CompTIA Network+ N10-008 ITProTV - NET+ 008 Practice Exam: Baseline #1
This flashcard set from the CompTIA Network+ N10-008 ITProTV Practice Exam reviews WAN technologies and their bandwidth capacities. It highlights that OC-3 provides the highest potential bandwidth among the listed options, reaching 155.52 Mbps.
** Which WAN technology offers the highest potential bandwidth?
Frame Relay
T3
E3
FDDI
OC-3
OC-3
Explanation:
SONET WAN Technologies
- Frame Relay up to 1.544 Mbps
- OC-1 speeds up to 51.84 Mbps
- OC-3 speeds up to 155.52 Mbps
- OC-12 speeds up to 622.08 Mbps
- ATM speeds up to 622 Mbps
Key Terms
** Which WAN technology offers the highest potential bandwidth?
Frame Relay
T3
E3
FDDI
OC-3
OC-3
Explanation:
SONET WAN Technologies
** While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?
bend radius exceeded
maximum cable length exceeded
dirty connectors
RF interference caused by impedance mismatch
maximum cable length exceeded
Explanation:
10GBase-SW max cable length is 300 meters...
** Your network uses a single switch that divides your network into 3 virtual LANs (VLANs). The devices in each VLAN are connected to a single port on the switch. You plan to implement a second switch on your Network. You need to ensure that the VLANs that were originally implemented are spread across both switches. What should you do?
create a subnet-based VLAN on both switches.
implement frame tagging on both switches.
create a protocol-based VLAN on both switches.
Create a port-based VLAN on both switches.
implement frame tagging on both switches
Explanation:
Frame Tagging is a technique t...
Which one of these requires a user complete an action, such as digitally signing an AUP, prior to accessing the Network?
Captive Portal
Access Control List
MAC Filter
Port Security
Captive Portal
Explanation:
Captive Portals - are Web Pages, typically used in publi...
Your company has decided to implement an Acceptable Use Policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit your management approval. What is defined in this policy?
which method administrators should use to back up Network data
how users are allowed to employ company hardware
the sensitivity of company data
which users require access to certain company data
how users are allowed to employ company hardware
Your company has a corporate-wide Windows Server network using the TCP/IP protocol. Several users are complaining that their computers are getting IP address conflics. Which action should you perform?
Implement a DHCP Server
Increase the TCP window size
Change the MAC Address for each Network interface card
Manually configure IP Addresses on each computer
Implement a DHCP server
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
** Which WAN technology offers the highest potential bandwidth? Frame Relay T3 E3 FDDI OC-3 | OC-3 Explanation: SONET WAN Technologies - Frame Relay up to 1.544 Mbps - OC-1 speeds up to 51.84 Mbps - OC-3 speeds up to 155.52 Mbps - OC-12 speeds up to 622.08 Mbps - ATM speeds up to 622 Mbps |
** While troubleshooting a network outage on a 10GBase-SW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue? bend radius exceeded | maximum cable length exceeded Explanation: Bend Radius Exceeded - could be the problem if the max cable length wasn’t exceeded already. Remember, fiber-optic cable has max distances depending on the type of cable used and thet ype of network being implemented. attenuation/DB loss - is reduction in power of the light signal as it is transmitted. |
** Your network uses a single switch that divides your network into 3 virtual LANs (VLANs). The devices in each VLAN are connected to a single port on the switch. You plan to implement a second switch on your Network. You need to ensure that the VLANs that were originally implemented are spread across both switches. What should you do? create a subnet-based VLAN on both switches. | implement frame tagging on both switches Explanation: |
Which one of these requires a user complete an action, such as digitally signing an AUP, prior to accessing the Network? Captive Portal | Captive Portal Explanation: Port Security - Allows a Network administrator to only allow a specific MAC Address (or group of MAC Addresses) on a Switch port. MAC Filtering - Basically does the same thing as Port Security, but Port Filtering works on Switches where MAC Filtering works on Routers. Accomplished by granting or denying Network access to a list of MAC Addresses. The List of MAC Addresses for which you are either granting or denying access to is stored in an Access Control List (ACL) ACLs - compare the entity that is requesting access to a Network resource against a list of valid entities. Access is granted or denied based on the access configured for that entity. Simply put, ACLs identify which users have access to a given object, such as a drive, a file, or a directory. |
Your company has decided to implement an Acceptable Use Policy (AUP) that must be distributed to all users. You have been asked to write the preliminary policy to submit your management approval. What is defined in this policy? which method administrators should use to back up Network data | how users are allowed to employ company hardware |
Your company has a corporate-wide Windows Server network using the TCP/IP protocol. Several users are complaining that their computers are getting IP address conflics. Which action should you perform? Implement a DHCP Server | Implement a DHCP server |
One of your branch offices is located on two non-adjacent floors in an office building. You have been given permission to route a communications link between the two floors using existing conduit in the building’s elevator shaft. Your current cabling plan calls for TP wiring on each of the two floors, but the distance between them is more than 90 meters. You need to interconnect the two floors using fiber optic cable in the cheapest manner possible. Which of the following should you deploy between the wiring centers on each floor? Media Converters Firewalls Modems Hubs Routers Switches | Media Converters |
You support multiple wireless networks. You need to ensure that the protocols used offer the appropriate level of security. Match the descriptions on the left with the Wireless Encryption Protocols on the right? Descriptions: Answers: | WEP = Uses a 40-bit or 104-bit Key |
You are designing a SOHO Network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the Network? 10Base-T | 1000BaseCX |
You need to increase the arena that is covered by your Wireless Network to include another building. You decide to use a signal bounce. All of the following could help with this issue EXCEPT? repeaters | encryption |
Management has stipulated that you must use unshielded twisted-pair category consists of four twisted pairs of copper wire that is certified for transmission rates up to 100 Mbps for the new guest network you are setting up. Which cabling category should you use? CAT 2 CAT 1 CAT 4 CAT 5 CAT 3 | CAT 5 Explanation: Transmission Rates CAT 1 = 4 Mbps, 2 Twisted Pairs CAT 2 = 4 Mbps CAT 3 = 10 Mbps CAT 4 = 16 Mbps CAT 5 = 100 Mbps CAT 5e = 1000 Mbps (1 Gbps) CAT 6 = 1000 Mbps CAT 6a = 10 Gbps CAT 7 = 10 Gbps CAT 8 = 40 Gbps |
Protocols: POP3 HTTPS FTP IMAP RDP Answers: Port 3389 Port 110 Port 21 Port 143 Port 443 | POP3 = 110 HTTPS = 443 FTP = 21 IMAP = 143 RDP = 3389 |
To improve security, you change your Web server named Web1 to the HTTPS protocol. Shortly after implementing the change, users report that they cannot access any Web sites hosted on Web1 by using their fully qualified domain names (FQDN). However, they can access other websites that are hosted on other Web Servers by using their FQDN. What is causing the problem? HTTPs is not a supported protocol. | The new Web address starts with https instead of http. |
A Network admin use wants the Network can accept an MTU value above 1500. Which of the following should he configure? UTM appliance | Jumbo Frame |
What is a physical barrier that acts as the first line of defense against an intruder? a lock | a fence |
You use HTTPS to secure your e-commerce website. You suspect an external breach has occurred. What should you do to enhance transaction security? Hashing files | Generating new keys |
Your organization needs to perform a risk assessment for their ISP. Which specific type of assessment should you complete? Vulnerability Assessment | Vendor Assessment |
Which TCP Port is the Well-Known Port assigned to SSL? 119 | 443 |
Your company has implemented a Firewall that only examines the packet header information. Which type of Firewall is this an example of? application-level proxy firewall | packet-filtering firewall |
You need to implement Spanning Tree Protocol (STP) to prevent Network Loops when more than one path can be used. Which two devices could you deploy? (Choose Two) Switches | Switches Bridges |
Your company wants to use the Private Class B Network designation of 172.17.0.0/20. You have been asked to divide it up into six subnets. Two subnets should have 512 nodes and four more subnets have 256 nodes already established. While a total of 2,048 IP addresses are needed, the design should leave some room for growth in each subnet. Allocate two networks with /22 masks, and the remaining four with /23 masks. | Allocate two networks with /22 masks, and the remaining four with /23 masks. |
Which of these devices functions works at Layer 7? VoIP Gateway | NGFW (Next Generation Firewall) Explanation: |
Which of the following would be used to help defend against a Man-in-the-Middle Attack? Flood Guard | DHCP Snooping |
Your organization has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is Authenticated? AS | TGT (Ticket-Granting Ticket) Explanation: |
A company procedure calls for using the IPv4 and IPv6 Loopback addresses as part of the troubleshooting process. Which of the following explanations best represents the purpose of this tool? To provide an IP address for testing the local IP stack through the Network interface. | To provide an IP address for testing the local IP stack without a physical Network connection. |
You are using DSL to connect to the Internet. You recently setup Firewall software to protect your computer's resources from external users. After setting up the Firewall software, you can no longer access Websites by name. What is the problem? You do not have a static IP address. | Your firewall software is blocking port 53. Explanation: |
You administer your company's 100Base-TX Ethernet Network. TCP/IP is the Networking protocol used on the Network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices? Telnet | SNMP (Simple Network Management Protocol) |
You need to assign a virtual IP address to an internet server. What are valid reasons for doing so? (Choose ALL that Apply) To permit multiple servers to share the same address. | To permit multiple servers to share the same address |
You manage a network for your organization. The network contains one DNS server and three routers. You are setting up a new DHCP server. You configure separate scopes for each subnet on your Network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? (Choose ALL that Apply) Configure the DNS server as a scope option for each scope | Configure the DNS server as a server option | Configure each router as a scope option for its appropriate scope |
You just installed a replacement switch that was moved from one part of the network to a new location. After all the patch cables are reconnected, some users cannot communicate via email. What is the most likely issue? Network connection LED status indicators | VLAN mismatch |
Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy? Bluetooth | Mesh |
Which device or feature provides a bridge between the physical environment and the virtual environment? Virtual router | Virtual NIC (Network Interface Card) |
You have been called to troubleshoot a workstation problem in the oldest building on your company's corporate campus. The network workstations in the building are unreliable. When the room lights are on, connectivity is lost, but when the room lights are off, the network is functional. Upon arrival, you quickly survey the work environment. You observe the following conditions:
What is most likely causing the loss of connectivity? Fluorescent lighting in the room | Fluorescent lighting in the room |
Your company is located in Atlanta, GA. Management has decided to deploy multiple 802.11b WLANs. You are concerned that there are not enough non-overlapping channels to support the number of access points that you need to deploy. How many non-overlapping channels are supported in this deployment? five | three |
Your company uses a single global IP address that maps to the company's local IP addresses. When requests are sent from the internal network to destinations outside the company, those requests are mapped from the IP address of the local host that made the request to the global IP address. What term describes this process? Network Address Translation (NAT) | Network Address Translation (NAT) |
A user reports that she cannot print from her computer. You also notice that they are unable to reach a suppliers web site. The operating system is Windows 8.1. Which command should you start with to help with your diagnosis? route | ping |
Which of these devices can perform router functions? IDS | Multi-Layer Switch |
You are a system admin. A user calls you complaining that every time she tries to log onto the network, she gets an error message. Other users are not having any problems. Which question is best to ask first when attempting to troubleshoot the problem? Which error message do you receive? | Which error message do you receive? |
Users are unable to log in to the network. When you examine the authentication server, you see that CPU usage is almost 100%. What is most likely the issue? expired IP address | unresponsive service |
You are the network admin for a healthcare organization. Recently several federal and state government laws have been enacted which will affect network operations. Which change management documentation should record this information? baselines | regulations |
You are installing the wiring for a small office. You want to connect the fifty computers in the office to the Switch. The CAT6 cables that you plan to use have RJ-45 connectors on both ends. Which component should you use? 110 Block | Patch panel |
You need to deploy a fiber distribution panel for datacenter, remote office, or local area networking use. Which of the following features are NOT important for such uses? (Choose ALL that Apply) Support for SFP+ Cable storage Cable termination Support for GBIC connectors bulkhead adapters and receptacles cable splices | Support for SFP+ Explanation: GBIC connectors are used for end-point termination at a device interface of some kind. They are neither typically used nor necessary on a fiber distribution panel. SFP+ stands for the enhanced, or plus, version of the Small Form-Factor (Hot) pluggable or (SFP) fiber optic connector. SFP+ connectors are used for endpoint connections and not in FDPs which do not need optical-to-digital or digital-to-optical conversion. |
You administer a LAN. You want to encrypt TCP/IP communications on the LAN. The protocol that you use for encryption should be able to encrypt entire data packets, and the protocol should be able to operate in both tunnel mode and transport mode. Which protocol should you use to encrypt data on the Network? Kerberos | IPSec (Internet Protocol Security) |
You are a desktop admin for Nutex Corporation. Your org uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR) the signal returns too soon. What should you do? reinstall the network adapter | replace the network cable |
What is the main purpose of a VPN concentrator? to resolve host names and IP addresses | to terminate the VPN tunnels |
A TOOL - used to identify and trace Wires? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | Tone Generator/Probe |
A TOOL - used to test voltage, current, and resistance? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | Multimeter |
A TOOL - used to check UTP/STP cable resistance levels and locate cable faults? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | TDR (Time Domain Reflectometer) |
A TOOL - used to collect Network cable test data and print certification reports? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | Cable Certifier |
A TOOL - used to capture and analyze data that is sent over a Network? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | Protocol Analyzer |
A TOOL - used to check Fiber cable resistance levels and locate cable faults? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | OTDR (Optical Time Domain Reflectometer) |
A TOOL - used to test cable resistance levels, but does not locate faults? Cable Certifier Cable Tester Multimeter OTDR Protocol Analyzer TDR Tone Generator/Probe | Cable Tester |
You need to check for open circuits and short circuits on your network. Which tool should you use? Toner Probe | Cable Tester |
Which of the following computing technologies is most likely to fall under the US Government's export administration regulations designed to protect the sale or transfer of commodities, technology, information, or software considered of strategic importance to the US? file compression techniques | encryption tools |
You are examining the packet captured on your network. You notice some communication between your Cisco router and someone from outside your network. The packets indicate that the communication is occurring over TCP port 23. Which protocol is being used? FTP | Telnet |
Which social engineering attack is typically considered the most dangerous? social engineering | physical penetration |
You have recently discovered that your company is not maintaining system logs as per the adopted company procedures. You need to decide if the company procedures should be modified, or if the system logs should be maintained as per the procedures. Which statement is an accurate reason for following the company procedures? Logging helps an administrator to detect security breaches and vulnerable points in a network. | Logging helps an administrator to detect security breaches and vulnerable points in a network. |
Your company is considering converting to the use of IPv6 addresses. What are the three types of internet protocol version 6 (IPv6) addresses? (Choose Three) Unicast Anycast Dual-cast Broadcast Multi-cast | Unicast |
Which of these is NOT associated with data conversion between the ISP and the customer premises equipment? CSU/DSU | ATM (Asynchronous Transfer Mode) |
You install a Network analyzer to capture your network's traffic as part of your company's security policy. Later, you examine the captured packets and discover that the only packets that were captured are from Subnet 1. You need to capture packets from all four subnets on your network. Two routers are used on your network. What could you do? (Choose Two - Each answer is a complete solution.) Install the network analyzer on a router. | install a distributed network analyzer | install the network analyzer on all four subnets |
Your database admin needs accurate timestamping for purchases. Which of the following would you implement? Lease Time | NTP (Network Time Protocol) |
You are troubleshooting a Network connectivity problem on a Windows 7 Enterprise computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use? the ping command | the ipconfig /all command |
Your client is experiencing what appears to be a decrease in network throughput. However, the symptoms the client is reporting to you are not detailed enough for your to diagnose the issue and make a recommendation. What will best assist you in pinpointing the bottleneck the next time it occurs? Standard operating procedures/work instructions | Network configuration and performance baselines |
You have a strong wireless password policy, but users (including management) are complaining about it. Consequently, enforcement is difficult. You need a protocol solution that does not require digital certificates. Which of these choices would help you secure your Network? PEAP | EAP-FAST (Extensible Authentication Protocol - Flexible Authentication via Secure Tunneling) |
You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment, the accounting department is flooding the network with a high volume of data, which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department? bridge | bridge |
You have a subnet that contains a computer within the IP address 172.16.5.2/23. You need to send a message to every computer on the network where the computer resides. Which subnet is the IP address a member of, and what is the broadcast address for that subnet? subnet: 172.16.0.0, broadcast: 172.16.7.255 | subnet: 172.16.4.0, broadcast: 172.16.5.255 |
You administer a network for your company. You determine that there is a network connectivity problem on one of the computers on the network. You re-create the problem and determine that the problem is located in the NIC. You establish a theory of probable cause. Which step should you take NEXT to troubleshoot the problem? Form a correction plan. | Test the Theory. |
Which component of a computer use policy should state that the data stored on a company computer is NOT guaranteed to remain confidential? computer ownership | no expectation of privacy |
During a recent network redesign meeting, one team member suggested that you implement a device that operates at both the Data Link Layer and the Network Layer of the OSI Model. Which device operates at BOTH of these layers? A repeater A brouter A bridge A router A hub | A brouter Explanation: |
You have recently added a new Windows 8 computer to your IPv6 Network. Because your network is small, you currently use static IP addressing. You record the IPv6 addresses of the new Windows 8 computer. What is the shortest possible notation of IPv6 addresses as shown below? 2001:0DB8:0000:0001:0000:0000:0000:F00D 2001: DB8::1::F00D | 2001:DB8:0:1::F00D Explanation: |
Your company consists of 75 employees. Your company has entered into a partnership with another company that is located across the country. Your company's users must be able to connect to the partner's network quickly and reliably. Support for voice, data, and imaging transmissions and a dedicated 24-hour link are required. Your solution must be as inexpensive as possible while providing enough bandwidth for your company's employees. What should you implement? ATM POTS FDDI T1 ISDN | T1 |
You have been hired as a network admin. The company's network consists of several subnetworks located in various locations across the southeast United States. You want to deploy switches across the different locations so that you can implement virtual local area networks (VLANs). What is the primary benefit of this implementation? Users are grouped by their geographical locations. Users can be grouped by their work functions, by shared applications or protocols, or by department, regardless of their geographical location. VLANs provide switchless networking using virtual addresses. Users in a single geographical location can be micro-segmented. | Users can be grouped by their work functions, by shared applications or protocols, or by department, regardless of their geographical location. |
What well-known port is used to forward email on the Internet between email Servers? 23 | 25 (SMTP = Simple Mail Transfer Protocol) Explanation: SMTP = Sending/Forwarding Email between Servers POP3 & IMAP = Receiving Email POP3 = 110 IMAP = 143 |
Which unsecured Protocol do Web Browsers use to access documents on the World Wide Web? IP | HTTP (Hypertext Transfer Protocol - Port 80) |
You have been hired as a contractor to implement a Small Office Home Office (SOHO) Network for a small business. While gathering the requirements and constraints regarding the Network, you decide to implement two subnets on the Network. to increase network security | to increase network security to reduce congestion by decreasing network traffic Explanation: Subnets are used for the following Reasons: - To expand the Network. - To reduce congestion. - To reduce CPU use. - To isolate Network problems. - To improve Security. - To allow combinations of media, because each subnet can support different medium. |
You are troubleshooting a connectivity problem on an Ethernet Network that contains both NetWare and Windows Servers. A Windows 7 Client cannot connect to the internet or any network resources. However, other computers on the same subnet as the client can access network resources and the internet. You issue the ipconfig command at the workstation and find that the IP Address is 169.254.184.25 and the subnet mask is 255.255.0.0. The IP network and subnet are different from the IP network and subnet that other computers on the same segment are using. What is the most likely problem? the client obtained the IP address from a NetWare server. | the client selected the IP address using APIPA. (Automatic Private IP Addressing) |
The owner of your favorite pastry shop has just installed Free WIFI access for customers. The owner accomplished this task with limited technical skills and without any assistance. After a couple of days in operation, the owner calls to complain that he cannot get into the WIFI router to make an adjustment. First, you have him use the hard reset function built into the router. What action would you recommend that the owner take next? patch and update the router | change the default credentials |
You decide to install an 802.11a wireless network in your company's main building. Which frequency band is used in this network? 2.4 GHz | 5 GHz Explanation:
|
Your organization has several VLANs implemented on its network. The VLANs operate across several switches. What do all users on a VLAN have in common? Collision Domain | Broadcast Domain |
Your network is experiencing a problem that a tech suspects is concerning a Cisco router. The tech provides you the following command RESULTS: 1 14.0.0.2 4 msec 4 msec 4 msec 2 63.0.0.3 20 msec 16 msec 16 msec 3 33.0.0.4 16 msec * 16 msec What Cisco command produced the results you were given? traceroute | traceroute |
You have decided to implement 802.1q. What does this standard do? It implements MAC filtering. | It implements VLAN trunking. |
You need to verify a network's transmission speed. Which tool should you use? loopback plug | throughput tester |
An administrator would like to integrate DNS and DHCP so that each is aware of changes in the other. Which of the following would be the best method for him to do this? MAC reservations | IPAM (IP Address Management) |
Which of the following indicates the largest number of bytes allowed in a frame? PDU | MTU (Maximum Transmission Unit) |
Your company is researching different wireless antennas. Antennas that you research are high-gain antennas. Which statement best describes a property of high-gain antennas? high-gain antennas provide a wide coverage area. | high-gain antennas provide a small vertical beamwidth. |
You administer a TCP/IP network that is not subnetted. one of the network hosts has the following IP address:
| 130.250.0.0 |
Which type of intrusion detection system (IDS) relies upon a database that contains the identities of possible attacks? signature-based IDS | signature-based IDS Explanation: network-based IDS = is attached to the network in a place where it can monitor all network traffic. anomaly-based IDS = detects activities that are unusual. behavior-based IDS = looks for behaviors that is not allowed and acts accordingly. |
What should you implement to isolate two of the devices that are located on a storage area network (SAN) fabric containing eight devices? HBA allocation | virtual SAN |
You have been hired as a consultant for the medium-sized business. As part of your duties, you need to make recommendations on changes to the network. You decide that you want to install agents on the network devices to monitor network traffic and record the behavior of network components. You will then use the statistical data that is gathered to make your recommendations. Which standard should you deploy? SNMP | SNMP (Simple Network Management Protocol) |
You notice that several ping requests have been issued on your network in the past couple of hours. Which protocol responds to these requests? TCP | ICMP (Internet Control Message Protocol) |
A company has an 802.11b wireless network deployed to allow mobile devices to connect to the network. Which frequency band is used in this network? 2.9 GHz | 2.4 GHz |
Which protocol is NOT capable of preventing a man-in-the-middle attack? IPSec | RSH (Remote Shelll) Explanation: |
You need to ensure that the Web Server always receives the same IP address from the DHCP server. What should you do? create a DHCP exclusion | create a DHCP reservation |
You have recently been hired by a small company to assess its network security. You need to determine which TCP/IP ports are open on the network. Which tool should you use? port scanner | port scanner |
You are troubleshooting a computer that has the IP address of 192.22.14.42. To which network class does the IP belong? Class C Class B Class E Class D Class A | Class C Explanation: |
Your company wants to allow remote users to access their Windows Network remotely if their network is NOT connected to the Internet. Which of the following should you implement? DHCP | Remote Access Service (RAS) Explanation: Point-to-Point Tunneling Protocol = PPTP is used to allow networks to connect using the INternet as their WAN link. Does not provide remote dial-up access. Secure Sockets Layer (SSL) is a security encryption protocol. Dynamic Host Configuration Protocol is a protocol that allows network administrators to centrally manage and automate the assignment of Internet Addresses in an organization's network. DHCP can automatically assign a new IP address when a computer is plugged into a different location the network. It does not provide remote dial-up access. |
Which of the following provides both authentication and authorization using UDP? SSO | Remote Authentication Dial-In User Service (RADIUS) Explanation: Terminal Access Controller Access Control System Plus (TACACS+) authenticates credentials of a remote user, typically an administrator. Only provides Authentication, not Authorization. Lightweight Directory Access Protocol (LDAP) validates user credentials (typically just username/password) against a database stored in Microsoft Active Directory, Open LDAP, or OpenDJ. LDAP runs over TCP. Single Sign-On (SSO) allows a client to access multiple applications with a single set of credentials. SSO relies on several underlying authentication technologies, and on its own does NOT use UDP or TCP. |
Match the Description with the DNS Resource record? DNS Resource Records: A AAAA CNAME MX PTR Description: Maps a host name to an IPv6 Maps a mail server name to a domain Maps an additional host name to an existing host record Maps a host name to an IPv4 address Maps an IP address to a host name | A = Maps a host name to an IPv4 Address AAAA = Maps a host name to an IPv6 Address CNAME = Maps an additional host name to an existing host record MX = Maps a mail server name to a domain PTR = Maps an IP address to a host name (Reverse) Other: SVR = specifies location data, IE: port numbers for specified services. TXT = provides the ability to associate other services, sometimes your mail service, to your domain SOA = stores important information about the DNS zone for your domain, each zone must have an SOA record |
Which system or device detects network intrustion attempts and controls access to the network for the intruders? IPS | Intrustion Prevention System (IPS) Explanation: |
An employee shows you a Website that publishes the SSIDs and passwords for private Wireless Networks in your area. The information on your company's Wireless network is included. Of which type of attack is this an example of? war chalking | war chalking Explanation: WEP cracking = is the process of cracking WEP security. Evil Twin = occurs when a wireless access point that is not under your control is used to perform a hijacking attack. Is a type of Rogue Access Point. |
Your organization has responded to a security incident. The breach has been contained, and all systems have been recovered. What should you do LAST as part of the incident response? analysis | post-mortem review |
You need to implement a wireless network to provide users in an outdoor sitting area with Internet connections. Which signal-absorbing obstructions should be noted when performing a WLAN site survey? trees | trees |
Which DSL technology provides the highest data rate? SDSL | VDSL (Very high data rate Digital Subscriber Line) Explanation: |
Which of the following can be manipulated to reduce Network traffic? lower TTL increase lease time MAC reservations NTP | increased lease time Explanation: Lease Time is the amount of time a device maintains the IP address assigned by the DHCP server. Default lease time for Windows is 8 days, but lease times may be adjusted. Increasing Lease Time justification is that every lease must be renewed, and those renewals increase Network Traffic. Increasing the duration of the lease reduces the amount of Network traffic required for lease renewal. MAC Reservations allow you to permanently assign an IP address to the MAC address of a specific device. TTL = Time to Live specifies the length of time that a DNS Name server must cache the name. By default, the TTL is 60 minutes, but it may be modified in the DNS management console. Longer TTLs are best for more permanent records such as MX Records and others. Lower TTL would mean additional network traffic. NTP = Network Time Protocol is used to synchronize clocks of computers and network devices on the Network. NTP has 3 major elements 1. Stratum/Clientstratum 2. Clients 3. Serverservers |
Your company's WAN connects Networks in New York, Atlanta, Dallas, and Boston. Each city is directly connected to every other city. Star | Mesh Explanation: |
Which option is a Critical Metric in preventitive maintenance that would allow you to schedule the replacement of a component at a convenient time, as opposed to waiting for the component to fail at an inopportune time? SLA Requirements | MTBF (Mean Time Between Failures) Explanation: MTBF = is the average, or mean, time between failures on a device or system. It is an expression of reliability. Generally speaking, it is the average length of time that something will work before it is likely to fail. Good preventive maintenance policies would replace a device, such as a power supply as the time in service approaches MTBF. MTTR = Mean Time to Revoer is the average, or mean time that it takes to Recover or Restore a system. Can be applied in terms of Backups, or also applied to full system failures, hardware failures. SLA = Service Level Agreements requirements determine what the vendor who provides technology services is obligated to provide to the customer. Load Balancer = can be used to divert incoming web traffic based on content, to specific servers to reduce workload of the primary server. RTO = Recovery Time Objective, refers to the concept of the amount of time in which a business processes and applications must be restored to prevent a defined amount of impact after an outage. RPO = Recovery Point Objective refers to a maximum tolerable period that data can be considered LOST after an incident. |
An employee has just relocated to the New York Office, after working in Paris for the past five years. Both offices use DHCP to issue IP addresses. She brought her company laptop with her. The laptop was issued in Paris. As she is settling in to the new office, she is not able to connect to the Network. What is most likely the cause of her problem? Duplicate MAC Address | Duplicate MAC Address Explanation: |
Which of the following technologies implements packet tagging in a LAN? Diffserv | CoS (Class of Service) Explanation: |
An eight-port hub receives a signal through port five. That signal is then sent back out through ports one, two, three, four, six, seven, and eight without any signal regeneration. Which type of Hub has been described? switching hub | passive hub Explanation: hub = is a central point of connection between media segments. 2 Primary types of Hubs 1. Passive - sents received signals out through ALL of its ports except the one through which the signal was received. Does NOT amplified or regenerate the signal, therefore it does not require electricity to operate. 2. Active - also sends data out all of its ports except the one through which the signal was received, but it amplifies or regenerates the signal as it sends it out the ports. Therefore it does require electricity to operate. 3. Hybrid - not a Primary type, but there is a Hybrid Hub. Used to connect different types of cabling. Typically connects sub-hubs which connect to computers. Switching Hubs - Also known as Switches or Layer 2 Switches, also serve as connection points between media segments. They are built on a table of MAC Addresses unlike other hubs. Thus they are able to send the signal out through the Specific Port leading to the destination rather than through all of the ports. |
Which of the following Network Devices would be MOST likely found within an Office Building setting? Industrial Control Systems (ICS) | HVAC Systems Explanation: |