Practice Test 2 Part 2 Flashcards

(48 cards)

1
Q

Which strategy is MOST EFFECTIVE for maintaining network availability during scheduled maintenance?

A) Notifying users in advance about potential downtime
B) Implementing redundant systems to take over during maintenance
C) Scheduling maintenance during off-peak hours
D) Performing maintenance in small, incremental steps

A

Implementing redundant systems to take over during maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which scenario would require the SHORTEST RPO?

A) A financial institution processing high-frequency transactions
B) A research facility storing archived experimental data
C) A marketing agency working on weekly campaigns
D) A remote backup service provider with nightly backups

A

A) A financial institution processing high-frequency transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IT team wants to predict how often their systems might fail during operation. Which metric are they focusing on?

A) MTTR
B) RTO
C) MTBF
D) RPO

A

C) MTBF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a commonly cited advantage of using a hot site for disaster recovery?

A) Immediate availability with minimal downtime
B) Real-time replication of critical data
C) Lower operational costs compared to other recovery sites
D) Full mirroring of primary site infrastructure

A

C) Lower operational costs compared to other recovery sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company needs a high availability solution where one server handles all the traffic, and another server only becomes active if the primary server fails.

Which configuration are they most likely using?

A) Active-Active
B) Load Balancing
C) Active-Passive
D) Clustered Storage

A

C) Active-Passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 53
Correct
A network administrator needs to allocate a range of IP addresses for devices on a specific subnet. They must ensure that the addresses are assigned dynamically within this range.

What configuration should the administrator focus on?

A) DHCP Exclusions
B) DHCP Reservations
C) DHCP Scope
D) DHCP Relay

A

C) DHCP Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator needs to ensure that certain IP addresses within the DHCP scope are not assigned to clients because they are reserved for static use.

What configuration should the administrator implement?

A) DHCP Exclusions
B) DHCP Reservations
C) DHCP Lease Time
D) DHCP Relay

A

A) DHCP Exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following best describes the role of DNSSEC in a network?

A) It provides authentication and integrity for DNS responses to prevent spoofing attacks
B) It encrypts DNS queries and responses to protect data privacy
C) It ensures that DNS queries are routed through secure channels only
D) It blocks malicious IP addresses from accessing the DNS server

A

A) It provides authentication and integrity for DNS responses to prevent spoofing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company needs to securely connect its headquarters with a branch office located in another city, allowing both locations to share resources as if they were on the same local network.

What solution should they implement?

A) Site-to-Site VPN
B) Remote Access VPN
C) SSL VPN
D) Client-to-Site VPN

A

A) Site-to-Site VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network administrator needs to configure a new router that has not yet been connected to the network.

What type of connection should they use to perform the initial setup?

A) Console
B) SSH
C) API
D) Telnet

A

A) Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company needs to encrypt sensitive data with a high level of security. They are considering using either a symmetric or an asymmetric encryption algorithm.

Which of the following algorithms should they use if they opt for a symmetric encryption method?

A) RSA
B) ECC
C) DSA
D) AES

A

D) AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best describes the role of MFA in IAM?

A) It allows users to access multiple systems with a single set of credentials
B) It enhances security by requiring users to provide two or more forms of verification before granting access
C) It provides users with temporary access to systems without requiring a password
D) It enables secure access to a network by encrypting all user credentials

A

B) It enhances security by requiring users to provide two or more forms of verification before granting access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following best describes the principle of least privilege in authorization?

A) It allows users to access all resources on a network to ensure maximum productivity
B) It ensures users are granted only the minimum permissions necessary to perform their job functions
C) It grants administrators unrestricted access to all network resources for easy management
D) It provides users with temporary elevated access to resources when needed

A

B) It ensures users are granted only the minimum permissions necessary to perform their job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company recently installed biometric locks to secure its data center. However, they have noticed that some employees are experiencing frequent access denials even though they are authorized users.

What is the most likely cause of this issue?

A) The system has a high FRR
B) Spoofing attacks
C) DDoS attacks
D) The system has a high FAR

A

A) The system has a high FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A security team wants to monitor a broader range of attacker behaviors by setting up multiple decoy systems that work together to simulate a realistic network environment. This setup will allow them to gather extensive data on intruder techniques and methods. What type of security architecture are they implementing?

A) Honeypot
B) IDS
C) DMZ
D) Honeynet

A

D) Honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following best defines a vulnerability in the context of network security?

A) A tool used to exploit weaknesses in a network
B) A weakness or flaw in a system that can be exploited by a threat
C) An unauthorized access attempt by a malicious actor
D) A security measure designed to protect against attacks

A

B) A weakness or flaw in a system that can be exploited by a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company operating in the European Union collects personal data from its customers.

To comply with regulations that require giving customers control over their personal information, including the right to have their data erased, which regulation must the company adhere to?

A) PCI DSS
B) HIPAA
C) GDPR
D) SOX

A

C) GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is NOT an effective strategy for mitigating DoS attacks?

A) Implementing rate limiting to control traffic flow
B) Using firewalls to filter out malicious traffic
C) Deploying redundancy and load balancing to distribute traffic
D) Using anti-virus software to detect and prevent attacks

A

D) Using anti-virus software to detect and prevent attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network administrator notices unauthorized devices appearing in different VLANs across the network. After investigating, they find that these devices are sending frames with 802.1Q tags that don’t match their assigned VLAN.

Which of the following actions would BEST prevent this type of attack in the future?

A) Enable BPDU guard on all switch ports
B) Disable DTP on all switch ports
C) Implement DHCP snooping on the network
D) Increase the length of the DHCP lease time

A

B) Disable DTP on all switch ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the MOST effective technique for mitigating ARP-related attacks?

A) Implementing DHCP snooping on all network switches
B) Enabling port mirroring to monitor ARP requests
C) Using DAI to validate ARP packets
D) Deploying VLAN hopping to isolate ARP requests

A

C) Using DAI to validate ARP packets

21
Q

A user reports that they were redirected to a suspicious website after entering the URL of their bank’s website. The security team investigates and finds that the user’s DNS request was intercepted and altered.

Which of the following measures would BEST prevent this type of attack in the future?

A) Deploying a VPN for all users
B) Configuring firewalls to block all inbound DNS traffic
C) Implementing DNSSEC to ensure the authenticity of DNS responses
D) Regularly flushing DNS caches on all user devices

A

C) Implementing DNSSEC to ensure the authenticity of DNS responses

22
Q

A user reports that they received an unexpected email from their bank asking them to verify a transaction they never made. The security team discovers that the communication between the user and the bank was intercepted and altered.

What type of attack is MOST likely responsible for this incident?

A) A brute-force attack on the user’s email account
B) An on-path attack where the attacker intercepted the communication
C) A phishing attack where the user was tricked into providing credentials
D) A DDoS attack targeting the bank’s website

A

B) An on-path attack where the attacker intercepted the communication

23
Q

Which of the following is a common consequence of a ransomware attack on an organization?

A) The organization’s data becomes inaccessible due to encryption by an attacker
B) The attacker gains unauthorized access to sensitive financial records
C) The organization’s public website is replaced with malicious content
D) The organization experiences a significant increase in spam emails

A

A) The organization’s data becomes inaccessible due to encryption by an attacker

24
Q

A network administrator notices that two different devices on the network are using the same MAC address, causing connectivity issues and intermittent network loss for users.

What measure could have prevented this scenario?

A) Configuring port security to limit the number of devices allowed per port
B) Implementing network segmentation to isolate sensitive devices
C) Using strong encryption protocols to secure network traffic
D) Disabling unused ports and services on all network switches

A

A) Configuring port security to limit the number of devices allowed per port

25
A network administrator notices an unauthorized device attempting to connect to a secured switch port in a corporate network. Despite the device being disconnected, the administrator observes that the port is now disabled, and no other devices can connect to it. What port security feature is most likely responsible for this behavior? A) MAC address filtering B) Port blocking C) DHCP filtering D) Shutdown violation mode
D) Shutdown violation mode
26
A small business is concerned about unauthorized devices accessing its wireless network. The IT team decides to implement a security measure that will only allow known devices to connect. Which solution would best address this concern? A) Implementing dynamic IP addressing for all devices B) Setting up port security on the network switches C) Configuring MAC filtering on the wireless access points D) Using encryption protocols to secure wireless communications
C) Configuring MAC filtering on the wireless access points
27
Which of the following best describes how RBAC differs from ABAC in managing access to cryptographic keys? A) RBAC assigns access based on the attributes of users and resources, while ABAC uses predefined roles B) RBAC dynamically adjusts access permissions based on the context of the access request, while ABAC relies on static roles C) RBAC provides access based on user roles within the organization, while ABAC uses specific attributes such as department, clearance level, and time of access D) RBAC allows access to be granted based on user requests, while ABAC requires administrative approval for each access attempt
C) RBAC provides access based on user roles within the organization, while ABAC uses specific attributes such as department, clearance level, and time of access
28
A company is experiencing an increase in security incidents where employees are inadvertently accessing malicious websites. The IT team needs to implement a solution that will prevent access to these sites and reduce the risk of malware infections. Which solution would be most effective in addressing this issue? A) Implementing a robust firewall to block unauthorized access B) Enforcing strict password policies for all users C) Deploying antivirus software on all employee devices D) Setting up content filtering to restrict access to malicious and inappropriate websites
D) Setting up content filtering to restrict access to malicious and inappropriate websites
29
After designing the network topology and placing the public-facing servers within the screened subnet, what should be the next step the network administrator takes to ensure the subnet is secure? A) Configure the external firewall to allow traffic to the web servers B) Establish security rules on the internal firewall to control traffic between the subnet and the internal network C) Implement intrusion detection systems (IDS) within the subnet to monitor for suspicious activity D) Assign IP addresses to the internal network devices connected to the subnet
B) Establish security rules on the internal firewall to control traffic between the subnet and the internal network
30
A user reports intermittent slowdowns when accessing a shared network drive. What is the BEST initial question to ask to begin diagnosing this issue? A) "Can you describe exactly what happens when the slowdown occurs?" B) "Have you checked if other users are experiencing the same problem?" C) "Is the network drive on the same subnet as your device?" D) "Have you tried rebooting your computer to resolve the issue?"
A) "Can you describe exactly what happens when the slowdown occurs?"
31
A user reports that they cannot access a shared network drive. What is the first thing you should check? A) Whether the user's computer is connected to the network B) If the shared drive permissions have been changed C) Whether the network drive has enough free space D) If the network switch is functioning properly
A) Whether the user's computer is connected to the network
32
You’ve been troubleshooting a recurring network issue that’s only affecting a small subset of users, all located in the same physical area of the building. Despite testing several theories, the root cause remains unclear. What is the MOST appropriate next step? A) Escalate the issue to a more specialized team B) Investigate potential environmental factors that may be contributing to the issue C) Increase the level of logging to gather more detailed information D) Reapply one of the previous fixes to see if the issue temporarily resolves
B) Investigate potential environmental factors that may be contributing to the issue
33
You are about to implement a critical update on a production server. Which of the following actions should you take first? A) Schedule the update during a maintenance window to minimize user impact B) Inform users that the update will occur, but no downtime is expected C) Apply the update immediately to take advantage of the latest security patches D) Begin implementing the update and monitor the server for any immediate issues
A) Schedule the update during a maintenance window to minimize user impact
34
Which of the following is NOT a key difference between STP and UTP cables? A) STP provides better protection against EMI B) UTP is typically less expensive and easier to install C) STP can be used over longer distances than UTP D) UTP is more commonly used in residential networking environments
C) STP can be used over longer distances than UTP
35
A network in a certain section of a building is experiencing intermittent connectivity issues. The cables are all within standard length limits and have been properly terminated. Additionally, the network equipment shows no signs of hardware failure. Which of the following is the MOST likely cause of the problem? A) Crosstalk from improper cable twisting B) Signal attenuation due to cable length C) Electromagnetic interference from nearby sources D) Network congestion affecting performance
C) Electromagnetic interference from nearby sources
36
Which of the following conditions is NOT typically responsible for the presence of runts in a network? A) Duplex mismatches B) Cable faults C) Excessive fragmentation at the IP layer D) Network collisions
C) Excessive fragmentation at the IP layer
37
What is the BEST course of action if a network port is found to be "administratively down" but needs to be reactivated for use? A) Apply the ‘restore connection’ command to reset the port’s status B) Issue the ‘port enable’ command to activate the port C) Use the ‘reactivate interface’ command to bring the port back online D) Issue the ‘no shutdown’ command on the port
D) Issue the ‘no shutdown’ command on the port
38
Which of the following is the MOST common symptom of a network loop? A) High latency in specific applications B) Broadcast storms causing excessive network traffic C) Intermittent connectivity issues with end-user devices D) Unexpected VLAN hopping across the network
B) Broadcast storms causing excessive network traffic
39
What is the BEST initial step to resolve an issue where a switch port is assigned to the wrong VLAN? A) Increase the port’s bandwidth to handle VLAN traffic B) Reboot the switch to reset the port’s configuration C) Change the IP address of the device connected to the port D) Verify the VLAN assignment in the switch’s configuration and correct it if necessary
D) Verify the VLAN assignment in the switch’s configuration and correct it if necessary
40
Which of the following is the MOST common symptom of address pool exhaustion in a DHCP environment? A) Devices are frequently disconnected from the network B) Increased latency in network traffic due to IP conflicts C) New devices cannot obtain an IP address and are assigned APIPA addresses D) Users experience slow internet speeds during peak hours
C) New devices cannot obtain an IP address and are assigned APIPA addresses
41
What is the MOST effective way to prevent duplicate IP address issues in a network? A) Regularly restart network devices to clear any temporary IP conflicts B) Assign static IP addresses from a separate range outside of the DHCP scope C) Implement network segmentation to reduce the chances of IP conflicts D) Use DHCP to automatically assign IP addresses and avoid static IP configurations whenever possible
D) Use DHCP to automatically assign IP addresses and avoid static IP configurations whenever possible
42
Which of the following is NOT a recommended strategy for mitigating network contention? A) Implementing VLANs to segment network traffic B) Increasing the size of the broadcast domain C) Configuring QoS to prioritize critical traffic D) Upgrading network infrastructure to higher bandwidth capabilities
B) Increasing the size of the broadcast domain
43
Which of the following physical layer issues is MOST likely to cause a significant reduction in network throughput? A) A software bug in the routing protocol B) A DNS misconfiguration on client devices C) Incorrect subnet mask configuration on network devices D) A damaged network cable with partially severed pairs
D) A damaged network cable with partially severed pairs
44
Which of the following is NOT a potential solution to reduce packet loss in a network? A) Replacing damaged cables B) Increasing network bandwidth C) Implementing error correction protocols D) Increasing the number of broadcast domains
D) Increasing the number of broadcast domains
45
Which of the following is NOT an appropriate use of a protocol analyzer? A) Identifying the source of network latency B) Capturing packets for analyzing suspicious activity C) Configuring routing protocols on network devices D) Monitoring network performance over time
C) Configuring routing protocols on network devices
46
A network administrator needs to identify devices and their network details within a local network segment. The administrator prefers a tool that operates at Layer 2 of the OSI model. Which of the following tools should be used? A) LLDP B) Nmap C) traceroute D) nslookup
A) LLDP
47
A company is merging with another organization, and the network administrator must ensure that devices on both networks can communicate. One network uses the 192.168.1.0/24 range, and the other uses 192.168.2.0/24. Both networks have overlapping IP addresses, causing conflicts. What is the BEST solution for resolving the IP address conflicts? A) Implement NAT B) Reconfigure one network with a different subnet C) Disable DHCP on both networks D) Use VLANs to isolate the conflicting devices
B) Reconfigure one network with a different subnet
48
What must be configured to ensure instances in a VPC can communicate with the internet via an internet gateway? A) Assigning a public IP address to the instances B) Setting up internal firewalls for each instance C) Creating an encrypted VPN tunnel D) Configuring DNS records for the instances
A) Assigning a public IP address to the instances