Udemy Questions Flashcards
(137 cards)
Your company has two office buildings which are connected via a copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?
An open circuit has been created.
A technician added memory to a router, but the router never recognizes that memory. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue?
The most likely cause is that the memory chips are faulty because they have suffered from electrostatic discharge (ESD)
A malicious user is blocking wireless devices from connecting to the Internet when people are in the coffee shop. What is the malicious user performing
Frequency Jamming
Which of the following BEST describes how a DHCP reservation works?
By matching a MAC address to an IP address within the DHCP scope.
Which of the following is used to proxy client requests for IP configurations across different network segments?
DHCP Relay
A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building?
Use the same SSIDs on different channels and AP isolation.
At which of the following OSI layer does QoS operate?
Quality of Service (QoS) occurs at both Layer 2 and Layer 3 of the OSI Model.
An offsite backup service is involved in an investigation currently. Because of this, they are not recycling outdated tapes. Which of the following is the MOST likely reason for this?
A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. If a legal hold notice has been given to the backup service, they will not destroy the old backup tapes until the hold is lifted.
An outside organization has completed a penetration test for a company. One of the report items reflects the ability to read SSL traffic from the web server. What is the MOST likely mitigation for this reported item?
A patch is designed to correct a known bug or fix a known vulnerability, such as in this case, to read SSL traffic in a piece of software.
A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. Which of the following media would BEST meet this requirement?
To achieve 10 Gbps, you should use CAT 6a or a fiber cable. Since CAT6a isn’t an option, fiber is the best answer here.
When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?
eDiscovery is the term that refers to the process of evidence collection through digital forensics.
Which of the following is the BEST encryption from the options below to maximize network security between AP4 and AP5?
WPA2-CCMP is the most secure option of the ones presented here.
A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. Which of the following should be implemented within the network?
SNMP stands for Simple Network Management Protocol.
Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently, only one student can log in at a time. What should be done to fix this issue?
Increase the number of virtual terminals available.
The Chief Information Officer (CIO) in your company has been trying to convince the Chief Security Officer (CSO) that the company should move its data to a SaaS solution to save some money in the budget. The CSO is hesitant to move all of the company’s data because she is concerned with the risk involved in moving the corporation’s sensitive data to a SaaS solution. The CSO has been asked for a reason behind her fears. Which of the following might be her response?
Migrating all corporate data to a SaaS solution will lose full control over the data and its protection.
A college needs to provide wireless connectivity in a cafeteria with a minimal number of WAPs. What type of antenna will provide the BEST coverage?
High gain antennas put out increased signal strengths and can reach further with fewer WAPs.
Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues are occurring and remember that each time it occurs that the lights also become dimmer momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?
The best solution would be to install a UPS.
An end-user receives a new computer and now is unable to connect to a database using ODBC. Other users can connect successfully, and the network technician can successfully ping the database server but still is unable to connect. What might have caused this issue?
A change in the firewall settings to allow access to the specified ports will fix the problem.
A network’s design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?
SCADA/ICS is used in industrial control systems, such as an assembly-line network.
You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. Which of the following SNMP options should you enable to ensure the data is transferred confidentially?
In SNMPv3, the authPriv option ensures that the communications are sent with authentication and privacy.
You are working as a wireless networking technician and running a wireless controller to aid in network administration. Your supervisor has requested that you implement a centralized authentication service. Which of the following devices should you install and configure if you want to decrease the amount of time spent administering the network while still providing a centralized authentication service for your users?
A Remote Authentication Dial-In User Service (RADIUS) server will enable the wireless clients to communicate with a central server to authenticate users and authorize their access to the requested service or system.
A new network administrator is hired to replace a consultant who ran the network for several months and whose contract was just canceled. After a month of working on the network, the new network administrator realized some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem?
A hacker or the previous administrator (consultant) left a piece of software or an SSH protocol to allow themselves access to the network and change the server settings.
Which device actively defends the network by detecting threats and shutting down ports or changing configurations to prevent attacks?
Intrusion Protection Systems (IPS) can reconfigure themselves based on the threats experienced.
Which of the following ports are used to provide secure remote connection sessions over the Internet?
Port 22 is used by Secure Shell (SSH) to securely create communication sessions over the Internet for remote access to a server or system.