Networks Final

Ace your homework & exams now with Quizwiz!

Which of the following manages the dynamic distribution of IP addresses to devices on a network?

A DHCP

What is the secure port for HTTPS?

443

How many bits are used in a network with a subnet of 255.0.0.0?

8

Which of the following prefixes would you allot for a quantity of 1,000,000,000 bits per second?

Giga

You, as a network administrator, have been contracted to set up a WLAN network so that you can transmit data directly to the other nodes without any intervening connectivity device. Which of the following will you use for this purpose?

IBSS

As a network engineer, you have been sent to install a data outlet at BMC Corporation Ltd. Which of the following cable installation tips should you follow to prevent physical layer failures and to reduce the risk of damage from pests and water?

Install cable through conduits.

When a router connects to a switch that supports multiple VLANs, it is sometimes called _____.

a router-on-a-stick

Which of the following commands lists a router's routing table information?

show ip route

Mr. X wants to use cellular technology that offers at least 5 Mbps of download speed. He consults you about this. Which of the following cellular technologies will you suggest?

**5G**(could be wrong)

Which of the following is not a social engineering strategy?

DoS

Identify which router connects an autonomous system with an outside network, also called an untrusted network.

Edge router

What is the purpose of the TXT (text) DNS resource record?

Holds any type of free-form text

Which of the following is not a characteristic of fiber cable?

Low cost

Which of the following can be used to provide administrative access to a switch

Management VLAN

What is the term used to identify the first four blocks that normally help to identify a network?

Site prefix

Which of the following transceivers supports up to 10 Gbps?

XFP

Which form of communication is well suited to users who receive more information from the network than they send to it?

ADSL

In the formula 2n = Y, what does n represent?

It is the number of bits that must be switched from the host address to the network ID

Which of the following client-server applications use Apache and Nginx?

Web service

Which of the following commands can be used to change a device's name?

hostname

What is a small file containing verified users' identification information and public key known as?

Digital certificate

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administrator to determine the best solution to this problem. Which type of routing path will you use to solve this problem?

Dynamic route

As a network administrator, you have to deal with a situation where an Ethernet segment leading from your company's data center uses fiber-optic cable to connect to a workgroup switch that only accepts twisted-pair (copper) cable. In this case, which of the following would you use to interconnect the switch with the fiber-optic cable?

Media converter

You, as a network engineer, want to have an insight into your network's weaknesses that need attention. You want to search for devices with open ports indicating which insecure service might be used to craft an attack and identify unencrypted sensitive data. Which of the following scanning tools will you use in this scenario?

Nessus

Which of the following tools measures the amount of light power transmitted on a fiber-optic line?

OPM

Which of the following cables comes coated with a flame-resistant jacket?

Plenum cable

What is the service that offers a central authentication point for wireless, mobile, and remote users called?

RADIUS

Which of the following is used to issue tickets to an authenticated client for access to services on the network?

TGS

Which of the following utilities is also known as a packet sniffer?

Tcpdump

You have just managed to send a fragmented IP packet across a network as the IP packets are larger than what the network allows. Which of the following bits in the flags section of an IPV4 field will you apply so that you can send a clear message across to the receiving host that there are more fragments on the way?

The third bit

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

VLSM

You have been sent to the University of Yale to enable voice calls using a broadband connection instead of a regular analog phone line. Which of the following protocols would you apply in such a scenario?

VoIP

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Which of the following traverses a significant distance and usually supports very high data throughput?

WAN

Which of the following security threats involves an interception of the network keys communicated between clients and access points?

WPA attack

Which of the following ports are used by applications such as Telnet, FTP, and HTTP?

Well-known ports

You have been recently appointed by Jaylabs Internet Solutions to verify the TCP/IP protocols that have been set up at Heroku Industries for interorganizational purposes. On examining the TCP header segment, you want to get a sense of the limit of the maximum bytes of data that a computer can receive before returning an acknowledgment. Which of the following fields in a TCP segment should you check in such a situation?

Window size

Which command displays the full list of available objects and commands?

ip help

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

255.0.0.0

Which one of the following DNS record types holds the name-to-address mapping for IPv6 addresses?

AAAA records

You, as a network engineer, have been sent to insert twisted pairs into an RJ-45 T568B for a newly set up network at Delta Innovations. Which of the following cables will you use in this scenario to connect the workstation to a switch?

Straight-through cable

Which of the following statements stands true?

An email can be downloaded to the client computer using POP3.

Ground Movers Ltd., a courier service provider, has recently encountered certain breaches that have led to packages being stolen and damaged. The company has contracted you, a network analyst, to fix this issue. You plan on installing a device that will be able to provide constant or periodic collection of information. This information can then be used by the management control software for monitoring and reporting. Which of the following devices will you install for Ground Movers Ltd.?

Asset tags

The part which identifies the network in an IPv4 address is known as _____.

the network ID

Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele's password to a sensitive database in the law firm. What kind of password attack did she use?

A brute-force attack

Which of the following server racks would you use for a bolt-free mounting?

Square-hole racks

Name the phenomenon where a wireless signal is split into secondary waves, when it encounters an obstruction?

Diffraction

Royal Global University has just set up a new department for biotechnology and has hired you to extend the network connection to this department. Which of the following equipment do you think is necessary while extending the connection?

IDF

Katy, a senior technician, wants to document all the devices that are connected to the network of Ford Industries, which has a large complex network. She wants to ensure that all information in the network, including the hostnames, manufacturer names, operating systems, and IP addresses, are well-documented. Which of the following tools should she opt for to carry this out?

IP scanner

Hilary has been working on a pilot project for a start-up on which she has been testing the maximum bytes for the length of an IP packet. As her intended IP packets are larger than what the network allows, she has to break them up into smaller packets for transmission. Analyze and suggest which of the following fields Hilary should use in an IPv4 packet so that the receiving host is able to identify and reassemble the fragmented messages.

Identification

Mr. Furland was hired as a network engineer at Secret Eye Corporations that is running a security camera outlet. While setting up a camera at one of the sites, he notices that the security camera has been mounted really high as a result of which there are no power receptacles to power up the device. So, Mr. Furland plans on powering these devices using an Ethernet cable. Which category of cable should he choose to power up the device?

Cat 7

The University of Philadelphia wants you to format an IPv4 address through which the dean of the university wants to go on a videoconference with the teaching staff about certain educational norms which they plan on implementing. Which of the following classes of classful addressing will you apply to deliver the requirement?

Class D

Which of the following is a type of DoS (denial-of-service) attack that is bounced off uninfected computers before being directed at the target?

DRDoS attack

Which of the following is an enclosed space that holds network equipment?

Data room

Which of the following utilities would you use to display TCP/IP components and connections on a host?

Netstat

A special kind of DoS (denial of service) attack has attacked an AAA server with authentication requests that must all be processed and responded to. The network administrator has analyzed the situation and requested you, a network engineer, to use a command by which you can reclaim compromised resources in case of a similar attack in the future. Which of the following commands will you use in this scenario?

Floodguard

BitBakers is a small start-up selling local bakery items in Kansas. It has its organizational back end running from a small LAN setup. Recently, it received funding for its products to be sold on a larger scale. As a result of this funding, the firm has contracted Kevin to boost up its network strength so that it can traverse to more than one LAN segment. Analyze which of the following protocols he should apply in this scenario.

IP

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as?

Knowledge base

JW Communications has hired you to install a Wi-Fi network on its floor. To provide a seamless network connection, you have decided to install a centralized wireless controller to manage AP redundancy by directing wireless traffic to alternate APs when an AP fails. Which of the following protocols will you apply in order to direct all the wireless frames to the controller?

LWAPP

Bradley has been running a business in his garage for over a period of 10 years. He plans on expanding the business by opening up three new offices in three different cities. Since he has accumulated sufficient profits to move to a larger office space, he plans to upgrade his network connection to one with a dedicated and symmetrical bandwidth. Bradley approaches Mantle Solutions, an ISP. Which of the following options should be offered by the ISP in this scenario?

Leased lines

Crom Breweries is an old client of HW Internet Solutions. Crom's IT department calls HW Solutions to inform that the interface is down. HW Solutions sends a network analyst to check the situation. The network analyst assumes that an employee must have shut down the interface. He applies the show interface command to get an overview of all the devices interfaces. Analyze which of the following will help the network analyst to know whether the interface was shut down.

Link state

Warner is employed as a network engineer and part of his job requires him to measure the RSSI (received signal strength indicator) on the receiver's end. Warner is required to measure the RSSI and fill out a form indicating whether the signal is acceptable or not. During one such visit, the client's device's RSSI level reads -80 dBM. Analyze what Warner should report in such a scenario.

Mark the rating as not good

As a network administrator, you are already aware of the possible option of using a default trust relationship between a network device and another by a hacker to access an entire network. Which of the following security measures will you use to prevent a possible DoS attack that can be induced by sending high volumes of router advertisement messages?

RA guard

You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand?

RAID

Which authorization method allows a network administrator to receive from a user's supervisor a detailed description of the roles or jobs the user performs for the organization?

RBAC

In which of the following phases of the social engineering attack cycle will an attacker require the most time investment?

Research

Which of the following elements in a Domain Name System is a DNS client that requests information from DNS name servers?

Resolvers

You are currently working as a network engineer at GHP Ltd. The network administrator tells you to change a default route and apply the best route available so that the path to the destination can be shortened. Which of the following will help you in doing so?

Routing cost

You as a network administrator plan on using an NIDS (network-based intrusion detection system) to protect your network. You plan on doing this by monitoring the traffic that will be carried by a switch. Which of the following will you use in such a scenario?

SPAN

Which of the following is a collection of protocols that performs both authentication and encryption?

SSH

You, as a network engineer, are working on setting up a data delivery service. While creating the TCP segment for this purpose, you wish to set up a command requesting a synchronization of the sequence numbers between two nodes. Which of the following flags will you apply with a 1-bit field so that you can set this up?

SYN

Identify the current name of a DMZ (demilitarized zone).

Screened subnet

As a network administrator, you want to validate that a data packet is being fragmented and subdivided into smaller parts to ensure reliable delivery. Which of the following fields in the 802.11 data frame will you check for this information?

Sequence Control

Hill Corporation Ltd., an Internet service provider, has been providing networking solutions to Riverdale High School for over a year. However, recently the administration at Riverdale high School has been complaining of an unstable connection. You are employed by Hill Corporation for the purpose of inspecting the issue at hand. What would be your first check point to ensure that there are no network issues from the service provider's end?

The entrance facility

Which of the following layer's header identifies the IP address of the destination host?

The network Layer

Glenn Infosys has successfully managed to set up VPN tunnels between branch locations for Syndicate Bank across India, ensuring that it protects the company's data, network, and liability. However, the top management wants Rahul, a network engineer for Glenn Infosys, to examine the network connection so that there are no bugs within the system. On inspection, he found that even though there are multiple points for connecting branch offices to the main office, certain branches have been left out. Analyze which of the following VPN protocols Rahul should use in such a situation

mGRE

Your client has hired you to extract details about the port on which the TCP/IP connections are running. You, as a network engineer, have decided to use the netstat utility for this purpose. Which of the following commands will you apply to list all current TCP connections and an all listening TCP and UDP ports?

netstat -a

Your client has contacted you to examine a workstation that has been showing network fluctuations time and again. The client tells you that one of his employees might have spilled some hot water over the Ethernet ports. Which of the following addresses will you choose to check the functionality of the Ethernet card without worrying about corrupted hardware and to ensure that the workstation's TCP/IP services are running?

ping 127.0.0.1

Bruno is a network engineer who is tasked with adding a separate layer of protection to the control plane of a router. He wants messages with a bps (bits per second) rate below the threshold 7000 to be transmitted and the messages with a threshold above 7000 to be dropped. Analyze which of the following commands Bruno should use in pmap configuration mode in this scenario

police 8000 conform-action transmit exceed-action drop

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model?

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?

Trailer

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario?

Transmission Control Protocol

Wildfilms Ltd., who is your client, has raised a ticket complaining of loss in signal strength since the new upgrade. Earlier, the connection was established using wired transmission, which has now been upgraded to a wireless connection. Which of the following will you use to amplify the power of the transmission in this scenario so that the issue can be resolved?

Wireless range extender

Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wi-Fi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.

Wrong SSID

Monica, a network engineer at J&K Infotech Solutions, has been contracted by a small firm to set up a network connection. The requirement of the network backbone for the connection is of a couple of switches needing fiber-optic connections that might be upgraded later. Which of the following transceivers should Monica use when the maximum transmission speed is of 8 Gbps?

XFP

Which of the following hostname commands resolves a device's hostname with its IP address on the network?

hostname -I

Subnetting, which alters the rules of classful IPv4 addressing, is known as _____.

classless addressing

If a twisted-pair cable has a diameter of 0.8 cm, which of the following options would you apply as the bend radius of the cable so that data transmission is not impaired?

3.2 cm

The Mosiac Music School has hired Kirk to set up a SIP protocol for a collaborative multimedia conference session that will be limited to the selected students opting for music theory. Which of the following ports should he use in such a situation so that the required encryption can be provided?

5061

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?

62

Identify which of the following statements is Correct.

A 32-bit IPv4 address is organized into four groups of 8 bits each.

What is the maximum allowable distance for horizontal cabling?

100 m

Which of the following will help you to determine an AP arrangement that will ensure reliable wireless connectivity?

Site survey

Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain so that she can start an online delivery system through his web portal as well. He wants Angela to put a unique domain name so that his website appears a little different from the other competitors. Analyze which of the following top level domain names Angela should opt for under such requirements.

.biz

Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario?

A star topology

A client who has a small office setup has complained about a faulty wired connection in their LAN as a result of which they are unable to use the broadband service to access the Internet. You, as a network technician, have to solve the matter. Which of the following will you need to access the situation?

A wiring diagram

Which of the following is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements?

An MSA

Which of the following terms is also referred to as a "network of networks"?

Backbone

The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution?

CAN

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered?

CAN

Which of the following cabling methods connects workstations to the closest data rooms?

Horizontal cabling

Which of the following protocols is used by the echo request and echo reply of ping to carry error messages and information about a network?

ICMP

Which of the following institutions assigns a manufacturer's OUI?

IEEE

What other technical name or PDU can be used to represent the session presentation and application layer?

L7PDU

Matt, a senior technician, has installed a switch for the purpose of identifying devices on the LAN. Analyze which of the following addressing methods Matt should follow so that the switch can quickly and efficiently direct the network traffic to its destination.

MAC address

Which of the following DBMS applications would you use if you were to organize data into tables and records?

Microsoft SQL Server

Larry is a senior technician who has to document the recent troubleshoot he carried out at Kroger Industries related to the baseline configuration of network devices. Larry is still unsure as to what category type he should document the troubleshoot so that it falls under standard operating procedures. Analyze which of the following category types Larry should opt for in such a scenario.

Network configuration

As a senior network engineer, which of the following would you use when you are setting up a network connection at a university and you have to connect and organize lines running from walls to racks to network devices?

Patch panels

What is the data passed between utility programs or applications and the operating system known as?

Payload

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply?

Presentation layer

You are an employee for Asianet Solutions, which is an ISP. Rickwell Infrastructures has hired Asianet Solutions to establish a network connection in its organization. You have been sent to its office to stack up the routers, servers, and switches. Which of the following options would you use in such a scenario?

Rack

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade.

Roll out changes in stages.

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO?

Router

Which of the following consists of high capacity data storage devices in a distinctly defined network segment?

SAN

You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books?

The total number of computers functioning in the organization

Which of the following consists of one or more insulated twisted-pair wires encased in a plastic sheath?

UTP

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario?

Use a top-to-bottom OSI layers approach

What should be the ideal procedure after implementing the solution to a network troubleshooting problem?

Verify functionality and implement preventive measures.

Which of the following is a component of backbone cabling that runs between building floors?

Vertical cross connect

Which of the following sockets will you apply to a standard Telnet port TCP23 where the host has an IP address of 10.43.3.87?

10.43.3.87:23

As a network engineer, you have been tasked to form a Gigabit Ethernet for connecting a data center with a data closet in an office building. Identify which of the following fiber Ethernet standards would you apply in this situation.

1000BASE-FX

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

14

Which of the following addresses can be identified as an APIPA address?

169.254.0.1

Betty has recently bought a house in Manhattan, and she wants the living room to be wirelessly connected through Bluetooth. She intends on buying a central Bluetooth device that will be the center for all the other Bluetooth devices. This has been presented to you, a network analyst. Which of the following frequencies in the wireless spectrum will you use to successfully enable this connection?

2.4 GHz-2.4835 GHz

What is the frequency range for Bluetooth communication?

2.4 GHz-2.4835 GHz

Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario

A host-based firewall

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you?

A network operating system is much more expensive than a desktop operating system.

The administrator at JK Cements wants you to assign a port number other than the standard port 80 to a web server on the Internet so that several people within the organization can test the site before the web server is made available to the public. To reach the web server, which type of port number must a tester enter in the browser address box along with the web server's IP address?

A private port number

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.

A star topology

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers?

Active Directory

The HR manager of Veep Communications notices a lot of employees waste valuable time surfing social media websites. The HR manager requests you (a network administrator) to prevent the employees' access to these websites. Which of the following firewalls will you use in this scenario?

Application layer firewall

Hilary is an employee of Munich Securities. The HR manager has received a complaint from one of her fellow employees about her misusing her account. You as a network administrator want to conduct a user configuration check to ensure that there are no vulnerabilities to the network configuration. Which of the elements of the AAAA acronym will you use to apply this security measure?

Auditing

Barney is the owner of Venture Capitals Internet Solutions. Venture's client Riverdale Union High has many remote users, who are school students, and they regularly need access to desktops. The school wants to offer a consistent desktop experience with installed applications that the students commonly need. However, they don't want to purchase dozens of physical computers for these students to connect to. What should Barney do in such a scenario?

Barney should use VDI (Virtual Desktop Infrastructure).

Which of the following devices scans an individual's unique physical characters such as iris color patterns to verify the person's identity?

Biometrics

The University of Claudine plans on opening a new IT division for underprivileged students so that it can offer education free of cost to them. However, the university wants to ensure that there are no data breaches, so it has requested the network administrator to handle the configurations of the computers in order to comply with the organizational policies. Analyze which of the following practices the university should adopt in this scenario so that the network securities are not compromised.

CYOD

Which of the following methods requires the entry of a code to open a door?

Cipher lock

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers?

CuteFTP

You are a network engineer who is keen to develop a secure TCP/IP transmission so that you can not only add security information to the headers of the IP packets but also encrypt the entire IP package for added security. Which of the following IPsec encryptions will you apply to your program in such a scenario?

ESP

Mr. Walker plans on manufacturing a new line of twisted-pair cables for Ethernet Networks. To do so and to compete with the other brands circulating in the market, he has to get his cable qualified as per certain standards. Which of the following points should he emphasize to get his cable TIA/EIA certified?

Effective throughput

The University of Mordor houses almost 1000 students in its campus. It has multiple buildings in the campus where free food and Internet services are provided for the students. The University boasts of providing one of the fastest Internet experiences in the country and there have never been any reports of the service going down. To ensure such efficient connectivity, the University adheres to the ANSI/TIA standards to better manage the data feed from the main data facilities. Which of the following can be reasonably inferred from the above scenario?

Every floor in the building has an individual IDF.

Which of the following is an optional server that receives queries from local clients but doesn't work to resolve the queries?

Forwarding DNS server

You have been appointed to design a subnet mask for a network. The current IP address of the network is 192.168.89.0. You have been requested by the network administrator to divide this local network into nine subnets to correspond to the organization's nine different floors. How many bits will you borrow from the host portion of the ID address in this scenario?

Four bits

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?

Incorrect port mode

Your network administrator has asked you to change the subnet mask of the Cisco router used in the organization. Which of the following Cisco CLI modes would you apply in this scenario?

Interface configuration

You are working as a network engineer for an ISP. You have successfully set up a home Internet connection for a client. The ISP requires the network engineers to provide a document with specifications and tests that the customer can run on their own to check various aspects of their connectivity. However, in the document that you provided you forgot to mention the functionality of speedtest.net in the document. So, the client calls you with a query about the use of speedtest.net. Which of the following will be your reply to the client in this scenario?

It is used for bandwidth speed tests.

As a network administrator, you have asked one of the contracted vendors of the company to ship a consignment of spare parts and components of all the network devices. You have decided to place this order to store the devices for a rainy day. Now, as the consignment has been received by your organization, you want to store these devices in a secure location. Which of the following will you use in this scenario?

Locking cabinets

Which of the following statements about MPLS (multiprotocol label switching) is not true?

MPLS does not offer any decreased latency.

You, as a network administrator, want to set up a file transfer version of SSH so that you can use a single channel to control both inbound and outbound communications. Which of the following ports will you use to carry out this operation?

Port 22

HCL Industries are keen on allowing its employees with a work-from-home option for its respective jobs. You have been hired to establish a secure and encrypted control for remote Windows computers. Which of the following ports will you use to establish this connection?

Port 3389

At a security training exercise, you had to devise a strategy to penetrate into an organization's data room by accessing one of their employee's ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?

Quid pro quo

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?

RDP

As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context.

Set a limit on consecutive login attempts

An IDS (intrusion detection system) has been installed in your organization as a stand-alone device to monitor network traffic and to generate alerts about suspicious activities. You as a network analyst have been assigned to check the effectiveness of the device. You notice that the effectiveness of the IDS has significantly come down since its installation because it has not been updated. Which of the following processes will you use in updating the IDS?

Signature management

You have been hired by Radio 995.5 to establish a fast and effective network connection so that the signals are least affected by latency, noise, and attenuation. Which of the following would you choose in this scenario so that there is no failed or slow transmission for the radio network?

Simplex

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

Stack master

Which of the following can capture all traffic traversing a network connection?

TAP

The IT department at Zatar Airways has complained of a faulty fiber-optic cable as a result of which there are connectivity issues in the organization. You, as a senior technician, are planning on an on-site visit to examine the defects of the cable. Which of the following tools must you carry along so that the defects are detected?

TDR

Which of the following protocols transfers files without any authentication or security?

TFTP

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router?

The network layer

The State of Nevada has organized a gaming championship for which you have been contracted to set up the network connection. The championship is a seven-day long affair with a heavy influx of participants. Which of the following protocols would you choose in setting up such a network?

UDP

Robert has been working as a network security expert for Indus Grow Wealth Management, which allows its clients to view their current loan status online. With the recent cases of attempted hacks in banking systems, Robert has decided to test the security systems by hiring hackers to try and analyze the security risks at Grow Wealth Management. Analyze who among the following would best suit Robert's requirement in this scenario.

White hat hackers

The Embassy of New Zealand has hired you to set up some patch cables that are to be used at its immigration office. What color wire will you insert into the third pin of an RJ-45 plug in such an establishment?

White/orange

In which of the following do the bits work opposite of how bits in a subnet work?

Wildcard mask

Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?

Zero-day exploit

The process of designing, implementing, and maintaining an entire network is called _____.

a system life cycle

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

switchport trunk native vlan

What is the maximum supported bandwidth for a Category 5 twisted-pair cable specified under TIA/EIA-568 standards?

100 Mbps (Fast Ethernet)

Pocso Group of Institutions has hired you to set up a LAN connection so that the students in the hostel can easily avail the prerecorded classes. These classes are provided through video lectures on the desktops situated at the common rooms for each hostel within the campus. Which of the following standards will you apply to provide the fastest transmission for their requirement?

100GBASE-T

You are working as a network engineer for ABC Ltd. You have been instructed to translate the slash notation /20 into a subnet mask. Which of the following will you select?

255.255.240.0

Identify the core of an RG-6 coaxial cable.

18 AWG

Which of the following is a valid IP address for a network ID of 191.254.0.0 using 11 bits for subnetting?

191.254.1.29

You are a network engineer who is working on a very busy network and is concerned why the actual throughput is less than the potential bandwidth. The total signal strength has been estimated to be 1000 watts, and the estimated loss of signal due to noise has been calculated to be 6 dB. What is the throughput that is being received at the moment as per your calculations, keeping the 3-dB rule in mind?

250 watts

The organization where you are currently working as a network administrator has a class A network address 10.0.0.0 with 40 subnets. You want to add another 60 new subnets to the network. You would like to still allow for the largest possible number of host IDs per subnet. Which of the following subnet masks will you choose in this scenario?

255.254.0.0

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.224

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use?

255.255.255.240

With which of the following pin numbers would you associate a white/orange T568A color Fast Ethernet function

3

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

30

Which of the following 802.11 wireless standards has a theoretical throughput of 11 Mbps?

802.11b

The Habitat Centre is one of the most well-known places for holding conferences. It has contracted you to fix its network issue-connections to various Wi-Fi clients are dropping during meetings. After inspecting, you realize that the wireless standard needs to be upgraded to a faster standard using the BSS (basic service set) coloring technique in order to provide more network clients with higher speeds at the same time. Which of the following standards will you use in this situation?

802.11ax

Which of the following 802.11 wireless standards operates in the 6-GHz frequency band?

802.11ax

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address?

AA

You are a network engineer at BHMS Ltd. The network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. Which of the following will you use in such a scenario?

ACL

Beevan works as a network analyzer for an ISP. The network manager has asked him to use a protocol for the routers that can scan beyond the home territory and can instruct a group of routers to prefer one route over other available routes. Analyze which of the following should be used in this scenario.

BGP

Which of the following terms refers to the amount of data you can theoretically transmit during a given period of time?

Bandwidth

SMCS School has hired you to set up an Internet connection within the school premises. The Internet connection will be utilized by both the junior and senior sections of the school situated in two different buildings on the same campus. Which of the following types of network will you install in this scenario?

CAN

Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer?

CSU/DSU

Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?

CVE

You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario?

DAI

Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?

Honeypot

A client contacted you to avail your services of cable installation. The requirement is to set up a connection which connects workstations to the data room, and the distance between them spans 87 meters. Which of the following cabling methods would be an ideal option for this assignment?

Horizontal cabling

Which of the following statements is true?

In a peer-to-peer network model, each computer controls its own administration, resources, and security.

Which of the following VLANs receives all untagged frames from untagged ports?

Native VLAN

As a network administrator in Wright Elementary School, it is your job to monitor all the devices used by the staff and students. Which of the following commands would you employ to be able to detect, identify, and monitor devices on a network?

Nmap

Wheys Solutions has contracted you to subdivide an 802.11ax 20-MHz channel into smaller frequency allocations so that the access points can transfer multiple small frames to multiple clients at one time using parts of the channel. According to you, which of the following innovations of the 802.11 standard is ideal for this scenario?

OFDMA

In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?

On-path attack

Heroku Industries has a SQL Server database that provides data to clients throughout its network. It has now asked George, a network engineer, to sort an issue within the administration branch where the Windows firewall does not allow access to the users to such databases. Analyze what port should George open up in the firewall so that the issue is resolved.

Open up port 1433

Yours Eventfully is a talent acquisition firm that wants to install biometric methods such as hand scanning at its office for which you have been contracted. Your job as a network engineer is to create an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. Which of the following versions of EAP will you use in this scenario?

PEAP

As a network engineer for Orior Telecommunications, you are programming an IPv4 header. You decide to put additional routing and timing information to the header as a result of which the header is no longer a multiple of 32 bits. Which of the following IPv4 fields will you use in such a situation?

Padding

Bryden is a network analyst who has been recruited into Big Bay Burger's security management. Which of the following terminologies must he use to explain to the company's employees about the possibility of someone using a deception in following them into a restricted area?

Piggybacking

You are working as a technical specialist for an ISP. The network administrator has asked you to set up a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use?

RIPv2

Which of the following versions is the most recent iteration of SHA (Secure Hash Algorithm), which was developed by private designers for a public competition in 2012?

SHA-3

RT&T is a world-renowned ISP that has hired you as a contractor for a cross-country network cabling project for its upcoming new FiberNet package. Through this package, it plans on providing high-speed Internet to consumers. Which of the following cables will you choose to carry out this large-scale project?

SMF

Which of the following anti-malware software will slow down your network performance considerably?

Server-based

Which of the following is a more intelligent version of an NIU (network interface unit)?

Smartjack

Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources?

SoD

Sphinx Infra Ltd. has doubts on how to meet the various privacy, security, and safety precautions installed for their network. You have been hired to analyze the existing modules for which you will need to go through the network documentation before suggesting any change. Which segment in the network document will contain the necessary information you require?

Special instructions

Identify and analyze whether the implicit deny rule be applied to the following statements or not.

When the incoming packet is denied in the third test by the ACL

Wilson Breweries has called you to its office space to troubleshoot an error wherein there is an issue with outgoing email messages as a result of which the logistics are getting delayed. Which of the following ports would you troubleshoot to sort out this issue?

25

Yang, a network engineer, has been tasked with establishing a new long-distance connection for the branch offices between Manhattan and Texas by an ISP. In doing so, analyze which of the following cables he should opt for in order to obtain maximum speed and bandwidth.

Fiber optic cable

Which of the following is an example of an industrial controls system?

HVAC

Hari has been employed by Telnet Softtech Ltd. as a senior network engineer. Analyze which of the following statements he should keep in mind while visiting the data room of a multinational company for monitoring and security purposes.

He should have the HVAC sensors connected as network devices themselves.

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation?

He should use POP3 to deliver the message.

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Identify why the application is behaving in this manner and the symptoms behind such behavior.

What is the process of reverting to a previous version of the software after a failed upgrade attempt known as?

Rollback

As a network engineer, you have been sent to ZoomCar Enterprises to have a routine check on the network devices. In doing so, you suddenly notice that there are still some old-generation routers installed at certain points. You plan on replacing these old routers with the new upgraded ones. At what life cycle phase can you remove an old device from the network?

The implementation phase

What is help desk software used for?

To document problems and their resolutions

You as a network engineer have finished setting up local security policies for your Windows 10 operating system. Which of the following commands will you use to implement your changes in this scenario?

Gpudate

Which of the following remote access methods requires a virtual connection to remotely access resources between a client and a network?

VPN

A client has complained to you about connections being dropped on a regular basis in his office. To fix the issue, you plan on checking the RSSI (received signal strength indicator) level to ensure that the minimum signal strength for basic connectivity is maintained. Which RSSI level will you check to get an indication that the minimum signal strength for basic connectivity is maintained?

-80 dBm

Mr. Anderson had to set up an Ethernet network segment that can transmit data at a bandwidth of 1000 Mbps and cover a distance of 2000 m per segment. The available fiber-optic cable in the market was an SMF cable. Analyze and discuss which of the following fiber Ethernet standards he should follow under such circumstances

1000BASE-LX

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address?

192.168.50.118

Computer A started a communication sequence with Computer B that has a sequencing number of 300070. Computer B accepted the request and sent an acknowledgment number of 300071. Until this point, no payload has been exchanged. So far, the sequence numbers have increased by exactly 1 in each acknowledgment. Now, Computer A sends a payload data that is 800 bits long. According to you, what will be the acknowledgment number for the return message in this case?

300871

Gamezee is a YouTuber who streams games. He has recently hired Jasmine to help him manage the wireless video streaming services. Currently, Gamezee is facing a network fluctuation issue. As a result, there are lags in his live video stream. He wants Jasmine to install the latest available Wi-Fi so that the devices can tap and utilize the maximum bandwidth and increase the throughput. Analyze which frequency range will help Jasmine to fix this issue.

5.925 GHz-7.125 GHz

HealthCity Nursing Home is a newly opened hospital with many employees, doctors, nurses, and support staff. The upper management of the hospital wants to draft a security policy that outlines the guidelines, rules, restrictions, and consequences of violations, all of which help minimize the risk involved in allowing restricted access to some users. The doctors who have access to protected patient information must be informed what they can and can't do with that patient data and what special precautions they must take to protect patients' privacy. Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?

A PUA (privileged user agreement)

Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario?

A combo device

You are a junior technician at KVM Solutions. They have just received a query from a university who wants their network connection to be set up. You have been tasked with sketching a diagram for the various network devices that will be used to establish the connection. Which of the following options would you apply to identify the routers in that connection?

A hockey-puck shape with two arrows pointing inward and two arrows pointing outward

Moses has just been hired as a service manager for Dalton Associates. Which of the following statements misrepresents information that might be essential for Moses to be familiar with?

A more negative RSSI value indicates a higher quality of signal.

What is a graphical representation of network devices and connections known as?

A network diagram

Which of the following diagrams is needed while tracking and troubleshooting equipment installed in a rack?

A rack diagram

Must Eat is a company that allows online food delivery. Must Eat rolls out updates every month for better user interface. Recently, after one of its updates, the network team of the company detects certain unauthorized access to the main data frame of the company. On inspection, the team notices that there has been no breach of sensitive data. What kind of cybersecurity exploitation was attempted by the hackers in this scenario?

A zero-day attack might have been the cause.

Which of the following will act as a filter to instruct the router to permit or deny traffic from travelling through the network?

ACL

Which wireless technology is used to track fitness activity levels and geographic movement?

ANT+

An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?

AUP

You are employed as a network administrator of Vincent Motors. An unreleased blueprint of a new car model of Vincent Motors has been leaked on the Internet. You assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. Which of the following access control techniques will you use so that such an activity can be detected in the future?

Accounting

Which of the following fields in a TCP segment confirms receipt of data via return message to the sender?

Acknowledgment number

Andy Bryant is a network analyst at Freewoods Centre for Policy Research. There are approximately 35 employees currently working on various issues of policy making and research, and this requires access to the network's resources. He has been asked to set a list of dos and don'ts for all the employees to clarify what is acceptable use of company IT resources and what is not. He also needs to explain penalties for violations and describe how these measures protect the network's security. Analyze which of the following security policies Andy should implement in this scenario.

An AUP (acceptable use policy)

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

An RFP

Youhan has been placed as the security in charge of an organization. Which of the following should he use to monitor the movement and condition of equipment, inventory, and people?

Asset tags

Analyze which of the following can be used to establish a static VLAN assignment for a device.

Assigning a VLAN based on the switch port the device is connected to

Identify which of the following terms defines the process of verifying a user's credentials.

Authentication

You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization's resources. Which of the elements of the AAAA acronym will you use to apply this security measure?

Authentication

You are working as a network engineer with SkyNet Solutions. You have been sent to the Waylan Union High to establish a wireless link between the entrance facility and the main distribution frame. Which of the following cabling methods would you choose to complete the task at hand?

Backbone cabling

You are the DNS administrator and have been tasked to hold alternative names for a host that is a newly established start-up venturing into the business of ecommerce. The start-up wants its clients to be directed to the appropriate page whenever they request for alternative names. Which of the following resource records would you apply as a DNS administrator in such a case?

CNAME record

You have been getting complaints about slow speed from one of your clients. You decide to visit the site to have a look, and you notice that the RJ-45 connector has been tampered with as a result of which there are network fluctuations. These fluctuations are taking place as the pins in the connectors are bent. Which of the following tools will you use to push the pins inside the RJ-45 connector?

Cable crimper

While setting up a network segment, you want to check the functionality of a cable before putting connectors on them. You also want to measure the termination point or damage in the cable. Which of the following tools would you use to identify this?

Cable performance tester

You have been working as a network engineer for Flaming Systems and Solutions. An existing client of your organization has requested you to set up a network for a new joint wherein a user will have to agree to a certain set of terms and conditions before gaining access to the network. Which of the following options will you use in such a scenario?

Captive portal

You are setting up a network connection that can transmit up to 10 Gbps with a maximum frequency of 500 MHz. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Cat 6a

You have been tasked to set up a 10GBASE-T standard Fast Ethernet for JJ Mills Corporation. While doing so, you have managed to follow all the specified standards, and the only thing left to do is to purchase and plug the twisted-cable pairs. Which of the following pairs of twisted cables will you use in this scenario?

Cat 7

An Internet Service Provider has hired you to frame cables for a network connection using TIA/EIA standards so that it can transmit up to 10 Gbps or 40 Gbps at short distances. However, you do not want to disrupt the previous cabling equipment as it will increase the cost. Which of the TIA/EIA 568 standard twisted-pair cables will you use to carry out this operation without having to go through the equipment changes?

Cat 8

PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional.

Change management procedures should consist of preparing a backup plan as well.

While analyzing an intermittent error, James, an independent contractor for HKV Infrastructures, finds that the destination host is constantly asking the source to retransmit the data. He finds that the bug might be related to the transport layer of the OSI model. Since the TCP provides reliable delivery protocols, analyze which of the following characteristics of the TCP protocol James should check to fix this error.

Checksum

William has been working as a senior networking professional at Mediaworks Ltd. The company has a very strict policy regarding employees' access to certain key rooms in the organization. The company wants William to provide a specific access technology to only a few selected employees so that they can access those certain rooms. Which of the following options are best suited for William in this scenario?

Cipher Lock

Your network administrator wants you, a network analyst, to partition a VLAN broadcast domain. However, he has asked you to ensure that the host can connect with the Internet. Which of the following will you use in this scenario?

Community VLAN

Examine the following circumstances as a network analyst and analyze in which of the following conditions MANs (metropolitan area networks) cannot be useful.

Connecting a clothing manufacturer to sell its products to customers worldwide

What should you do once you have tested your theory to determine the cause of the problem at hand? Establish a plan for resolving the problem.b. Implement the solution or escalate the problem.c. Verify the functionality and implement preventive measures.d. Document findings, actions, and outcomes.

Correct. Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data.

You as a network administrator want a switch to determine if the message's source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. Which of the following switch security configurations will you use alongside DAI on a network switch in this scenario?

DHCP snooping

You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario?

DIA

Which of the following devices contains ports to connect both to an incoming telephone line and to a computer or network connectivity device?

DSL modem

Netcom Solutions is an Internet Service Provider that has purchased a fresh wholesale bandwidth from network service provider GT&P. Netcom Solutions has been using duplex technologies running through copper wires for its distribution. It now wants to upgrade to multiplexing technologies using fiber-optic cables so that it can allow multiple signals to travel simultaneously. Analyze which of the following types of multiplexing technologies Netcom should choose in this situation for its connection with GT&P so that it can operate with more channels.

DWDM

Which of the following carries user-generated traffic, such as email, web browsing, or database updates?

Data VLAN

Game Zone is a well-known games park located in Manhattan that allows gamers to engage in multiplayer competitions. The competitions function smoothly on the opening day, but on the following days, there are multiple instances of the computers getting disconnected temporarily from the wireless network. These connections however function normally when they are reconnected. Which type of attack is this most likely to be?

Deauth attack

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization?

Default VLAN

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

Departmental boundaries

Gary is a freelance network analyst. A client approaches him to provide a solution for his firm wherein employees have been found to carry sensitive information out of the office premises. This data breach has led to a lot of market speculations as a result of which there has been a significant drop in the share market prices of the company's stocks. Gary is contracted to find a solution to this issue. Analyze which of the following options should be carried out by Gary keeping in mind the sensitivity of the situation.

Deploy a DLP solution

What is the logical group of Windows Servers controlling the network access to a group of computers also known by?

Domain

Silicone Printers has raised a ticket claiming that it was unable to view websites from its workstations, because with every attempted access, the system displayed an error message that read "there is another device using the same IP address." What would you, as a network engineer, check for in such a scenario?

Duplicate IP addresses

Which of the following ports range from 49152 to 65535 and are open for use without restriction?

Dynamic and private ports

Which of the following versions of EAP (Extensible Authentication Protocol) uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server?

EAP-TLS

The Cambridge Law Department has complained of a loss of network signal from time to time. On inspection, it has been noticed that the loss of signal is due to noise interference at the physical layer. Analyze which of the following measures should be taken to sort out this issue.

Ensure that the cables are at least 3 feet away from fluorescent lights or other sources of EMI.

Which of the following protocols creates a frame around the payload by adding both a header and a trailer to the payload?

Ethernet

Which of the following refers to any router outside an organization's AS(autonomous system), such as a router on the Internet backbone?

Exterior router

You are a network administrator for an ISP that wants to increase the amount of data that can be transmitted within the given bandwidth. For this purpose, you decide to use multiplexing technologies so that you can modulate the signals into different frequencies that can travel simultaneously over a single channel only to be demultiplexed at the other end. Which of the following multiplexing types will you use in this case?

FDM

The IT department of Mascom Telecom has requested you to fix an error that seems to have been associated with a possible malware attack. This particular malware file seems to have attacked the operating system files on the computer. Which of the following should you use to avoid or alert such an attack in the future?

FIM

You, as a network administrator, want to set up an FTP for remote file access. You also want to add an added layer of protection so that you can encrypt both the data and control channels. Which of the following technologies will you apply in such a case?

FTPS

As a network engineer, Matthew has installed a wireless connection in a newly constructed office floor for Yuvi Mediaworks. The office of the managing director of Yuvi Mediaworks is located at the end of the hallway, and he has raised a complaint about slow data transmission and occasional dropped connections. According to Matthew, the issue should be related to obstacles blocking the signal's passage. Analyze which of the following phenomena must be used to ideally describe this scenario.

Fading

You are working as a network administrator for an ISP. You receive a complaint about fluctuations in the network speed despite using a fiber-optic cable. On checking the situation, you are of the opinion that you will need to cut a clean slice through the fiber strands. Which of the following kits should you carry for this purpose?

Fiber cleaver

Mr. Chadwick has recently set up a network connection for a client wherein he made a transition between an SMF and an MMF cable using a fusion splicer. Around a week later, the client calls him up and raises a concern about fluctuations in the network. Mr. Chadwick decides to conduct an on-site inspection, and he gets to know that the reason behind the fluctuation is that the transmission has not traversed successfully. Analyze which common fiber problem Mr. Chadwick is referring to in this case.

Fiber type mismatch

Which of the following technologies selectively filters or blocks traffic between networks?

Firewall

Jordan wants to install a Z-Wave network for his private sports complex that he has constructed in his backyard. He has contacted you, a network administrator, to carry out the network installation for his Z-Wave devices that will be used to control and transmit data and commands between devices. The total distance spans across 400 meters, so you have decided to use a Z-Wave mesh network to connect the devices. How many hops will you require for the Z-Wave transmission to reach the devices, which will also act as repeaters?

Four hops

LTE (Long-Term Evolution) and LTE-A (LTE advanced) are variations of which generation of cellular network?

Fourth generation

You are working as a network engineer for an ISP. A ticket has been raised that states that the SMF (single mode fiber) and the MMF (multimode fiber) cables have come apart at the FDP (fiber distribution panel). On checking the situation, you realize that you will need to melt the tips of the two fibers together so that light can pass cleanly through the joint. Which of the following kits will you require in this scenario?

Fusion splicer

Which of the following protocols are used to transmit IP and other kinds of messages through a tunnel?

GRE

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?

Geographic locations

You are working as an executive for a cable company. A client raises a request to set up a network that uses fiber-optic cabling to connect your company's distribution center to distribution hubs and then to optical nodes near its customers. From the following network options, which one would you recommend in the given scenario?

HFC

Local Brew is a small cafe operating in New York. It has set up a free wireless network in its cafe to provide customers with ease of Internet access. Recently, one of the customers lodged a complaint against Local Brew regarding data theft from his emails, which has been traced back to the cafe's public IP. Local Brew has informed Barton, who is the network provider for the cafe, to rectify the issue. Which of the following should Barton do to analyze and rectify the issue?

He should check whether captive portal user reminders have been set up.

Kristen has plans of starting an online food delivery company. She plans on making the company one of the most secured portals for online food delivery. She hires Brad, a network consultant, to guide her through the necessary security protocols. Brad conducts all the necessary security checks and involves a white hat hacker too to point out any vulnerability that might be overlooked. Analyze if Brad needs to conduct any other risk assessment procedures in this scenario.

He should conduct a vendor risk assessment.

Mr. Haywire has just bought a set of wireless security cameras for his backyard. Howard, a network professional, has been sent by the store to set up the security cameras. While configuring and setting up the cameras, Howard notices that he is unable to configure the in-house Wi-Fi network with the cameras because of some frequency issues. Analyze what Howard should do in this situation.

He should set up an AP that offers a Wi-Fi standard on that band.

Michelle has been inducted into an organization as a trainee. Which of the following firewall software should she use to protect only the computer on which it is installed?

Host-based firewall

Which of the following topologies uses a small number of nodes closely positioned together to transmit directly to each other without an intervening connectivity device?

IBSS

Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host?

IPS

Which of the following would you use to provide a set of rules for encryption, authentication, and key management for TCP/IP transmissions?

IPsec

Your client has hired you to troubleshoot a network error. On inspection, it can be seen that the client has a static IP address, subnet mask, and default gateway all configured correctly. You open a browser to check the connection, and you can't get to a web page. You open a PowerShell window, ping the gateway, and ping Google's public DNS server, and everything is working. But you still can't navigate to websites. What kind of problem are you most likely to be experiencing?

Incorrect DNS

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation

Incorrect VLAN assignment

Michael Slater is the new technician in the office. An issue has reduced the performance of the network, but he is unable to diagnose the reason behind the issue. On checking the recommended geographic range for the AP, he realizes that the clients are not within the recommended distance. This has caused multiple data errors and a deterioration in communication. Which of the following issues has caused the issue here?

Insufficient wireless coverage

Black Lion Cements has set up its new branch office adjacent to its manufacturing unit. Even though there are a lot of heavy pieces of machinery operating adjacent to the office, the management at Black Lion Cements believes that this will enhance the employees' performance. It has hired JW Communications to manage and assess its network requirements. After setting up the network, the network engineers are constantly facing wireless communication errors, which are difficult to diagnose. Analyze which of the following might be the cause of this error.

Interference seems to be the cause.

JHS Mediaworks has contacted you to troubleshoot some TCP/IP errors on some workstations within the organization. On inspection, you get to know that the workstations functioning on Windows are all stable and the ones running on UNIX and Linux systems are the ones that need troubleshooting. Which of the following command-line tools will you use in such a scenario to view and manage the TCP/IP settings?

Ip

Which of the following command-line tools is used to display current TCP/IP addressing and domain name information on a Windows computer?

Ipconfig

When Kyle visited Claremont Group of Institutions as a network professional to repair defective cable ends, he accidently left more than an inch of exposed cable before a twisted-pair termination. Analyze what the consequence of Kyle's error will be.

It will increase the possibility of transmission interference between wires.

The University of Pochinki scheduled a webinar for the students belonging to the law department. The webinar had professionals participating from various parts of the state. However, once the webinar started, a lot of participants sent messages claiming that the video transmission was repeatedly jumping around. The university called in its network administrator to take a look at the situation. Analyze what might have been the issue here

Jitter

Which of the following issues keys to clients during initial authentication?

KDC

Josh is a new trainee at TT&P who has been sent to a client location to patch up cables connecting the switch to the data center. While doing so, Josh is unable to decide which connector to consider while connecting the ferrules of an SMF cable that measures 1.25 mm. Analyze and suggest which of the following connectors Josh should opt for under the circumstances so that there are minimum back reflections.

LC

To ensure better security measures for the computers used in your organization, you, as a network administrator, have decided to update the passwords of each computer on a weekly basis. But managing and changing the passwords for all the computers is a tiresome task. Hence, you decide to apply a security measure with the help of a password management software. Which of the following software will you use in this scenario?

LastPass

Which of the following layers in an Open System Interconnection (OSI) model adds a header in front of the payload?

Layer 4

Huey Dewey Ltd. is a talent management company with over a hundred employees. Gary has been appointed as a system analyst to ensure security across the office networks during and after the period of employment. Some user accounts are given privileged access, which allows the users to perform more sensitive tasks, such as viewing or changing financial information, making configuration changes, or adjusting access privileges for other users. Analyze which of the following security precautions Gary should implement so that he can avoid users logging into the accounts even after their termination.

Limited duration

You, as a network engineer, have recently established a network connection for three separate department buildings in a university. One of the departments has complained that the signal strength it receives is not the same as the signal strength the other two buildings receive. Which of the following will you use in this scenario?

Line drivers

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Low overhead, fast convergence

Which authorization method grants access to a user when the user's classification and category match those of a resource?

MAC

Victor has been recently added to the network engineers' team at Yakuza Infinity. Which of the following methods must he know to understand how filtering prevents the AP from authenticating any device whose MAC address is not listed by the network administrator?

MAC filtering

Which of the following will act as the centralized point of interconnection in reference to an organization's LAN, CAN, or WAN?

MDF

The organization where you have been working as a network analyst decides to provide BYOD (bring your own device) options to the employees to cut down on its operating costs. The company has asked you to handle the BYOD policies and the necessary documentation. You have decided to install a software that will automatically handle the configuration process for the wireless clients when they require network access. Which of the following will you use in such a scenario?

MDM

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.

MIL Ltd. can create up to 65,536 subnets.

A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation?

Mac

Which of the following testing tools combines known scanning and exploit techniques to explore potentially new attack routes?

Metasploit

Vialom network has organized an online web concert featuring various well-known pop stars, which will stream globally. It has contacted JMT internet services to help the company in delivering a single video stream to multiple receivers so that there is minimal network traffic. Analyze which of the following IPv6 addresses it should use in this case.

Multicast address

You are a network administrator, and you want to verify that a cable is properly conducting electricity so that its signal can travel unimpeded from one node on a network to another. Which of the following tools would you use to identify this while setting up the network segment?

Multimeter

While programming an IP packet, Kiara, a network programmer, gets to know that the packet has not reached the destination and has been sent back because the allotted TTL has expired. Now, as the device was running on an IPv6 packet, analyze which of the following protocols should Kiara opt for so that such errors do not arise in the future?

NDP

DMPL is an MNC that wants to establish a one-stop shopping point for consumers. DMPL has contracted you to develop a single card that can be used for loyalty and membership programs as well as for cashless payments. The management at DMPL has specified that the card should not include a power source and should be able to transfer data wirelessly over short distances up to 10 cm. Which of the following technologies will you use?

NFC

MNT Enterprises has hired you as a network administrator to help the organization design a more comprehensive traffic analysis and protection tool to protect the entire network from hackers trying to flood the network with traffic. Which of the following will you use in this situation?

NIPS

Which of the following protocols is used to synchronize clocks on computers throughout a network?

NTP

Robert is the network administrator for JP Morgan. He made a hardware upgrade, which involved him bringing in new hard disks and NICs for the entire facility. Despite all this, he notices that the web server is taking twice as long to respond to HTTP requests. He has an impression that the reason for this might be the traffic going into and out of each NIC. Analyze which of the following utilities should Robert use to determine the traffic going in and out of each NIC.

Netstat

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error.

Network layer

You are working as a network administrator, and you want to conduct simulated attacks on a network to determine its weaknesses. To do so, you want to check for open ports so that you can remote in using that port and craft an attack. Which of the following software will you use to scan for open ports in this scenario?

Nmap

Which of the following IGPs supports large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops?

OSPF

In reversing a software upgrade, which of the following types of upgrade uses the patch's automatic uninstall utility for reversing?

Operating system patch

Mr. Lowe is a network administrator who plans on purchasing a switch that will be the part of a network for a new fast-growing fast-food joint named Momos & More (M&M). The team at M&M has specifically told Mr. Lowe that even though the current need of the network is two fiber-optic connections, it is planning on a significant expansion in the coming years. This expansion will include a fiber-optic connectivity to every desktop in the organization. Analyze what Mr. Lowe should do in this situation.

Order switches that allow upgradeable interfaces

Britain Airways has complained of a faulty NIC as a result of which they are having connectivity issues within the organization. You, as a senior technician, want to find out the manufacturer of the NIC so that you can submit a report of constant bugs in their device. Which of the following addresses will help you to identify the manufacturer of the NIC?

Organizationally Unique Identifier

JV Enterprises is currently using terminal emulation software to remotely control the devices for its employees. The administration however wants to build a dedicated network connection that will allow network administrators to remotely troubleshoot boot problems. Analyze which of the following options should JV consider for its needs.

Out-of-band management

You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation?

PAM

Which of these DoS (denial-of-service) attacks damages a device's firmware beyond repair?

PDoS

You are working as a network analyst at BBM Infotech. The entire network of computers in the organization had recently been at the receiving end of an attempted hack that eventually turned out to be unsuccessful. However, certain computer systems have sustained sufficient damages. After inspection, it has been found that the firmware in few of the switches has been completely damaged because of the attack. What kind of an attack is this most likely to be?

PDoS attack

Which of the following is not a recognized cabling type for horizontal cabling as per the ANSI/TIA standards?

Patch cable

You are adding new cables to a data outlet where you have to run the cables above the ceiling tile. What kind of cables should you use in such a scenario?

Plenum-rated cable

Riverview Union High has contacted you to establish a secure communication over the computer network by encrypting the communication protocol using the SSL. Which of the following registered ports will you use to secure the connection?

Port 443

Analyze which of the following is true about a default VLAN.

Ports in default VLAN can be reassigned to other VLANs.

Global ISP has received the tender for a project that requires the company to run a fiber connection to provide Internet connection to 120 families in an area simultaneously. Analyze which of the following would be feasible for Globe ISP in this scenario.

Providing the connection using FTTN

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won't receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario?

Proxy server

You are a network technician who, on inspection, has found that one of the cables is faulty as a result of which you now have to insert a new piece of twisted pair into the data receptors to complete the circuit. Which of the following will you apply to sort this issue?

Punchdown tool

Joffrey plans on installing a terminal emulator for a small organization so that he can control the office computers for troubleshooting issues. Joffrey is working as an intern for IVP Internet Solutions, which is an ISP. Analyze which of the following terminal emulators will be more suitable for James as he is new to his job and not well-equipped to handle complex layers of programming.

RDP

Fred works as the network administrator at Globecomm Communications. The HR team at Globecomm has come up with a new working policy for the employees. This policy allows the employees to freely work at any time of the day as long as they submit the work within 24 hours. Keeping this policy in view, Fred has to work on strengthening the security of the network by adding additional authentication restrictions. Analyze which of the following Fred should do in this scenario.

Restrict some user accounts to a specific number of hours of logged-on time

You have been hired to implement a major change in the financial software used by the accountants at a fast-food chain. On implementation, you notice that the devices are not compatible with the upgrade and have started showing errors, as a result of which the organization is unable to function. What would you do in such a situation?

Rollback

You have successfully followed the cabling procedures for a new network connection at a primary school. The only task left is to connect the administrative computer to the console port of the router. Which of the following cables will you choose to connect the console port of the router to the computer?

Rollover cable

You are working as a network engineer at Krofter Securities. The organization uses Cisco's Linux OS in all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario?

Route

A client recently contacted Katie, a networking engineer, at IHP solutions to troubleshoot a connectivity issue. On inspecting the issue, she gets to know that there is a missing default route, which is preventing the network nodes from reaching the DNS servers outside the local network. Analyze which of the following gateway devices she should use to sort this issue.

Router

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?

SAID

An ISP's headquarters is located in Philadelphia, and it has a branch office in Canada. The ISP wants to ship an edge device to the branch location where a non-technical person can plug in the device without any configuration needed on-site. Which of the following should be used in this scenario?

SD-WAN

XYZ Ltd. is a company that has 12 regional offices around the world. All the major operations of the company are carried out from the headquarters based in New York. XYZ Ltd. has approached you, a network facilitator, to install a WAN service that can manage network configurations at multiple locations throughout the world. Which of the following WAN services would you advise to XYZ Ltd. in this scenario?

SD-WAN

Browski is a company that deals with SD-WAN (software-defined wide area network) units. The management of Browski wants to present an audio-video presentation at one of the network exhibitions to demonstrate its new product. As a network administrator working there, you have been asked to go through a few pointers in the presentation to verify the accuracy of the content. Analyze if any of these aspects do not apply to SD-WAN.

SD-WAN can be more expensive than leased lines.

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them?

SDS

Which of the following will you use to monitor and analyze data stored in logs?

SIEM

Which of the following protocols is used to send an email message to the first server?

SMTP

Which of the following protocols will an Oracle Database use to communicate with other Oracle Databases?

SQLnet

The University of Oklahoma has hired you as a network engineer, and you are required to remote into a LINUX server of the legal department building, which is located on the same block. Which of the following protocols will you apply in this case?

SSH

Which of the following is a device or an application that stores or generates information known only to its authorized user?

Security token

The managing director of Seviicco Laminates wants to secure certain financial documents that can only be accessed by him and the finance team of the organization. He wants to install a sophisticated authentication process so that the documents are extremely safe. You have been contracted as a network analyst for this project. After having an overview of the office premises, you decide to provide this security via a specific barcode that will be used as a key to access the documents. Which of the following access control technologies will you install in this scenario?

Smart locker

Which of the following devices will help users to adjust temperature settings based on daily schedules in response to voice commands?

Smart thermostat

You are working as an intern for an Internet service provider. You are asked to assist a senior network engineer on a field day. The network engineer calls you and tells you to carry along a device to measure all the frequencies within a scanned range. Which of the following devices will you carry in this situation?

Spectrum analyzer

Raqeeb is an employee working for Deloitte Corporation. He has been allowed to work from home because of the COVID-19 outbreak. You have been asked to establish a VPN so that Raqeeb can access a file server from the office while he operates from his workstation at home. It also has to be kept in mind that Raqeeb wants to stream music alongside when he does this. Which of the following VPN types will you apply so that the necessary requirements are met?

Split tunnel VPN

Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections?

Stateless firewall

Which of the following will you use to assign a VLAN based on the switch port the device is connected to?

Static VLAN assignment

An attack has been detected in your network system by one of the network engineers. Analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own VLAN traffic into the port and accessed the network. What kind of an attack have has been experienced in this scenario?

Switch spoofing

You are the network engineer for Muhan Mobile Services. The network administrator has asked you to separate the authentication, auditing, and authorization process. Which of the following tools will you use in such a scenario?

TACACS+

Which of the following multiplexing types divides a channel into multiple intervals of time, or time slots?

TDM

As a network analyst, you have to separate the digital communication of data in a GSM network. Which of the following will you use in this scenario?

TDMA

Which of the following protocols is not a terminal emulation protocol?

TFTP

What are larger data rooms also known as?

Telecommunications room

Meredith and Co. provides ISP services to a bulk of the corporates in the Silicon Valley. However, due to the recent COVID outbreak, a lot of the firms have started to allow their employees to work from home. Ceratrix is one such company that wants to allow its employees to work from home; however, certain features are only available to the employees when they have access to their workstations in the organization. This basically means that they would have to command the host computer. What remote access method should be provided to Ceratrix to fulfill this requirement?

Terminal emulation

Which of the following remote access methods allows a remote client to take over and command a host computer?

Terminal emulation

Which of the following is the third step in a network troubleshooting methodology?

Test your theory to determine the cause

Tim has been contracted to install a wireless connection at the head office of Travis Roadways. The head office is located in between two manufacturing units because of which there is a lot of noise in the wireless spectrum. The management has requested Tim to ensure that the network connection provides reliable delivery of time-sensitive data so that they can conduct meetings with other branch divisions via video streaming. Analyze the RSSI (received signal strength indicator) level required for Tim to establish the connection functional as per the requirements.

The RSSI level should at least be -50 dBm.

White Hawks runs a baseball stadium, and it would like to set up a network that has a reasonable level of availability and effectiveness so that fans can receive a close and strong signal throughput when they watch a game. Analyze which of the following statements will help in understanding why a 5G service is ideal in this scenario.

The cell density for the network must be close.

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

The default VLAN should not be used.

You have been invited to the University of Bert to deliver a lecture on network security. In your presentation, you want to focus solely on malware that can harm a system or its resources by disguising itself as something useful. Which of the following categories of malware would be best suited to demonstrate such an example?

Trojan horse

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario?

Trunking

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for?

UDP

Which of the following cables consists of one or more insulated wire pairs encased in a plastic sheath?

UTP cable

Joseph is the managing director of Ideakt Cellular World Pvt Ltd., and he wants you to create an IPv6 network that has one-to-one type of data transmission between his personal department and the company's administration office. Which of the following types of IPv6 addresses would you apply in such a situation?

Unicast address

Globcom is a call center operating in California. It has hired you as a network administrator to set up a voice VLAN to ensure the quality of voice transmissions. Which of the following will not be of immediate priority while setting up the VLAN connection?

Untagged frames

James has been contracted to set up a wireless network for a supermarket. The IT department of the supermarket wants James to develop a mesh network of APs in order to offer customers Internet access and selective discount coupons. James has decided that he will have to add additional security options for this purpose. Analyze which of the following will help James fix the issue.

Use Geofencing security technique

Johnathan is the network engineer of an organization that restricts the use of certain webpages. As he does not have any pending work, he decides to take a break and watch a movie online until a task is assigned to him. Analyze which of the following actions is best suited for him in this situation so that the IP address of the organization is not compromised.

Use proxy servers to mask Internet activities

Quinton works as a network specialist at John Brooks &Co, an ISP. Part of his job requires him to authenticate and secure Wi-Fi networks using the EAP (Extensible Authentication Protocol). Freesco, a client of John Brooks &Co., uses PKI (public-key infrastructure) certificates to exchange public keys. Analyze which of the following steps Quinton should follow under these circumstances.

Use the EAP-TLS encryption to protect communications

Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario.

Use the privileged EXEC mode to apply the changes

Mr. Yen has been working as a network technician for Goldyear Tyres. Recently, a couple of routers were reported for hardware failure. As the organization is large, it will take a lot of time to track down and identify the malfunctioning routers. What would be the most feasible option for Mr. Yen in this situation to solve the issue?

Use tracert to target a node instead of the router

Nathan has plans of opening a call center. He will require a network connection that will have a bare minimum of 3 Gbps upstream and at least 8 Gbps downstream throughput. Analyze which of the following will provide a solution to Nathan

Using a DOCSIS 4.0 for maximum throughput

As a network administrator, a client has approached you to set up the network for MKV, a software company. The company requires sufficient amounts of data for both uploading and downloading purposes; however, it prefers a connection that has better download speed. Which of the following DSL varieties do you think is best suited for such a requirement?

VDSL

Hammond Industries has appointed Gavin as the network administrator to set up a complete secured and flawless network throughout the office premises. One of the employees has come to him to fix an error message that keeps popping up every time he tries to open the web browser. He also states that this error started popping up after the external hard drive had been used to transfer some of the necessary documents to the HR's office. Analyze what kind of malware might possibly be behind this error.

Virus

You are working as a network analyzer for an ISP. A client has approached you to set up a network connection for a bank with offices around the state. The network needs to connect these offices with each other in order to gather transaction and account information into a central database. Which of the following connections will you provide in this scenario?

WAN

Which of the following multiplexing technologies would you use with fiber-optic cable?

WDM

You have been appointed as the network administrator in Well Brew Ltd. The WPS (Wi-Fi Protected Setup) in the office is user-friendly, but not very secure. A recent problem highlighted that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. Which of the following attacks have you most likely encountered?

WPS attack

Jamieson has hired you to set up a wireless network for his new workstation that includes a home router as well. The only problem you are facing while setting up the connection is related to channel overlapping, which is causing interference on other routers that are installed on the first floor of his house. Looking at the situation, you have decided to determine the channels used by other nearby networks and then utilize a less crowded channel. Which of the following devices will you use for this installation?

Wi-Fi analyzer

Which of the following commands is used to assign a statement to an ACL on Cisco routers?

access-list

As a network analyst, you want the ACL (access control list) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. Which of the following commands will you use in this scenario?

access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5

Your client has hired you to change the command-line tool from nslookup to dig since it provides more detailed domain information than nslookup. Which of the following commands will you use to install dig on the Window operating system?

apt-get install dnsutils

As a network engineer, you are noticing inconsistent connectivity issues related to certain addresses. After examining the errors, you have decided to flush the ARP table on any device experiencing a similar problem. Which of the following commands will you apply to enable this action?

arp -d

Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL.

class-map limit-icmp

You are running the netstat command to list all active TCP/IP connections of the local machine. However, you now want to have access to the routes used by the network hosts to reach the particular network destinations. Which of the following commands will you apply in such a situation?

netstat -r

Liam has just set up a network connection for JLS Tyre's administration and wants to ensure that the IP addresses are functioning correctly with the NIC. Liam just wants to cross-check that basic Internet connection is up and running for the corporation by visiting Google's servers. In such a situation, analyze which of the following addresses Liam should visit to ensure that the network connection has been successful.

ping 8.8.8.8

You are employed as a network engineer. While setting up a client's connection, the client requests you to display trunks configured on a switch. Which of the following commands will you use in this scenario?

sh int tr

You are employed as a network engineer. While setting up a client's connection, the client requests you to display the concise network layer information of the device interface that is being installed. Which of the following commands will you use in this scenario?

sh ip int br

JusDial Telecommunications has requested your help to set up a new hostname on a couple of devices. On inspection, you find out that the devices are operating under LINUX systems. Which of the following command lines would you apply to set up a new hostname for the required network devices?

sudo hostname


Related study sets

Galvanize Test Prep's HARD GRE Word List #11

View Set

Chapter 11 - Project Risk Management

View Set

Phrases, Clauses, Sentence Structure

View Set

Management: Business & Society. Ethics

View Set

VSim Charlie Snow Core Pre/Post Sim

View Set

MACRO: CHAPTER 6- AN INTRODUCTION TO MARCOECONOMICS

View Set

SES : Partie science économique / Chapitre 1 : Comment créer-t-on des richesses et comment les mesures t-on ?

View Set

Lecture 9: G-protein coupled receptors

View Set