Test 0 Flashcards
(100 cards)
- A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
A. Move the UTM onto the LAN side of the network
B. Enable TLS inspection on the UTM
C. Enable stateful inspection on the UTM
D. Configure the UTM to deny encrypted files from being transferred
C. Enable stateful inspection on the UTM
Stateful-inspection firewalls: Unlike packet-filtering firewalls, stateful-inspection firewalls can track and “understand” when a TCP connection has occurred. This allows for reply traffic to be allowed through the firewall without the need for explicit rules. As a result, stateful-inspection firewalls make configuration easier, but can add a bit more inspection overhead and slow down traffic slightly more than packet-filtering firewalls. so C could be the correct answer
- A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?
A. Swap the fiber pairs in one of the SFPs
B. Replace the jumpers with single-mode fiber
C. Set the correct MTU on the new interface
D. Install an optic that matches the fiber type
B. Replace the jumpers with single-mode fiber
“extended-range 10Gb SFP” is the key here. And their use of the word “jumpers” means all the mm fiber is getting changed.
- A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?
A. DLP B. IDS C. WAF D. WPA E. TPM
C. WAF
Web Application Firewall
Option C is correct: The clue here is “ cloud-based file storage”. The only security mechanism here is Web Application Firewall (WAF).
Data Lost prevention (DLP): A security technique that detects potential data breaches/data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Intrusion Detection System (IDS): A device or software application that monitors a network or systems for malicious activity or policy violations.
Wi-Fi Protected Access (WPA): A security protocol designed to create secure wireless (Wi-Fi) networks.
Trusted Platform Module (TPM): A cryptographic module that enhances computer security and privacy.
- A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting departmentג€™s router, but is not able to ping the machine from the IT network. Which of the following is MOST likely the cause?
A. Incorrect default gateway
B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment
A. Incorrect default gateway
If the technician can ping the workstation from the accounting department’s router (and there is no mention of the staff person having difficulties connecting to accounting resources), we can assume the workstation is in the correct VLAN. The only other answer that makes sense is an incorrect default gateway - likely due to manual misconfiguration (they make no mention of using DHCP, so manual entry errors should be considered). A makes sense - it’s just a poorly worded question to make you think it through.
- A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?
A. NAT B. PAT C. STP D. SNAT E. ARP
B. PAT
The answer is PAT.
Static Network Address Translation (SNAT) would be used to translate from one address to another. The question asks how to convert from one port to another; this is called Port Address Translation (PAT)
- A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
A. Install additional WAPs
B. Install external antennas
C. Move the WAPs closer to the more populated area
D. Change the antenna types
A. Install additional WAPs
- A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
A. Damaged fiber
B. Corrupted operating system
C. VLAN mismatch
D. Bad port
B. Corrupted operating system
If the switch doesn’t boot up, it’s likely due to the operating system, not the configuration of the switch itself. Even with a vlan mismatch, the switch should completely boot up.
- A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A. It segments broadcast domains in the network infrastructure
- A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved?
A. Rack diagrams
B. Network topology
C. Standard operating procedures
D. Wiring documentation
A. Rack diagrams
It asked for “reference to determine the location of the equipment being moved”. Keyword is the physical location, you need the rack diagrams to determine the space and the positions of the servers/network equipment.
network topology refers to… Bus, Star, Mesh, Ring topologies.. not physical location of equipment.
- Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?
A. MAC address reservation
B. Static IP address
C. IP address exclusion
D. Custom DNS server entry
A. MAC address reservation
Because it says the ‘physical address’ and physical address is another word for MAC address. Launch CMD in windows and type ‘ipconfig/all’ next to physical address you will find the MAC address of your device.
- A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?
A. Access control lists
B. Captive portal
C. WPA2
D. Port security
D. Port security
keyword “via Ethernet” aka port
They want to prevent an unauthorized host from connecting to the network via Ethernet. Anyone can hook up their laptop to an open Ethernet port. Port Security (Layer 2) would only allow certain computers to connect via a given port. ACL is associated with Layer 3 of the OSI model. Therefore, answer is D.
- A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests.
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A. Guests should log into a separate wireless network using a captive portal
B. Guests should log into the current wireless network using credentials obtained upon entering the facility
C. The existing wireless network should be configured to allow guest access
D. An additional wireless network should be configured to allow guest access
A. Guests should log into a separate wireless network using a captive portal
A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
- The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?
A. Proxy server
B. UTM appliance
C. Content filter
D. Load balancer
D. Load balancer
Load balancing refers to the process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.
- A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
A. GSM B. TDM C. CDMA D. PSTN E. MIMO
A. GSM
The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991. By the mid-2010s, it became a global standard for mobile communications achieving over 90% market share and operating in over 193 countries and territories.
- A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?
A. 172.16.80.0-172.16.85.254
B. 172.16.80.0-172.16.88.255
C. 172.16.80.1-172.16.87.254
D. 172.16.80.1-172.16.85.255
C. 172.16.80.1 - 172.16.87.254
16 (classful subnet - 255.255.0.0)
21 ( classless subnet - 255.255.248.0) 5 bits borrowed from host portion count in bit format to get your magic number ( block size) 128,192,224,240,248 = 5 bits which equals 8 block size, so you count in 8’s to for your networks in this case .80-87 (88 is the last IP which is broadcast so you cannot use that)
- A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks.
Which of the following should the technician perform to discover possible interference?
A. Site survey B. Vulnerability scanning C. Wardriving D. Checking logical diagram E. Bandwidth test
A. Site survey
The site survey will allow us to see the overlap of networks, being able to pinpoint where the interference is coming from.
Installing and configuring a Wi-Fi network requires a number of discrete steps. You should start with a site survey to determine any obstacles (existing wireless, interference, and so on) you need to overcome and to determine the best location for your access points.
because bandwidth deals with the AMOUNT OF DATA TRANSMITTED over an internet connection at a given time. So a bandwidth test would just be checking the upload/download times of the network.
- A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?
A. Test the possible solution
B. Question the users
C. Determine what has changed
D. Document the theory
A. Test the possible solution
A good mnemonic for the CompTia troubleshooting steps is: I Go To Poland Via Denmark.
- Identify
- Guess
- Test
- Plan
- Verify
- Document
- Identify the problem.
- Establish a theory of probably cause. (Question the obvious)
- Test the theory to determine cause.
- Establish a plan of action to resolve the problem and implement the solution.
- Verify full system functionality and if applicable implement preventative measures.
- Document findings, actions, and outcomes.
- A network technician has discovered a rogue access point placed under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?
A. Disable unused ports on switches
B. Enable DHCP guard to detect rogue servers
C. Configure WPA2 on all access points
D. Use TACACS+ authentication
B. Enable DHCP guard to detect rogue servers
Enabling DHCP guard will protect the network from another rogue AP in all the ports. Disabling unused ports will just protect unused ports, it’s a good option but it doesn’t erradicates the issue.
- Which of the following provides the ability to deploy consistent access point configurations from a central location?
A. Wireless controller B. AAA server C. WiFi-protected setup D. Proxy server E. VPN concentrator
A. Wireless controller
What Is a Wireless LAN Controller?
A wireless LAN controller, or WLAN controller, monitors and manages wireless access points in bulk and allows wireless devices to connect to WLAN, a wireless network architecture. As a centralized device in the network, the wireless LAN controller is usually located at the data center, to which all the wireless APs on the network are directly or indirectly connected.
How a Wireless LAN Controller Functions?
The wireless access controller takes the bandwidth produced coming from a router and stretches it to fit the network needs. Similar to an amplifier in a stereo system, the wireless controller allows devices from farther distances to connect. Besides, it enables the network administrators to check all the data related to the network and is able to detect rogue access points and recent traps generated by the access points.
- A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?
A. a
B. ac
C. g
D. n
B. ac
- A network administrator configures a router with the following IP address information:
Gigabit Ethernet 1 Interface: 10.10.0.1/24
Serial 0 Interface: 10.10.0.253/30
Clients are connected to a switch on the gigabit Ethernet interface; the ISP is connected to the Serial 0 interface. When the router configuration is complete and client devices are reconfigured, all clients report that they are unable to connect to the Internet. Which of the following is the MOST likely reason?
A. The router was configured with an incorrect IP address
B. The router was configured with an incorrect default gateway
C. The router was configured with an incorrect subnet mask
D. The router was configured with an incorrect loopback address
C. The router was configured with an incorrect subnet mask
The subnet mask is incorrectly configured.
A /30 would give you a subnet mask of 255.255.255.252
First available would be 10.10.255.253
If the (ISP) is conNECTED to the 253 itS WRONG
It should be 252 which is the network ID
- A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)
A. Network scan B. Banner grab C. Tracert D. DHCP server check E. Brute-force attack
A. Network scan
C. Tracert
The answer is A and C because the question is asking what they should do FIRST. Banner Grab is done AFTER you determine what systems have open ports.
First start with;
A penetration test is an active test that attempts to exploit
discovered vulnerabilities. It starts with a vulnerability scan and then
bypasses or actively tests security controls to exploit vulnerabilities.
A Network/port scanner scans systems for open ports and attempts to
discover what services and protocols are running.
Banner grabbing queries remote systems to detect their operating
system, along with services, protocols, and applications running on
the remote system.
Pick your answer this.
Tracert—A command-line tool used to trace the route between two systems.
- Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A. traceroute
B. ping
C. nslookup
D. netstat
A. traceroute
Using traceroute, you can see where the connection drops and determine whether that specific point is located within your network or on the way to the ISP.
- Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honeypot
C. DMZ
D. Proxy server
A. SIEM
Security information and event management (SIEM) gather and analyze the log data you send to it.
Security Information and Event Management (SIEM) software has been in use in various guises for over a decade and has evolved significantly during that time. SIEM solutions provide a holistic view of what is happening on a network in real-time and help IT teams to be more proactive in the fight against security threats.
What is unique about SIEM solutions is that they combine Security Event Management (SEM) - which carries out analysis of event and log data in real-time to provide event correlation, threat monitoring an incident response - with Security Information Management (SIM) which retrieves and analyzes log data and generates a report. For the organization that wants complete visibility and control over what is happening on their network in real-time, SIEM solutions are critical.
In computer terminology, the term honeypot refers to a security structure or mechanism that is built to deflect the attackers. In other words, a honeypot is there to distract the attackers from valuable assets of the organization.
Honeypot can be defined as a system that is attached to the network. It is set up to be a decoy. It lures the hackers and wastes their time as they try to gain unauthorized access to the network or systems of the organization.