Practice Test #1 Flashcards
(90 cards)
What Ethernet feature will allow increased FCoE network throughput as long as all network devices recognize their specific size?
Quality of service
Jumbo frames
Frame relay
TCP offloading
Jumbo frames
OBJ 2.2: By allowing jumbo frames, network throughput can be increased. Fibre Channel over Ethernet (FCoE) is a computer network technology that encapsulates Fibre Channel frames over Ethernet networks. This allows Fibre Channel to use 10 Gigabit Ethernet networks (or higher speeds) while preserving the Fibre Channel protocol. Jumbo frames are Ethernet frames with more than 1500 bytes of payload, the IEEE 802.3 standard limit.
You work for Dion Training as a physical security manager. You are concerned that the physical security at the entrance to the company is not sufficient. To increase the security, you are determined to prevent piggybacking. What technique should you implement first?
Install a RFID badge reader at the entrance
Require all employees to wear security badges when entering the building
Install CCTV to monitor the entrance
Install an access control vestibule at the entrance
Install an access control vestibule at the entrance
Overall explanation
An access control vestibule, or mantrap, is a device that only allows a single person to enter per authentication.
Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
TACACS+
RADIUS
Kerberos
CHAP
TACACS+
TACACS+ is an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco.
Which of the following communication types can only be used with IPv6?
Broadcast
Anycast
Multicast
Unicast
Anycast
OBJ 1.4: Anycast only works with IPv6. Anycast communications are sent to the nearest receiver in a group of receivers with the same IP.
What is the broadcast address associated with the host located at
189.76.60.164/26?
189.76.60.192
189.76.60.191
189.76.60.129
189.76.60.128
189.76.60.191
Explanation:
The notation /26 means that the first 26 bits of the IP address are used for the network portion. The corresponding subnet mask in dotted-decimal notation is 255.255.255.192. With /26, there are 6 bits available for host addresses (since 32 - 26 = 6), resulting in 2⁶ = 64 total addresses per subnet.
Step 2: Determine the Subnet’s Range
Since each subnet contains 64 addresses, the valid ranges (in the fourth octet) will increment by 64. The possible ranges in the fourth octet are as follows:
0 to 63, 64 to 127, 128 to 191, 192 to 255.
Step 3: Locate the Host’s Subnet
The given IP address is 189.76.60.164. Look at the last octet (164) to determine which block it falls into. Since 164 is between 128 and 191, the network this address belongs to starts at 189.76.60.128.
Step 4: Identify the Broadcast Address
In any subnet, the broadcast address is the very last address in the range. For a subnet that starts at 189.76.60.128 and has 64 addresses, the broadcast address is:
Network Address + (Total Addresses - 1)
= 128 + 63
= 191
Thus, the broadcast address is 189.76.60.191.
After deploying a new subnet for a department, a network technician finds that devices in this subnet experience intermittent connectivity issues. Investigation reveals IP address conflicts. What TWO items should be checked to ensure resolution of this situation?
Port security settings
STP configurations
Routing table
Potential Duplicate IP address
DHCP scopes
Potential Duplicate IP Addresses
DHCP scopes
Overall explanation
OBJ 5.3 - Duplicate IP addresses can cause the connectivity issues described, as multiple devices attempting to use the same IP can intermittently disrupt each other’s connections. DHCP scopes should also be reviewed to ensure they are correctly configured and not overlapping with static IP assignments, which can lead to duplicates.
You are working at the service desk as a network security technician and just received the following email from an end-user who believes a spear phishing campaign is being attempted against them:
From: user@diontraining.com
To: susanne@diontraining.com
Subject: You won a free iPhone!
Dear Susanne,
You have won a brand new iPhone! Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freesmartphone.io:8080/claim.php)
What should you do to prevent any other employees from accessing the link in the email above while still allowing them access to any other webpages at the domain freesmartphone.io?
Add DENY IP ANY ANY EQ 8080 to the IPS filter
Add DENY TCP http://www.freesmartphone.io ANY EQ 8080 to the firewall ACL
Add http://www.freesmartphone.io:8080/claim.php to the load balancer
Add http://www.freesmartphone.io:8080/claim.php to the browser’s group policy block list
Add http://www.freesmartphone.io:8080/claim.php to the browser’s group policy block list
Overall explanation
OBJ 4.3: There are two ways to approach this question. First, you can consider which is the right answer (if you know it). By adding the full URL of the phishing link to the browser’s group policy block list (or black hole list), the specific webpage will be blocked from being accessed by the employees while allowing the rest of the freesmartphone.io domain to be accessible. Now, why not just block the entire domain? Well, maybe the rest of the domain isn’t suspect, but just this one page is. (For example, maybe someone is using a legitimate site like GitHub to host their phishing campaign. Therefore, you only want to block their portion of GitHub.) The second approach to answering this question would be to rule out the incorrect answers. If you used DENY TCP to the firewall ACL answer, you would block all access to the domain, blocking legitimate traffic as well as possible malicious activity. If you used the DENY IP ANY ANY to filter traffic at the IPS, you would block any IP traffic to ANY website over port 8080. If you added the link to the load balancer, this would not block it either. Therefore, we are only left with the correct answer of using a group policy in this case.
What is the network ID associated with the host located at 172.16.200.130/26?
172.16.200.0
172.16.200.128
172.16.200.129
172.16.200.127
172.16.200.128
OBJ 1.7: In classless subnets using variable length subnet mask (VLSM), the network ID is the first IP address associated within an assigned range. In this example, the CIDR notation is /26, so each subnet will contain 64 IP addresses. Since the IP address provided is 172.16.200.130, it will be in the 172.16.200.128/26 network.
Which of the following types of agreements is used to protect an organization’s intellectual property and is considered legally binding between the signatories?
SLA
AUP
MOU
NDA
NDA
Overall explanation
OBJ 3.1: A non-disclosure agreement (NDA) is a documented agreement between two parties that define what data is considered confidential and cannot be shared outside of that relationship. An NDA is used to protect an organization’s intellectual property. An acceptable use policy (AUP) is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict the ways in which the network, website, or system may be used and sets guidelines as to how it should be used. A memorandum of understanding (MOU) is a non-binding agreement between two or more organizations to detail what common actions they intend to take. A service level agreement (SLA) is a documented commitment between a service provider and a client, where the quality, availability, and responsibilities are agreed upon by both parties.
Michael, a system administrator, is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. Which of the following commands should he enter on his workstation to resolve this connectivity issue?
C:\windows\system32> route print
C:\windows\system32> nbtstat –R
C:\windows\system32> nslookup
C:\windows\system32> ipconfig /flushdns
C:\windows\system32> nbtstat –R
Overall explanation
OBJ 5.5: Since this is a Windows-based network, the client is likely attempting to connect to the servers using NetBIOS. NetBIOS stores a local cached name table in the LMHOSTS file on each client. If the entry in the client file is pointing to the wrong IP, this could cause the connectivity issues described. Therefore, the system administrator should enter the “nbtstat -R” command to purge and reload the cached name table from the LMHOST file on their Windows workstation. The nslookup command is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information. The nslookup command has an interactive and non-interactive mode. The ipconfig command is used on Windows devices to display the current TCP/IP network configuration and refresh the DHCP and DNS settings on a given host. The route command is used to create, view, or modify manual entries in the network routing tables of a computer or server.
A network administrator is tasked with connecting two buildings in an enterprise network. They decide to use fiber optic cabling for high-speed data transmission. Which type of fiber optic cable is best suited for long-distance communication between the buildings?
Coaxial Cable
Multimode fiber
Direct attach copper (DAC) cable
Single-mode fiber
Single-mode fiber
Overall explanation
OBJ 1.5 - Single-mode fiber is ideal for long-distance communication because it uses a single light path, minimizing signal loss and allowing data to travel farther compared to multimode fiber. Multimode fiber is better suited for shorter distances due to higher signal dispersion. Direct attach copper cables are typically used for short-range, high-speed connections, such as within data centers. Coaxial cable is not designed for the high-speed, long-distance requirements of fiber optic networks.
Which network protocol is commonly used for centralized authentication, authorization, and accounting for remote access users?
SNMP
LDAP
POP3
RADIUS
RADIUS
Explanation:
RADIUS (Remote Authentication Dial-in User Service) is specifically designed for remote authentication and authorization, providing a centralized system for managing user access to network resources, making it the correct choice. SNMP (Simple Network Management Protocol) is used for network management and monitoring, not for authentication purposes. POP3 (Post Office Protocol version 3) is an email retrieval protocol and is not used for authentication of remote access users. LDAP (Lightweight Directory Access Protocol) is often used for directory services such as user authentication, but it lacks the robust features of RADIUS, particularly in managing remote access user sessions.
In a bustling office environment, employees rely heavily on the company’s Wi-Fi network to access resources, collaborate, and communicate. However, lately, users have been encountering difficulties connecting their devices to the network. Despite being within range of the Wi-Fi access points, devices struggle to obtain IP addresses and often fail to connect to the network altogether. The IT department is tasked with resolving these connectivity issues promptly. Which of the following is the MOST likely cause of the reported network issues?
Outdated firmware on Wi-Fi access points
Address Pool Exhaustion
Interference from nearby electronic devices
Configuration error in DHCP settings
Address Pool Exhaustion
Overall explanation
OBJ 5.3: Address Pool Exhaustion occurs when all available IP addresses are assigned, preventing new devices from connecting. Interference may disrupt connectivity but doesn’t address the inability to obtain IP addresses. DHCP configuration errors could cause problems, but Address Pool Exhaustion directly relates to the reported issue. Outdated firmware could cause issues but doesn’t explain the inability to connect due to IP address unavailability.
Which of the following types of hosting would an organization use if they wanted to maintain their own datacenter in their worldwide headquarters?
Collocation
Branch Office
Cloud
On-Premise
On-Premise
Overall explanation
OBJ 1.8 - If you use an on-premise data center, then you are using a traditional, private data infrastructure where your organization has its own datacenter that houses all of its servers and networking equipment that will support its operations. A branch office is a smaller office that connects back to an on-premise solution or maintains their own smaller version of an on-premise solution. In a colocation arrangement, your organization would place their servers and network equipment in a data center environment owned by another company. Essentially, you would rent space in their datacenter instead of having to build your own. Cloud hosting relies upon a cloud service provider to provide the hardware and infrastructure for an organization’s virtualized datacenter needs.
A technician is called to investigate a connectivity issue to a remote office connected by a fiber optic cable. Using a light meter, it is determined that there is excessive dB loss. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cable was installed. Which of the following is most likely the reason for the excessive dB loss?
Distance Limitations
Wavelength mismatch
Bend radius limitation
Dirty connectors
Dirty connectors
Overall explanation
OBJ 5.2: When fiber optic connectors become dirty, signal loss can cause severe problems and performance issues. Something as simple as oil from a technician’s hand can render a fiber connector dirty and cause a loss of signal. The technician will need to use appropriate cleaning cloth to clean the dirty connectors and restore the service. Since the switch was only moved to the other side of the room, it is unlikely that it now exceeds the distance limitations for a fiber cable since those are measured in hundreds of meters. The question does not mention that the cable was bent or moved around a corner, therefore it is unlikely to be a bend radius limitation affecting the signal. Fiber optic cables use different wavelengths depending on the type of fiber optic cable being used. Multimode fibers use 850 or 1300 nanometer wavelengths, whereas single-mode fibers use 1550 nanometer wavelengths. It is unlikely that the wrong patch cable was used as most organizations only implement a single type of fiber infrastructure to minimize the number and type of cables needed to support them.
Which of the following is an example of a valid IPv4 address?
192.168.1.254
192:168:1:55
00:AB:FA:B1:07:34
::1
192.168.1.254
Overall explanation
OBJ 1.7: An IPv4 address consists of 32 bits. IPv4 addresses are written in dotted octet notation, such as 192.168.1.254. MAC addresses are writing as a series of 12 hexadecimal digits, such as 00:AB:FA:B1:07:34. IPv6 addresses are written as a series of up to 32 hexadecimal digits, but can be summarized using a :: symbol. The ::1 is the IPv6 address for the localhost. The other option, 192:168:1:55 is not a valid address since it uses : instead of a . in between the octets.
Mark is in charge of redesigning the network infrastructure for a corporate office that will soon migrate to high-speed fiber optic internet. To ensure the network’s physical layer is robust, easily manageable, and future-proof, Mark must choose an appropriate way to manage the incoming fiber optic connections and distribute them throughout the building. What is the best option for Mark to implement in this scenario?
Use a fiber distribution panel for efficient management of fiber optic connections.
Implement a centralized virtual LAN (VLAN) configuration for easier network management.
Replace all existing copper cables with fiber optics to ensure compatibility.
Configure additional DHCP scopes to accommodate the increased network capacity.
Use a fiber distribution panel for efficient management of fiber optic connections.
Overall explanation
OBJ 2.4 - Using a fiber distribution panel is the best option for efficiently managing fiber optic connections in a corporate office network infrastructure. It provides a centralized point for connecting incoming fiber optic lines to the network’s backbone and distributing them throughout the building, facilitating easier management, troubleshooting, and future expansions. Configuring additional DHCP scopes increases the network’s IP address capacity but does not relate to managing physical fiber optic connections. Implementing a centralized VLAN configuration would help with network management on the software layer but does not address the physical management of fiber optic connections. Replacing all existing copper cables with fiber optics ensures compatibility with high-speed internet but does not address the organization and distribution of these connections.
Max is a network technician who just terminated the ends on a new copper cable used between two legacy switches. When he connects the two switches using the cable, they fail to establish a connection. What is MOST likely the issue?
The cable has exceeded bend radius limitations
The cable is a straight-through cable
The cable has RJ-11 connectors instead of RJ-45
The cable is a crossover cable
The cable is a straight-through cable
Overall explanation
OBJ 2.2: There are two types of cable, Straight-through and Crossover. In this instance, a crossover cable would need to be used to communicate with legacy switches since they won’t support MDIX. A medium dependent interface crossover (MDIX) is a version of the medium dependent interface (MDI) enabling a connection between corresponding devices, such as a switch to another switch. If the switch doesn’t MDIX, then you must use a crossover cable to connect them. Bend radius cannot be the correct answer to this question since copper cables are being used and not fiber cables. Bend radius is a concern when using fiber cables as it leads to increase reflections and a decrease in signal strength. An RJ-11 connector only has 6 pins and is smaller than an RJ-45 connector. The technician would visually be able to see the difference as the RJ-11 connector would not fit properly in the switchports.
Which statement accurately describes Layer 2 encapsulation in Virtual Extensible Local Area Network (VXLAN)?
VXLAN encapsulates Layer 2 frames within Layer 4 TCP packets.
VXLAN encapsulates Layer 3 packets within Layer 2 frames.
VXLAN encapsulates Layer 2 frames within Layer 2 Ethernet packets.
VXLAN encapsulates Layer 2 frames within Layer 3 UDP packets.
VXLAN encapsulates Layer 2 frames within Layer 3 UDP packets.
Explanation:
VXLAN encapsulates Layer 2 Ethernet frames within Layer 3 UDP packets, specifically using User Datagram Protocol (UDP) as the transport protocol. This encapsulation allows for the creation of virtual Layer 2 networks over Layer 3 infrastructure, facilitating efficient communication between virtual machines across different physical networks. The other options describe incorrect encapsulation methods.
Dion Training has just purchased a new domain name and needs to indicate which DNS server is the definitive information source for the domain. Which type of DNS record should be created?
AAAA
SOA
MX
A
Start of Authority (SOA)
Explanation:
OBJ 3.4: A Start of Authority (SOA) resource record indicates which Domain Name Server (DNS) is the best source of information for the specified domain. An AAAA record associates your domain name with an IPv6 address. An A record associates your domain name with an IPv4 address. An MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic.
Which type of VPN specifically allows users to remotely access a private network without requiring them to install any special software or plugins?
Site-to-Site
SSL VPN
IPsec VPN
Clientless
Clientless
Overall explanation
OBJ 3.5 - Clientless VPNs enable users to access a private network through a web browser without needing to install additional software, which provides convenience and flexibility for remote access without compromising security. Site-to-Site VPNs establish secure connections between two separate networks, such as branch offices or data centers. These site-to-site VPNs can be clientless, however there is no restriction for them to be configured this way, making it incorrect. SSL VPNs utilize the Secure Sockets Layer (SSL) protocol to establish secure connections between users and the private network. While SSL VPNs can be clientless, not all SSL VPN implementations are clientless. IPsec VPNs use the Internet Protocol Security (IPsec) protocol suite to secure communication between two devices or networks. While IPsec VPNs provide strong security for remote access, they typically require client software installation, unlike clientless VPNs.
What metric does OSPF use for route selection?
Bandwidth
Your answer is incorrect
Hop count
Load
Cost
Cost
Overall explanation
OBJ 2.1 - OSPF uses cost as its metric for route selection, which is calculated based on the bandwidth of the links. The lower the cost, the more preferred the route. This allows OSPF to select the most efficient path based on the link speeds. While OSPF’s cost metric is influenced by bandwidth, “bandwidth” itself is not the metric OSPF uses directly. “Load” is not a metric used by OSPF for route selection; it primarily relies on cost, which is derived from link bandwidth. “Hop count” is the metric used by RIP, not OSPF.
A technician is testing a new web-based tool capable of generating an automatic teller machine (ATM) cash and service availability reports. A consortium of financial institutions developed the web-based tool. Which of the following cloud delivery models is being described in this scenario?
Private
Community
Public
Hybrid
Community
Overall explanation
OBJ 1.3: A community cloud is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The scenario described is a community cloud created tool by the banking industry.
What can be issued from the command line to find the layer 3 hops to a remote destination?
netstat
ping
traceroute
nslookup
traceroute
OBJ 5.5: Traceroute will determine every hop between the host and the destination using ICMP. Traceroute is used for Linux and UNIX systems. Tracert is used for Windows systems. The traceroute command will issue a series of pings from the host to the destination, incrementing the time to live (TTL) by one each time. As each packet passes through a router or firewall, the TTL is decreased by one. If the TTL for a packet reaches zero, it will send an error message back to the host. By doing this, the host can map out each hop in the network from the host to the destination. The netstat command is used to display the network statistics. The nslookup command is used to display and troubleshoot DNS records. The ping command is used to test the end to end connectivity between a host and a destination. The netstat, nslookup, and ping commands cannot be used to find the layer 3 hops to a remote destination.