ACT CompTIA Network+ N10-008 Practice Test Flashcards
Identify and list the types of secure protocols that use communications protected by the host’s private key.
SELECT ALL THAT APPLY
Secure Hash Algorithm (SHA)
HyperText Transfer Protocol over SSL/TLS (HTTPS)
Message Digest (MD5)
Secure Shell (SSH)
HyperText Transfer Protocol over SSL/TLS (HTTPS)
Secure Shell (SSH)
When using a secure channel, such as Secure Shell (SSH), the communications are protected by the host’s private key. SSH typically uses a utility such as ssh-keygen.
When using a secure channel, such as HTTP over SSL/TLS, the communications are protected by the host’s private key. HTTPS make a certificate signing request (CSR) with new key material and submit it to the certificate authority (CA) that issues digital certificates.
Secure Hash Algorithm (SHA) is a secure hash algorithm and is a means of fingerprinting a file.
Message Digest (MD5) is a secure hash algorithm and is a means of fingerprinting a file.
An administrator configured a group of routers so that one router is the master, and all other routers are prioritized backups that monitor to the master and if the master loses connectivity one of the backups becomes the new master based on priority. What is the administrator using?
VRRP
Multipathing
NIC Teaming
ISP
VRRP
The administrator is using Virtual Router Redundancy Protocol (VRRP) where the active router is known as the master and all other backup routers monitor the status of the master.
An organization may need to contract multiple Internet Service Providers (ISPs) and use routing policies to forward traffic over multiple external circuits to provide fault tolerance and load balancing.
Network Interface Card (NIC) teaming on a host means combining two or more separate cabled links between a host and a switch into a single logical channel.
Multipathing means that a network node has more than one physical link to another node and is a default feature of full and partial mesh internetworks.
A network architect is updating the organization’s network to use one set of credentials to access corporate equipment, further mitigating threats and vulnerabilities. What is the architect creating for each employee?
Vendor assessment
Vulnerability assessment
Threat assessment
Single sign-on (SSO)
Single sign-on (SSO)
A single sign-on (SSO) system allows the user to authenticate once to a local device and access compatible application servers without having to enter credentials again.
A vulnerability assessment is an evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system.
A vendor management assessment is a process for selecting supplier companies and evaluating the risks inherent in relying on a third-party product or service.
Threat assessment is the process of identifying threat sources and profiling the types and capabilities of threat actors.
A network consultant is conducting a test to determine the amount of data transferred through a connection over a given period. What is the consultant testing?
Netflow data
Bandwidth
Baselines
Audit Logs
Bandwidth
Generally, bandwidth refers to the amount of transferable data through a connection over a given period.
An audit log records the use of authentication and authorization privileges. It will generally record success/fail type events. An audit log is also an access log or security log.
Reviewing baselines is the process of evaluating whether a baseline is still fit for purpose or whether a network technician should establish a new baseline.
Netflow is a Cisco-developed means of reporting network flow information to a structured database. NetFlow allows a better understanding of IP traffic flows as used by different network applications and hosts.
A school with no resources stages an enterprise mobility management solution for their planned “Bring Your Own Device” (BYOD) program. A network analyst will caution them about obstacles they will need to mitigate as a successful part of this rollout. What are the obstacles? (Select all that apply.)
SELECT ALL THAT APPLY
Security
Feature licensing
Misconfigured firewall
Compatibility
Security
Compatibility
BYOD device variety also causes security issues, especially in terms of unpatched devices. Another issue is that the device is not fully under the administrative control of the IT department. An insider threat actor could install apps that might risk school data or misuse the device to exfiltrate data.
The wide range of BYOD devices, mobile OS versions, and vendor support for patches do the job of ensuring that each device can connect to network apps and data resources highly complex.
Licensing for servers and network appliances can be complex, and it is easy to make configuration errors. Although this would be a problem, it would not be specific to a BYOD subset of devices.
Although a misconfigured firewall would be something to address, it would affect all BYOD devices and school-owned devices.
A network administrator is trying to set up IP assignments to be automatic for all broadcast domains. How can they enable this for routers?
Dynamic assignment
Stratum
IP helper
DHCP relay
DHCP relay
A DHCP relay agent can be configured to provide forwarding of DHCP traffic between subnets. Routers that can provide this type of forwarding are described as RFC 1542 compliant.
This IP helper functionality can be configured on routers to allow set types of broadcast traffic (including DHCP) to be forwarded to an interface.
A disadvantage of the standard dynamic assignment method is that it does not guarantee that any given client will retain the same IP address over time.
Top-level NTP servers (stratum 1) obtain the Coordinated Universal Time (UTC) via a direct physical link to an accurate clock source.
A network administrator implemented video surveillance mechanisms to provide a layer of defense in the event prevention-based controls fail to work. If this security mechanism is effective, it ensures which of the following options? (Select all that apply.)
SELECT ALL THAT APPLY
Detecting attempts to penetrate a barricade
Recording of movement and access
Improving resilience of perimeter gateways
Shorter response times and fewer guards needed
Detecting attempts to penetrate a barricade
Recording of movement and access
Improving resilience of perimeter gateways
Detection-based controls provide an important layer of defense if prevention-based controls fail to work. Effective surveillance mechanisms ensure attempts to penetrate a barricade are detected.
Detection-based controls provide an important layer of defense if prevention-based controls fail to work. Surveillance is another layer of security designed to improve the resilience of perimeter gateways.
Detection-based controls provide an important layer of defense if prevention-based controls fail to work. The other big advantage of video surveillance is that movement and access can be recorded.
The main drawback to surveillance is longer response times, and security may be compromised if not enough staff are in place to monitor the camera feeds.
A fancy new office floor uses high-gloss, shiny tile on the walls and on the building’s inside pillars. Employees are reporting connectivity issues and slow download speeds. Identify the most likely reason for the reported issues.
Signal mismatch
Signal refraction
Signal absorption
Signal reflection
Signal reflection
A signal reflection is a multipath interference caused by mirrors or shiny surfaces. A high-gloss, shiny tile will have a mirror effect. A variable delay in the signal is also introduced in this case.
A signal refraction occurs when radio waves bend and take a different path to the receiver caused by glass or water.
A signal absorption happens when obstacles such as walls are in the signal’s patch. Concrete walls are the most effective at absorbing the wireless signal.
A signal or frequency mismatch occurs, for example, when a laptop with a network interface card (NIC) using a 2.4 Ghz frequency attempts to connect to an access point (AP) using the 5.0 Ghz frequency. All users are connecting in this case.
Which of the following are characteristics of cloud services as opposed to local services? (Select all that apply.)
SELECT ALL THAT APPLY
Direct attached storage
Pay-per-use
Virtualization
Rapid elasticity
Pay-per-use
Rapid elasticity
Cloud service provides rapid elasticity. This means it can scale quickly to meet peak demand. A company may operate a single web server for part of the year but provision additional instances for the busy periods.
Pay-per-use is a feature provided by many cloud services like Amazon Web Services and Microsoft Azure Cloud. Customers only use services as needed, making it cost efficient.
Virtualization is used on cloud and local services. Although virtualization makes cloud possible, it is not exclusive to cloud services. vSphere virtual solutions can be used as stand alone.
Direct attached storage (DAS) is a storage drive within a computer server. Although cloud services may operate on physical hosts with DAS, it is not exclusive to cloud services.
A network engineer is designing a network in various offices to create multiple broadcast domains. Each has its own Virtual Local Area Network (VLAN). When configuring these multiple broadcast domains on the switch, the switch will be operating at what layer of the OSI model?
Layer 7
Layer 2
Layer 5
Layer 3
**Layer 3 **
Layer 3 of the OSI model is the Network layer. Information is sent and configured using logical network addresses (e.g. IP address). Layer 3 switches are capable of creating multiple broadcast domains using multiple subnet IP ranges.
Layer 2, or the Data link layer, is responsible for transferring data between nodes on the same logical segment using local or hardware addresses (e.g. MAC address).
Layer 7 or the application layer provides an interface for software programs on the network. A switch will never operate at layer 7.
Layer 5 or the Session layer represents the dialog control functions to exchange messages between the client and server. SSH (Secure Shell) is an example of using the session layer.
A tech team provides a network technician with a faulty device. They want a new one with the same parameters as the failed device. What should the parameters on the new device be?
Baseline Configuration
Business Continuity Plan
Audit and Assessment Report
Change Management
Baseline Configuration
Each device should have a documented baseline configuration. The deployment process should be capable of applying this configuration to a replacement device or restoring a faulty device.
A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.
An audit and assessment report makes recommendations on where the network is not meeting goals for performance or security.
Business continuity planning (BCP) identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event.
A network engineer is setting up a network in a new building. What should the engineer complete to make sure the access points are properly placed?
nmap
Asset tags
Site survey
Baseline report
Site survey
A site survey is documentation about a location to build an ideal wireless infrastructure. It often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and identifying sources of interference.
A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.
Asset tags are important to gather when setting up a network to track where devices are, but it does not help the network’s performance.
The Nmap Security Scanner is widely used for IP scanning, both auditing and penetration testing tools.
What application can define policy decisions on the control plane?
Software Defined Networking (SDN)
Network Controller
Storage Area Network (SAN)
Distributed switching
Software Defined Networking (SDN)
A Software Defined Networking (SDN) application, or suite of applications, can be used to define policy decisions on the control plane.
The decisions that are defined by the SDN are implemented on the data plane by a network controller application. The network controller application interfaces with the network devices using Application Programming Interfaces (APIs).
Distributed switching accommodates the design goals of adaptability and scalability and is a hierarchical model.
A Storage Area Network (SAN) is one that interconnects storage devices, such as tape drives, to make pools of shared storage capacity available to servers.
A network technician is setting up DHCP scopes for printers. Which of the following would be the best practice for these? (Select all that apply.)
SELECT ALL THAT APPLY
Dynamic assignment
Lease time
Reservation
Static assignment
Reservation
Static assignment
A reservation is a mapping of a MAC address or interface ID to a specific IP address within the DHCP server’s address pool.
Statically assigned addresses can be assigned from a specially configured exclusion range if this is supported by the server.
One disadvantage of the standard dynamic assignment method is that it does not guarantee that any given client will retain the same IP address over time.
A long lease time means the client does not have to renew the lease often, but the DHCP server’s available pool of IP addresses is not replenished frequently. Printers should be fixed.
A technology company is investigating the possibility of working with a marketing company on the development and advertising of a new product. In order to discuss the details of the product without concern that the marketing firm will share it with other technology companies, what will the technology company ask the marketing firm to sign?
Memorandum of understanding
Security policy
Service level agreement
Non-disclosure agreement
Memorandum of understanding
The technology company will ask the marketing firm to sign a memorandum of understanding (MOU) which is a preliminary agreement to express an intent to work together and almost always have clauses stating that the parties shall respect confidentiality.
A non-disclosure agreement (NDA) defines the permitted uses of sensitive data, the enforcement of storage and distribution restrictions, and what penalties for breaches of the agreement will incur.
Security policy establishes a duty for each employee to ensure the confidentiality, integrity, and availability of any data assets or processing systems that they use as part of their job.
A service level agreement (SLA) is a contractual agreement setting out the detailed terms under which a service provider provides an ongoing service.
A network engineer conducts a redundancy check and identifies that interference exists due to a poor-quality cable. What is this finding called?
CRC
Logging Levels
MIB
CRC error
CRC error
Interference usually causes CRC errors. This interference might be due to poor quality cable or termination, attenuation, mismatches between optical transceivers or cable types, or some external factor.
The error checking field contains a 32-bit (4-byte) checksum called a Cyclic Redundancy Check (CRC) or Frame Check Sequence (FCS).
The logging level configured on each host determines the maximum level at which events are recorded or forwarded.
The agent is a process (software or firmware) running on a switch, router, server, or other SNMP-compatible network devices. This agent maintains a database called a Management Information Base (MIB) that holds statistics relating to the device’s activity, such as the number of frames per second handled by a switch.
A network administrator is deciding which session control protocol they should use for their environment. Which of the following would they use?
EGP
RIP
RTP
SIP
SIP
The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end-user devices (also known as user agents), such as IP-enabled handsets or client and server web conference software.
While SIP provides session management, the actual delivery of real-time data uses different protocols. The principal one is Real-time Transport Protocol (RTP).
The Routing Information Protocol (RIP) is a distance vector routing protocol. RIP only considers a single piece of information about the network topology.
An Exterior Gateway Protocol (EGP) can advertise routes between autonomous systems. An EGP includes a field to communicate the network’s autonomous system ID.
An office installed a wireless Access Point (AP). A network technician is in the area, surveying the signal from the AP and other background noises. The technician is looking for an above average Signal-to-Noise Ratio (SNR) to approve use of the AP. Which of the following readings would the technician consider unsatisfactory? (Select all that apply.)
SELECT ALL THAT APPLY
Background noise decibel is high.
RSSI (Received Signal Strength Indicator) decibel is low.
AP signal decibel is high.
SNR is high.
Background noise decibel is high.
RSSI (Received Signal Strength Indicator) decibel is low.
RSSI (Received Signal Strength Indicator) is an access point (AP) signal expressed as a percentage or decibel reading (dBm). A low dBm reading is unsatisfactory.
Background noise dBm must be as low as possible. AP signal dBm should be higher than background noise, and never the same to be rated good.
An AP signal with a high decibel reading (dBm) with the number beginning in the negative range and moving towards 0, is good. A -50 dBm is better than -65 dBm.
The signal-to-noise ratio must be high to be rated good. For example, if signal is 65 dBm and noise is 90 dBm, the SNR is 25 decibels (dB). A SNR at 5 dB would be worse.
fiber link is terminated at a demarc. Which of these solutions would accomplish that?
Smartjack
VDSL
FTTP
FTTN
FTTP
The most expensive solution is Fiber to the Premises (FTTP). The essential point about both these implementations is that the fiber link is terminated at the demarc.
Fiber to the Node (FTTN) retains some sort of copper wiring to the demarc while extending the fiber link to a communications cabinet servicing multiple subscribers.
Service providers with their roots in telephone networks use Very high-speed DSL (VDSL) to support FTTC. It allows for both symmetric and asymmetric modes.
A T1 line from the service provider is terminated at the demarc on a smartjack. The smartjack has an RJ-48C or RJ-48X interface on the customer side.
An engineer plans to configure a device as transparent, rather than non-transparent, at an organization. Which device does the engineer configure?
Firewall
Load balancer
Proxy server
Content filter
Proxy server
A proxy server is used as a middle-man for Internet access. A transparent proxy is configured on an inline device, while a nontransparent proxy is configured on a client machine.
Content filtering is a feature found in security appliances, such as firewalls. With content filtering enabled, people can block websites based on criteria such as topic categorization.
Firewalls are principally used to implement security zones, such as intranet, screened subnet topology, and Internet.
A load balancer distributes client requests across available systems, like server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.
A cyber engineer tests the organization’s network firewall to see if any vulnerabilities can be observed. What is the name of this test?
Penetration
Kerberos
LDAP
Honeypot
Penetration
Penetration testing aims to model how exposed the organization is to vulnerabilities that threat actors could exploit.
The client submits the Kerberos credentials (a Ticket Granting Ticket) obtained when the user logged onto the workstation to the server using the Generic Security Services Application Program Interface (GSSAPI).
Lightweight Directory Access Protocol (LDAP) is not a directory standard but a protocol used to query and update an X.500-like directory.
A honeypot is a computer system set up to attract attackers, intending to analyze attack strategies and tools, provide early warning of attack attempts, or possibly as a decoy to divert attention from actual computer systems.
There has been a system breach on the corporate network utilizing the installation of particular software. The security manager asks for a report to show which computers have this software installed on them. What data should the security administrator investigate to provide the requested information?
Syslog
Encapsulation errors
CRCs
Netflow data
Syslog
Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.
Netflow is a Cisco-developed means of reporting network flow information to a structured database. NetFlow allows a better understanding of IP traffic flows as used by different network applications and hosts.
Encapsulation errors will prevent transmission and reception. If you check the interface status, the physical link will be up, but the line protocol will be down.
CRC errors are caused by interference. This interference might be due to poor quality cable or termination, attenuation, mismatches between optical transceivers or cable types, or some external factor.
What describes what happens when traffic is recirculated and amplified by loops in the switching topology?
Asymmetrical routing
Broadcast storm
Hardware failure
Routing loop
Broadcast storm
In a broadcast storm, traffic is recirculated and amplified by loops in a switching topology, causing network slowdowns and crashing switches.
A routing loop occurs when two routers use one another as the path to a network. Packets are caught in a routing loop circle around until the TTL expires. One symptom of a potential routing loop is for routers to generate ICMP Time Exceeded error messages.
Asymmetrical routing refers to a topology where the return path is different from the forward path.
Hardware failure may cause issues on a network but typically does not cause a flood of traffic.
A user logged on to a desktop client and was immediately prompted to enter credit card information to proceed. What type of attack is the user witnessing on screen?
Brute-force attack
Ransomware
MAC spoofing
Phishing
Ransomware
Ransomware is malware that tries to extort money from the victim. For example, it does this by appearing to lock the victim’s computer or by encrypting their files.
Phishing is an email-based social engineering attack, where the attacker sends an email from a supposedly reputable source to try to elicit private information from the victim.
Brute-force attack is a password attack where software tries to match the password hash against one of every possible combination it could be to gain access to a system.
Media Access Control (MAC) or IP spoofing is when a threat actor spoofs the value of a valid MAC or IP address to try to circumvent an access control list or impersonate a legitimate server.