should implement if the server and client configure the same shared secret.

Remote Authentication Dial-in User Service (RADIUS)

Employees of a company need remote access to the corporate network by connecting to a virtual private network (VPN). To validate credentials, the network administrator suggests installing an authentication, authorization, and accounting (AAA) server. If the server and client configure the same shared secret, what protocol should be used in this scenario?

Remote Authentication Dial-in User Service (RADIUS)

An employee logs into the employee's Windows desktop located at the office while working from home. The software logs directly into the employee's desktop using the employee's Windows login profile. Choose the remote access software/protocol utilized in this scenario.

Remote Desktop Protocol (RDP)

Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts?

Remote Desktop Protocol (RDP)

A network switch has been identified as the cause for slow network performance in a small remote office. Without any further information to consider, what options should a network administrator consider when preparing a plan to resolve the network issue? (Select all that apply)

Repair Replace Ignore Upgrade

A network security specialist is terminated from the employee's position at a large company. As a result, the employee's account and network privileges were revoked and the company retrieved all required devices and assets. Analyze the scenario to determine which component the employer neglected to execute as part of the offboarding process.

Resecure the network and renew all credentials

Consider and select the components least likely to be part of the employee onboarding process.

Retrieving company assets

In which of the following would an IT engineer configure a PTR?

Reverse lookup zone

A user compromises a critical system service. Conclude which of the following options will provide accounting and non-repudiation of the incident.

Reviewing activity logs

A wired Windows client set for DHCP (Dynamic Host Configuration Protocol) received an IP (Internet Protocol) address that is not from a recognized DHCP pool. Identify the most likely cause for this issue.

Rogue DHCP server

While experiencing a Denial of Service Attack (DoS) on the corporate WiFi, a network engineer noticed two Service Set Identifiers (SSIDs) with the same name on the company's wireless infrastructure. Which of the following is most likely associated with this type of attack? (Select all that apply)

Rogue access point spoofing

A network engineer has applied a new firmware update to several critical hosts on the company's network. Upon reviewing comparisons to baseline, the engineer realizes there has been a major slowdown and packet loss. The engineer decides to uninstall the update and restore it to its previous version. Name the terminology for this action.

Rollback

A network engineer installs a layer 3 device to connect several networks with differing subnets. Which device does the engineer implement to achieve the desired connectivity?

Router

An engineer needs to direct network traffic based on logical network addresses. Which device does the engineer configure?

Router

A network manager configures a dynamic routing protocol on the network. The protocol considers only one route to a given destination network. To prevent looping, the protocol limits the number of hops to 15. Compare dynamic routing protocols to determine which protocol the manager is implementing.

Routing Information Protocol (RIP)

Using a Windows server, a network admin is trying to test a remote server's network configuration and confirm the packet's routing path. Apply the information given to determine which of the following actions will provide the appropriate information for this test. (Select two)

Run a tracert command. Run a ping command.

A security admin has been tasked to audit a new web server on the network. The admin's task is to ensure the server does not have any unnecessary open ports or services running on it. Deduce the best course of action for checking the server if the admin knows the Internet Protocol (IP) address of the server.

Run the nmap utility from a laptop

A network employs block-level technology to share a database and is easily accessible to users on the network. Which option utilizes this technology?

SAN

An engineer follows technical guides to implement a new shared device on the network. The guide requires the use of a host bus adapter (HBA) with the device. Based on the options and the requirement, which of the following is the engineer implementing?

SAN

A systems administrator moves a database from an old server to a new device that uses a host bus adapter (HBA) for connectivity to the network. The administrator places the device on the network, hoping for much better performance and quicker access for clients. With the implementation in mind, what has the administrator deployed for users?

SAN (storage area network)

A company reports that phones are not working. What is likely causing the problem?

SIP (Session Initiation Protocol) trunk

Users mention that a video conferencing service is not working properly. The service ties to the company domain name for business purposes. Which domain name system (DNS) record does the tech identify as incorrect?

SRV

A Voice over Internet Protocol (VoIP) application does not work properly with company email address accounts. A tech concludes that a domain name system (DNS) record is incorrect. Which record type does the tech modify to restore services?

SRV (Service record)

IT implements Google Suite for Business at a large firm. This implementation negates the need to install any local applications. Considering the implementation, which type of cloud service does IT deploy?

SaaS

A company looks to replace a communication technology used between two locations. The current technology is often unreliable due to recurring issues with obstruction to the equipment's line-of-sight. With this issue in mind, what communication technology does the company look to replace?

Satellite

An engineer researches possible solutions for a connection between two buildings. After reviewing the choices, the engineer selects a technology that requires clear line of sight for best functionality. Considering the functional criteria, which option does the engineer choose to implement?

Satellite

An employee at a small insurance office is the only person left in the office when a sudden power outage occurs during closing time. There are open files on the employee's computer, as well as the boss's computer. The employee decides to take action to preserve the day's work. Explain the best course of action the employee should take.

Save open files immediately while the UPS/battery backup retains power.

A security admin is auditing a newly deployed web server on the local network. After gaining knowledge of the server's (Internet Protocol) IP address, the admin runs the nmap utility. Which of the following objectives is the admin most likely to achieve when applying this utility?

Scan for open ports. Scan for unnecessary services.

A user is not able to browse the Internet, but can browse local shares without any issue. An IT engineer discovers that the default gateway is missing in the computer's dynamic network configuration. The engineer configures which of the following?

Scope options

A network security specialist is assisting the administrator of a corporate network in setting up an file transfer protocol (FTP) server that will be secured with Secure Shell (SSH) encryption over port 22. With this information in mind, identify the protocol used in this scenario.

Secure FTP (SFTP)

What are the main uses of Secure Shell (SSH)? (Select two)

Secure File Transfer (SFTP) Remote administration

A new hire at a technology firm must connect to the company's virtual private network (VPN) in order to do work while away from the office. The employee requires use of an application that utilizes Secure Shell (SSH) to establish secure file sharing access with the remote file system. Analyze and select the type of remote access protocol applied in this scenario.

Secure File Transfer Protocol (SFTP)

Identify and list the types of secure protocols that use communications protected by the host's private key. (Select all that apply)

Secure Shell (SSH) HyperText Transfer Protocol over SSL/TLS (HTTPS)

An IT engineer researches moving IT services to the cloud. The engineer considers an IaaS approach. Which of the following details relate to this cloud service approach?

Servers and SANs

Which Open Systems Interconnection (OSI) layer assumes responsibility for managing network connections between applications?

Session

An Information Technology (IT) team leader at a major company is tasked with measuring network utilization and error rate to establish network baselines. Devise viable strategies for accomplishing the task. (Select three)

Set up SNMP (Simple Network Management Protocol) traps throughout the network. Use Wireshark to collect stats. Use the typeperf command (Windows).

An organization moving to a cloud infrastructure joins one of its partners' platforms. Evaluate the given statements and conclude which best fits the organization's approach.

Shared costs

IT engineers from partner organizations plan a cloud infrastructure. After considering the available delivery models, engineers decide to migrate and use a community model. Evaluate the given statements and conclude which best fits the model's approach.

Shared costs

Which of the following relates to a community cloud delivery model?

Shared costs

A contracting company is planning to run new network cables in an area with many power lines and other network cables servicing several tenants in an office building. The existing cables in the area are emitting some noise and electromagnetic interference (EMI). What types of cables are best suited for the work? (Select all that apply)

Shielded Twisted Pair (STP) Ethernet Coaxial Cable Fiber cable

A network administrator needs to implement "something you know" authentication technology for remote access to a critical service. Analyze and select the security concerns the admin must consider before installing such technology. (Select all the apply)

Short PIN codes are vulnerable to brute force attacks. Long PIN codes are harder to remember than passwords.

Corporate employees require remote access to a critical service. What problems should the network administrator consider before implementing "something you know" authentication for this purpose? (Select all that apply)

Short PIN codes are vulnerable to brute force attacks. Long PIN codes are harder to remember than passwords.

A network technician installed a Wi-Fi analyzer app on a personal smart phone to analyze the recently installed wireless access point (AP). Evaluate and select useful information available for a site survey. (Select all that apply)

Signal meter AP list Channel graph

A fancy new office floor uses high-gloss, shiny tile on the walls and on the building's inside pillars. Employees are reporting connectivity issues and slow download speeds. Identify the most likely reason for the reported issues.

Signal reflection

A company requires connectivity between two buildings. The buildings are over 750 meters apart. IT engineers suggest which type of fiber cabling?

Single mode

An engineer installs fiber cable between two buildings on a large company campus. Which type of fiber optic cable does the engineer use?

Single-mode

An engineer suggests running fiber cable for a project. Which type allows for a longer distance?

Single-mode

Determine which of the following terms relate to an always-on virtual private network (VPN). (Select all that apply)

Site-to-site Compulsory tunneling

An IT department made a recent transceiver purchase, which provided network speeds in the gigabit range, rather than the planned 10-gigabit network design. They determined the department purchased the wrong transceivers. Evaluate the needs of the department to determine what type of transceiver options the company must purchase to provide a 10 Gigabit Ethernet (GbE) network. (Select two)

Small Form Factor Pluggable+ (SFP+) 10 Gigabit Small Form Factor Pluggable (XFP)

A technician is on the job troubleshooting connection issues experienced throughout a client's system. The technician finds that the access layer switch ports terminate at the Main Distribution Frame (MDF). Evaluate the following options to determine the scenario most likely to result in a situation where the system does not require Intermediate Distribution Frames (IDFs) and the access layer switch ports terminate at the MDF.

Small one floor office with one location

A leased line experiences performance issues. The telco preforms a self-test to check for issues with the line. Which component allows for self-testing?

Smart jack

An attacker abused the Internet Control Message Protocol (ICMP) to direct multiple hosts' echo responses to a victim server by pinging the broadcast address of the network. Select the correct type of denial of service (DoS) that best illustrates this attack.

Smurf attack

An attacker pinged the broadcast address of a network and each host directed its echo responses to a victim server, resulting in a network crash. Which of the following is a denial of service (DoS) attack which specifically takes advantage of the Internet Control Message Protocol (ICMP)?

Smurf attack

What application can define policy decisions on the control plane?

Software Defined Networking (SDN)

A physical server has just connected to a switch in the communications room. The server has no network connection. When checking the switch port's LED (light emitting diode) status indicator, which of the following may explain the server's network issue? (Select all that apply)

Solid amber light No light

Despite its susceptibility to error, a network administrator wants to introduce new a method of biometric recognition, either as an intrusion detection or as a continuous authentication mechanism. Analyze and identify which of the following terms accurately illustrates this type of authentication factor.

Something you do

Which type of authentication factor should be applied if a network administrator wants to implement a method incorporating gestures as either an intrusion detection or continuous authentication mechanism, despite its susceptibility to error?

Something you do

A Wi-Fi router is unable to reach all users on the office floor due to radio interference. Which of the following tools have the capability to pinpoint the origin of the interference?

Spectrum analyzer

An engineer begins the installation of a network for a new business. Ethernet cables run from desktop locations to a centralized patch panel in a data closet where a hub is placed until a new switch arrives. Evaluate the engineer's configuration, and conclude which types of physical and logical topologies the engineer implements.

Star Bus

An engineer for a large firm documents the internal computer network. A diagram the engineer creates shows a top-down view of the Ethernet infrastructure in a hub and spoke layout. While considering the physical and logical topologies of the network, determine which choices qualify. (Choose two)

Star Bus

An IT engineer troubleshoots a small network. Previously, IT wired all nodes to a central closet. In the closet, the engineer discovers a hub. Of the choices given, which represents the current physical topology and the current logical topology?

Star, bus

IT engineers evaluate a network for upgrade purposes. IT engineers recommend replacing a hub with a switch. Of the choices given, which represents the current physical topology and the current logical topology?

Star, bus

A new physical server has been deployed and is connected to a client switch. While logged in to the server via a KVM (key, video, mouse) device, the network admin noticed the network port is not connected. The switch configurations have disabled all unused ports. After identifying the issue, which course of action should take place next?

Step 1. Establish a plan Step 2. Implement a solution Step 3. Verify network connectivity

A physical server has been plugged in, powered on, and networked into the communication closet. Using a KVM (key, video, mouse) device, the network technician notices there is no network connectivity. Examining the back of the server, the LED status indicators for the port are off. After identifying the issue, which course of action should take place next?

Step 1. Establish a plan Step 2. Implement a solution Step 3. Verify network connectivity

A new virtual environment in an organization is not functioning properly. Engineers conclude that a virtual switch is corrupt. Evaluate the function choices and determine which function the misconfigured switch is directly impacting.

Subnet host communication

A systems engineer provisions several servers in a cloud-hosted environment. The servers will function on a single subnet while utilizing static (Internet Protocol) addresses. During testing, the engineer discovers that a virtual switch is not present. Conclude which functionality is missing as a result of the lack of a virtual switch configuration.

Subnet host communication

A department in an organization asks a systems administrator to set up a small network for a test project that consists of five computers. The admin searches the storage for a spare device to make the connection. Considering the functionality of network connectivity devices, which options can independently satisfy the requirement?

Switch

A new network device handles local traffic by analyzing media access control (MAC) addresses. Which device is the new device?

Switch

A systems engineer documents a customer's network. Knowing that all of the hosts connect in a physical star configuration, which data link layer device utilizes this type of topology?

Switch

After a device failure, a network engineer replaces a layer 2 device on a network. Which device does the engineer replace to restore layer 2 functionality?

Switch

A systems administrator installs new software on a client workstation that communicates with an internal Internet Information Services (IIS) server. The application is unable to establish a connection with the IIS using an Internet Protocol (IP) address. Pinging the IIS and establishing a telnet connection works as expected. Examine the following examples to determine possible causes for this network issue. (Select all that apply)

TCP (Transmission Control Protocol) ports are blocked. IIS service is not running.

In which type of Nmap port scanning does the scanning host request a connection without acknowledging it?

TCP SYN (half-open scanning)

A custom client application is unable to communicate with the internal Internet Information Services (IIS) server. Pinging or establishing a telnet connection from a workstation to the server works normally using an IP address or FQDN. Examine the following reasons and determine possible causes for this network issue. (Select all that apply)

TCP ports are blocked. The IIS service is not running.

Evaluate which of the following file transfer protocols is connectionless and runs over UDP port 69.

TFTP

An engineer creates several Ethernet cables and chooses to terminate the cable ends with the orange pair using pins one and two. Considering the standard choices, which of the following does the engineer choose to implement?

TIA/EIA 568b

An engineer creates several Ethernet cables and chooses to use the widely deployed pinout standard when terminating the cable ends. Considering the standard choices, which of the following does the engineer choose to implement?

TIA/EIA 568b

An engineer configures a DomainKeys Identified Mail (DKIM) record to list the names allowed to receive email from a given source. Considering domain name system (DNS) record types, which does the engineer configure?

TXT record

An engineer configures a sender policy framework (SPF) record to list the server names allowed to send email for a company. Considering domain name system (DNS) record types, which does the engineer configure?

TXT record

Employees at a gas station observe a potential hacker trying to install a malicious device in a credit card reader. Which of the following is a layer of security that could have been implemented to detect and alert this type of criminal activity? (Select all that apply)

Tamper detection Circuit alarm Duress alarm

Employees observe an attacker trying to gain physical access to a credit card machine for malicious purposes. Analyze the options and determine which are viable solutions in mitigating this criminal activity. (Select all that apply)

Tamper detection Circuit alarm Duress alarm

A network engineer wants to allow authorized users to be able to authenticate administrative access to routers and switches remotely. Which protocol will allow this type of access, uses reliable delivery, and make it easy to detect when a server is down?

Terminal Access Controller Access Control System (TACACS+)

Identify and select the protocol that will detect when a server crashes and will allow users to remotely authenticate with administrative privileges to routers and switches.

Terminal Access Controller Access Control System (TACACS+)

A user reported slow download speeds when retrieving files from a personal OneDrive. A request was received immediately afterwards for a faster NIC (network interface card). A quick investigation by a network technician showed a download speed of 5 Mbps (megabits per second) when retrieving a large file from an internal file server. Which of the following can be safely assumed, given the amount of information gathered so far? (Select two)

The NIC is working as expected. The proxy server connections may need some testing.

A Linux server is unable to ping remote hosts, but other hosts can ping the server. Using the iptables command-line utility, what should a network technician examine to ensure the ping command can work for the Linux server?

The OUTPUT chain

A developer finished coding on a physical server with a direct-connect Ethernet cable from a personal laptop. After plugging in the Ethernet cable into the Ethernet port of the switch in the communications closet, the server is unable to establish a network connection. Applying information provided in the scenario, determine what is most likely wrong with the cable.

The cable is a crossover cable.

A systems administrator successfully connects a laptop directly to a server by using an Ethernet cable. After copying files to the server, the administrator then connects the laptop to a network switch using the same cable. The administrator cannot access any network resources. Why does the connection to the switch fail?

The cable is a crossover cable.

A Category 6 cable run has been installed and connected into an office communications closet. The origin of the cable can be traced back to the main offices on the floor below. Using a cable tester, the network admin measured the insertion loss at -21 dB (decibels). What may be causing this high decibel reading?

The cable is too long.

Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS).

The client and server negotiate the use of a supported security mechanism.

A major manufacturing company's interoffice file system uses a file transfer protocol (FTP) that negotiates a Secure Sockets Layer/Transport Layer Security (SSL/TLS) tunnel using the secure port 990 before any FTP command exchanges. The network technician in charge decides the protocol needs to be downgraded since current protocol is proving challenging to configure due to firewalls between client and server. Analyze the scenario and select the current protocol and which protocol meets the criteria for change.

The current protocol is FTPS and should be changed to TFTP.

A specialized hardware device uses a file transfer protocol that runs Secure Shell (SSH) over TCP port 22 to collect small non-critical data files. The Information Technology (IT) team compiles the files daily and inputs them into data graphs. The new protocol only requires reading (GET) and writing (PUT) files, not directory browsing, file deletion, or any other features. The network technician in charge decides the protocol needs to be downgraded for simplicity purposes. Based on this information, identify the current protocol and determine which protocol meets the new criteria.

The current protocol is SFTP and should be changed to TFTP.

A specialized hardware device uses a file transfer protocol that runs over User Datagram Protocol (UDP). The device collects small, non-critical data files daily to compile into data graphs. The protocol only supports reading (GET) and writing (PUT) files, not directory browsing, file deletion, or any other features. The network technician in charge decides the protocol needs to be changed for security and upgrading. Based on this information, identify the current protocol and conclude which protocol should be included in the change.

The current protocol is TFTP and should be changed to SFTP.

A user downloads a file from the internet, but the file's hash value does not match the hash published by the developer. Applying this information, which of the following options should the user consider? (Select all that apply)

The file should not be trusted. The file was downloaded from an illegitimate source. The integrity of the file is compromised.

After checking the logs and configuration settings of the firewall, a security analyst discovered the firewall was misconfigured. If only one user is complaining about not being able to access the corporate network, which of the following is most likely the cause of the issue?

The firewall access control list (ACL) is blocking the user's source IP address.

A vendor's client application on a workstation is unable to communicate with its public web services. The application uses the common Transmission Control Protocol (TCP) port 80. The client can still browse the websites using Internet Explorer. Why is the application unable to reach the vendor services?

The firewall is blocking the application.

A new application on a client workstation is unable to communicate out to the Internet. Vendor support has stated the application uses common Transmission Control Protocol (TCP) port 443 for secure access to their public web services. The client can still browse the Internet via Internet Explorer. Determine why the application is unable to communicate with the vendor's public services.

The firewall rule for the application is disabled.

A certificate does not match the subject name as a result of utilizing an Internet Protocol (IP) address instead of a Fully Qualified Domain Name (FQDN) and is self-signed. Determine the reasons the certificate should NOT be trusted. (Select all that apply)

The holder is the issuer and the subject It could indicate malicious activity

Why should a certificate that is self-signed NOT be trusted? (Select all that apply)

The holder is the issuer and the subject It could indicate malicious activity

There is an issue with network connectivity. Examining the physical port's LED (light emitting diode) status indicator, a solid green light appears. What status does the solid green light indicate?

The link is connected but there is no traffic.

A network cable was replaced on a switch. The LED (light emitting diode) status indicator on the physical port shows a blinking green light. What does this indicate?

The link is operating normally with traffic.

A network admin is working with a beta application at an office workstation and is unsure if the app is connecting properly to the internal web server. The ipconfig utility shows the workstation has a valid Internet Protocol (IP) address and a default gateway. Determine which command-line tool the admin can apply in this situation to show active connections and execute further troubleshooting actions.

The netstat command

An admin reconfigured a windows server to become a proxy server. Two 100/1000 network adapters were installed and their settings are configured manually. After establishing a good network connection, the admin manually set one of the network adapter's speeds to 100. Apply the provided information to draw a conclusion about what the admin most likely observed next with the network.

The network link failed.

A Jr. systems administrator at an organization has just learned to use a multiple input multiple output (MIMO) configuration with a 802.11n wireless network. The administrator now plans on increasing bandwith by adding the maximum number of antennas possible in a 4x4:2 configuration. After evaluating the administrator's approach, which option defines the planned implementation?

The number of transmit antennas x the number of receive antennas : the number of simultaneous transmit and receive streams

A wireless systems administrator modifies a company's 802.11n network to increase bandwidth. The administrator employs a multiple input multiple output (MIMO) configuration of 3x3:2. Considering the administrator's selected MIMO notation, which option explains the selected configuration?

The number of transmit antennas x the number of receive antennas : the number of simultaneous transmit and receive streams

A network technician examines the physical cable between the server and the switch while troubleshooting network issues with software tools. The cables seem excessively rolled up on one end, and the pins on the other end show the striped brown and solid brown wire on the outer sides of the cable head. Which of the following options is likely causing the network connectivity issues?

The pins are incorrect.

An Ethernet port on a switch suddenly lost connectivity. After changing the Ethernet cable with a known good cable, the port still has no link light. Which of the following is most likely caused the lost connectivity?

The port is bad.

A network administrator wants to prevent the signal of a wireless access point (AP) from extending over to other work areas and businesses. Analyze the scenario and determine what the admin can adjust on the AP to accommodate this requirement.

The power level

A network manager configures a Routing Information Protocol (RIP) on the network. Consider the types of dynamic routing protocols to determine what features the protocol will provide.

The protocol will consider only one route to a given destination network.

An authorized employee authenticated through a barrier and unlocked entry into a secure access point. Which of the following actions should occur once the door closes behind the employee? (Select all that apply)

The secure gateway should be self-closing The secure gateway should be self-locking

Service Level Agreement (SLA) requirements for a major corporate network define Mean Time to Repair (MTTR) standards and require service of faulty leased hardware within 24 hours of the first report, with replacement of hardware guaranteed within 48 hours. A service technician arrives on time on Tuesday morning to respond to a fault report made Monday afternoon and spends 6 hours before declaring the hardware needs replacing. The service technician installs the replacement hardware Friday afternoon. Decide who is liable for any losses incurred by the customer and explain why.

The service provider is liable for the customer's losses, since the provider did not meet the SLA conditions.

A media stream from a wireless AP (access point) shows a significant lag. Knowing real-time application is sensitive to latency and jitter, which of the following may be contributing to the problem?

The signal is experiencing attenuation.

A wireless access point (AP) is installed in very large office floor space with multiple cubicle walls. A network technician is uncertain about the effectiveness of the type of AP selected for installation. They are concerned it may not provide an adequate amount of bandwidth to all corners of the office using the 2.4 gigahertz (Ghz) frequency. As a result, a second AP type is also being considered. Using what is known, determine the limitations and concerns when installing a single AP. (Select all that apply)

The signal is not strong enough. There is too much frequency interference.

A network technician plugged in a Small Form Factor Pluggable (SFP) module into a standard port on a switch. The technician connected the server and was only able to test for speeds typical of a gigabit link rather than a 10-gigabit link, as advertised by the switch vendor. Evaluate the scenario to determine what is wrong with the switch port.

The switch port is not the issue.

An Ethernet frame is transmitting across the network. A network manager uses the Wireshark packet capture application to view the Maximum Transmission Unit (MTU). What information will the network manager gain?

The upper limit of the payload in the frame.

A user is using a smart phone to attempt to find the new Wi-Fi guest network in the office. However, only older Wi-Fi networks appear as available options. Which of the following is most likely the reason why the user cannot find the wireless network?

The wireless frequency is incompatible.

A Windows Server 2016 has recently been remotely joined to the domain by a network admin, and is now known as IISMARKETING01.redwood.local. When pinging the server using its Fully Qualified Domain Name (FQDN) the reply fails. When trying to remote access the server using the sa FQDN the session does not connect. Applying a divide and conquer approach, where would a network admin most likely begin to resolve this issue?

Theorize an IP issue at Layer 3.

A new web server on the domain is called WEBMARKETING01.proprints.co. The marketing department worked remotely on setting up this web server for the past two days. After joining the server to the domain, a remote session cannot be established. Pinging the FQDN (Fully Qualified Domain Name) also fails. Using a divide and conquer approach, how would a network admin most likely begin to theorize a probable cause?

Theorize an IP issue at Layer 3.

Tier 1 support just received a report of network issues with a web server that was working normally just an hour ago. After gathering as much information as possible, Tier 1 support established and tested a theory of cause under the customer's service level agreement (SLA). What are the most likely reasons that Tier 1 support escalated the issue to Tier 2 after 15 minutes of work? (Select TWO)

Theory testing failed. Contract limits work to 15 minutes.

A virtual host using VMware's hypervisor has been installed in the communications rack. A baseline build of the host has been deployed and the network admin is not able to Secure Shell (SSH) to or ping the management port of the hypervisor. All Internet Protocol (IP) settings, switches, and status indicators on the ports are green and blinking. Which of the following is most likely causing the network issue?

There is a VLAN mismatch.

A technician is troubleshooting a network issue. The technician confirms physical port connections between the switch and server through the light emitting diode (LED) status indicators. Data packets are intermittently dropped from the server. Plugging in another server using a different cable in the same port shows no issues. Evaluate the scenario to identify the issue with the previous cable.

There is a short circuit.

A technician is troubleshooting a network issue. Physical port connections are showing as not connected by the light emitting diode (LED) status indicators. Network drivers are installed on the server that is connecting to the switch. Plugging in another server using the same cable produces the same issue. Analyze the network issue to determine what is most likely wrong with the cable.

There is an open circuit.

Users at recent video conference meeting reported some delayed video in the stream after the video session restarted twice during the meeting. A network technician arrived and completed a basic ping test on the network. Which of the following can the network technician conclude regarding the issue users experienced?

There is latency and packet loss

A network admin reconfigured a workstation's root certificate store to add the root certificate of a trusted certificate authority. The admin restarts Internet Explort (IE) to confirm the additional certificate worked with an Intranet SharePoint portal. Justify the admin's actions in this scenario.

There was a webite security error.

A network technician patches the vulnerability and verifies full system functionality after identifying a vulnerability on a network switch operating system. Justify the technician's decision to document any findings, actions, or outcomes that may have taken place during the process. (Select two)

They establish a new baseline for the template. They create installation procedures.

After a site survey, the network technician found the single wireless 2.4 gigahertz (Ghz) access point (AP) in a large office floor space does not have a strong enough signal, and is contending a significant amount of background noise and interference. What will these findings most likely limit on the AP's wireless signal?

They will limit the signal's range.

Proper disposal of an asset the end of its life cycle is important for security and privacy purposes. Company EFGH encrypts all storage devices before wiping and degaussing them. Next, the company throws away all optical media and shreds all paper documents. Analyze the disposal process to identify the mistake company EFGH made in this scenario.

Throwing out optical media

A routing table is corrupted and causing a packet to loop. The router discards the packet and sends a warning packet to the source host. Consider the types of Internet Control Message Protocol (ICMP) messages to determine what type of message the source host receives.

Time exceeded

Host A sends a packet to Host B. There is congestion on the network that causes a considerable delay. The source host receives a warning packet after the router discards the packet. Compare the types of Internet Control Message Protocol (ICMP) messages to determine what type of message the source host receives.

Time exceeded

A network admin gains remote access to a server with a beta application running. The admin realizes there are issues connecting the application with the internal web server and runs the netstat command. Justify why the admin might execute the netstat command for troubleshooting? (Select two)

To show active TCP connections To show all active ports

When testing the network configuration of a remote server, a network admin uses the ping and tracert command. Which of the following justify the admin's choice of network utilities? (Select two)

To test the network connectivity of the remote host. To confirm the routing path from a Windows server.

Which port will a Domain Name Server (DNS) use for record transfers over 512 bytes?

Transmission Control Protocol (TCP) port 53

The Open Systems Interconnection (OSI) reference model provides windowing in which layer?

Transport layer

A Simple Network Management Protocol (SNMP) agent informs the monitor of a port failure. Analyze the functions of an SNMP agent to determine what command the monitor uses for this notification.

Trap

A network technician is attempting to use an SNMP (Simple Network Management Protocol) monitor to collect performance metrics from devices throughout the network. They set up the monitoring software to receive alert messages from the SNMP agents notable events to record in the Management Information Base (MIB) at intervals determined by a threshold. Interpret which SNMP command is being used to accomplish this alert messaging.

Trap

A government office is installing a stand-alone Intranet for their security systems. The installation includes a file transfer protocol (FTP) server that will only be used for transferring small configuration files to a router over User Datagram Protocol (UDP) port 69. Consider the requirements for the installation and identify the protocol that meets the office's needs.

Trivial File Transfer Protocol (TFTP)

A router downloads configuration files over User Datagram Protocol (UDP) port 69. The router does not have access to browse the directory or to delete files. Analyze File Transfer Protocols (FTPs) and determine what protocol the router is using.

Trivial File Transfer Protocol (TFTP)

A network manager adds a new switch to the network. The switch will interconnect with the other switches already in place. What does the network manager need to complete the interconnection between switches?

Trunks

A network manager is designing a network for a new company. The company will have over 300 hosts and will interconnect multiple switches to build the network fabric. What will the network manager use to connect the switches?

Trunks

A user reported a performance issue on the network the department's web server is communicating on. After questioning a few other users, and notating some recent changes on the server and its symptoms, what other actions will a network admin most likely take to better identify the problem?

Try and duplicate the problem.

Company PDQ is utilizing Internet Protocol Security (IPSec) to implement a client-to-site virtual private network (VPN) across an unsecure network (the Internet). Select the mode and encryption level used in this situation.

Tunnel mode with whole packet encryption

A host uses Internet Protocol version 6 (IPv6). The host sends a packet over the Internet. The IPv6 packets insert into Internet Protocol version 4 (IPv4) packets. The packets route over the IPv4 network to their destination. What is providing this function?

Tunneling

Identify common examples of wireless interference in office or home settings. (Select all that apply)

Two APs (Access Points) using the same channel An office cubicle

A systems administrator is powering on a standalone workstation and notices the computer's clock is set for five years in the past. This incorrect time setting can result in what common issues? (Select two)

Unable to join to the domain Cannot authenticate to other servers

A systems administrator setting up a virtual machine (VM) notices the VM has a duplicate Media Access Control (MAC) address as another VM on the same virtual host. The admin discovered this after running the ipconfig/all command. Which issue is possible when the VM is connected to the virtual switch (vSwitch)?

Unable to maintain zero packet loss.

A tech configures a yagi for a wireless network. Which component does the tech configure?

Unidirectional antenna

A network admin is using a standalone laptop to test a newly deployed web server in the internal network. The admin must test access to the website using a Fully Qualified Domain Name (FQDN) and Internal Domain Name System (DNS) service is currently unavailable. What actions can the admin execute to continue the test?

Update the Windows HOSTS file.

A non-technical manager purchased a single-band wireless Access Point (AP) and set up a wireless network using the 5.0 Ghz band. Employees are not able to connect their laptops that only support the 2.4 Ghz band. What is the most cost effective way the manager can resolve this issue?

Upgrade laptop wireless adapters.

Single-band 802.11n wireless Access Points (APs) were recently installed in the warehouse to operate several wireless automated machineries using the 5.0 gigahertz (Ghz) band. Employees would also like to connect company laptops to the wireless network to roam freely, but they are unable to connect. What is the best option for the company to resolve this issue at mimimal cost?

Upgrade laptop wireless adapters.

A coffee shop customer is connected to the store's open wireless access point (AP). The customer proceeds to transfer sensitive data files over File Transfer Protocol (FTP) in cleartext. Which of the following is a way to ensure this confidential information is transmitted securely on open wireless APs, and helps prevent attackers from intercepting traffic via sniffing, eavesdropping, and Man-in-the-Middle (MitM) attacks? (Select all that apply)

Use HTTPS Use SSL/TLS Use a VPN

A network administrator wants to mitigate attackers from performing traffic interception techniques such as sniffing, eavesdropping, and Man-in-the-Middle (MitM) attacks. If the network uses open wireless access points (APs), how can the administrator help ensure sensitive data is transmitted securely? (Select all that apply)

Use HTTPS Use SSL/TLS Use a VPN

A large enterprise client asks a contracted technician to make hourly backups of an Influx database that is always open and continuously updated. The database is critical for hundreds of workers. Which of the following is the best method for accomplishing these backups?

Use Volume Shadow Copy or Samba to create hourly snapshots of the database host.

Hosts on a particular network are sending erroneous packets and the network's administrator is investigating the issue. Which of the following is the best method to identify and isolate the source of the erroneous packets?

Use a packet analyzer, such as Wireshark, to monitor packets.

A network admin is unable to find the end of an Ethernet cable connected to a server in the communications room. Which of the following is the most efficient way to find and trace the cable to its endpoint?

Use a tone generator and probe.

An access point (AP) has, on average, 50+ clients connected to it everyday. The device saturation is affecting bandwidth. Select the activity that most effectively prevents bandwidth hogs.

Use a wireless controller.

On average, 60+ laptops connect to a wireless access point (AP) every day. The connections are saturating the AP device and it is experiencing overcapacity. The saturation lowers individual user's wireless performance and speeds. Even a single user with five connected laptops can experience lower performance if there is a single bandwidth hog. What activities can best prevent bandwidth hogs?

Use a wireless controller.

A network administrator is working directly with programmers on a new project at a manufacturing plant. The project involves installing modules that a Linux server monitors, that sends "heartbeat" messages of the status of the press molds connected to the modules. Before the installation process, the programmers require the network administrator's assistance establishing network performance baselines. Determine which of the following tools or methods the administrator would use to establish performance baselines. (Select three)

Use jFlow by Juniper to monitor packet flow. Test throughput between essential hosts by transferring a large file from one to the other. Draw network diagrams of all layers.

An Information Technology (IT) team leader at a major company is measuring network utilization and error rates to establish some baselines for the network. The team leader has devised multiple strategies for accomplishing the task. Distinguish between the methods to determine which is NOT valid.

Use the arp -a command to view the ARP table.

An attacker bypassed authentication controls to gain access to an authorized area of a company building. In order to help increase the physical security posture, determine the considerations the company must make when choosing and implementing a "something you are" authentication factor with biometric recognition. (Select all that apply)

Users find that biometric recognition invades privacy. Biometric recognition technology can be discriminatory. Setup and maintenance costs for biometric recognition are high.

What considerations should a company make when selecting and installing authentication factors with biometric recognition? (Select all that apply)

Users find that biometric recognition invades privacy. Biometric recognition technology can be discriminatory. Setup and maintenance costs for biometric recognition are high.

An organization considers moving some internal services to the cloud. Which of the following descriptions relates to a hybrid cloud infrastructure?

Utilization benefits

The administrator of a large corporate network has been instructed to configure endpoints to provide information to the Security Information and Event Management (SIEM) software. Eliminate the invalid option to plan the best method for accomplishing the task.

Utilize WireShark to identify top talker and top listeners.

Identify which of the following remote access protocols does NOT provide access to a command-line interface (CLI) natively. (Select two)

VNC (Virtual Network Computing) RDP (Remote Desktop Protocol)

An IT engineer implements a SonicWall firewall and a Windows server for connectivity and authentication purposes. Which of the following roles does the IT engineer configure for this implementation? (Select two)

VPN concentrator RADIUS server

A company's sales team functions as a completely remote workforce. To support the team, IT implements a solution for access to internal company files and assets. Which two technologies does the IT department implement to provide this access? (Select two)

VPN concentrator RADIUS server

What allows a network designer to allocate ranges of Internet Protocol (IP) addresses to subnets that match the predicted need for the number of subnets and hosts per subnet?

Variable Length Subnet Masks (VLSMs)

An automated misconfiguration of a host-based firewall inhibited web services from running properly on a network server. The automation process should be re-evaluated immediately. Determine which stage of network troubleshooting methodology effectively executes preventative measures.

Verifying system functionality

A guest operating system is not able to access a switch in a virtualized environment. What does a technician need to configure for a successful connection?

Virtual NIC (network interface)

An employee logs into the employee's Windows desktop located at the office while working from home. The software logs the employee directly into a Linux GUI (Graphic User Interface) to access the desktop's screen, mouse, and keyboard. Select the remote access software/protocol applied in this scenario.

Virtual Network Computing (VNC)

In a virtualized environment, guest machines can communicate with physical systems, even with those on a different subnet. The guests, however, cannot communicate with wireless printers. Which configuration is causing the issue?

Virtual firewall

An attacker exploited a native feature of 802.1Q by crafting a frame with two tag headers. The attacker used this type of double tagging to send large amounts of traffic to another broadcast domain, which ultimately resulted in a denial of service (DoS). Analyze the scenario and select the type of attack this event describes.

Virtual local area network (VLAN) hopping

Which of the following is typically associated with a denial of service (DoS) attack? (Select all that apply)

Virtual local area network (VLAN) hopping Deauthenticaion Resource exhaustion

A virtual environment is missing a configuration that allows guests to communicate with another virtual subnet. Which option needs configuring?

Virtual router

Inline network appliance

VoIP PBX

Users report that phone calls between departments are not working. Of the options, which of the following does an engineer check first?

VoIP PBX (Voice over Internet Protocol(VoIP) Private Branch Exchange(PBX))

A user requests that the company's voicemail system is accessible by a computer. Which of the following options does an IT technician configure?

VoIP endpoint

A company implements a new Voice over Internet protocol (VoIP) phone system. The company installs several devices. Which of the following devices connect the new system to the existing analog phone service?

VoIP gateway

A user states that phone calls external to the organization do not work. The engineer tests a phone and can only make internal calls. Which component needs troubleshooting?

VoIP gateway

During a scheduled penetration test, a penetration tester discovered weaknesses within a corporate environment that could cause a security breach, such as misconfigurations, faults and design flaws in software. Identify what the penetration tester has discovered during testing.

Vulnerabilities

Which of the following network types may use an ad hoc topology?

WLAN

Which of the following options are reasons to NOT use Wi-Fi Protected Access 2 (WPA2)? (Select all that apply)

WPA2 is not supported by some adapters. WPA2 is not supported by some access points (APs). WPA2 is not supported by some operating systems.

A user with an older laptop selects the only Wi-Fi access point (AP) available at the doctor's office. After entering the passphrase, the laptop is still not able to connect. What may be causing this issue?

WPA2 is required.

A user is trying to connect to the only wireless access point (AP) in the area. Using a Windows 10 laptop, the user selects the AP's Service Set Identifier (SSID) and is prompted for a passphrase, but the connection fails. What is likely causing this issue?

WPA2 was not selected.

A criminal used an adapter and a laptop to search for unsecure wireless networks to compromise, focusing particularly on wireless access points (APs) that are open or use weak encryption security protocols. Determine which types of attacks this scenario describes. (Select all that apply)

War driving Wired Equivalent Privacy (WEP) cracking

A person with malicious intent installed a wireless adapter in their laptop. They then searched for unsecure wireless local area networks (WLANs) and eavesdropped on WiFi traffic not secured by encryption. Which of the following can be associated with this type of attack? (Select all that apply)

War driving Wired Equivalent Privacy (WEP) cracking

What will cause a switch to act like a hub and transmit a frame out of all ports, except the source port?

When the MAC address table cannot find the MAC address

A network admin can log into a Windows server using the Remote Desktop Protocol (RDP), but cannot ping the server. Identify the most likely cause of the issue.

Windows firewall settings are configured incorrectly.

An attacker used deauthentication to interpose a rogue access point (AP) to perform a Denial of Service (DoS) attack against a wireless infrastructure. Analyze and select the wireless encryption security protocol that is most vulnerable to this type of attack.

Wired Equivalent Privacy (WEP)

If a wireless access point (AP) is highly susceptible to deauthentication and Denial of Service (DoS) attacks, which wireless encryption security protocol is the AP most likely using?

Wired Equivalent Privacy (WEP)

A vendor visits an organization to demo a network management device. As part of the hands-on demonstration, an IT engineer can see and manage an extended service set (ESS) on the network. Based on the engineer's experience with the device, what is the vendor demonstrating?

Wireless controller

A site survey confirmed the current wireless access point (AP) is contending with significant background noise. This is limiting the frequency range of the AP. Identify the office items that possibly contribute to background noise in this situation. (Select all that apply)

Wireless phones An access point Power lines

An engineer needs to place a device that will act as a repeater on a network. Which device does the engineer use?

Wireless range extender

Users report that connectivity does not work in a certain part of the building. An IT engineer responds by reconfiguring repeater frequencies so they match. Which of the following does the engineer troubleshoot and configure to restore connectivity?

Wireless range extender

A network diagram symbol resembles a three-dimensional circular object with four arrows pointing in multiple directions on its surface. It also has two antennae protruding from the top. Identify the symbol.

Wireless router

An employee of a manufacturing plant is terminating twisted pair cables with Registered Jacks (RJ), RJ-45 and RJ-48C. Recommend which diagram type to use.

Wiring diagram

The marketing office reported issues regarding slow network connectivity to the Internet and inability to access the company's SharePoint site. All marketing users on the 7th floor offices are getting an "HTTP 404" warning. What is the best way the network admin can approach this incident to identify the problem?

Work on the slow Internet connection first.

A department manager reported slow network speeds on behalf of their employees. The employees require constant communication with various public cloud services and the manager requests an upgrade of all workstations. A network technician was not able to duplicate the issue when accessing and downloading files from an internal file server. What can be safely assumed given the information gathered so far? (Select all that apply)

Workstation NICs are working as normal. Proxy network performance should be tested.

A wireless AP (access point) located on a table in the middle of a small office area is not producing a strong enough signal for users on the outer perimeter for higher data rates. Determine which of the following options is the most likely reason for this issue.

Wrong antenna type

A user is having a hard time connecting to a wireless AP (access point) that is not broadcasting its SSID (service set identifier). Which of the following is most likely cause of this issue? (Select all that apply)

Wrong name Wrong password

A consumer troubleshoots a security system that ties into a garage door opener. Which of the following protocols does the system likely use?

Z-Wave

A consumer configures a new wireless router at home and only configures the 5 GHz band. Which wireless standard only works with this band?

ac

A network manager cannot communicate with a system on the network that has an Internet Protocol (IP) address of 192.150.060.024. The manager uses the ping command and can reach the IP address. Recommend a command the network manager can use for troubleshooting the issue.

arp -a 192.150.060.024

A user mentions that the wireless speed of a laptop is much slow than a coworker's laptop. The laptops are the same, except for a universal serial bus (USB) wireless adapter on the questionable laptop. Testing the problematic laptop reveals a wireless speed no greater than 11 Mbps. Which standard does the USB adapter use?

b

A system sends a message to all link-local nodes via a multicast address. Compare private address types and conclude which address the system will use.

ff02:11

A tech replaces a failed wireless router at a company. While waiting for the new router to arrive, an older router is put in place and will only provide speeds of 54 Mbps. Which wireless standard does the older router use?

g

A company uses a network-based storage device for file shares. The implementation of the device uses an Internet protocol (IP) tunneling protocol and standard ethernet network adapters. Based on these technology features, which of the following provides connectivity to the device?

iSCSI

A technician installs a new network storage device. The technician easily configures the device by simply plugging it into the Ethernet network and configuring a few settings in the device's management console. Considering the simplicity of the setup, which connectivity solution does the technician utilize?

iSCSI

A Linux administrator is configuring a Linux server's network interface card. The server must have a static IP (Internet Protocol) address for a Class C network. Settings must be verified. Analyze and select which commands would be most appropriate to run in this scenario. (Select all that apply)

ifconfig eth0 192.168.101.120 ifconfig eth0 netmask 255.255.255.0 ifconfig

A Windows server is being configured to go live again on a LAN (Local Area Network) that has a DHCP (Dynamic Host Configuration Protocol) server with a new pool of addresses. The change must be verified upon completion. Which of the following commands would be most appropriate to apply to this scenario? (Select all that apply)

ipconfig /release ipconfig /renew ipconfig /all

A systems admin is unable to ping remote hosts from a Debian server. Remote hosts can ping the server. The admin troubleshoots the issue by examining the OUTPUT chain. Determine which tool meets the admin's needs to troubleshoot the issue.

iptables

Network equipment in a rack system has limited in-front facing space with the door closed. A technician uses small form-factor connectors to connect a fiber cable. After evaluating the choices, predict the correct fiber connectors for the system.

lucent connector (LC)

A tech looks to increase a company's wireless network performance by implementing a multiple input multiple output (MIMO) configuration. Which wireless standard supports this configuration type?

n

An IT engineer digs through a closet to find a Wi-Fi router to use while waiting for a new one to arrive. The IT engineer chooses between several routers and selects one that supports both 2.4 and 5 GHz frequencies. Which standard does the engineer use to support both frequencies and all deployed mobile devices?

n

Users at a company use a mix of wireless devices (phones, tablets, laptops) that use either the 2.4 GHz or the 5 GHz spectrum. Considering the given wireless standards, which one does the company utilize?

n

A small business owner is running a business website on a home server. As the website provides an online gaming service, traffic is very high and, therefore, the owner needs to install server software with load balancing mechanisms. The owner is only interested in an open-source solution. Evaluate the following tools and select the options that will fit the owner's needs. (Select two)

nginx Apache

A network technician is troubleshooting network issues between a workstation and a virtual server running a beta application. Network performance is lacking and there seems to be issues in between the source and destination. Which command will provide the technician with the best information regarding other nodes between the workstation and the remote host?

pathping

A system administrator for ABC Company receives a request for a new account. A new employee is onboarding and will receive a Voice over Internet Protocol (VoIP) phone. The employee's name is Sam Smith and the phone number will be 1234567890. The company's domain is @abccompany.com. Develop a Session Initiation Protocol (SIP) Uniform Resource Indicator (URI). (Select two)

sip:[email protected] sip:sam.smith@1234567890


Related study sets

Unit 6 Progress Check: MCQ Part A

View Set

periodic table of elements 30-60

View Set

vue模板书写以及生命周期

View Set