Network Pro (Plus), Testout B.7 certification practice exam – Flashcards

Unlock all answers in this set

Unlock answers
question
Members of the Sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches have been installed. Which solution should you use? VLAN
answer
NAC
question
A user reports that she can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?
answer
Create an action plan.
question
...within your server room are failing at a rapid pace. You discover that the humidity room is at 60% and the temperature is at 80 degrees. What should do to help reduce problems?
answer
A separate SC unit in the server room
question
Your consulting firm has been hired by a small business to implement a wireless network. The company leases two office suites within a business park approximately 200 m apart, as shown below. The objectives of the implementation are as follows: • Create a secure wireless network whose signal doesn't emanate beyond each office space by implementing access points in locations A-D in each building. • Connect the wireless networks at each office together with a secure outdoor wireless link using locations E and F. Drag the antenna type from the list on the left to the appropriate location on the right. Each antenna type can be used more than once or not at all.
answer
Normal gain directional antenna aimed East Normal gain directional antenna aimed South Normal gain directional antenna aimed North Normal gain directional antenna aimed West High-gain directional parabolic antenna aimed East High-gain directional parabolic antenna aimed West
question
Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rack-mounted environment monitoring device within the rack. Currently, the device shows the temperature within the rack to be 70 degrees Fahrenheit (21 degrees Celsius). What should you do? Install a humidifier to increase the humidity within the server room.
answer
Nothing, the temperature within the rack is within acceptable limits.
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link
answer
The WAN provider is throttling bandwidth on the link.
question
A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?
answer
The client system has moved too far away from the access point.
question
Which of the following services are available regardless of whether the telephone company network is available?
answer
Cable modem
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MT-RJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work?
answer
No, you shouldn't use multimode patch cables with single mode GBIC modules.
question
You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.)
answer
Enable STP on each switch. Remove the patch cable connecting the first switch to the third switch.
question
Drag the collision domain property on the left to the appropriate network device(s) on the right. Each property can be used more than once.
answer
Hub Single collision domain Switch Multiple collision domains 802.11n wireless access point Single collision domain Router Multiple collision domains Bridge Multiple collision domains Repeater Single collision domain Layer 3 switch Multiple collision domains
question
Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver?
answer
-1.2 dB
question
Which of the following provides security for wireless networks?
answer
WPA
question
Which three of the following IP addresses are Class C addresses?
answer
222.55.0.0 223.16.5.0 192.15.5.55
question
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable. You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters. Which condition are you most likely to experience?
answer
Echo
question
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building. Which of the following conditions are you most likely to experience?
answer
Attenuation
question
You suspect that some of your computers have been hijacked and are being used to perform denial of service attacks directed against other computers on the Internet. Which log would you check to see if this is happening?
answer
Firewall
question
You walk by the server room and notice a fire has started. What should you do first?
answer
Make sure everyone has cleared the area.
question
If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?
answer
Disconnect the intruder.
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
answer
PTZ
question
You are configuring PuTTY to be used to access the CLI of a Cisco switch. Which of the following configuration values would prevent PuTTY from connecting? (Select two.)
answer
4600 baud Flow control = RTS/CTS
question
You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. A user's workstation is powered on and receives addressing information from this DHCP server Monday morning at 8:00 AM. When will the client contact the DHCP server to renew the lease (by default)?
answer
Wednesday morning
question
A workstation is connected to a switch on the Gi 0/2 interface using a straight-through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in full-duplex mode. Which of the following are true in this scenario? (Select three.)
answer
If the link speed is 10 Mbps or 100 Mbps, half-duplex is used. The switch attempts to sense the link speed. If it can't, the slowest link speed. supported on the interface is selected. If the link speed is 1000 Mbps or faster, full-duplex is used.
question
Which of the following are used when implementing Kerberos for authentication and authorization? (Select two.)
answer
Ticket granting server Time server
question
Which of the following activities are typically associated with a penetration test? (Select two.)
answer
Running a port scanner Attempting social engineering
question
You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?
answer
Crimping tool
question
You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?
answer
Missing route on the default gateway router
question
Which of the following network services or protocols uses TCP/IP port 22?
answer
SSH
question
You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)
answer
How many devices will need to be supported? Is the business expected to grow in size in the future? What type of data will be transmitted on the network?
question
Which TCP/IP utility gives you the following output?
answer
netstat -r
question
You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network?
answer
Convergence
question
What is the main difference between a worm and a virus?
answer
A worm can replicate itself, while a virus requires a host for distribution.
question
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?
answer
RDP
question
You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.)
answer
1000BaseLX Single mode fiber
question
Network signaling is a function of which layer of the OSI model?
answer
Physical layer
question
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer
Change management
question
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)
answer
802.11b Bluetooth
question
You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
answer
Verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer.
question
A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?
answer
Identify the affected areas of the network.
question
Match the Network Access Protection (NAP) component on the left with its description on the right.
answer
• The NAP Client generates a Statement of Health (SoH) that reports the client configuration for health requirements. • A NAP Server runs the System Health Validator (SHV) • The Enforcement Server (ES) is the connection point for clients to the network. • The remediation server contain resources accessible to non-compliant computers on the limited-access network.
question
Consider the network shown in the exhibit. When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface. What does this statistic indicate?
answer
Collisions are occurring.
question
You have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network shown?
answer
There are two broadcast domains. Each VLAN is in its own broadcast domain. When connecting devices to a switch, each switch port connection is in its own collision domain.
question
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
answer
11 Mbps
question
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
answer
Privilege escalation.
question
You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?
answer
Event log
question
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?
answer
IDS
question
While troubleshooting a problem on a Linux system, you run a utility that generates the following output: (longass example)
answer
traceroute
question
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
answer
Use syslog to implement centralized logging.
question
Which firewall implementation creates a buffer network that can be used to host email or web servers?
answer
DMZ
question
Which of the following topologies connects all devices to a trunk cable?
answer
bus
question
You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?
answer
iSCSI Initiator
question
Which of the following best describes the Ping of Death exploit?
answer
An ICMP packet larger than 65,536 bytes.
question
Which of the following actions should you take to reduce the attack surface of a server?
answer
Disable unused services.
question
Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?
answer
wiring schematic
question
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?
answer
BGP. BGP is an advanced distance vector protocol (also called a path vector protocol) that uses paths, rules, and policies instead of a metric for making routing decisions.
question
You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements: • Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet. • You want to use a site-to-site tunneling method instead of a host-to-host tunneling method. Which IPv6 solution should you use?
answer
6 to 4
question
Match each network enumeration technique on the left with its corresponding description on the right
answer
Identifying phone numbers with modems: War dialing Scanning for wireless access points: Wardriving Identifying operating system type and version number: Banner grabbing Identifying services that can pass through a firewall: Firewalking
question
You are moving to an area where DSL will be available in the next six months. Which method of Internet connectivity should you implement until DSL is available, if your existing connectivity needs are minimal?
answer
PSTN
question
Arrange the steps in the Change and Configuration Management process on the left in the
answer
Step 1: Identify the need for a change. Step 2: Conduct a feasibility analysis. Step 3: Define the procedure for implementing the change. Step 4: Notify affected parties of the pending change. Step 5: Implement the change. Step 6: Test the implementation. Step 7: Document the change
question
You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?
answer
load tester
question
At which of the following OSI layers does a router operate?
answer
3
question
Arrange the Group Policy Objects (GPOs) in the order in which they are applied
answer
First The Local Group Policy on the computer. Second GPOs linked to the domain that contains the user or computer object. Third GPOs linked to the organizational unit that contains the object.
question
Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?
answer
Smart jack
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Up What is the most likely cause of this WAN issue?
answer
There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link.
question
A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent?
answer
Botnet
question
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?
answer
Replace the network card in the user's computer
question
You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have?
answer
Peer-to-peer
question
what tcp/ip utility gives you the following output?
answer
ping
question
One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?
answer
Sends a message via email or SMS when an event occurs.
question
You are configuring the DHCP Relay Agent role service on a Windows server. Which of the following is a required step for the configuration?
answer
Specify which server network interface the agent listens on for DHCP messages.
question
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)
answer
Near backup generators Near cordless phones
question
All of the 802.11 standards for wireless networking support which type of communication path sharing technology?
answer
CSMA/CA
question
Which of the following authentication protocols are you most likely to recommend to the client?
answer
EAP
question
Which 802.11 standard will work best in this situation?
answer
802.11n
question
Which of the following is the best recommendation for applying hotfixes to your servers?
answer
Apply only the hotfixes that apply to software running on your systems
question
Which of the following features are common functions of an all-in-one security appliance?
answer
Spam filtering Bandwidth shaping
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
answer
Network-based firewall
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, email server
question
Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of guest WLANs for keeping public wireless traffic separate from private traffic?
answer
Distributed wireless mesh infrastructure
question
You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use
answer
Load tester
question
At which of the following OSI layers does a router operate?
answer
Layer 3
question
Which of the following features are common functions of an all-in-one security appliance?
answer
Spam filtering Bandwidth shaping
question
Which type of device should you use to create the DMZ?
answer
Network-based firewall
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, email server
question
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
answer
circuit level
question
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
answer
11 Mbps
question
Match each Interoperability Agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.
answer
Specifies exactly which services will be performed by each party SLA Creates an agreement with a vendor to provide services on an ongoing basis BPO Provides a summary of which party is responsible for performing specific tasks MOU Documents how the networks will be connected ISA Defines how disputes will be managed SLA Specifies a preset discounted pricing structure BPO
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
answer
Network-based firewall
question
Which of the following features are common functions of an all-in-one security appliance? (Select two.)
answer
Spam filtering Bandwidth shaping
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, email server
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New