Network+ Prep

Ace your homework & exams now with Quizwiz!

A network engineer is creating a network diagram based on a list of media access control (MAC) addresses used in a network. At what layer of the OSI model are all hosts identified by a specific MAC address?

Data-link layer

How does the TCP/IP protocol suite resolve the machine hardware address of the target IP if the target IP is on a remote network?

Determine the MAC address of the default gateway using ARP cache

A network administrator is configuring a switching network based on the three-tiered hierarchy model used by Cisco. Which tier of Cisco's modular design principles would the administrator most likely install a Layer 2 LAN switch?

Access Layer The access/edge layer allows end-user devices.

A network technician is using Nmap to map a corporate network. The technician does not have privileged access to the network driver to support packet crafting and decides to do a half-open scan. Select the Nmap argument that will perform a half-open scan.

-sS

nmap switch that allows for host discovery only

-sn

An electric power company is onboarding new employees for its IT/network team. The employees will be responsible for managing switches that connect a variety of Internet of Things (IoT) field devices. Determine the most relevant password policy rule to be applied that the network switch requires in order to align with NIST password recommendations for critical infrastructure.

14 character minimum password length

A network engineer is tracing network routes and counting network hops. The engineers ping packet passes through a total of 3 switches and two routers before reaching its target. Determine how many network hops the packet has taken. The TTL is set to 64.

2 Two routers count as two hops. Switches do not count as hops.

A network specialist is installing a new WiFi 6 access point in a dentists office lobby. The office is a small space with few physical obstacles, and only patients waiting in the lobby are expected to use the AP. There is a lot of interference from legacy devices used by the offices directly above, mostly on the lower channels of the lowest frequencies. Recommend a frequency and channel for the network.

5 Ghz, channel 40 Because the office lobby is small in area and obstacle-free, 5 Ghz with multi-user MIMO could be ideal in a setting dominated by 2.4 Ghz devices (interference is stated to occur on lower frequencies). Channel 40 is a great default if there is no known interference.

What is the lowest ANSI/TIA/EIA copper Ethernet cabling category available in the form of shielded/foiled twisted pair (S/FTP), and is often recommended for use in healthcare settings?

6a Category 6a fully shielded cabling has a braided outer screen and foil-shielded pairs and is referred to as shielded/foiled twisted pair (S/FTP).

Which IEEE wireless standard is designated as using high efficiency (HE), allowing throughput speeds of up to approximately 4800 Mbps over a 5 Ghz channel using Orthogonal Frequency Division Multiplexing with Multiple Access (OFDMA) modulation and UL-MIMO beamforming and can potentially reach approximate 10G speeds using a 6 Ghz frequency?

802.11ax Wi-Fi 6 (802.11ax) uses more complex OFDM with multiple access (OFDMA) modulation and signal encoding to improve the amount of data sent per packet by about 40%.

A branch manager of several chain stores has been researching physical security and wants to set up a network of monitored locks, intruder alarms, and video surveillance cameras. What should they set up?

A physical access control system (PACS) is a network of monitored locks, intruder alarms, and video surveillance cameras.

A network engineer is performing packet capture on a Gigabit copper cable for analysis and troubleshooting of a large network. The engineer requires a network sniffer that captures all frames (including frames with errors), performs signal regeneration, and is easy to implement with dedicated hardware. Suggest a network sniffer that will fulfill the engineer's requirements.

Active test access point (TAP) An active test access point (TAP) is a powered device that performs signal regeneration and can capture all packets.

A network cabling installer is inspecting existing cabling in an older building on behalf of a local ISP. The cabling connects several branches of 10BASE-T Ethernet to a newer 100BASE-TX trunk. What protocol does the Fast Ethernet standard use that encodes service capabilities into a 16-bit data packet broadcast as Fast Link Pulse link test pulses that allow legacy hosts to choose the highest available connection settings, thus enabling compatibility between the 100BASE-TX and the legacy 10BASE-T?

An auto-negotiation protocol

A systems administrator is researching an identity and access management (IAM) system to mediate the use of objects by subjects. Which of the following components determines what rights subjects should have on each resource?

Authorization

A network consultant wants to configure their client's system to generate an alert when either a certain type of a given severity has been encountered, or by setting thresholds for performance counters. What is the name of this type of system?

Automated Event Management An automated event management system can be configured to generate some sort of alert when a certain event type of a given severity is encountered. An alert can also be generated by setting certain thresholds for performance counters.

A network technician is manually configuring speed and duplex settings in a managed switch, in order to define specific speeds for specific devices. After testing the manual configuration of a single test device, the technician notes that the LED indicator corresponding to the port the test device is connected to is blinking amber. Recommend a next step for the technician to investigate.

Check duplex settings

A company has deployed a large network of PLC devices in its manufacturing facilities. The company has recently laid off several employees who had regular access to the configuration settings of the PLC devices through workstations connected to the PLC firmware through Secure Shell (SSH) sessions authenticated with public key infrastructure (PKI). Plan the proper actions for remediation of the client device and management of the keys associated with the user accounts of the former employees. (Select all that apply.)

Copy new public key to SSH server Regenerate a new key pair on the client device Delete the old public key from the appliance

A service provider has terminated a T1 link to a mid-sized company using the T-carrier system. After patching from where the service provider terminated their connection, where would the customer connect for connectivity?

DSU The customer connects to the CSU / DSU. The cabling from the smartjack to the CSU/DSU can use an ordinary RJ-45 patch cord.

A team of network engineers is using an interior gateway routing protocol that takes into consideration only the number of hops when calculating routes. Recommend an interior gateway routing protocol that calculates routes using a metric weighted on bandwidth cost combined with delay time, and that only sends updates to neighbors when the topology has changed.

Enhanced IGRP (EIGRP)

A network engineer is configuring an Internet of Things (IoT) network that uses multicasting to allow devices to communicate over a VLAN-enabled managed switch. An issue is occurring where the multicast traffic is being flooded across the network as a broadcast, resulting in reduced network performance. Recommend a potential fix for this issue.

Ensure IGMP snooping is enabled at the switch IGMP snooping means the switch reads IGMP messages and can determine if the host on an access port or one or more hosts in a VLAN have joined a multicast group. It prevents flooding.

An enterprise network provides remote database services delivered using a commercial relational database management system (RDBMS) to employees of an architectural firm. To secure the data, TLS encryption is required by both the server and the client. Propose a method of configuring the authentication that will provide for this requirement.

Install certificates on the server and all clients

What advantage does Collision Detection (CD) bring to the carrier-sense multiple access (CSMA) media access control method?

Instant termination upon collision

A technician is tasked with deploying ethernet cable throughout a new wing of the organization's building. Using the various tools available to assist in achieving this requirement, what is the purpose of using a cable crimper?

It is connector specific and used to fix a plug to a cable and create patch cords.

What is a hacker trying to accomplish when attacking Neighbor Discovery protocol?

Layer 2 spoofing

A security analyst is looking at attacks against unencrypted Neighbor Discovery (ND) protocol. What is the attacker most likely trying to accomplish?

Layer 2 spoofing While IPv6 does not use ARP, it is also vulnerable to layer 2 spoofing if the unencrypted Neighbor Discovery (ND) protocol is used.

A network engineer is testing an application over the IPv6 protocol. Determine how the server can cast packets to an entire local subnet

Multicast to associated private topology

A data center network administrator working for a cloud services company is configuring an SDN that is optimized for east-west traffic. The SDN must be loop-free so that spanning tree protocol is not required, instead utilizing a protocol called Equal Cost Multipathing (ECMP) to distribute traffic between the links to the top-tier switches. Most importantly, all server resources will be on-premises, so the solution should avoid the use of the public Internet and the use of Protocol-Independent Multicast (PIM) protocols, instead establishing private links with guaranteed service levels to operate as an overlay network and configure point-to-point or point-to-multipoint links between nodes without respect to the underlying physical and data link topologies (in other words, tunneling through the network layer). The SDN must also feature multipath redundancy to allow for load balancing and failover. Choose a multipath routing protocol that will best fulfill these requirements.

Multiprotocol Label Switching (MPLS) with Shortest Path Bridging (SPB)

A virtualization specialist is configuring a host-based hypervisor so that software engineers can test their code in a variety of OS and hardware environments from right on their Mac Pro workstations, using a combination of virtualization and emulation techniques. Select a Type II hypervisor that will fulfill the specialists requirements.

Oracle® Virtual Box

A network security specialist is using Mitre's Common Vulnerabilities and Exposures (CVE) list to identify techniques the specialist can then use to actively demonstrate ways vulnerabilities in the network can be exploited by potential adversaries. Discern the security technique the specialist is demonstrating.

Penetration testing

Which Open Systems Interconnection (OSI) model layer is responsible for the transmission of bits of data?

Physical

A systems administrator is setting up conferencing servers that they want to be publicly available. What should the system administrator set up for protocol-specific inbound traffic?

Reverse Proxy A reverse proxy server provides for protocol-specific inbound traffic. Reverse proxies can publish applications from the corporate network to the Internet in this way.

A Windows server manager is trying to calculate the amount of data loss that a system can sustain, measured in time units. What is this referred to as?

Recovery Point Objective (RPO) is the amount of data loss that a system can sustain, measured in time units.

While performing a resiliency test for availability, a technician is trying to calculate the amount of data loss that a system can sustain, and further calculate the time it would take for a database to be recovered if it was targeted by a virus. What is the technician testing for?

Recovery Point Objective is the amount of data loss that a system can sustain, measured in time units. That is, if a database is destroyed by a virus, an RPO of 24 hours means that the data can be recovered from a backup copy to a point not more than 24 hours before the database was infected.

Conference servers that they want publicly available, protocol specific inbound traffic

Reverse proxy

A systems administrator is configuring a server for email services. Which protocol or protocol command is also referred to as implicit TLS?

SMTPS

A technician is installing a new file server and several printers on a small Windows office network that also contains several legacy Windows XP desktops and legacy printers that the office managers have insisted must remain. Evaluate the protocol and port required for the file share server to be available to all devices on the network, including legacy devices.

Server Message Block (SMB), TCP port 139

A network engineer has configured a network with a tiered mesh topology with multiple redundant links, causing an entire switch segment to become unusable until being reset. What layer 2 protocol packages data into bridge protocol data unit (BPDU) multicast frames and routes based on a ranked hierarchy of switches in order to prevent loops?

Spanning Tree Protocol (STP) The spanning tree protocol (STP) allows bridges or switches to organize themselves into a hierarchy.

best connection option to not overflow internal network with all traffic from remote users

Split tunnel VPN Client accesses internet using its "native" IP configuration and DNS serves

Which fiber optic connector was a quick use bayonet but no longer considered standard when retrofitting?

Straight Tip (ST) Early bayonet-style connector

An internet user types a fully qualified domain name (FQDN) into the URL bar of the Google Chrome web browser. Chrome then checks its local cache for the correct mapping before querying the local name server. Evaluate the role of the Chrome web browser in this scenario.

Stub resolver Stub resolver is the client system, where chrome exists.

A network engineer is configuring a local intranet for a large manufacturing company that uses a DNS server on its network to resolve internal and external queries while keeping internal IP addresses private. The engineer sets both UDP port 53 and TCP port 53 on the primary name resolution server to allow larger DNS record transfers. Select the situations that would require larger DNS record transfers over TCP. (Select all that apply.)

The DNS server is utilizing a security protocol such as DNSSEC. The network deploys IPv6 addressing.

A manufacturing plant, that is closed on weekends, employs a full-time network administrator to oversee the network at the plant. The network administrator is testing and recording network performance baselines and notices a throughput bottleneck is occurring on the same network when a team is using analytical software to retrieve volumes of data for testing. Provide the best guess for diagnosing the bottleneck?

The bottleneck is being caused by usage patterns of an entire group of users

Which section of how many bits of a IPv6 address can the Interface ID be found?

The last 64 bits

A network engineer is troubleshooting a packet loss issue on a small corporate Internet of Things (IoT) network. The issue began occurring after a legacy device was added to the network, and the engineer has noted that the MTU size on the router is less than the default 1500, at 750 MTU. Propose a likely cause of the packet loss by the legacy device.

The legacy device does not support fragmentation

A public school is installing a new two-way intercom system using raspberry-pi based devices as endpoints. Because of the real-time nature of the transmitted data, some packet loss is acceptable, while latency is not. Recommend a layer 4 transport protocol that will be best suited for no-acknowledgment, low-latency broadcast, or multicast traffic that will ignore lost packets.

UDP

Which wireless authentication mechanism uses SAE

WPA3 SAE replaces 4-way handshake

A systems administrator is trying to distribute client requests across server nodes in a farm or pool based on application-level data, such as a request for a particular URL. Which of the following should they set up?

With a Layer 7 or content switch, as web applications have become more complex, modern load balancers need to be able to make forwarding decisions based on application-level data, such as a request for a particular URL or data types like video or audio streaming.

Lowest ethernet cabling category that is recommended for healthcare settings

cat 6a

Minimum acceptable class for cable for convering the distance at 10GBASE-T without repeaters

cat 6a

A manufacturing company utilizes multiple access points (APs) spread across its factory. The APs all share an SSID to allow client roaming. Since there are areas where it is difficult to run cabling, a wireless distribution system is used, where the main router is connected to the Internet and the rest are set in repeater mode. What is true about the channels used by the APs?

APs should avoid using channels that overlap

A network cabling installer is installing cable in a senior care center. A distance of about 80 meters (262 feet) must be connected with a single copper twisted-pair Ethernet cable. What is the minimum acceptable class of cable for covering the distance at 10GBASE-T without repeaters?

Cat 6a


Related study sets

Introduction to Archaeology Midterm Study Guide Instructor Jane A. Hill

View Set

World History - The Medieval World - Q2

View Set

CPCU 520- Meeting Challenges Across Insurance Operations

View Set

Legal Environment of Business - Ch 8 Intellectual Property Rights

View Set

English 4 Unit 4 4-5 Structural Grammar

View Set

ATI Maternal Newborn Practice 2016B

View Set

MKT Promotional Strategy Exam 3 Prep

View Set