Udemy Questions Flashcards

(137 cards)

1
Q

Your company has two office buildings which are connected via a copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?

A

An open circuit has been created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A technician added memory to a router, but the router never recognizes that memory. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue?

A

The most likely cause is that the memory chips are faulty because they have suffered from electrostatic discharge (ESD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A malicious user is blocking wireless devices from connecting to the Internet when people are in the coffee shop. What is the malicious user performing

A

Frequency Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following BEST describes how a DHCP reservation works?

A

By matching a MAC address to an IP address within the DHCP scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is used to proxy client requests for IP configurations across different network segments?

A

DHCP Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building?

A

Use the same SSIDs on different channels and AP isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At which of the following OSI layer does QoS operate?

A

Quality of Service (QoS) occurs at both Layer 2 and Layer 3 of the OSI Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this?

A

A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. If a legal hold notice has been given to the backup service, they will not destroy the old backup tapes until the hold is lifted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An outside organization has completed a penetration test for a company. One of the report items reflects the ability to read SSL traffic from the web server. What is the MOST likely mitigation for this reported item?

A

A patch is designed to correct a known bug or fix a known vulnerability, such as in this case, to read SSL traffic in a piece of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. Which of the following media would BEST meet this requirement?

A

To achieve 10 Gbps, you should use CAT 6a or a fiber cable. Since CAT6a isn’t an option, fiber is the best answer here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?

A

eDiscovery is the term that refers to the process of evidence collection through digital forensics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is the BEST encryption from the options below to maximize network security between AP4 and AP5?

A

WPA2-CCMP is the most secure option of the ones presented here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following should be implemented within the network?

A

SNMP stands for Simple Network Management Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently, only one student can log in at a time. What should be done to fix this issue?

A

Increase the number of virtual terminals available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Chief Information Officer (CIO) in your company has been trying to convince the Chief Security Officer (CSO) that the company should move its data to a SaaS solution to save some money in the budget. The CSO is hesitant to move all of the company’s data because she is concerned with the risk involved in moving the corporation’s sensitive data to a SaaS solution. The CSO has been asked for a reason behind her fears. Which of the following might be her response?

A

Migrating all corporate data to a SaaS solution will lose full control over the data and its protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A college needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. What type of antenna will provide the BEST coverage?

A

High gain antennas put out increased signal strengths and can reach further with fewer WAPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues are occurring and remember that each time it occurs that the lights also become dimmer momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?

A

The best solution would be to install a UPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An end-user receives a new computer and now is unable to connect to a database using ODBC. Other users can connect successfully, and the network technician can successfully ping the database server but still is unable to connect. What might have caused this issue?

A

A change in the firewall settings to allow access to the specified ports will fix the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A network’s design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?

A

SCADA/ICS is used in industrial control systems, such as an assembly-line network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?

A

In SNMPv3, the authPriv option ensures that the communications are sent with authentication and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are working as a wireless networking technician and running a wireless controller to aid in network administration. Your supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users?

A

A Remote Authentication Dial-In User Service (RADIUS) server will enable the wireless clients to communicate with a central server to authenticate users and authorize their access to the requested service or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A new network administrator is hired to replace a consultant who ran the network for several months and whose contract was just canceled. After a month of working on the network, the new network administrator realized some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem?

A

A hacker or the previous administrator (consultant) left a piece of software or an SSH protocol to allow themselves access to the network and change the server settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?

A

Intrusion Protection Systems (IPS) can reconfigure themselves based on the threats experienced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following ports are used to provide secure remote connection sessions over the Internet?

A

Port 22 is used by Secure Shell (SSH) to securely create communication sessions over the Internet for remote access to a server or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?
A Web Application Firewall (WAF) or Application-Aware Firewall would detect both the accessing of random ports and TLS encryption and could identify it as suspicious, whereas Stateless would inspect port number being used by the traffic leaving. IDS only analyzes incoming traffic.
26
A network administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. Which type of firewall should the administrator install?
A stateful firewall enhances security through packet filtering, and these types of firewalls also keep track of outbound requests and open the port for the returning traffic to enter the network.
27
A client has combined the voice-data circuit from a provider and gets a maximum download and upload speeds of 2.0Mbps. Which type of service is MOST likely being used by the client?
E1 service provides symmetric 2.0 Mbps of data service. It can handle voice and digital services (with a mix-n-match service).
28
What allows a telecommunication company to test the circuits of customers remotely?
Smart jacks typically provide diagnostic capabilities. A common capability provided by a smart jack is loopback, such that the signal from the telephone company is transmitted back to the telephone company.
29
Your company has just installed a new web server that will allow inbound connections over port 80 from the internet while not accepting any connections from the internal network. You have been asked where to place the web server in the network architecture and configure the ACL rule to support the requirements. The current network architecture is segmented using a firewall to create the following three zones: ZONE INTERFACE, IP address PUBLIC, eth0, 66.13.24.16/30 DMZ, eth1, 172.16.1.1/24 PRIVATE, eth2, 192.168.1.1/24 Based on the requirements and current network architecture above, what is the BEST recommendation?
Since the new web server needs to disallow traffic from the internal network (PRIVATE), you should place it in the DMZ. You should then add an ACL entry to the firewall that allows traffic from eth0 (PUBLIC, the internet) to the server's IP within the DMZ (eth1).
30
You have been asked to connect three 802.11a devices to an 802.11g access point configured with WEP. The devices are within 20 feet of the access point, but they still cannot associate with the access point. Which of the following is the MOST likely cause of the devices not associating with the WAP?
802.11a operates in the 5 GHz band, while 802.11g operates in the 2.4 GHz band. Therefore, 802.11a devices will be unable to communicate with 802.11b or 802.11g access point.
31
What is a common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network?
Evil Twin access points are the most common way to perform a man-in-the-middle attack on a wireless network.
32
Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up a man-in-the-middle attack against Mary's computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful only to affect the traffic associated with Mary's computer and not the entire network. Which type of man-in-the-middle attack is Rick conducting against Mary?
By conducting an ARP cache poisoning attack, Rick can poison the cache and replace Mary's computer's MAC association with his own, allowing him to become the man-in-the-middle between Mary and the default gateway.
33
A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?
Port 22 will allow a user to use SFTP (Secure FTP) or SCP (Secure Copy) to transfer a file from a computer to a remote server over an encrypted SSL/TLS tunnel.
34
Which of the following is designed to keep the system's uptime running in the event of a disaster?
High Availability If a network switch or router stops operating correctly (meaning that a network fault occurs), communication through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore, network availability, called uptime, is a major design consideration.
35
An employee of a highly-secure company needs to use facial recognition in addition to a username/password to establish a VPN successfully. What BEST describes this methodology?
This would classify best as two-factor authentication since it requires "something you are" (face) and "something you know" (username/password) for successful authentication to occur.
36
Which type of wireless technology are OFDM, QAM, and QPSK examples of?
Modulation. Common types of modulation include Orthogonal frequency-division multiplexing (OFDM), Quadrature Amplitude Modulation (QAM), and Quadrature Phase-shift keying (PSK).
37
You are working as a wireless networking technician and have been sent to a user's home to install a brand new 802.11 AC WAP to replace their old WAP. To ensure all of the current devices on the network will automatically connect to the new network, you set the SSID, encryption type, and password to the same ones as the old WAP. You turn the new WAP on and notice most of the devices connect automatically, but one older wireless printer won't connect. You notice that the printer is about 7 years old, but the user says it has always worked great over the old wireless network. What is the MOST likely reason that the printer will not connect to the new WAP?
Since you installed a brand new 802.11 AC WAP, it is only broadcasting at 5.0 GHz, which prevents the older printer from connecting due to a frequency mismatch.
38
Which of the following WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?
POTS is the Plain Old Telephone System and is connected to almost every facility in the United States. DSL and dial-up services can be received over POTS.
39
A network technician was tasked to install a network printer and share it with a group of five human resource employees. The technician plugged the device into a LAN jack but was unable to obtain an IP address automatically. What is the cause of the problem?
The DHCP scope is used as a pool of IP addresses that can be assigned automatically. The issue might be that there are no more IP addresses left in the scope, and is therefore exhausted.
40
Which communication technology would MOST likely be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths?
Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly used in MANs (metropolitan area networks).
41
A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement?
Since the back end uses a RADIUS server for back-end authentication, the network administrator can install 802.1x using EAP with MSCHAPv2 for authentication.
42
You are creating a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and be lightweight as it will be mounted outside the building. Which type of antenna should you install?
A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern.
43
A facility would like to verify each individual's identity before allowing access to its server room and data-center. Additionally, the building should ensure that users do not tailgate behind other users. What solution would BEST meet these requirements?
A biometric reader would read the employee's fingerprints. A mantrap is most often used in physical security to separate non-secure areas from secure areas and prevent unauthorized access.
44
A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. What solution would be BEST to achieve this?
A Remote Authentication Dial-in User Service (RADIUS) server provides AAA management for users connecting to a wired or wireless network, which includes the ability to authenticate users.
45
A technician installs three new switches to a company’s infrastructure. The network technician notices that all the switch port lights at the front of each switch flash rapidly when powered on and connected. Additionally, there are rapidly flashing amber lights on the switches when they started up the next day. What is happening to the switches?
The switch port lights flashing is indicating that the switch is performing the spanning tree process. The Spanning Tree Protocol (STP) is responsible for identifying links in the network and shutting down the redundant ones, preventing possible network loops.
46
Your network security manager wants a monthly report of the security posture of all the assets on the network (e.g., workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, or other essential security feature and its risk severity. Which solution would work best to find this data?
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks, or applications for weaknesses.
47
What type of cable would you use to connect a switch to a hub?
Crossover
48
What access control model will a network switch utilize if it requires multilayer switches to use authentication via RADIUS/TACACS+?
802.1x is the standard that is used for network authentication with RADIUS and TACACS+.
49
You have just moved into a new apartment and need to get internet service installed. Your landlord has stated that you cannot drill any holes to install new cables into the apartment. Luckily, your apartment already has cable TV installed. Which of the following technologies should you utilize to get your internet installed in your apartment?
DOCSIS (Data Over Cable Service Interface Specification) is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television system.
50
Michael has been tasked with assigning two IP addresses to WAN interfaces on connected routers. To conserve address space, which of the following subnet masks should he use for this subnet?
/30
51
A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?
Patches should always be tested first. Once successfully tested, deployment to the production environment can then be accomplished.
52
The Security Operations Center is trying to determine if there are any network anomalies currently being observed. To assist them, you gather information about the current performance of the network. Which of the following should you also gather to compare the current information against?
A baseline may be created from these other types of data, but the baseline is the MOST correct answer based on the question.
53
The RAID controller on a server failed and was replaced with a different brand. What will be needed after the server has been rebuilt and joined to the domain?
If the RAID controller fails and is replaced with a RAID controller with a different brand, the RAID will break. We would have to rebuild a new RAID disk and access and restore the RAID's most recent backup.
54
A company has a secondary datacenter in a remote location. The data center staff handles cable management and power management. The building’s security is also handled by the data center staff with little oversight from the company. Which of the following should the technician do to follow the best practices?
By ensuring rack security is performed, the staff would have locks, RFID card locks, and swing handles installed.
55
A network technician needs to install a server to authenticate remote users before accessing corporate network resources when working from home. Which kind of server should the network technician implement?
Remote Access Server (RAS) A remote access server is a type of server that provides a suite of services to connect users to a network or the Internet remotely.
56
Which type of equipment should be used for telecommunications equipment and have an open design?
The 2/4 post racks are open-framed, which are the most common type utilized with telecommunication equipment.
57
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management, and there is no time to go through the emergency change management process. Which of the following should the technician do?
While this is a difficult situation, the best answer is to make the change, document the requester, and document all the network changes.
58
Sally, in the web development group, has asked for your assistance in troubleshooting her latest website. When she attempts to connect to the web server as a user, her web browser issues a standard HTTP request but continually receives a timeout response in return. You decided to capture the entire TCP handshake between her workstation and the webserver to troubleshoot the issue best. Which of the following tools would BEST allow you to capture and then analyze the TCP handshake?
A protocol analyzer or packet analyzer (like Wireshark) has the capability to capture the handshake and display it for analysis
59
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?
TACACS+ is a AAA (accounting, authorization, and authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices.
60
A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: Avg % Processor Time =10% Avg Pages/Second = 0 Avg Disk Queue Length = 3 Based on the results, what might be causing a performance bottleneck?
Based on the results, the hard drive (disk queue) causes the performance bottleneck.
61
Workers in a company branch office must visit an initial web page and click the "I agree" button before being able to surf the web. Which of the following is this an example of?
AUP stands for acceptable use policy. If you're agreeing to what you can and can’t view, you accept the AUP.
62
The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?
RADIUS is used to manage credentials for network devices centrally.
63
An administrator has configured a new 100 Mbps WAN circuit, but speed testing shows poor performance when downloading larger files. The download initially reaches close to 100 Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the router interface and sees the following: NETRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000F.33CC.F13AConfigured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding What is the issue?
Since the VLAN port is untagged, it can be slowing down performance. It is recommended to remove the default VLAN tag and set up a server VLAN to increase performance.
64
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate. Which of the following should the technician install to satisfy this requirement?
By adding a multilayer (layer 3) switch, the technician can improve network routing performance and reduce broadcast traffic.
65
A network technician needs to identify active services that should be disabled on the network. What tool would BEST accomplish this?
Port scanner will scan for what ports are open or closed enabling certain services or not
66
Your co-worker has just installed an unmanaged 24-port switch. He is concerned with the amount of broadcast traffic that may exist when using this device. How many broadcast domains are created when using this single 24-port switch?
A single 24-port unmanaged switch will have only 1 broadcast domain.
67
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?
Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication.
68
A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, the interface will not come up. The technician has cleaned the fiber connectors and used an optical power meter to confirm that light passes in both directions without excessive loss. What is the MOST likely cause of this issue?
Wavelength mismatch is when one or more wavelengths in a fiber optic cable are unequal and cannot be measured using an optical power meter.
69
You have configured your network into multiple segments by creating multiple broadcast domains. Which of the following devices should you use to allow the different network segments to communicate with each other?
A router is used to allow different network segments and broadcast domains to communicate with each other.
70
A network technician receives the following alert from a network device: "High utilization threshold exceeded on gi1/0/24: current value 8463257.54" What is being monitored to trigger the alarm?
This is an error message that indicates that the threshold of high utilization of network interface, in this case, interface gi1/0/24, has been exceeded. The message has been triggered on the interface link status. (Note: gi1/0 would be a gigabit interface.)
71
A wireless networking technician has completed a wireless network survey and documented the detected signal strengths in various locations. What is this document called?
A heat map will show the signal strengths of wireless network signals in various locations.
72
Which of the following WAN connection types might an Amplitude Modulation (AM) radio station have a detrimental effect on and cause interference?
DOCSIS is how cable modems operate by sending radiofrequency waves over coaxial cables. AM frequencies can interfere with DOCSIS.
73
Thomas has a server that streams media to the local network, and the device is currently visible on the network. All of the workstations on the LAN can ping the device, and all the firewalls are currently turned off. The goal is for the streaming media server to allow different workstations to watch the stream if they choose to subscribe to it. The streaming device appears to be functioning properly, but the media won't stream when requested. Which of the following TCP/IP technologies is MOST likely not implemented properly?
Multicast is not implemented properly because the TCP/IP technology sends out the packets to the requested devices when streaming to multiple workstations from a single streaming media server
74
A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation within the network?
The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free topology for Ethernet networks.
75
A company utilizes a patching server to update its PCs regularly. After the latest patch deployment, all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. What could be done to prevent this problem next time?
The most likely cause of this issue was a forced driver update being pushed from the update server to the older PCs, breaking their ability to use their network cards.
76
A network architect is designing a highly-redundant network with a distance vector routing protocol to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize?
Route poisoning is a method to prevent a router from sending packets through a route that has become invalid within computer networks.
77
A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct the issue. What should the company do to reduce this type of action from causing network problems in the future?
Segmented networks would ensure every system isn’t updated simultaneously and would be updated in groups. The test lab would ensure proper functionality before deployment or would allow you to work through the technical difficulties before deployment.
78
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. What can the technician do to fix this issue while causing internal users to route to the website using an internal IP address?
Split Domain Name System (Split DNS) is an implementation in which separate DNS servers are provided for security and privacy management for internal and external networks.
79
A company has hired you to upgrade its aging network. The network currently uses static routing for the internal network, but the organization wants to reconfigure it to use a dynamic routing protocol. The new dynamic routing protocol must support IPv4 and VLSM, at a minimum. Based on the requirements provided, which of the following routing protocols should you enable and configure?
Of the options provided, only OSPF supports IPv4 and VLSM (Variable Length Subnet Mask).
80
You are working as part of a network installation team. Your team has been asked to install Cat 5e cabling to some new offices on the building's second floor. Currently, the office only has one network closet, which is located on the first floor. Your team spent the morning running 48 new CAT 5e cables from a patch panel in the networking closet on the first floor to a new networking closet you are outfitting on the second floor. Your team terminated these cables in a new patch panel in the 2nd-floor closet. You measured the distance from the switch in the 1st-floor closet to the new 2nd-floor patch panel and determined it was 80 meters. The team then ran cables from this patch panel to each of the new offices. Some of the offices are working properly, but others are not. You suspect that some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What is the BEST solution to this problem?
The best option is to install a switch in the networking closet on the second floor, connecting to the cables coming from the first-floor closet and then to the cables on the second-floor patch panel. This will act as a repeater to boost the signal strength over the Cat5e cable, effectively resetting the cable length to 0 meters before leaving the closet.
81
A network technician needs to protect IP-based servers in the network DMZ from an intruder trying to discover them. What should the network technician do to protect the network from ping sweeps?
All ping requests are based on Internet Control Message Protocol. Blocking ICMP communication at the firewall would stop the firewall from communicating with any ping sweeps that would occur.
82
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?
Management Information Base (MIB) is used for managing all entities on a network using Simple Network Management Protocol.
83
A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password have been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all the networking devices, which of the following should the technician do to prevent the password from being sniffed on the network again?
Port 22 uses SSH to authenticate a remote computer or user, or in this case, an administrator.
84
What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform?
The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.
85
While installing new network equipment, a network administrator wants to add infrastructure to keep the cables organized in the environment. The administrator also needs cables to be easily removed or added due to the constantly changing environment. Which of the following should be added to the network's cable distribution plant to achieve this goal?
Ladder trays are a cost-effective alternative and allow for easy installation of cables by electricians as well as future access for adding or removing cable runs.
86
Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?
ISAKMP is used in IPSec, which is commonly used in securing the key exchange during the establishment of a client-to-server VPN connection.
87
You are assisting the company with developing a new business continuity plan. What would be the BEST recommendation to add to the BCP?
By keeping redundant links between core devices, critical business services can be kept running if one link is unavailable during a disaster. Some of the other options are good ideas, too, but this is the BEST choice.
88
Your company hosts all of the company's virtual servers internally in your own datacenter. If a total failure or disaster occurs, the server images can be restored on a cloud provider and accessed through a VPN. Which of the following types of cloud services is your company using in this scenario?
Infrastructure as a Service (IaaS) is the foundation of cloud computing.
89
Which network device operates at Layer 2?
A basic switch operates at Layer 2 of the OSI model. For the exam, unless they mention a "multilayer switch" or "layer 3 switch", always assume they are referencing a basic layer 2 switch.
90
Based on the information provided to you so far, which network device would you log into first to begin your troubleshooting efforts?
Since everything was working properly on the network before AP2 being replaced after the recent hardware failure, AP2 likely has some configuration error that has led to the recent connectivity and performance problems. Therefore, you should begin your troubleshooting efforts with AP2.
91
After a recent breach, the security technician decides to analyze and aggregate its security logs. Which system should be used?
Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated.
92
A technician is attempting to resolve an issue with users on the network not accessing websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. What would resolve the issue?
Port 53 is used by DNS. The DNS Server is used to translate FQDN to IP addresses.
93
A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator can ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. What should the technician do next?
By checking the link lights on the ports, the administrator can verify if there is any activity on the network, if the ports are enabled, and if the Layer 1 components are working correctly.
94
You have been asked to configure a router. Which of the following protocols should you enable to allow the router to determine the path to another network?
BGP (Border Gateway Protocol) is a protocol that operates at layer 3 of the OSI model. Since the question asks about a router, you need to identify a routing protocol since this would enable the router to determine the path to another network using IP (layer 3) information.
95
A switch technician is tasked to centrally manage the switches and segment the switches by broadcast domains. The corporate network is currently using VLAN 1 for all of its devices and uses a single private IP address range with a 24-bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. What option would be best to use?
802.1q is the networking standard that supports VLANs and VLAN tagging. VTP is the VLAN Trunk Protocol and carries all VLAN information to all switches in a VTP domain.
96
A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all the computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost-effective manner. What devices would be MOST appropriate?
A Gigabit Layer 2 switch is the cheapest switching solution offering 1 Gbps network connectivity between the computers. RIPv2 has a lower overhead as outlined in the requirements.
97
You are currently troubleshooting a network connection error. When you ping the default gateway, you receive no reply. You checked the default gateway, and it is functioning properly, but the gateway cannot connect to any of the workstations on the network. Which of the following layers could be causing this issue?
Ping requests occur at layer 3 (Network Layer). Therefore, the problem could exist in layer 1 (physical), layer 2 (data link), or layer 3 (network).
98
The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager's inquiry, what did the administrator forget to do first?
A change request should be submitted through the change management process prior to any changes being made.
99
A user is receiving certificate errors in other languages within their web browser when accessing your company's website. Which of the following is the MOST likely cause of this issue?
A man-in-the-middle attack is a general term when a perpetrator positions himself in a conversation between a user and an application, either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is occurring.
100
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice.
101
A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. Which of the following is the QUICKEST option to configure a replacement switch?
To image a switch, you can make a backup of the configuration and deploy it to a new/different switch.
102
You are trying to connect to another server on the network but are unable to do so. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?
Tracert is a command-line utility used to trace the path of an IP packet as it moves from its source to its destination.
103
A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan and concurrently upload large images of items to a centralized server. Which of the following technologies should they utilize to meet these requirements?
802.11ac is a very fast high-speed Wi-Fi network capable of 1 Gbps speeds over a 5 GHz spectrum – perfect for uploading large image files quickly.
104
A network engineer is designing a wireless network that uses multiple access points for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point?
Because the overlapping signals are from access points from unrelated non-overlapping channels, the access points are least likely to interfere with each other. For Wireless B and G networks, you should always use channels 1, 6, and 11.
105
A network administrator installs and configures one distribution and five access switches in a new building. Which of the following is the BEST physical location for the equipment?
Distribution switches should be placed in the Main Distribution Facility (MDF) and the access switches would be placed in the IDF closer to the end-users.
106
You are setting up uplink ports for multiple switches to communicate with one another. All of the VLANs should communicate from the designated server switch. Which of the following should be set on the uplink ports if VLAN 1 is not the management VLAN?
The Spanning Tree Protocol (STP) is a network protocol used to eliminate bridge loops in Ethernet LANs. STP prevents network loops and associated network outages by blocking redundant links or paths. The redundant paths can be used to keep the network operational if the primary link fails.
107
What benefit does network segmentation provide?
Network segmentation in computer networking is the act of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security through isolation.
108
An organization wants to improve its ability to detect the infiltration of servers in a DMZ. IPS/IDS solutions are currently located on edge between DMZ and Untrust, and DMZ and Trust. Which of the following could increase visibility inside the DMZ?
Layer 7 firewalls are at the application layer. They allow you to choose your security at a more granular (almost undetectable) level.
109
A wireless technician wants to configure a wireless network to identify itself to visitors by including the word “Guest” in the name. This wireless network needs to provide coverage to the entire building and requires 3 wireless access points to accomplish this coverage level. What would allow users to identify the wireless network by its displayed name as a single network?
With an ESSID (Extended Service Set), a wireless network can utilize multiple wireless access points (WAPs) to broadcast a single network name for access by the clients. A BSSID (Basic Service Set) can only utilize a single WAP in each wireless network.
110
What is true concerning jumbo frames?
Jumbo frames are Ethernet frames whose MTU is greater than 1500. To increase performance, you should use jumbo frames only when you have a dedicated network or VLAN, and you can configure an MTU of 9000 on all equipment. Because of this, jumbo frames are most commonly used in a separate SAN (storage area network).
111
A technician has attempted to optimize the network, but some segments are still reporting poor performance. What issue should the technician look at?
A bottleneck occurs when bandwidth cannot accommodate large amounts of system data at designated data transfer rate speed, typically caused by TCP/IP data interruption or other performance issues.
112
A network technician must replace a network interface card on a server. The server currently uses a multimode fiber to uplink a fiber switch. Which of the following types of NICs should the technician install on the server?
10GBase-SR is a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short-wavelength signaling. Remember, for the exam, "S is not single," meaning the ones that have a Base-S as part of its name designates it as a multimode fiber cable
113
Your company wants to create highly-available data centers. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?
If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available. Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.
114
A client has asked you to provide their local office with the BEST solution for a wireless network based on their requirements. The client has stated that their users will need a wireless network that provides a maximum of 54 Mbps of bandwidth and operates in the 2.4Ghz frequency band. Which of the following wireless network types should you install to meet their needs?
802.11g provides transmission over short distances at up to 54 Mbps in the 2.4 GHz band. It is backward compatible with 802.11b (which only operates at 11 Mbps).
115
What is used to define how much bandwidth can be used by various protocols on the network?
Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users
116
After an employee connected one of the switch ports on a SOHO router to the office's wall jack, other employees in the building started losing network connectivity. Which of the following could be implemented on the company’s switch to prevent this type of loss of connection?
DHCP snooping is a series of techniques applied to improve the security of a DHCP infrastructure. When DHCP servers are allocating IP addresses to the LAN clients, DHCP snooping can be configured on LAN switches to prevent malicious or malformed DHCP traffic or rogue DHCP servers.
117
A company is setting up a brand new server room and would like to keep the cabling infrastructure out of sight but still accessible to the network administrators. Infrastructure cost is not an issue. Which of the following should be installed to meet the requirements?
Raised floors allow the cabling to be placed under the floor, but still accessible to the network administrators.
118
There are two switches connected using both a Cat 6 cable and a Cat 5e cable. Which type of problem might occur with this setup?
A switching loop is when there is more than one Layer 2 path between two endpoints. This can be prevented by using the STP (Spanning Tree Protocol).
119
The service desk has received many calls this morning complaining about how slow the network is responding when trying to connect to the internet. You are currently at one of the user's workstations and conducted a ping to Google.com, but the results showed that the response time was too slow, and there was too much latency in the route between the workstation and Google.com. You then attempted to ping some of the network printers and other local servers on the network. The results showed acceptable response times. What should you try to do NEXT?
You should try to identify what has changed since yesterday. By checking what has changed through the change control system, you can identify possible issues. Generally, if everything was fine yesterday, and it doesn't work right today, you should ask yourself, "what changed?"
120
A network administrator is noticing slow response times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. What should the network administrator do?
Adding dual NICs to the server can increase the bandwidth at the server and minimize congestion.
121
A firewall technician configures a firewall to allow HTTP traffic as follows: Source IP Zone Dest IP Zone Port Action Any Untrust Any DMZ 80 Allow The organization should upgrade to what technology to prevent unauthorized traffic from traversing the firewall?
Application-aware firewall can analyze and verify protocols all the way up to layer 7 of the OSI reference model. It has the advantage to be aware of the details at the application layer.
122
A software company is meeting with a car manufacturer to finalize discussions. In the signed document, the software company will provide the latest versions of its mapping application suite for the car manufacturer’s next generation of cars. In return, the car manufacturer will provide three specific vehicle analytics to the software company to enhance the software company’s mapping application suite. The software company can offer its enhanced mapping application to other car manufacturers but must pay the car manufacturer a royalty. Which of the following BEST describes the document used in this scenario?
MOU is a memorandum of understanding. This is the most accurate description based on the choices given.
123
Today, your company's network started to experience network connectivity issues for various workstations around the company. As you begin troubleshooting, you identify that all the workstations receive their connectivity from a single switch on the 3rd floor of the office building. You start searching the 3rd floor for the cause of this issue and find a small wired router plugged into a network jack in the sales manager's office. From this small wired router, he has connected his workstation and a small Smart TV to watch Netflix while working. You question the sales manager about when he brought in the new router. He states that he just hooked it up this morning. What type of issue did the sales manager accidentally introduced into the network by installing the router?
Routers usually contain their own DHCP servers. When the sales manager installed the wired router, he inadvertently introduced a secondary DHCP server into the network.
124
A desktop computer is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can reach the Internet. What is the MOST likely source of the problem?
APIPA addresses are self-configured and used when the client cannot get proper IP configuration from a DHCP server. One possible source of this problem is a misconfigured switch port that the computer is connected to. The 802.1q protocol is used to configure VLAN trunking and be configured on the trunk port, not the switch port.
125
A technician is troubleshooting a desktop connectivity issue. The technician believes a static ARP may be causing the problem. What should the technician do NEXT according to the network troubleshooting methodology?
Based on the troubleshooting methodology, you should try to test your hypothesis once you have come up with a probable cause (the static ARP entry). Since this issue has already caused the workstation not to communicate, the best way to test your theory would be to remove the static ARP entry and see if the issue is resolved.
126
When a switch has multiple paths to reach the root bridge, what state is the port with the LEAST desirable path placed by the spanning tree protocol?
Blocking is the state in the spanning tree protocol that prevents loops in the network.
127
Users are reporting extreme slowness across the network every Friday. What should the network technician review first to narrow down the root cause of the problem?
Reviewing the network utilization can help the technician identify why the slowness is being experienced every Friday, such as placing additional load on the network by streaming videos or something similar.
128
Michael is a system administrator who is troubleshooting an issue remotely accessing a new server on the local area network. He is using an LMHOST file, which contains the hostname and IP address of the new server. He cannot remotely access the server on the same LAN as another server that he can successfully remote to. What output from the command line would BEST resolve the issue?
Since he uses a local LMHOST file, it is bypassing the DNS of the machine, and flushing the DNS will not solve the problem. In this case, purging the NetBIOS name cache contents and then reloads the #PRE-tagged entries from the LMHOST file.
129
Which attack utilizes a wireless access point made to look as if it belongs to the network to eavesdrop on the wireless traffic?
An evil twin is meant to mimic a legitimate hotspot provided by a nearby business, such as a coffee shop that provides free Wi-Fi access to its patrons. The evil twin is the wireless LAN equivalent of the phishing scam.
130
You have been asked to troubleshoot a router which uses label-switching and label-edge routers to forward traffic. Which of the following types of protocols should you be familiar with to troubleshoot this device?
Multi-protocol label switching (MPLS) is a mechanism used within computer network infrastructures to speed up the time it takes a data packet to flow from one node to another.
131
When troubleshooting a T1 connection, the service provider’s technical support representative instructs a network technician to place a special device into the CSU/DSU. Using this device, the provider can verify that communications are reaching the CSU/DSU. What was used by the network technician?
Loopback plug equipment facilitates the testing of simple networking issues and is available at very low costs.
132
While monitoring the network, you notice that the network traffic to one of the servers is extremely high. Which of the following should you utilize to verify if this is a concern?
High network traffic can be a sign of a possible attack conducted either by an insider or someone out of the network to steal relevant information. By reviewing the network baseline, you can determine if the traffic is actually high and if any network configurations are out of the baseline, causing the issue. By knowing what "normal" looks like, you can then more easily identify the abnormal.
133
A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user’s VoIP phone is routed directly under the rolling chair and has been repeatedly smashed. What is the likely cause of the problem?
Cross-talk and EMI occur when signals experience interference. Since the cable has been repeatedly run over, its shielding could be damaged since the cable is no longer made up of the same consistency, and cross-talk could occur between the pairs.
134
You want to install a perimeter device on the network that will help ensure FTP commands are not being sent out over port 25. Which of the following devices would allow for deep packet inspection to catch this type of activity?
Layer 7 firewalls are application-filtering firewalls. FTP traffic does not usually travel over port 25 and should travel over port 21.
135
Andy is a network technician who is preparing to configure a company's network. He has installed a firewall to allow for an internal DMZ and an external network. No hosts on the internal network should be directly accessible by their IP address from the Internet, but they should reach remote networks if they have been assigned an IP address within the network. Which of the following IP addressing solutions would work for this particular network configuration?
A private IP address is an IP address reserved for internal use behind a router or other Network Address Translation (NAT) devices, apart from the public.
136
Which of the following is the BEST way to regularly prevent different security threats from occurring within your network?
Users are the biggest vulnerability on your network. Therefore, increasing user training can decrease the number of security threats that are realized on your networks. According to industry best practices, you should conduct end user security awareness training at least annually (if not more frequently).
137
A network technician just finished configuring a new interface on a router, but the client workstations do not receive the addressing information from the new interface. Which of the following should be added or changed to allow the workstations to connect to the new interface?
IP Helper