testout yessir

Ace your homework & exams now with Quizwiz!

What is the maximum data rate of an ISDN BRI line?

128 Kbps

Which of the following IP addresses are Class C addresses? (Select two.)

192.15.5.55 223.16.5.0

Which network modes can typically be used for both 2.4 GHz and 5 GHz clients? (Select two.)

802.11n only 802.11ax only

Which of the following BEST describes a MAC address?

A 48-bit number that serves as a unique identifier for network devices.

In virtualization, what is the role of a hypervisor?

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.

Which of the following do hosts on a private network share if the network utilizes a NAT router?

A physical IP address

Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices?

ARP spoofing/poisoning

You are configuring the Local Security Policy on a Windows system. You want to require users to create passwords that are at least 10 characters in length. You also want to prevent login after three unsuccessful login attempts. Which policies should you configure? (Select two.)

Account lockout threshold Minimum password length

Which of the following components are the SIEM's way of letting the IT team know that a pre-established parameter is not within the acceptable range?

Alerts

Which of the following is a characteristic of static routing in comparison to dynamic routing?

All routes must be manually updated.

Which of the following protocols prescribes what to do when a data channel is in use on a half-duplex device?

CSMA/CD

Which of the following are network sniffing tools?

Cain and Abel, Ettercap, and tcpdump

What does SNMP use to identify a group of devices under the same administrative control?

Community strings

Your organization uses a time-keeping application that only runs on Windows 2000 and does not run on newer OS versions. Because of this, there are several Windows 2000 workstations on your network. Last week, you noticed unusual activity on your network coming from the workstations. After further examination, you discover that they were victims of a malicious attack and were being used to infiltrate the network. You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. Your organization still needs to use the Windows 2000 workstations (which need to be connected to the internet) but you want to make sure that the network is protected from future attacks. Which solution should you implement to protect the network while also allowing operations to continue as normal?

Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN.

Within an SDN, what is commonly referred to as the brains?

Controllers

You manage a single domain named widgets.com. Organizational units (OUs) have been created for each company department. User and computer accounts have been moved into their corresponding OUs. Members of the Directors OU want to enforce longer passwords than are required for the rest of the users. You define a new granular password policy with the required settings. All users in the Directors OU are currently members of the DirectorsGG group, which is a global security group in that OU. You apply the new password policy to that group. Matt Barnes is the chief financial officer, and he would like his account to have even stricter password policies than are required for other members in the Directors OU. What should you do?

Create a granular password policy for Matt. Apply the new policy directly to Matt's user account.

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?

Crimping tool

You need to connect two switches using their uplink ports. The switches do not support auto-MDI. Which type of cable should you use?

Crossover

You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI. Which type of cable should you use?

Crossover

An attacker sets up 100 drone computers that flood a DNS server with invalid requests. Which kind of attack is this an example of?

DDoS

While using the internet, you type the URL of one of your favorite sites in your browser. Instead of going to the correct site, the browser displays a completely different website. When you use the web server's IP address, the correct site is displayed. Which type of attack has likely occurred?

DNS poisoning

Which of the following is a method of VLAN hopping?

Double tagging

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has already learned both networks. The router does not have a default route configured. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?

Drop the packet.

You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and confirm your suspicions?

Dump files

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?

Dumpster diving

A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users. Which of the following conditions is the MOST likely cause?

Duplex mismatch

Which of the following services automatically creates and deletes host records when an IP address lease is created or released?

Dynamic DNS

Which IPsec subprotocol provides data encryption?

Encapsulating Security Payload (ESP)

A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the website from being accessible on the internet. Which solution should you implement?

Ethernet bonding

You've just signed up for a broadband home internet service that uses coaxial cabling. Which connector type will you MOST LIKELY use?

F-type

You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem?

Failed patch cable

Which of the following is the best device to deploy if you want to protect your private network from a public untrusted network?

Firewall

You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. Which type of network hardware should you implement to prevent this from happening again?

Firewall

Your network uses the following backup strategy. You create: Full backups every Sunday night. Incremental backups Monday night through Saturday night. On a Thursday morning, the storage system fails. How many restore operations would you need to perform to recover all of the data?

Four

What is the most common form of virtualization?

Full virtualization

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the MOST likely cause is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

Identify possible side effects of the solution.

Which of the following is the MOST effective protection against IP packet spoofing on a private network?

Ingress and egress filters

Which of the following is true about single-mode fiber optic network cabling?

Its central core is smaller than the standard multi-mode fiber optic cabling core.

Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference?

Jitter is the up and down variation in latency.

Which recommendation should you follow while using 110 blocks for connecting Cat5 and higher data cables?

Keep wire pairs twisted up to within one half of an inch of the connector.

You are on a phone call using VoIP. You notice that it takes several seconds for the person on the other end to respond to questions that you ask. Which type of problem is occurring?

Latency

Which Syslog level indicates an emergency that could severely impact the system and cause it to become unusable?

Level 0

Which of the following technologies uses variable-length packets, adds labels to packets as they enter the WAN cloud, and uses the labels to switch packets and prioritize traffic?

MPLS

What is the primary goal of business continuity planning?

Maintain business operations with reduced or restricted infrastructure capabilities

Match the wireless networking term or concept on the left with its appropriate description on the right. (Each term may be used once, more than once, or not at all.)

Moving a wireless device between access points within the same wireless network. Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN. LWAPP Specifies the number of clients that can utilize the wireless network. Device density Automatically partitions a single broadcast domain into multiple VLANs. VLAN pooling Connects two wired networks over a Wi-Fi network. Wireless bridge The number of useful bits delivered from sender to receiver within a specified amount of time. Goodput

You have a large TCP/IP network and want to keep a host's real-time clock synchronized. Which protocol should you use?

NTP

You are an administrator of a growing network. You notice that the network you've created is broadcasting, but you can't ping systems on different segments. Which device should you use to fix this issue?

Network bridge

Which of the following provides information on the subnets within your network, including the subnet addresses and the routers connecting each subnet?

Network diagram

You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?

PPTP

A new law was recently passed requiring that all businesses must keep a history of the emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?

Policy

Which port does Remote Desktop use?

Port 3389

You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer that's connected to a computer at home. Which protocol should you use?

RDP

Which of the following DHCP scope options assigns a static IP configuration to a device using that device's MAC address?

Reservation

Which of the following topologies connects each device to a neighboring device?

Ring

You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then tracks system activity and allows an attacker to remotely gain administrator access to the computer. Which of the following terms BEST describes this software?

Rootkit

You want a switch to have the ability to modify the media type the switch port supports. Which type of module might you use to make this possible?

SFP GBIC

Your company has just acquired another company in the same city. You need to integrate the two email systems so that messages can be exchanged between email servers. Currently, each network uses an email package from a different vendor. Which TCP/IP protocol enables message exchange between systems?

SMTP

Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

SSH

Which of the following can serve as a buffer zone between a private, secured network and an untrusted network?

Screened subnet

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?

Send it out all ports except for the port it was received on.

Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet isn't working properly. Which of the following allows the service provider to remotely test the local loop?

Smartjack

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

Spamming

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto-MDI. Which type of cable should you use?

Straight-through

What is a VPN (virtual private network) primarily used for?

Support secure communications over an untrusted network.

You've been asked to document your building's wiring. You'd like to identify the length of each Cat 5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?

TDR

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, she can no longer access the network. You go to the office and see that some of the wires in the Cat 5 network cable are now exposed. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?

Test the solution.

Which of the following does Kerberos use for authentication and authorization? (Select two.)

Ticket granting server Time server

Why should you store backup media off site?

To prevent the same disaster from affecting both the network and the backup media

VoIP uses several protocols. Which layer of the OSI model do these protocols reside on?

Transport

Which hypervisor is for bare metal use?

Type 1

You've just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Update the signature files.

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

Use Syslog to send log entries to another server.

Which of the following identification and authentication factors are often well-known or easily discovered by others on the same network or system?

Username

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?

Users cannot change the password for 10 days.

Which of the following scenarios would cause a problem in asymmetric routing?

Using two stateful firewalls in the traffic flow.

You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?

VLAN

Which of the following CCTV camera types allows you to zoom the focus in and out?

Varifocal

Which VoIP device helps establish the connection between two VoIP phones?

VoIP server

Which operating system does not use Syslog by default?

Windows

Windows Update for Business (WUfB) lets you keep your devices current with the latest security upgrades and features. Which operating system releases does WUfB support?

Windows 10

Which of the following tools can you use to troubleshoot and validate Windows updates? (Select three.)

Windows Update Troubleshooter Windows Server Update Service (WSUS) PowerShell

Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?

arp

Which TCP/IP utility gives you the following output?

arp -a

You are troubleshooting a network connectivity issue on a Unix system. You're able to connect to remote systems by using their IP address, but you're unable to connect using the hostname. You check the TCP/IP configuration and notice that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Select two.)

dig nslookup

You are troubleshooting a connectivity problem on a Linux server. You're able to connect to another system on the local network but not to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?

ifconfig

Which command would you use on a switch to enable management from a remote network?

ip default-gateway 192.168.10.185

Which TCP/IP utility gives you the following output?

netstat -a

Examine the following output. Reply from 64.78.193.84: bytes=32 time=86ms TTL=115Reply from 64.78.193.84: bytes=32 time=43ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=47ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=44ms TTL=115Reply from 64.78.193.84: bytes=32 time=73ms TTL=115Reply from 64.78.193.84: bytes=32 time=46ms TTL=115 Which of the following utilities produced this output?

ping

You have been asked to perform a penetration test for a company to see if any sensitive information can be captured by a potential hacker. You used Wireshark to capture a series of packets. Using the tcp contains Invoice filter, you found one packet. Using the captured information shown, which of the following is the account manager's email address?

[email protected]

Which of the following utilities could you use to lock a user account? (Select two.)

usermod passwd


Related study sets

HSDA 3240 ABUSE MIDTERM CH. 1-6 (NEW)*

View Set

Ap Human Geography - Unit 2 Test Questions

View Set

Chapter 7 - Insurance Completion,Matching

View Set

M06 Evaluate: Quiz Computer Logic Sdev120

View Set

Exam 2 1063 bio quiz questions/iclicker questions

View Set

ECON 4 Microeconomics Final Chaffey

View Set

Prep U Chapter 34: Assessment and Management of Patients with Inflammatory Rheumatic Disorders

View Set