Testout Network and Practice Exam – Flashcards
Unlock all answers in this set
Unlock answersquestion
You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server has averaged a higher number of active connections than last month. Which type of document should you update to reflect the change?
answer
Baseline
question
You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use?
answer
Packet sniffer
question
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ45 port. You need to set up the network with the following in mind: • Spend as little money as possible. • Do not purchase unnecessary equipment. • Computers need to have a gigabit connection to the network. • New devices should not require management or configuration. You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs. What should you purchase?
answer
An unmanaged switch and CAT5e cabling
question
Which of the following is a good reason to install a firewall?
answer
To prevent hackers from accessing your network
question
What is the greatest threat to the confidentiality of data in most secure organizations?
answer
USB devices
question
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix. : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address . . . . . : 00AABBCC74EF DHCP Enabled. . . . . . . : No Autoconfiguration Enabled . . : Yes IPv4 Address. . . . . . . : 192.168.2.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.2.20 What is the most likely cause of the problem?
answer
Incorrect IP address
question
Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloudbased Microsoft Intune account and configure mobile device security policies. You now need to apply those security policies to the end users' mobile devices. What should you do? (Select two. Each response is a part of the complete solution.)
answer
Enroll the devices with the Intune service; Create a user account for each user who has a managed mobile device
question
Which of the following components is used by switches to optimizes network performance by performing switching operations in hardware rather than using the CPU and software?
answer
An application- specific integrated circuit
question
You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?
answer
Application log
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work?
answer
No, you should purchase patch cables that use MTRJ connectors.
question
Which exploit seeks to maliciously reassociate the IP address of a legitimate network host with the MAC address of the attacker's computer.
answer
ARP Poisoning
question
Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands: switch2# show interfaces fa0/1 status Port Name Status Vlan Duplex Speed Type Fa0/1 connected 3 ahalf a100 10/100BaseTX switch2# show interfaces Gi0/1 status Port Name Status Vlan Duplex Speed Type Gi0/1 connected trunk afull a1000 1000BaseTX switch2# show interfaces Gi0/2 status Port Name Status Vlan Duplex Speed Type Gi0/2 connected trunk afull a1000 1000BaseTX What is the issue with this network?
answer
The device connected to the Fa0/1 interface has autonegotiation disabled
question
How many total channels are available for 802.11g wireless networks?
answer
11
question
The following is a general approach to network troubleshooting:
answer
1. Identify the problem. 2. Establish a theory of probable cause. 3. Test the theory to determine the cause. 4. Establish a plan of action to resolve the problem and identify potential effects. 5. Implement the solution or escalate as necessary. 6. Verify full system functionality and, if applicable, implement preventative measures. 7. Document findings, actions and outcomes.
question
Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center?
answer
Transformer
question
One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?
answer
Sends a message via email or SMS when an event occurs.
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standards will work best in this situation? (Select two.)
answer
802.11n; 802.11a
question
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?
answer
Remote access
question
While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?
answer
Use a different Channel ID
question
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user's stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user's computer. What should you do next in your troubleshooting strategy?
answer
Test the solution
question
At what percent is packet loss noticeable in voice traffic?
answer
1 %
question
Which of the following are characteristics of a circuitlevel gateway? (Select two.)
answer
Stateful ; Filters based on sessions
question
Why do attackers prefer static environment devices to conduct distributed network attacks? (Select two.)
answer
These devices tend to employ much weaker security than traditional network devices.; These devices are typically more difficult to monitor than traditional network devices.
question
Which of the following is the best recommendation for applying hotfixes to your servers?
answer
Apply only the hotfixes that apply to software running on your systems
question
Which of the following is not an example of a physical barrier access control mechanism?
answer
One time passwords
question
You walk by the server room and notice a fire has started. What should you do first?
answer
make sure everyone has cleared the area
question
You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)
answer
TKIP encryption; Preshared key
question
Consider the following output from a dig command run on a Linux system. ; <> DiG 8.2 <> westsim111.com ;;res options:init recurs defnam dnsrch ;;got answer: ;;>>HEADER<<opcode:QUERY, status: NOERROR, id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER:default 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd:103 What is the IP address of the DNS server that performed this name resolution?
answer
202.64.49.150
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue?
answer
There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link.
question
Which of the following is a feature of MSCHAP v2 that is not included in CHAP?
answer
Mutual authentication
question
Your Cisco router has three network interfaces configured: • S0/1/0 is a WAN interface that is connected to an ISP. • F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. • F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. You have configured an access control list on this router using the following rules: • deny ip 192.168.1.0 0.0.0.255 any • deny ip 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?
answer
Add a permit statement to the bottom of the access list.
question
Which of the following is most susceptible to interference related to atmospheric conditions?
answer
Satellite
question
While troubleshooting a problem on a Linux system, you run a utility that generates the following output: 5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms 6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms 38.050 ms 7 oc486yy.Seat.someisp.net (14.248.154.129) 57.440 ms 56.678 ms 57.675 ms 8 t223hghytry.swa.someisp.net (142.133.89.232) 103.041 ms 57.181 ms 56.619 ms 9 t8343mmd.cgssel.someisp.net (162.191.10261) 91.977 ms 93.971 ms 93.767 ms 10 twirem2.cgssfdl.ip.someisp.net (145.97.133.23) 92.463 ms 92.337 ms 93.523 ms 11 twerrm1.nfffsiny.ip.someisp.net (117.116.141.38) 106.000 ms 106.007 ms 105.283 ms 12 gbed22repp0.n5ddsdsy.ip.someisp.net (123.194.132.8) 103.198 ms 105.447 ms 104.263 ms Which of the following utilities were you using?
answer
traceroute
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work?
answer
No, you shouldn't use multimode patch cables with single mode GBIC modules.
question
Which of the following topologies connects each device to a neighboring device?
answer
Ring
question
When duplicating a drive for forensic investigative purposes, which of the following copying methods is most appropriate?
answer
Bit-level cloning
question
You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect as the real cause of the problem?
answer
Failed patch cable
question
A workstation is connected to a switch on the Gi 0/2 interface using a straightthrough cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in fullduplex mode. Which of the following are true in this scenario? (Select three.)
answer
If the link speed is 10 Mbps or 100 Mbps, halfduplex is used. If the link speed is 1000 Mbps or faster, fullduplex is used. The switch attempts to sense the link speed. If it can't, the slowest link speed supported on the interface is selected.
question
You manage the website for your company. The Web1 server hosts the website. This server has the following configuration: • Dual core processor • Dual power supplies • RAID 5 volume • One RAID controller • Two 1000 Mbps network adapters Which component is a single point of failure for the website?
answer
Disk controller
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloudbased Microsoft Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
answer
Admin Portal
question
A network utilizes a Network Access Control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called?
answer
Posture assessment
question
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
answer
Use syslog to implement centralized logging.
question
Using the Netstat command, you notice that a remote system has made a connection to your Windows Server 2012 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing?
answer
Downloading a file
question
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?
answer
Vertical cross connect
question
At which layer of the OSI model do hubs operate?
answer
physical
question
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you most likely to experience?
answer
Echo
question
Normal switching occurs at the OSI model Layer 2, using the MAC address to perform frame forwarding. Which type of switch uses the IP address for making forwarding decisions to optimize network performance?
answer
Layer 3 switch
question
Which of the following do switches and wireless access points use to control access through the device?
answer
Mac filtering
question
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static Web content, while another is responsible for secure transactions. You would like to implement a device to speed up access to your Web content. The device should be able to distribute requests between the various Web servers using specialized hardware and not just a software configuration. In addition, SSL sessions should use the hardware components in the device to create the SSL sessions. Which type of device should you choose?
answer
Content switch
question
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
answer
Ticket
question
Which of the following cellular network types use MIMO to increase 3G data throughput? (Select two.)
answer
HSPA+ ; LTE
question
Which of the following routing protocols are classified as link state routing protocols? (Select two.)
answer
OSPF IS-IS
question
While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network. Which utility would you use to track the route a packet takes as it crosses the network?
answer
traceroute
question
Which component of a Change and Configuration Management policy identifies the need for a proposed change?
answer
Change request
question
The media access control method of all Ethernet networks is __________.
answer
CSMA/CD
question
You administer a web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the website as follows: • IP address: 192.168.23.8 • HTTP Port: 1030 • SSL Port: 443 Users complain that they can't connect to the website when they type www.westsim.com. What is the most likely source of the problem?
answer
The HTTP port should be changed to 80.
question
Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available, so you contracted with a satellite provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and that the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance?
answer
There is latency on the WAN link.
question
Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server for the network. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure?
answer
The clients must be configured to obtain IP addressing from a DHCP server.
question
Which of the following are used when implementing Kerberos for authentication and authorization? (Select two.)
answer
Time server Ticket granting server
question
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply.)
answer
192.168.12.253 10.0.12.15 172.18.188.67
question
Computers A and B are on the same VLAN and are separated by two switches, as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frame as it travels from A to B?
answer
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this?
answer
Rogue access point
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
answer
802.11a
question
Which of the following is likely to be located in a DMZ?
answer
FTP server
question
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?
answer
BGP
question
You want to be able to monitor and filter VMtoVM traffic within a virtual network. What should you do?
answer
Implement a virtual firewall within the hypervisor
question
Which of the following Ethernet standards uses fiber optic cabling? (Select two.)
answer
100BaseFX 1000BaseLX
question
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
answer
169.254.0.0 169.254.255.255
question
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?
answer
SaaS
question
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?
answer
Screen lock
question
You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use?
answer
TDR
question
Consider the network shown in the exhibit. When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface. What does this statistic indicate?
answer
Collisions are occurring.
question
A user reports that she can't connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?
answer
Create an action plan
question
Which method can be used to verify that a bitlevel image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
answer
Hashing
question
While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of oversized Ethernet frames being received on one interface. This interface is connected to a workstation located on the 2nd floor. What could be causing this to happen?
answer
The workstation's network board is jabbering.
question
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
answer
SSL TLS
question
Which of the following ports are used with TACACS?
answer
49
question
Which of the following best describes the condition where a signal sent on one wire is received on another wire within the same connector?
answer
NEXT
question
What is the primary purpose of gateway redundancy?
answer
To overcome a single point of failure on the next hop router.
question
Which business document is a contract that defines the tasks, timeframe, and deliverables that a vendor must perform for a client?
answer
Statement of Work
question
When designing a firewall, what is the recommended approach for opening and closing ports?
answer
Close all ports; open only ports required by applications inside the DMZ.
question
What must you install between your network and a T1 line for your network to use the T1 line?
answer
CSU/DSU
question
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11a wireless network running in the 5.725 5.850 GHz frequency range • An 802.11j wireless network running in the 4.9 5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
answer
The wireless TV system
question
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons. The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet. Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored. What should you do?
answer
Implement a guest network
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?
answer
Sends a message via email or SMS when an event occurs
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Up What is the most likely cause of this WAN issue?
answer
There is an IP address misconfiguration issue between the WAN interfaces on both ends of the link.
question
Which of the following features is used with digital IP phones to supply power through a switch port?
answer
PoE
question
Review the output from the show interfaces fa0/1 command on the switch2 switch in the exhibit. What is wrong with the fa0/1 interface in this example?
answer
A duplex mismatch exists with the device on the other end of the connection.
question
While viewing the status of the interfaces on a Cisco switch, you see an abnormally large number of CRC errors on one interface. This interface is connected to a user's workstation located in a cubicle on the 2nd floor. What could be causing this to happen?
answer
A strong EMI emitter near the cable run connected to that interface.
question
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two.)
answer
802.1x AES encryption
question
Which of the following are characteristics of a packet filtering firewall? (Select two.)
answer
Filters IP address and port Stateless
question
Which of the following services automatically creates and deletes host records when an IP address lease is created or released?
answer
Dynamic DNS
question
Which type of security uses MAC addresses to identity devices that are allowed or denied a connection to a switch?
answer
Port security
question
A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?
answer
Identify the affected areas of the network.
question
What is another name for a logic bomb?
answer
Asynchronous attack
question
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
answer
11 Mbps
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer
question
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer
Change management
question
Which of the following describe the EDGE cellular technology? (Select two.)
answer
The first Internet compatible technology Offers speeds of 400-1,000 Kbps
question
SCADA systems are typically implemented using which of the following components?
answer
Remote terminal units (RTUs) and programmable logic controllers (PLCs)
question
Which of the following specifications identify security that can be added to wireless networks? (Select two.)
answer
802.1x 802.11i
question
Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO5UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?
answer
FastEthernet0/0 %LINEPROTO
question
You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix?
answer
Test the hotfix, then apply it to all servers.
question
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?
answer
Overlapping channels
question
Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?
answer
residual risk
question
You have heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log would you monitor?
answer
Firewall
question
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
answer
switch port
question
You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet. Which of the following is likely the cause of the problem?
answer
Missing default route on a router
question
You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link?
answer
Mesh
question
What is the purpose of using Ethernet bonding? (Select two.)
answer
Provides a failover solution for network adapters Increases network performance
question
You manage the information systems for a large colocation data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
answer
Verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer.
question
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
answer
Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system.
question
You recently installed a new allinone security appliance in a remote office. You are in the process of configuring the device. You need to: • Increase the security of the device. • Enable remote management from the main office. • Allow users to be managed through Active Directory. You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible. Which of the following tasks should you carry out? (Select two.)
answer
Configure the device's authentication type to use Active Directory. Change the default username and password.
question
Which of the following tasks is associated with the Session layer?
answer
Connection establishment
question
Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?
answer
It can deliver other configuration information in addition to IP addresses. A DHCP server assigns addresses to requesting hosts.
question
Which protocol and port number is used by BOOTP/DHCP?
answer
UDP 67
question
If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?
answer
Disconnect the intruder.
question
Which of the following connector types are used with UTP cables? (Select two.)
answer
RJ11 RJ45
question
You are designing an update to your client's wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?
answer
802.11n
question
You have been tasked with designing an Ethernet network. Your client needs to implement a very highspeed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiberoptic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.)
answer
1000BaseSX 10GBaseSR
question
A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works. What should you do next?
answer
Identify the results and effects of the solution.
question
During a network infrastructure upgrade, you have replaced two 10 Mbps hubs with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidentally cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network?
answer
All network nodes, with the exception of the printer, will be available.
question
Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right. Each type of access point may be used once, more than once, or not at all.
answer
Intelligent AP - Independent access point infrastructure Lightweight AP - Hubandspoke infrastructure Intelligent AP - Distributed wireless mesh infrastructure
question
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
answer
Privilege escalation
question
One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?
answer
Split horizon
question
What is the primary benefit of CCTV?
answer
Expands the area visible by security guards
question
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)
answer
Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.
question
To access the Internet through the PSTN, what kind of connectivity device must you use?
answer
Modem
question
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?
answer
Vertical cross connect
question
Which of the following best describes the purpose of using subnets?
answer
Subnets divide an IP network address into multiple network addresses.
question
Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?
answer
BGP
question
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
You suspect that your web server has been the target of a denialofservice attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
answer
Performance
question
What does hashing of log files provide?
answer
Proof that the files have not been altered
question
You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use?
answer
show interfaces gi0/1
question
Which of the following are not reasons to remote wipe a mobile device?
answer
When the device is inactive for a period of time.
question
Which protocol is used for securely browsing a website?
answer
HTTPS
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work?
answer
No, you should purchase patch cables that use MTRJ connectors.
question
You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three.)
answer
What type of data will be transmitted on the network? How many devices will need to be supported? Is the business expected to grow in size in the future?
question
Which of the following are advantages of virtualization? (Select two.)
answer
Easy migration of systems to different hardware Centralized administration
question
Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. What step must be taken to ensure that the information is useful in maintaining a secure environment?
answer
Periodic reviews must be conducted to detect malicious activity or policy violations.
question
You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: • Verified that the server is up and running. • Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 f l 1500 command on your workstation. The ping command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set." What does this mean?
answer
One of the intermediate routers is an MTU black hole.
question
What is the binary format for the following decimal IP address? 131.9.202.111
answer
10000011.00001001.11001010.01101111
question
A new law was recently passed that states that all businesses must keep a history of all emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?
answer
Policy
question
What is the frequency of 802.11a networking?
answer
5.75 GHz
question
Which type of Denial of Service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses?
answer
DNS poisoning
question
You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
answer
ifconfig
question
You suspect that some of your computers have been hijacked and are being used to perform denial of service attacks directed against other computers on the Internet. Which log would you check to see if this is happening?
answer
Firewall
question
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ45 port. You need to set up the network with the following in mind: • Spend as little money as possible. • Do not purchase unnecessary equipment. • Computers need to have a gigabit connection to the network. • New devices should not require management or configuration. You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs. What should you purchase?
answer
An unmanaged switch and CAT5e cabling.
question
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
answer
VLAN
question
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Both responses are part of the complete solution.)
answer
Create a new virtual switch configured for hostonly (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.
question
You are working with an older 10Base2 Ethernet network. Which of the following connector types will you most likely encounter?
answer
BNC
question
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks. Which of the following best describes what happens to network communications?
answer
No devices will be able to communicate
question
A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.)
answer
Remove the patch cable connecting the first switch to the third switch. Enable STP on each switch.
question
You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect. Which of the following might you suspect as the problem?
answer
Failed patch cable between the client system and the wall jack
question
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components
answer
Class C
question
Which of the following is not a reason to use subnets on a network?
answer
Combine different media type on to the same subnet.
question
Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?
answer
Disable SSID broadcast
question
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server. Which of the following troubleshooting actions are you most likely to perform first?
answer
Replace the network card in the user's computer
question
Which type of documentation would you consult to find the location of RJ45 wall jacks and their endpoints in the intermediate distribution closet?
answer
Wiring schematic
question
What is modified in the most common form of spoofing on a typical IP packet?
answer
Source address
question
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
answer
802.11a
question
You manage a network that uses switches. In the lobby of your building are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port authentication
question
You suspect that your web server has been the target of a denialofservice attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
answer
Performance
question
What is the most important element related to evidence in addition to the evidence itself?
answer
Chain of custody document
question
Which of the following standards is used by SONET?
answer
10GBaseLW
question
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two.)
answer
Greater cable distances without a repeater Immunity to electromagnetic interference
question
You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?
answer
Run the packet sniffer application on Host B.
question
You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.)
answer
dig nslookup
question
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?
answer
Identify possible effects of the solution
question
Which of the following is a characteristic of static routing when compared to dynamic routing?
answer
All routes must be manually updated on the router.
question
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
answer
Use syslog to implement centralized logging.
question
A user reports that he can't connect to a specific website. You go to the user's computer and reproduce the problem. What should you do next?
answer
Identify the affected areas of the network.
question
Which of the following identification and authentication factors are often wellknown or easy to discover by others on the same network or system?
answer
Username
question
Which TCP/IP utility gives you the following output? Interface: 192.168.4.101 on Interface 0x3 Internet Address Physical Address Type 192.168.1.23 00d1b6b7c2af dynamic
answer
arp
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping. To provide power for the new devices, you will hire an electrician to install several new 20amp wall outlets near the new rack. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. Will this configuration work?
answer
No, you should consider relocating the new rack next to the existing rack.
question
You have a network that uses a logical bus topology. How do messages travel through the network? Mes
answer
Messages are broadcast to all devices connected to the network.
question
You are in the process of configuring an iSCSI storage area network (SAN) for your network. You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec. Which tool should you use?
answer
iSCSI Initiator
question
SCADA systems are typically implemented using which of the following components?
answer
Remote terminal units (RTUs) and programmable logic controllers (PLCs)
question
You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS, which port should you enable?
answer
53
question
Members of the Sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed. Which solution should you use?
answer
NAC
question
During a recent site survey, you find a rogue wireless access point on your network. Which of the following actions should you take first to protect your network, while still preserving evidence?
answer
Disconnect the access point from the network
question
You are implementing a DHCP server for your segment. Your segment's IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP addressing information dynamically, your users complain that they are unable to access websites on the Internet. How can you resolve this problem?
answer
You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06).
question
Which of the following is a reason to use a protocol analyzer?
answer
Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS.
question
Your network has QoS implemented using the DSCP classification system. A data stream is marked with the Expedited Forwarding (EF) precedence value. Which level of quality can you expect from this data stream?
answer
Packets are sent with as little loss and latency as possible.
question
Which of the following solutions would you implement to eliminate switching loops?
answer
Spanning tree
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
answer
PTZ
question
You recently created a new network segment for Development. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem?
answer
Implement an IP Helper address on the router
question
You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
answer
Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.
question
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)
answer
802.11b Bluetooth
question
Which of the following devices operate at OSI model layer 2? (Select two.)
answer
Switch Network interface card
question
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
answer
Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system.
question
Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly. Which of the following allows the service provider to remotely test the local loop?
answer
smart jack
question
You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?
answer
Decrease the beacon interval
question
Your organization is in the process of negotiating an Interoperability Agreement (IA) with another organization. As a part of this agreement, the partner organization proposes that a federated trust be established between your domain and their domain. This configuration will allow users in their domain to access resources in your domain and vice versa. As a security administrator, which tasks should you complete during this phase? (Select two.)
answer
Identify how data ownership will be determined. Identify how data will be shared.
question
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server?
answer
Private addresses are not accessible through the Internet.
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue?
answer
There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link.
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
answer
443
question
Which three of the following are characteristics of ISDN?
answer
It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines. It is a dialup service that uses existing copper wires for the local loop. It lets you transmit voice, video, and data over the same lines.
question
Which of the following is a characteristic of TACACS+?
answer
Encrypts the entire packet, not just authentication packets
question
Which of the following statements about the functionality of LCP are true? (Select three.)
answer
Usernames and passwords may be required during the handshake. Data can be compressed at the source and decompressed at the destination. LCP provides multilink support.
question
Consider the following output. ;; res options: init recurs defnam dnsrch ;;got answer: ;;>>HEADER<<opcode:QUERY, status; NOERROR,id:4 ;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2, ADDITIONAL:0 ;;QUERY SECTION: ;; westsim111.com, type = A, class = IN ;;ANSWER SECTION: westsim111.com. 7h33m IN A 76.141.43.129 ;;AUTHORITY SECTION: westsim111.com. 7h33m IN NS dns1.deriatct111.com. westsim111.com. 7h33m IN NS dns2.deriatct222.com. ;;Total query time: 78 msec ;;FROM: localhost.localdomain to SERVER: default 202.64.49.150 ;;WHEN: Tue Feb 16 23:21:24 2005 ;;MSG SIZE sent: 30 rcvd: 103 Which of the following utilities produced this output?
answer
dig
question
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
answer
ICMP
question
You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You need to view and analyze the number of collisions detected on the interface. Which command should you use?
answer
show interfaces gi0/1
question
You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?
answer
Connect one server through a different ISP to the Internet.
question
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?
answer
Positive pressure system
question
An attacker sends an unwanted and unsolicited email message to multiple recipients with an attachment that contains malware. What kind of attack has occurred in this scenario?
answer
Spam
question
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack? (Select two.)
answer
The IDS logs all pertinent data about the intrusion. An alert is generated and delivered via email, the console, or an SNMP trap.
question
Which of the following best describes the Ping of Death exploit
answer
An ICMP packet larger than 65,536 bytes
question
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?
answer
SSL
question
Which of the following protocols has a limit of 15 hops between any two networks?
answer
RIP
question
Which of the following best describes onefactor authentication?
answer
Multiple authentication credentials may be required, but they are all of the same type
question
Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud,with the labels being used to switch packets and prioritize traffic?
answer
MPLS
question
You have a series of WAN links that connects your site to multiple other sites.Each remote site is connected yo your site using a dedicated link. What type of connection is being used?
answer
Point-to-point
question
What is the speed of an OC-3 connection
answer
155 mbps
question
Which of the following are characteristics of SONET? (Select two.)
answer
Dual counter-rotating fiber optic rings Transport protocol used for other traffic types (such as ATM)
question
Which of the following describes the lines used in the local loop for dial-up telephone access?
answer
POTS
question
Which of the following terms identifies the network of dial-up telephone and the long-distance lines?
answer
PSTN
question
You have a site in your network that is connected to multiple other sites.A single virtual circuit is used to connect to all other sites. What type of connection is being used?
answer
Point- to - multipoint
question
Which type of network divides data to be transmitted into small units and then routes these units from the originating system to the destination system,allowing multiple,concurrent communications on the network medium?
answer
Packet-swiched
question
Which of the following a characteristics of ATM? (Select two.)
answer
Adds labels to use data units Uses fixed legnth cells of 53-bytes
question
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
answer
DSL
question
What is the maximum data rate of an ISDN BRI line?
answer
128 Kbps
question
Which of the following Internet services provides equal upload and download bandwidth?
answer
SDSL
question
Which type of network establishes a dedicated physical connection between two hosts who need to communicate on the network,not allowing any other host to use the medium until the communication is complete?
answer
Circuit-switched
question
Which of the following are methods for providing centralized authentication,authorization,and accounting for remote access? (Select two).
answer
RADIUS TACACS+
question
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes though the ceiling and over several florescent light fixtures before reaching the client system. Which of the following may be a cause of the connectivity problem?
answer
EMI interference
question
Which of the following devices operate at OSI model layer 2?
answer
Network Interface card Switch
question
A user reports that she can't connect to a server on your network. You check the problem and find out that all users are having the same problem. What should you do next?
answer
Determine what has changed
question
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?
answer
Host based IDS
question
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
answer
OSPF
question
Which of the following terms describes a test lab environment that does not require the use of physical hardware?
answer
Virtual sandbox
question
Which of the following is the first IP address that can be assigned to hosts on the 166.70.0.0 network using the default subnet mask?
answer
166.70.0.1
question
Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver?
answer
-1.2 dB
question
Which of the following functions are performed by proxies? (Select two.)
answer
Block employees from accessing certain websites Cache web pages
question
Which of the following types of penetration test teams will provide you information that is most revealing of a realworld hacker attack?
answer
Zero knowledge team
question
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you only see frames addressed to the four workstations but not to the router. Which feature should you configure?
answer
Mirroring
question
Which of the following is a standard for sending log messages to a central logging server?
answer
Syslog
question
You have decided to perform a double blind penetration test. Which of the following actions would you perform first?
answer
Inform senior management
question
A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame?
answer
Send it out all ports except for the port it was received on.
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network
question
You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?
answer
Chain of custody
question
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business. The business has four computers that need to communicate with each other and the Internet. The ISP's cable modem has only one RJ45 port. You need to set up the network with the following in mind: • Spend as little money as possible. • Do not purchase unnecessary equipment. • Computers need to have a gigabit connection to the network. • New devices should not require management or configuration.You examine each computer and notice only one of the four computers has a wireless NIC; they all have Ethernet NICs. What should you purchase?
answer
An unmanaged switch and CAT5e cabling.
question
Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists. What should you do next?
answer
Determine if escalation is needed
question
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
answer
Circuit-level
question
Which of the following are solutions that address physical security? (Select two.)
answer
Escort visitors at all times Require identification and name badges for all employees
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables. Will this implementation work?
answer
No, you shouldn't use multimode patch cables with single mode GBIC modules
question
You have a network that uses a logical ring topology. How do messages travel through the network?
answer
Messages travel from one device to the next until they reached the destination device.
question
You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port. After connecting the workstation, you find that the workstation cannot get an IP address from the DHCP server. You check the link and status lights and the connection is working properly. A ping to the loopback address on the workstation succeeds. No other computers seem to have the problem. Which of the following is the most likely cause of the problem?
answer
Incorrect VLAN assignment
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an email server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
answer
Network based firewall
question
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?
answer
VLANs
question
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00AABBCC74EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20 What is the most likely cause of the problem?
answer
Incorrect default gateway
question
What does a tarpit specifically do to detect and prevent intrusion into your network?
answer
Answers connection requests in such a way that the attacking computer is stuck for a period of time.
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue?
answer
There is an authentication misconfiguration issue between the WAN interfaces on both ends of the link.
question
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer
Change management
question
Which process reduces the size of the routing table by advertising a single route as the destination for a group of contiguous subnets?
answer
Route summarization
question
You were recently hired by a small startup company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use?
answer
IaaS
question
You need to configure a Cisco RFC 1542 compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1 Which of the following commands would be used to configure the router?
answer
ip helperaddress 172.16.30.1
question
Which protocol does VoIP use to interface with the PSTN?
answer
Mgcp
question
You need to configure spanning tree on a Cisco switch. You'd like to use a protocol that conforms to the 802.1w standards. Which protocol should you use?
answer
Rapid PVST+
question
Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloudbased Microsoft Intune account and configure mobile device security policies. You now need to apply those security policies to the end users' mobile devices. What should you do? (Select two. Each response is a part of the complete solution.)
answer
Create a user account for each user who has a managed mobile device. Enroll the devices with the Intune service.
question
Which port number is used by SNMP?
answer
161
question
You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
answer
verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer.
question
To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria: • Nonoverlapping • Low utilization • Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as show in the exhibit. Based on the results, which channel should you configure your wireless AP to use?
answer
channel 1
question
Which network type divides transmitted data into 3w smaller pieces and allows for multiple communications on the network medium?
answer
Packet-switched
question
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use? (Select two.)
answer
ipconfig ifconfig
question
Which wireless networking component is used to connect multiple APs together?
answer
DS
question
Which encryption method is used by WPA for wireless networks?
answer
TKIP
question
You are an application developer and are writing a program to exchange video files through a TCP/IP network. You need to select a transport protocol that will guarantee delivery. Which TCP/IP protocol would you implement that provides this capability?
answer
TCP
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloudbased Microsoft Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
answer
Admin Portal
question
Which of the following best describes the Ping of Death exploit?
answer
An ICMP packet larger than 65,536 bytes
question
You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two.)
answer
nslookup dig
question
You need to perform a reverse lookup of the 10.0.0.3 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.)
answer
dig x 10.0.0.3 nslookup 10.0.0.3
question
Which of the following are characteristics of MPLS? (Select two.)
answer
Supports variable-length data units Adds labels to data units
question
What is the primary purpose of gateway redundancy?
answer
To overcome a single point of failure on the next hop router.
question
When designing a firewall, what is the recommended approach for opening and closing ports?
answer
Close all ports; open only ports required by applications inside the DMZ.
question
Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: • A wireless television distribution system running at 2.4 GHz • A wireless phone system running at 5.8 GHz • A wireless phone system running at 900 MHz • An 802.11a wireless network running in the 5.725 5.850 GHz frequency range • An 802.11j wireless network running in the 4.9 5.0 GHz frequency range Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?
answer
The wireless TV system
question
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons. The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet. Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored. What should you do?
answer
implement a guest network
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?
answer
Sends a message via email or SMS when an event occurs.
question
Which type of security uses MAC addresses to identity devices that are allowed or denied a connection to a switch?
answer
Port security
question
Match each network enumeration technique on the left with its corresponding description on the right.
answer
Identifying phone numbers with modems = war dialing Scanning for wireless access points = wardriving Identifying operating system type and version number = banner grabbing Identifying services that can pass through a firewall = firewalking
question
SCADA systems are typically implemented using which of the following components?
answer
Remote terminal units (RTUs) and programmable logic controllers (PLCs)
question
Which of the following specifications identify security that can be added to wireless networks? (Select two.)
answer
802.1x 802.11i
question
Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO5UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?
answer
%LINEPROTO
question
Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?
answer
Residual risk
question
You manage the information systems for a large colocation data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)
answer
Verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer.
question
All of the 802.11 standards for wireless networking support which type of communication path sharing technology?
answer
CSMA/ CA
question
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings. What is the best approach to take to accomplish this? (Select two. Each option is part of a complete solution.)
answer
Enroll the devices in a mobile device management system. Configure and apply security policy settings in a mobile device management system.
question
You recently installed a new allinone security appliance in a remote office. You are in the process of configuring the device. You need to: • Increase the security of the device. • Enable remote management from the main office. • Allow users to be managed through Active Directory. You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible. Which of the following tasks should you carry out? (Select two.)
answer
Configure the device's authentication type to use Active Directory. Change the default username and password.
question
Which protocol and port number is used by BOOTP/DHCP?
answer
UDP 67
question
Which of the following connector types are used with UTP cables? (Select two.)
answer
RJ11 RJ45
question
Drag each penetration test characteristic on the left to the appropriate penetration test name on the right.
answer
White Box Test = The tester has detailed information about the target system prior to starting the test. Grey Box Test = The tester has the same amount of information that would be available to a typical insider in the organization. Black Box Test= The tester has no prior knowledge of the target system. Single blind test = Either the attacker has prior knowledge about the target system, or the administrator knows that the test is being performed. Double blind test = The tester does not have prior information about the system and the administrator has no knowledge that the test is being performed.
question
Arrange the Fibre Channel SAN implementation tasks in the order they should be performed.
answer
Step 1 = Install a Fiber Channel adapter in each server that will access the shared storage on the SAN. Step 2 = Deploy a Fibre Channel switch. Step 3 = Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using. Step 4 = Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives.
question
You have been tasked with designing an Ethernet network. Your client needs to implement a very highspeed network backbone between campus buildings; some of which are around 300 m apart. Multimode fiberoptic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two.)
answer
1000BaseSX 10GBaseSR
question
Arrange the steps in the Change and Configuration Management process on the left in the correct order in which they should be completed on the right.
answer
Identify the need for a change Conduct a feasibility analysis Define the procedure for the implementing the change Notify affected parties of the pending change Implement the charge Test the implementation Document the change
question
Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right. Each type of access point may be used once, more than once, or not at all.
answer
Independent access point infrastructure = intelligent AP Hub-and-spoke infrastructure = Lightweight AP Distributed wireless mesh infrastructure = intelligent AP
question
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
answer
Privilege escalation
question
You are the wireless network administrator for your organization. As the size of the organization has grown, you've decide to upgrade your wireless network to use 802.1x authentication instead of preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution.)
answer
Configure the RADIUS server with a server certificate. Configure all wireless access points with client certificates.
question
Match each WiFi jamming attack on the left with its corresponding description on the right.
answer
Transmits radio signals at random amplitudes and frequencies = Random noise jamming Transmits pulses of radio signals at random amplitudes and frequencies = Random pulse jamming Repeatedly transmits highintensity, shortduration RF bursts at a rapid pace = Spark Jamming
question
Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?
answer
BGP
question
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
You suspect that your web server has been the target of a denialofservice attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
answer
Performance
question
What does hashing of log files provide?
answer
Proof that the files have not been altered
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work?
answer
No, you should purchase patch cables that use MTRJ connectors.
question
Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. What step must be taken to ensure that the information is useful in maintaining a secure environment?
answer
Periodic reviews must be conducted to detect malicious activity or policy violations.
question
You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, users in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following: • Verified that the server is up and running. • Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter the ping FS23 f l 1500 command on your workstation. The ping command returns the following command for each ping packet sent: "Packet needs to be fragmented but DF set." What does this mean?
answer
One of the intermediate routers is an MTU black hole.
question
Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center?
answer
Transformer
question
Match the wireless networking term or concept on the left with its appropriate description on the right. Each term may be used once, more than once, or not at all.
answer
Moving an wireless device between access points within the same wireless network = Roaming Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN = LWAPP Specifies the number of clients that utilize the wireless network. = Device density Automatically partitions a single broadcast domain into multiple VLANs. = VLAN pooling Graphically displays wireless signal strength within an area. = heat map Connects two wired networks together over a WiFi network. = wireless bridge Identifies how strong a radio signal is at the receiver. = leave blank The number of useful bits delivered from sender to receiver within a specified amount of time. = goodput
question
A new law was recently passed that states that all businesses must keep a history of all emails sent between members of the board of directors. You need to ensure that your organization complies with this law. Which document type would you update first in response to this new law?
answer
Policy
question
What is the frequency of 802.11a networking?
answer
5.75 GHz
question
In which of the following situations might you use an RJ11 connector?
answer
You want to connect your computer to the Internet with a dialup connection.
question
Which type of Denial of Service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps host names and IP addresses?
answer
DNS poisoning
question
You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server?
answer
ifconfig
question
What type of virtualization completely simulates a real physical host?
answer
Full virtualization
question
In virtualization, what is the role of a hypervisor?
answer
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
question
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
answer
Virtual servers
question
What type of component is most likely to allow physical and virtual machines to communicate with each other?
answer
Virtual switch
question
Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?
answer
Multicast
question
Which type of address is the IP address 198.162.12.254/24?
answer
Unicast
question
Which type of address is the IP address 232.111.255.250?
answer
Multicast
question
Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?
answer
IGMP
question
Which organization is responsible for allocating public IP addresses?
answer
IANA
question
Your computer has an IP address of 161.13.5.15. Your computer is on a:
answer
Public Network
question
Which of the following associates a port number with a host on a private network?
answer
PAT
question
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.138.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow Internet hosts to contact the server to browse a personal website. What should you use to allow access?
answer
Static NAT
question
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
answer
169.254.0.1 - 169.254.255.254
question
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why cant you access the server?
answer
Private addresses are not accessible through the internet.
question
What is the main difference between RIP and RIPv2?
answer
RIP is a classful protocol, while RIPv2 is a classless protocol.
question
You have a private network connected to the Internet. Your routers will not share routing information about your private network with Internet routers. Which of the following best describes the type of routing protocol you would use?
answer
IGP
question
Which of the following protocosl has a limit of 15 hops between any two networks?
answer
RIP
question
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route configured on the router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
answer
Drop the packet
question
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configure dto use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do?
answer
Wait for convergence to take place
question
You have a network configured to use the OSPF routing protocol. Which of the following describes the state when OSPF routers have learned about all other routes in the network?
answer
Convergence
question
Which of the following routing protocols divides the network into areas, with all networks required to have an area of 0 (area 0 identifying the backbone area)?
answer
OSPF
question
What are the main differences between the OSPF and IS-IS routing protocols?
answer
OSPF requires an area 0, while IS-IS does not.
question
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
answer
Forward the packet to the next hop router specified by the route to network 0.0.0.0
question
Which of the following routing protocols are classified as link state routing protocols?
answer
OSPF IS-IS
question
What information does the next hop entry in the routing table indentify?
answer
The first router in the path to the destination network.
question
Which of the following are often synonymous with or made possible by CIDR?
answer
Classless VLSM
question
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default route has changed. You need to make changes with the least amount of effort possible. What should you do?
answer
Manually configure the default route to point to the next hop router.
question
Which of the following routing protocols is used by routers on the Internet for learning and sharing routes?
answer
BGP
question
Which of the following statements about RIP is true?
answer
RIP uses hop counts as the cost metric
question
Which of the following best describes OSPF?
answer
OSPF is a classless link-state routing protocol
question
Which of the following routing protocols is classified as a balanced hybrid routing protocol?
answer
EIGRP
question
Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers?
answer
If the network is connected to the Internet using multiple ISPs.
question
You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type?
answer
Classless
question
Which two of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true?
answer
It can deliver other configuration information in addition to IP addresses. A DHCP server assigns addresses to requesting hosts.
question
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?
answer
DHCP Server
question
You have a TCP/IP network with 50 hosts. There has been inconsistant communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this?
answer
DHCP
question
Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing?
answer
169.254.0.1 - 169.254.255.254
question
What is the network address and subnet mask used by APIPA?
answer
255.255.0.0 169.254.0.0
question
Which of the following strategies are used to prevent duplicate IP addresses being used on a network?
answer
Install a DHCP server on the network. Use Automatic Private IP Addressing.
question
You manage a subnet that uses the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for the subnet?
answer
Supernetting
question
Consider the following IP address. 1. 124.77.8.5 2. 131.11.0.9 3. 190.66.250.10 4. 196.5.89.44Which list represents the IP address class of each listed IP address?
answer
Class 1 Class B Class B Class C
question
You need to provide DHCP and file share services to a physical network.These services should be deployed using virtualization. Which type of virtualization should you implement?
answer
Virtual servers
question
What type of virtualization completely simulates a real physical host?
answer
Full virtualization
question
In virtualization,what is the role of the hypervisor?
answer
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
question
Which of the following protocols is used during the call control process of multimedia communications?
answer
Session Initiation Protocol
question
You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator's office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal. Which of the following strategies could you try to increase signal strength?
answer
Replace the Omni- directional antenna with a directional antenna
question
What is the primary countermeasure to social engineering?
answer
Awareness
question
You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based on protocol. Which tool should you use?
answer
Packet sniffer
question
Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?
answer
SSID broadcast
question
Match the COS priority on the left with its corresponding value on the right.
answer
0 = Best effort (default) 1 = Background 2 = Excellent effort 3 = Critical applications 4 = Video (< 100ms latency) 5 = Voice (< 10ms latency) 6 = internetwork control 7 = network control
question
You are implementing Internet connectivity for a new startup company. Your client will provide online storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20-30 Mbps. Which type of service should you implement?
answer
T3
question
While developing a network application, a programmer adds functionally that allows her to access the running program, without authentication, to capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. What type of security weakness does this represent?
answer
Backdoor
question
Which of the following are true when configuring a serial connection between two routers? (Select two.)
answer
Use PPP encapsulation when connecting a Cisco router to a non-Cisco router. Configure the clock rate on the DCE device.
question
The outside sales reps from your company use notebook computers, tablets, and phones to connect to the internal company network. While traveling, they connect their devices to the Internet using airport and hotel networks. You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed. When a host tries to connect to the network, the host should be scanned to verify its health. If the host is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the host can then connect to the production network. Which solution should you use?
answer
NAC
question
Which type of polish grade uses greencolored connectors to help prevent using the wrong connector type?
answer
Angled Physical Contact
question
You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
answer
RADIUS
question
You want to store your computergenerated audit logs in case they are needed in the future for examination or to be used as evidence in the event of a security incident. Which method can you use to ensure that the logs you put in storage have not been altered when you go to use them in the future?
answer
Create a hash of each log
question
Which of the following describes the point where the service provider's responsibility ends and the customer's responsibility begins for installing and maintaining wiring and equipment?
answer
Demarc
question
Match the port security MAC address type on the left with its description on the right.
answer
MAC address manually identified as an allowed address = SecureConfigured MAC address that has been learned and allowed by the switch = SecureDynamic MAC address that is manually configured or dynamically learned that is saved in the config file = SecureSticky
question
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?
answer
DHCP server
question
What problem does the Spanning Tree Protocol prevent?
answer
Switching loops from developing when redundant paths are implemented between switches.
question
Which of the following is a firewall function?
answer
Packet filtering
question
Which of the following are characteristics of ATM? (Select two.)
answer
Adds labels to data units Uses fixed-length cells of 53-bytes
question
Which of the following statements about virtual NICs are true? (Select two.)
answer
Virtual NICs need the appropriate driver installed to function Multiple virtual NICs can be added to a virtual machine
question
You have a company network that is connected to the Internet. You want all users to have Internet access, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?
answer
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough plenum UTP cable that will be run through the suspended tile ceiling of the data center. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. The only power available in the data center is located on the wall opposite the new server rack, so you must run extension cords across the floor to plug in the UPS unit. There are problems with this plan. What should you do?
answer
Hire an electrician to install a wall outlet near the new rack
question
Which component of a Change and Configuration Management policy specifies options for reverting a system back to the state it was in before a change was made?
answer
Rollback
question
Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?
answer
netstat
question
Match each wireless term or concept on the left with its associated description on the right. Each term may be used more than once; not all descriptions have a matching term.
answer
Compares the level of the WiFi signal to the level of background radio signals. = Signal to Noise Ratio Checks channel utilization and identifies sources of RF inference. = Spectrum analysis Identifies how strong a radio signal is at the receiver. = Recieved Signal Level Identifies the number of useful bits delivered from the sender to the receiver. = (leave blank) Causes multiple copies of the same radio signal to be received by the receiving antenna. = Bounce Degrades wireless network performance. = Device satuaration
question
Which of the following information are you likely to find in a policy document?
answer
A requirement for using encrypted communications for web transactions.
question
You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change?
answer
Default gateway
question
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a shortterm, periodic basis (typically monthly)?
answer
hotfix
question
Which of the following are true about reverse proxy? (Select two.)
answer
Can perform load balancing, authentication, and caching. Handles requests from the Internet to a server in a private network.
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer
question
Which of the following is true about single mode fiber optic network cabling?
answer
The central core is smaller than that of multimode fiber optic cabling.
question
Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Autoduplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 [...] 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 15387 packets input, 1736263 bytes, 0 no buffer Received 15241 broadcasts, 0 runts, 0 giants 0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast 0 input packets with dribble condition detected 607 packets output, 6141 bytes, 0 underruns 4 output errors, 10 collisions, 3 interface resets, 0 restarts 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Which of the following statements are true about the fa0/0 interface? (Select three.)
answer
Several collisions have occurred. The interface has been dropping incoming packets. One cyclic redundancy check error has occurred.
question
What is the most common failure of a security policy in an environment?
answer
Lack of user awareness
question
Which protocol uses traps to send notifications from network devices?
answer
SNMP
question
During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format on the left with the appropriate layer of the OSI model on the right. (Not all layers have a matching information format.)
answer
Session Layer = (leave blank) Transport Layer = Segments Network Layer = Packets Data Link Layer = Frames Physical Layer = Bits
question
You have been struggling to keep the temperature in your server room under control. To address this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)
answer
The front of your servers should face the cold aisle. The rear of your servers should face the hot aisle.
question
Which of the following functions are performed at the Physical layer of the OSI model?
answer
Movement of data across network cables
question
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?
answer
IPS
question
This question includes an image to help you answer the question. View Image You have two switches connected as shown in the exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use the portfast command?
answer
Fa0/1 and Fa0/2
question
Which of the following allows for easy exit of an area in the event of an emergency, but prevents re-entry? (select two)
answer
Turnstile Double-entry door
question
Your network has been assigned the Class B address of 130.15.0.0 Which of the following is not an address you can assign to a node on your network?
answer
130.16.61.3
question
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connectionspecific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00AABBCC74EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask . . . . . . . : 255.255.255.0 Default Gateway. . . . . . . . . : 192.168.2.1 DNS Servers. . . . . . . . . . . : 192.168.2.20What is the most likely cause of the problem?
answer
Incorrect default gateway
question
You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?
answer
Short circuit
question
Which of the following are characteristics of Teredo tunneling? (Select three.)
answer
Works through NAT Tunnel endpoints configured on hosts Dual stack hosts
question
A new assistant network administrator was recently hired by your organization to relieve some of your workload. You assigned the assistant network administrator to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches. You noticed that it took him an unusually long time to complete this task. Once done, users almost immediately began to report that the network had gone down. Upon entering the server room, you see that the assistant administrator has configured your network rack as shown in the Exhibit. What should you do? (Choose two. Each response is a complete solution.)
answer
Enable STP on each switch Remove the patch cable connecting the first switch to the third switch
question
You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don't have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement?
answer
Partial Mesh
question
You have installed antivirus software on the computers on your network. You update the definition and engine files, and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two.)
answer
Schedule regular full system scans. Educate users about malware.
question
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.)
answer
Conduct a site survey. Check the MAC addresses of devices connected to your wired switch.
question
Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do?
answer
Install shielded cables near the elevator
question
Your Cisco router has three network interfaces configured: • S0/1/0 is a WAN interface that is connected to an ISP. • F0/0 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. • F0/1 is connected to an Ethernet LAN segment with a network address of 192.168.1.0/24. You have configured an access control list on this router using the following rules: • deny ip 192.168.1.0 0.0.0.255 any • deny ip 192.168.2.0 0.0.0.255 any These rules will be applied to the WAN interface on the router. Your goal is to block any IP traffic coming in on the WAN interface that has a spoofed source address that makes it appear to be coming from the two internal networks. However, when you enable the ACL, you find that no traffic is being allowed through the WAN interface. What should you do?
answer
Add a permit statement to the bottom of the access list.
question
You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two.)
answer
Single mode fiber 1000BaseLX
question
Which of the following documents would likely identify that drop cables on your network use the T568A standard?
answer
Wiring schematic
question
Which of the following are examples of social engineering? (Select two.)
answer
Dumpster diving Shoulder surfing
question
You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed automatically between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure?
answer
Website storage
question
In which of the following situations would you most likely implement a demilitarized zone (DMZ)?
answer
You want to protect a public Web server from attack.
question
You're documenting the configuration of your router. When you run the show interfaces S0 command, you recieve the output shown below: Given this output, which of the following statements is true?
answer
TCP/IP and CDP are being encapsulated
question
Which of the following are benefits of LCP? (Select three.)
answer
Negotiate the use (or lack) of authentication before starting the session Monitors data dropped on the link and avoids frame looping Provides load balancing across multiple links
question
What is the connection order used by two TCP/IP routers to open a session with PPP including authentication?
answer
LCP, authentication, NCP
question
PPP supports authentication, compression, and multiple Network-layer protocols. Which of the following correctly sequences these functions as performed when a PPP link is established?
answer
Negotiate compression settings, perform authenications, negotiate Network-layer protocols
question
Which of the following protocols is used by PPP to enable support for multiple Network-layer protocols?
answer
NCP
question
If you have multiple IPv6 address prefixes on a single OSPF interface, which of the following statements are true? (Select two.)
answer
All address prefixes on an interface are included by default. Users cannot select some address prefixes to be imported into OSPF for IPv6; either all address prefixes on an interface are imported, or no address prefixes on an interface are imported.
question
You have configured an OSPFv3 router interface as a passive interface. Which of the following is true?
answer
The interface advertises all subnets connected to the interface.
question
Map each OSPFv3 LSA type on the left with its corresponding description on the right. Each LSA type may be used once, more than once, or not at all.
answer
Created for each ABR in the area: Type 1 Provides summary information for each area: Type 3 Created for each router in the area: Type 1 Lists routers that are joined together by the segment: Type 2 Created for each segment on which a DR/BDR has been elected: Type 2
question
Match each OSPFv3 command on the left with its corresponding description on the right. Each command may be used once, more than once, or not at all.
answer
Enables OSPF for IPv6 router configuration: ipv6 router ospf [process id] Generates a default external route into an OSPF routing domain: default-information orginate Displays the current contents of the IPv6 routing table: show ipv6 route Enables OSPFv3 for IPv6 on an interface: ipv6 ospf [process id] area [number] Displays OSPFv3 adjacency events: debug ipv6 ospf adj
question
Which VSAT component provides data transmission capabilities over a satellite link?
answer
Block UP-converter (BUC)
question
Which VSAT component provides data reception capabilities over a satellite link?
answer
Low-noise Block Down- converter (LNB)
question
You are consulting with a client about a WAN implementation. Because the client's facility is located in a remote location, a VSAT link would provide the fastest WAN link. Which of the following are disadvantages associated with using satellite-based WAN links? (Choose two) Signal latency Weather interference
answer
Signal latency Weather interference
question
When implementing a Multiprotocol Label Switching (MPLS) WAN, what data unit is managed by the routers at different sites?
answer
Packets
question
You need to implement a WAN solution for a small business located in a remote mountain location. Currently, the local telecom only offers basic phone service at the location. Leased lines are not available. Which option would be the most appropriate choice?
answer
VSAT sateliltie link
question
Which of the following describe the channels and data transfer rates used for ISDN BRI? (Select two.)
answer
One D channel operating at 16 Kbps Two B channels operating at 64 Kbps each.
question
Which of the following are characteristics of ISDN? (Select three.)
answer
It lets you transmit voice, video, and date over the same lines. It is a dial-up service that uses existing copper wires for the local loop. It provides enough bandwidth to transmit data at higher speeds than standard modems and analog lines.
question
Which WAN connection types use digital communications over POTS? (Select two.)
answer
DSL ISDN
question
Which of the following is true of Multiprotocol Label Switching (Select two.)
answer
MPLS is designed to work with many different protocols. MPLS-enabled routers switch packets based on the label information, not on the packet contents.
question
Which of the following is true of Multi protocol Label Switching? (Select two.)
answer
MPLS can carry ATM, SONET, and Ethernet traffic. CEF is required for all MPLS-enabled Cisco routers.
question
Which of the following are characteristics of VDSL? (Select two.)
answer
Unequal download and upload speeds. Supports both data and voice at the same time.
question
Which of the following is a characteristic of SDSL?
answer
Supports data traffic only (no voice)
question
What happens when an HSRP active router fails? (Select two.)
answer
The HSRP standby router becomes the active router after the holdtime expires on the hello message. Additional HSRP member routers transition from the listen state after the holdtime expires on the hello message.
question
When configuring an HSRP group, which router(s) should be configured with the virtual IP address?
answer
Any one of the routers in the HSRP group.
question
What happens after the HSRP holdtime expires on the hello message? (Select two.)
answer
The HSRP standby router becomes the active router. Additional HSRP member routers transition from the listen state.
question
Which of the following best describes the various HSRP group roles? (Select two.)
answer
An active router forwards traffic destined to the virtual IP address. A standby router will become the active router should the existing active router fail.
question
Which of the following best describes the various VRRP group roles? (Select two.)
answer
A backup router will become the master router should the existing master router fail. A master router forwards traffic destined to the virtual IP address.
question
How does the HSRP group priority value affect the router's role within the group? (Select two.)
answer
The router with the highest priority becomes the active router. The router with the second highest priority becomes the standby router.
question
What happens when the host sends an ARP request to the HSRP group 3's virtual IP address?
answer
The active router will return 000.0c07.ac03 as the MAC address for the default gateway.
question
Which of the following is true concerning GLBP? (Select two.)
answer
Load balancing is achieved by the AVG replying to the host's ARP requests with different virtual MAC addresses. A GLBP group can have up to four member routers acting as IP default gateways.
question
Which of the following is true when tracking an interface configured within a HSRP group? (Select two.)
answer
The HSRP group priority of the active router is decreased by 10 by default. If the interface goes down, the priority of the HSRP group is reduced to allow the HSRP standby router to become the active router.
question
What effect does the standby 2 priority 110 interface configuration command have?
answer
The group priority is increased above the default.
question
You have two routers that should be configured for gateway redundancy. The following commands are entered for each router: Which of the following is true? (Select two.)
answer
Router B will serve as the active router, and Router A will server as standby router. The virtual IP address is 172.16.0.1
question
A router serving as the AVG in a GLBP group has which of the following responsibilities? (Select two.)
answer
The AVG assigns a virtual MAC address to each router of the GLBP group. The AVG is responsible for answering Address Resolution Protocol (ARP) requests for the virtual IP address.
question
The users of a network are complaining that they can connect to resources within the company, but cannot use the Internet. The network administrator begins troubleshooting the problem by entering privileged EXEC mode on the company router and typing the show ip route command. The results are shown in the exhibit. What is the most probable cause of the problem?
answer
An incorrect next-hop route has been statically configured on the local router.
question
Which of the following symptoms indicate a Layer 2 problem with the Serial0/1/1 interface?
answer
Interface status shows Serial0/1/1 is up, line protocol is down.
question
You are troubleshooting a basic serial connection on your router. The show interface serial 0/1/0 command shows the following information: What should be your first step in troubleshooting the problem?
answer
Verify that the encapsulation is correctly configured.
question
When attempting to make a Telnet connection to a remote router, the connection fails. You check the interface status on your local router and find the following: You ping the remote router but that fails as well. At which OSI model layer does the problem originate?
answer
Layer 3
question
You are troubleshooting the Frame Relay configuration of your router. RouterA should be able to communicate with RouterB over the WAN link. The show interfaces s0/1/1 command on RouterA returns the following information: What is the most likely cause of the problem?
answer
There is a mismatch in the encapsulation type used.
question
IP traffic destined for a device configured with the address 10.10.34.4/24 is congesting the network. The network administrator issues a traceroute command from the local router and receives the output shown below. What is the cause of the problem?
answer
A loop exists between two of the routers.
question
You are working at the console of a new router. You want to check the configuration of a neighboring router called Sales5. You type telnet Sales5 at the router prompt and receive the following message: What should you do?
answer
Configure an address of a DNS server for the router to contact.
question
You have created an access list with the following command: Router(config)#access-list 101 deny tcp 10.1.0.0 0.0.255.255 any Which three of the following are identified by the various parts of this command?
answer
It applies to all destination networks and all hosts. It will deny only TCP traffic. Is applies to traffic originating from all hosts on network 10.1.0.0
question
You have issued the following commands at the server console: Router(config)#access-list 122 permit tcp 10.6.0.0 0.0.0.255 any Router(config)#int eth 0 Router(config-if)#ip access-group 122 out From which three of the following addresses will TCP traffic be forwarded out the eth 0 interface?
answer
10.6.0.12 10.6.0.224 10.6.0.11
question
You are the administrator for the 172.16.0.0 network shown in the exhibit. You need to block Telnet traffic from entering your network while allowing other traffic to pass through. You decide to apply an access list to the incoming side of the Serial 0 interface. Which statements should be included in your access-list? (Select two.)
answer
access-list 101 deny tcp any any eq 23 access-list 101 permit ip any any
question
You are setting up a new branch office for your company. You would like to implement solutions to provide the following services: Hosts should be able to contact other hosts using names such as server1.westsim.com. IP address assignment should be centrally managed. Which services should you implement on your network to meet the requirements? (Select two.)
answer
DNS DHCP
question
You have a small network connected to the Internet as shown in the exhibit. Router1 will provide NAT services to all hosts on the private network, and DHCP services to hosts connected to SubnetA. Srv1 is located on SubnetA. You want to make sure that this server is assigned the same IP address every time it boots, but you still want to centrally manage the address that it uses. What should you do?
answer
Configure a DHCP binding for Srv1
question
You have a Cisco router connected to a local ISP. The ISP dictates that the router use DHCP to receive its IP address and other configuration information. Which command should you use?
answer
IP address DHCP
question
Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0. Which of the following are true concerning this network? (Select two.)
answer
172.17.2.0 is a valid subnet 254 host addresses are available.
question
You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two.)
answer
Enforcement of the organization's Internet usage policy An increase in bandwidth availability
question
Which of the following is the last IP address that can be assigned to hosts on the 211.70.0.0 network using the default subnet mask?
answer
211.70.0.254
question
You have a small network that uses a hub to connect multiple devices. What physical topology is used?
answer
Star
question
A network switch is configured to perform the following validation checks on its ports: • All ARP requests and responses are intercepted. • Each intercepted request is verified to ensure that it has a valid IPtoMAC address binding. • If the packet has a valid binding, the switch forwards the packet to the appropriate destination. • If the packet has an invalid binding, the switch drops the ARP packet. What security feature was enabled on the switch to accomplish this?
answer
Dynamic ARP Inspection
question
What is the primary purpose of penetration testing?
answer
Test the effectiveness of your security perimeter
question
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take? (Select two. Each response is a separate solution.)
answer
Enable device encryption Implement storage segmentation
question
Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber optic networking?
answer
SONET
question
You are building a wireless network within and between two buildings. The buildings are separated by more than 3000 feet. The wireless network should meet the following requirements: • Wireless data within Building 1 should be protected with the highest degree of security. • Wireless data within Building 2 should be accessible and permitted by any wireless client. • Wireless signals between Buildings 1 and 2 should be protected with the highest degree of security. • Wireless signals within Buildings 1 and 2 should cover the whole structure, but not extend to the outside. For each location on the image below, you need to select the following: • Antenna option • Security option Tip: Drag the items from the list on the left to the location identifier on the right. Items may be used more than once. Not all items will be used.
answer
Building 1 Location A- Right-facing Directional Antenna WPA2 with CCMP Building 1 Location B - Omni Directional Antenna WPA2 with CCMP Building 1 Location C - Left-facing Directional Antenna WPA2 with CCMP Building 1 Location D - Right-facing Parabolic Antenna WPA2 with CCMP Building 2 Location A - Omni Directional Antenna WEP with Open authentication Building 2 Location B - Left-facing Parabolic Antenna WPA2 with CCMP
question
Which of the following is an example of privilege escalation?
answer
Creeping privileges
question
You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?
answer
Late collisions
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an email server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
answer
Network-based firewall
question
You manage the network for your company. You have recently discovered information on a computer hard drive that might indicate evidence of illegal activity. You want to perform forensic activities on the disk to see what kind of information it contains. What should you do first?
answer
Make a bit-level copy of the disk
question
Which of the following connectivity hardware is used to create a VLAN?
answer
switch
question
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
answer
PPPoE
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
answer
Firewall
question
You need to secure your wireless network. Which security protocol would be the best choice? WEP
answer
WPA2
question
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet. Why can't you access the server?
answer
Private addresses are not accessible through the Internet
question
You have just received a genericlooking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you need enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
answer
Verify that the email was sent by the administrator and that this new service is legitimate.
question
You are troubleshooting physical layer issues with the Gi0/1 interface in a router. You suspect that a duplex mismatch error has occurred, and you need to determine the duplex settings configured on the interface. Which commands could you use? (Choose two. Each response is a complete solution.)
answer
show interfaces gi0/1 show interfaces gi0/1 status
question
Network signaling is a function of which layer of the OSI model?
answer
Physical Layer
question
Which networking technology creates virtual links between two remote network endpoints by prefixing packets with a header containing one or more labels?
answer
MPLS
question
You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system?
answer
Signal strength
question
Your organization entered into an Interoperability Agreement (IA) with another organization a year ago. As a part of this agreement, a federated trust was established between your domain and the partner domain. The partnership has been in the ongoing operations phase for almost nine months now. As a security administrator, which tasks should you complete during this phase? (Select two.)
answer
Conduct periodic vulnerability assessments Verify compliance with the IA documents
question
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together?
answer
Vertical cross connect
question
You manage a network with multiple subnets connected to the Internet. A user reports that she can't access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet, however the computer does access other computers on other subnets as well as the Internet. Which of the following is most likely the cause of the problem?
answer
Missing route on the default gateway router
question
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum. You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used multimode GBIC modules on eBay that you will install in each router to allow them to connect to the switch. Both the switch and the GBIC modules use MTRJ connectors. You purchased several used 1 meter multimode patch cables from Amazon. However, when they arrived, you noticed that they use LC connectors. Fortunately, with some force, you found that you are able to get the LC connectors on the cables to lock into the MTRJ connectors on the GBIC modules and on the switch. Will this implementation work?
answer
No, you should purchase patch cables that use MT-RJ connectors.
question
You want to measure the voltage, amps, and ohms of various devices. Which tool should you use?
answer
Multimeter
question
Which of the following functions can a port scanner provide? (Select two.)
answer
Determining which ports are open on a firewall. Discovering unadvertised servers.
question
You have a large TCP/IP network and want to keep hosts' real time clock synchronized. What protocol should you use?
answer
NTP
question
You need to keep users in all other departments from accessing the servers used by the finance department. Which of the following technologies should you use to logically isolate the network?
answer
VLANs
question
Which of the following do switches and wireless access points use to control access through the device?
answer
MAC filtering
question
Which exploit seeks to maliciously reassociate the IP address of a legitimate network host with the MAC address of the attacker's computer.
answer
ARP Poisoning
question
You have installed antivirus software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?
answer
User awareness training
question
Which IEEE standard describes wireless communication?
answer
802.11b
question
Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?
answer
netstat
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Up • Protocol status: Down What is the most likely cause of this WAN issue?
answer
There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link.
question
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use?
answer
Media converter
question
Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Autoduplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 [...] 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 15387 packets input, 1736263 bytes, 0 no buffer Received 15241 broadcasts, 0 runts, 0 giants 0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast 0 input packets with dribble condition detected 607 packets output, 6141 bytes, 0 underruns 4 output errors, 10 collisions, 3 interface resets, 0 restarts 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Which of the following statements are true about the fa0/0 interface? (Select three.)
answer
Several collisions have occurred. The interface has been dropping incoming packets. One cyclic redundancy check error has occurred.
question
You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?
answer
Configuration documentation
question
While troubleshooting a problem on a Linux system, you run a utility that generates the following output: 5 s3232.gw.Seat.someisp.net (63.201.72.9) 38.433 ms 38.713 ms 39.085 ms 6 st11122.gar1.Seat.someisp.net (211.242.9.121) 38.620 ms 38.593 ms 38.050 ms 7 oc486yy.Seat.someisp.net (14.248.154.129) 57.440 ms 56.678 ms 57.675 ms 8 t223hghytry.swa.someisp.net (142.133.89.232) 103.041 ms 57.181 ms 56.619 ms 9 t8343mmd.cgssel.someisp.net (162.191.10261) 91.977 ms 93.971 ms 93.767 ms 10 twirem2.cgssfdl.ip.someisp.net (145.97.133.23) 92.463 ms 92.337 ms 93.523 ms 11 twerrm1.nfffsiny.ip.someisp.net (117.116.141.38) 106.000 ms 106.007 ms 105.283 ms 12 gbed22repp0.n5ddsdsy.ip.someisp.net (123.194.132.8) 103.198 ms 105.447 ms 104.263 ms Which of the following utilities were you using?
answer
traceroute
question
You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all that apply.)
answer
Port number Source address of a packet Destination address of a packet
question
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?
answer
Ring
question
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you most likely to experience?
answer
Echo
question
You are interested in identifying the source of potential attacks that have recently been directed against your network but which have been successfully blocked. Which log would you check?
answer
Firewall
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see (i.e. zoom in or out)?
answer
Varifocal
question
In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?
answer
Network diagram
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping. To provide power for the new devices, you will hire an electrician to install several new 20amp wall outlets near the new rack. To protect against power failures, you also plan to install a UPS in the rack along with redundant power supplies for the server. Will this configuration work?
answer
No, you should consider relocating the new rack next to the existing rack.
question
You have a web server on your network that hosts the public website for your company. You want to make sure that a failure of the NIC in the server does not prevent the website from being accessible on the Internet. Which solution should you implement?
answer
Ethernet bonding
question
You have a company network with a single switch. All devices connect to the network through the switch. You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download. Which of the following components will be part of your solution? (Select two.)
answer
802.1x authentication Remediation servers
question
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
answer
Class C
question
Which of the following wireless network protection methods prevents the broadcasting of the wireless network name?
answer
SSID broadcast
question
Use the exhibit to match the connector type on the left with the corresponding letter on the right.
answer
A - DB-25 B - DB-9 C - RJ 45 D - RJ 11 E - LC F - BNC G - F-type
question
Ethernet 100BaseFX networks use what type of cabling?
answer
Fiber Optic
question
Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?
answer
Multilayer switch
question
You are troubleshooting a workstation connection to the network. During your troubleshooting, you move the cable in the wiring closet to a different port on the patch panel. Which type of document should you update?
answer
Wiring schematic
question
Match the firewall type on the right with the OSI Layer at which it operates. Note: Each OSI Layer can be used once, more than once, or not at all.
answer
Packet Filtering Firewall = OSI Layer 3 Circuit-level Proxy = OSI Layer 5 Application-level Gateway = OSI Layer 7 Routed Firewall = OSI Layer 3 Transparent Firewall = OSI Layer 2
question
You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix?
answer
Test the hotfix, then apply it to all servers.
question
Which of the following statements about DSCP are true? (Select two.)
answer
The DiffServ field is used to add precedence values. Classification occurs at Layer 3.
question
Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?
answer
IGMP
question
You use Cat5e twisted pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable such that a signal sent on pin 1 arrives on the cable connected to pin 7. What term describes this condition?
answer
Short circuit
question
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. This morning, users at the branch office reported that they can no longer access resources on the home office network. You ran the show interfaces command on the router at the home office and had an administrative assistant run the same command on the router at the branch office. Both routers reported the following: • Interface status: Down • Protocol status: Down What are the most likely causes of this WAN issue? (Select two.)
answer
The WAN interface on one or both routers has been disabled. There is a problem with the service provider's network.
question
You have installed antivirus software on the computers on your network. You update the definition and engine files, and configure the software to update those files every day. What else should you do to protect your systems from malware? (Select two.)
answer
Schedule regular full system scans. Educate users about malware
question
What is the primary difference between impersonation and masquerading?
answer
One is more active, the other is more passive
question
Which method can be used to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
answer
Photographs
question
Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center?
answer
transformer
question
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk for your network and want to strengthen their security profile as much as possible. Which actions should you take?
answer
Enable device encryption Implement storage segmentation
question
You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manager your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture?
answer
Install the latest firmware updates from the device manufacturer Verify that your network's existing security infrastructure is working properly.
question
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use??
answer
Host based firewall
question
Which media type can backup files be saved to?
answer
Tape Drive NAS
question
You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms. Which of the following will help reduce the effects of a broadcast storm?
answer
Enable spanning tree on the switches.
question
which type of polish grade uses green colored connectors to help prevent using the wrong connector type
answer
Angle physical
question
which firewall implementation creates a buffer network that can be used to host email or web servers
answer
dmz
question
You have implemented a network where hosts are assigned specific roles, such as for file sharing and rpinting. Other hosts access those resources but do not host services of their own. What type of network do you have?
answer
client server
question
what purposes does a wireless site survey serve?
answer
To identify existing or potential sources of interference. To identify the coverage area and preferred placement of access points.
question
you would like to find a solution so that static web content can be offloaded to a different server while the web server continues to process dynamic data
answer
proxy
question
you just connected 4 new computer systems to an Ethernet switch using spare patch cables after the installation only three systems are able to access the network you verify all client network setting
answer
Failed patch cable
question
you are configuring the dhcp relay agent role service on a windows server which of the following is required step for the configuration
answer
Specify which server network interface the agent listens on for DHCP messages.
question
which of the following are differences between radius and tacacs+?
answer
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.
question
Arrange the GPOs Group policy objects int he order in which they are applied
answer
1 . The Local Group Policy on the computer. 2. GPOs linked to the domain that contains the user or computer object. 3. GPOs linked to the organizational unit that contains the object.
question
you are concerned with the amount of traffic that passed through a router on your network you want to see how the amount of traffic has changed over time which document
answer
Baseline
question
which of the following are characteristic of mpls
answer
Supports variable-length data units. Adds labels to data units.
question
you recently installed a new windows 2012 system to ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet
answer
123
question
you manage a single subnet with three switches the switches are connected to provide redundanct paths between the switches which feature prevents switching loops and ensures there is only a single active path between two switches
answer
Spanning tree