TestOut Network pro

Flashcard maker : Lily Taylor
You have implemented a network where each device provides shared files with all other devices on the network.

What type of network do you have?

Peer-to-peer
You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts access those resources but do not host services of their own.

What type of network do you have?

Client-server
Which of the following geographic network types are typically managed by a city as a public utility?
Metropolitan Area Network (MAN)
You have a network that uses a logical ring topology. How do messages travel through the network?
Messages travel from one device to the next until they reached the destination device.
You have a network that uses a logical bus topology. How do messages travel through the network?
Messages are broadcast to all devices connected to the network.
Which of the following topologies connects all devices to a trunk cable?
Bus
Which of the following topologies connects each device to a neighboring device?
Ring
In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device?
Ring
Which of the following topologies connects each network device to a central hub?
Star
You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network.

What type of physical network topology has been implemented in this type of network?

Mesh
You have been asked to implement a network infrastructure that will accommodate failed connections.

Which of the following network topologies provides redundancy for a failed link?

Mesh
You want to implement a fault tolerant topology as you interconnect routers on your wide area network.

Which of the following would meet your needs?

Mesh
What device is used to create a physical star topology?
Switch
You have a small network that uses a hub to connect to multiple devices.

What physical topology is used?

Star
You have been asked to implement a wired network infrastructure that will accommodate failed connections. You don’t have a large budget, so you decide to provide redundancy for only a handful of critical devices.

Which of the following network topologies should you implement?

Partial Mesh
Which two of the following are included as part of the Data Link Layer?
-Identifying physical network device
-Controlling how messages are propagated through the network
In the OSI Model, what is the primary function of the Network Layer?
Routes messages between networks
In the OSI Model, which of the following functions are performed at the Presentation Layer?
-Specify data format

-Encrypt and compress data

In the OSI Model, which of the following functions are performed at the Application Layer?
-Integration of network functionality into the host operating system

-Enabling communication between network clients and services

Which of the following functions are performed at the Physical Layer of the OSI Model?
Movement of data across network cables
The Data Link Later of the OSI Model is comprised of two sublayers.
What are they?
-LLC
-MAC
Which of the following are functions of the MAC sublayer? (Select two)
-Defining a unique hardware address for each device on the network
-Letting devices on the network have access to the LAN
Which OSI Model layer is responsible for guaranteeing reliable message delivery?
Transport
Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI model on the right. Each option on the left can be used more then one.
Presentation-Application
Data Link-Network Interface
Application-Application
Session-Application
Network-Internet
Transport-Transport
Match the network function or device on the left with the OSI model layer it is associated with on the right.
Application-HTTP
Presentation-ASCII
Session-Session ID Number
Transport-Port Numbers
Network-Router
Data Link-Switch
Physical-Wireless Access Point
At what OSI layer does a router operate to forward network messages?
Network
Your company purchase a new bridge, which filters packets based on the MAC address of the destination computer. On which layer of the OSI Model is this device functioning?
Data Link
At which layer of the OSI Model do hubs operate?
Physical
Which of the following devices operate at OSI Model layer 2? (Select two)
-Network Interface Card
-Switch
Which three of the following devices operate at the Data Link Layer of the OSI Model?
-Bridges
-Network Interface Cards
-Switches
Match the description on the left with the appropriate network signal line code on the right.
Non-Return-to-Zero
Binary 1s are represented by positive voltage while 0s are represented by negative voltage. There is no zero voltage state between bits.
Manchester
The transition from one voltage level to another is used to represent binary data
Return-to-Zero Inverted
A 0 is represented by sending a light pulse. A 1 is represented by sending no light pulse.
Return-to-Zero
Binary 0s and 1s are transmitted by sending voltage pulses, with the voltage returning to zero between pulses.
Match each network signaling method on the left with its corresponding definition on the right.
Uses the entire network medium as a single transmission channel-Baseband

Combines signals from multiple channels into a single channel.-De-multiplexing

Assigns different frequencies to different channels on the same network medium.-Frequency-division multiplexing

Divides the transmission medium into several channels.-Broadband

Measures the number of times a signal in a communications channel changes state.-Baud rate

Measures the number of data bits transmitted in one second in a communication channel.-Bit rate

Network Signaling is a function of which later of the OSI Model?
Physical Layer
Based on the diagram, which network line code technique is being used?
Based on the diagram, which network line code technique is being used?
Non-Return-to-Zero
Which protocol is used on the World Wide Web to transmit Web pages to Web browsers?
HTTP
Your company just acquired another company in the same city. You are given the task of integrating the two e-mail systems to that messages can be exchanged between the e-mail servers. However, each network uses an e-mail package from a different vendor.

Which TCPIP protocol will enable messages to be exchanged between systems?

SMTP (Simple Mail Transfer Protocol)
You are an application developer and are writing a program to exchange video files through a TCPIP network. You need to select a transport protocol that will guarantee delivery.

Which TCPIP protocol would you implement that provides this capability?

TCP (Transmission Control Protocol)
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
TCP (Transmission Control Protocol)
You have a large TCPIP network and want to keep hosts’ real time clock synchronized. What protocol should you use?
NTP (Network Time Protocol)
What protocol sends e-mail to a mail server?
SMTP (Simple Mail Transfer Protocol)
Which of the following protocols stores e-mail on the mail server and gives users a choice to download mail or keep it on the server?
IMAP4 (Internet Mail Access Protocol V4)
You are asked to recommend an email retrieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers.

Which email protocol was designed for this purpose?

IMAP4 (Internet Mail Access Protocol V4)
Which of the following TCPIP protocols do e-mail clients use to download messages from a remote mail server?
POP3 (Post Office Protocol 3)
The UDP transport protocol provides which of the following features? (Select all that apply)
-Low overhead

-Connectionless datagram services

Which protocol is used for securely browsing a website?
HTTPS
Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
ICMP (The Internet Control Message Protocol)
Match each decimal value on the left with the corresponding hex value on the right. not all will be used.
11-17
B-11
D-13
F-15
C-12
10-16
What is the binary format for the following decimal IP address?
100000011.00001001.1001010.01101111
What is the decimal format for the following binary IP address?
206.58.170.67
You are installing networking wiring for a new Ethernet network at your company’s main office building. The project specifications call for Category 5 UTP network cabling and RJ-45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Category 3 network cable in storage. Upon investigation, it appears very similar to Category 5 wiring.

Should you substitute Category 3 cabling for Category 5 cabling to finish the project?

No, Category 5 cabling has more twists per inch than Category 3 cabling to reduce cross-talk and support higher data rates
Which of the following cable types often includes a solid plastic core?
Cat6
You are adding new wires in the office. The office has a false ceiling that holds the lights. You would like to run your Ethernet cable there.

What type of cable must you use?

Plenum
Which of the following connectors is used with Ethernet 10BaseT networks?
RJ-45
In which of the following situations might you use an RJ-11 connector?
You want to connect your computer to the internet with a dial-up connection.
When would you typically use an RJ-11 connector
When connecting a phone to a phone line.
Which of the following connector types would you most likely use to connect to a T1 WAN service?
RJ48c
Which of the following are characteristics of coaxial network cable? (Choose three)
-It uses two concentric metallic conductors.
-The ends of the cable must be terminated.
-It has a conductor made from copper in the center of the cable.
Which of the following cable classifications are typically used for cable and satellite networking with coaxial cables?
-RG-6

-RG-59

You have a small home network connected to the Internet using an RG-6 cable. You need to move the router connecting the network to the Internet, but can’t find any RG-6 cable.

Which cable types could you use instead?

RG-59
Of the following cables, which offer the best protection against EMI?
RG-6
You have just signed up for a broadband home Internet service that uses coaxial cable.

Which connector type will you most likely use?

F-type
F-Type connectors are typically used with cables using which of the following standards? (Select two)
-RG-6

-RG-59

You are working with an older 10Base2 Ethernet network.

Which of the following connector types will you most likely encounter?

BNC
Which of the following forms of optical fiber would usually be used to connect two buildings across campus from each other, which are several kilometers apart?
Single mode
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (Select two)
-Immunity to electromagnetic interference

-Greater cable distances without a repeater

Which of the following is true about single mode fiber optic network cabling?
The central core is smaller than that of multimode fiber optic cabling
Of the following cables, which offer the best protection against EMI?
Single mode fiber optic
Which of the following connectors usually require polishing as part of the assembly process? (Select two)
-ST

-SC

Which of the following are characteristics of an LC fiber optic connector? (Choose two)
-They use a housing and latch system similar to an RJ-45 UTP connector

-They are half the size of standard connectors

Which of the following are characteristics of an MT-RJ fiber optic connector? (Select two)
-They can be used with multimode fiber optic cables

-They use metal guide pins to ensure accurate alignment

Which of the following connectors is used with fiber optic cables and connects using a twisting motion?
ST
Which of the following connectors are used with fiber optic cables and include both cables in a single connector? (Select two)
-LC

-MT-RJ

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?
Crimping tool
What tool should you use to extend network services beyond the demarc?
Punchdown tool
You are making Ethernet drop cables using Cat5e cable and RJ45 connectors. You need to remove the plastic coating over the cable to expose the individual wires.

What tool should you use?

Cable Stripper
You are working with 25 pair wires and 66 blocks. You have pushed the wires onto the 66 block, but now need to cut off the excess end of each wire.

What tool do you use?

Punchdown tool
Which of the following connector types are used with UTP cables? (Select two)
-RJ45

-RJ11

Which of the following describes the point where the service providers responsibility ends and the customers responsibility begins for installing and maintaining wiring and equipment?
Demarc
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor.

What would you use to connect the wiring closets together?

Vertical Cross Connect
You have a network that occupies the top floor of a three story building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor.

What would you use to relocate the WAN line into a wiring closet on your floor?

Demarc extension
You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the main floor. You need to connect the two wiring closets.

Which of the following are typically used to connect the two wiring closets? (Select two.)

-Horizontal Cross connect

-25 Pair

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds
the demarc.

Which of the following terms describes the closet on the second floor?

IDF
Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ-45 ports?
Patch Panel
You want to use the T568B standard for adding connectors to your Cat5 cable.

Starting with pin 1, which order should you use for the wires within the connector?

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
Which of the following methods would you use to create a crossover cable?
Use the T568A standard on one connector, and the T568B standard on the other connector.
you need to terminate a Cat 6 UTP with an RJ45 connector. Your organization’s IT policy states that all cables connectors must be wired according to TIA568A standards. Match the order.
Pin 1 white with green stripe
Pin 2 solid green
Pin 3 white with orange stripe
Pin 4 solid blue
Pin 5 white with blue stripe
Pin 6 solid orange
Pin 7 white with brown stripe
Pin 8 solid brown
You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that is uses LC connectors. You also notice the cable’s ferrule has a slight slant to it.

Which polish grade should you sue to replace the existing cable?

Angled Physical Contact polish
Which type of polish grade uses green-colored connectors to help prevent using the wrong connector type?
Angled Physical Contact polish
You've connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device.

What does this output indicate? (Select two)
You’ve connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device.

What does this output indicate? (Select two)

-The cable is functioning correctly

-This is a crossover cable

Consider the 850nm multimode fiber optic cable shown below.

How much loss can you expect between the transmitter and the receiver?
Consider the 850nm multimode fiber optic cable shown below.

How much loss can you expect between the transmitter and the receiver?

-1.2db
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum.

You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.

Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables.

Will this implementation work?

No, you shouldn’t use multimode patch cables with single mode GBIC modules
You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum.

You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.

Both the switch and the GBIC modules use MTRJ connectors. You purchase several used 1 meter multimode patch cables from Amazon….

Will this implementation work?

No, you should purchase patch cables that use MT-RJ connectors.
While viewing the stats of the interfaces on a Cisco with, you see an abnormally large number of CRC errors on on interface. This interface is connected to a user’s workstation located in a cubicle on the 2nd floor.

What could be causing this to happen?

A strong EMI emitter near the cable run connected to that interface
You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame.

Which of the following troubleshoot steps are you most likely to perform first.

Use a cable test to test the cable between the computer system and the network switch.
Which network component connects a device with the transmission media and allows it to send and receive messages?
Network Interface card
What device sends signals from a computer onto a network?
Transceiver
Which of the following statements accurately describes how a modem works? (Select two)
It modulates digital data from the PC into analog data and transmits it on a telephone network.

It demodulates analog data from a telephone network into digital PC data.

You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports.

Which device should you use?

Media converter
At which OSI model layer does a media converter operate?
Layer 1
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two)
SFP
GBIC
Which of the following is a valid MAC address?
C0-34-FF-15-01-8E

A MAC or hardware address is a unique identifier hard coded on every network adapter card. A valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers contain the numbers 0 to 9 and letters A to F. Valid values in a MAC address range anywhere from 00 to FF. Note that one of the answers would be valid MAC address except it uses a G value, which is beyond the range of a hexadecimal number.

Which of the following is a valid MAC address?

95ABC2F4.ABC5.569D.43BF
FABC.875E.9BG6
AB.07.CF.62.16.BD
145.65.254.10

AB.07.CF.62.16.BD

MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F). They are typically represented as a three sets of four hexadecimal digits or six sets of two hexadecimal digits separated with periods. Regardless of the grouping and separator values, look for 12 hex digits for a valid MAC address.

Which of the following is true about the MAC address? (Select two)
It is typically represented by hexadecimal numbers.

It is a 48-bit address

A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?
ARP
Which of the following describes how a switch functions?
It connects multiple cable segments (or devices), and forwards frames to the appropriate segment
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame of packet contents? (Select two)
-Hub

-Repeater

How do switches and bridges learn where devices are located on the network?
When a frame enters a port, the source MAC address is copied from the frame header
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
Send the frame out ports 2-8
Which of the flowing devices does not segment the network ?
Hub
Which of the following hardware devices links multiple networks and directs traffic between networks?
Router
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization’s network to the Internet to provide users with Internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the Internet on three separate occasions.

What type of network hardware should you implement to prevent this from happening again?

Firewall
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
Firewall
Which of the following is a good reason to install a firewall ?
To prevent hackers from accessing your network
You are the administrator of your company’s network. You want to prevent unauthorized access to your intranet from the Internet. Which of the following should you implement?
Firewall
The media access control method of all Ethernet networks is
CSMA/CD
A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages?
The device listens to determine if the transmission media is free.
Which of the following use the CSMA/CD access method?(2 answers)
10BaseT
1000BaseT
Which of the following physical topologies are used with Ethernet networks?(2 answers)
Star
Bus
Ethernet 100BaseFX networks use what type of cabling?
Fiber-optic
Which of the following Ethernet standards uses fiber optic cabling?(2 answers)
100BaseFX

1000BaseLX

Your network follows the 100BaseTx specifications for Fast Ethernet. What is the maximum cable segment length allowed?
100 meters
With an Ethernet 10BaseT network, the maximum cable length between a computer and the hub is:
100 meters
You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings; some of which are around 300 m apart. Fiber-optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling that operates at full-duplex. Which Ethernet standard meets these guidelines?(2 answers)
10GBaseSR
1000BaseSX
What type of cabling is used with 100BaseTX Fast Ethernet networks?
Type 1A STP or Category 5 UTP
What topology is used with 100BaseTX Fast Ethernet networks?(2 answers)
Physical star/logical bus
Physical star/logical star
Which of the following are requirements of the 1000BaseT Ethernet standards?(3 answers)
RJ-45 connectors
The cable length must be less than or equal to 100m
CAT 5e cabling
You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub?
2000 meters
Which Gigabit Ethernet standard uses multimode fiber-optic cabling and supports network segments up to a maximum of 550 m long?
1000BaseSX
You have been tasked with designing a high-speed Ethernet network. Your client’s building already has 150 ohm shielded twisted pair wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation?
1000BaseCX
You would like to implement 10 Gbps Ethernet over a distance of 1 km or greater. Which of the following would be the minimum requirement for the implementation?(2 answers)
10GBaseLR standards
Single mode fiber
Which of the following standards is used by SONET?
10GBaseLW
You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose?(2 answers)
Single Mode Fiber
1000BaseLX
You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch.
Which type of cable should you use?
Crossover
You want to connect the LAN port on a router to the uplink port on a switch. The switch does not support auto-MDI.
Which type of cable should you use?
Crossover
You have two switches that you need to connect using their uplink ports. The switches do not support auto-MDI.
Which type of cable should you use?
Crossover
You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not sport auto-MDI.
Which type of cable should you use?
Straight-Through
You have purchased a new router that you need to configure. You need to connect a workstation to the router’s console port to complete the configuration task.
Which type of cable would you most likely use?
Rollover
Which of the following connectors is typically used on one end of a rollover cable?
serial
Using the exhibit to match the connector type on the left with the corresponding letter on the right.
Using the exhibit to match the connector type on the left with the corresponding letter on the right.
A- DB-25
B- DB-9
C- RJ45
D- RJ11
E- LC
F- BNC
G- F-Type
You want to create a rollover cable that has an RJ-45 connector on both ends. How should you connect the wires within the connectors?
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5
You are implementing a SOHO network for a local business. The ISP has already installed and connected a cable modem in the business.

The business has four computers that need to communicate with each other and the internet.

You examine each computer and notice only one of the four has a wireless NIC; they all have ethernet NICs.
What should you purchase.

An unmanaged switch and Cat5e cabling
You manage the two-location network shown in the exhibit. Workstations and servers at each location connect to a patch panel using behind-the-wall wiring. The patch panel....
Drag the cable type on the left to the most appropriate network location on the right.
You manage the two-location network shown in the exhibit. Workstations and servers at each location connect to a patch panel using behind-the-wall wiring. The patch panel….
Drag the cable type on the left to the most appropriate network location on the right.
Drop Cables
Cat6 straight-through UTP
Patch Cables
Cat6 straight-through UTP
Uplink Cables
Cat6 crossover UTP
WAN Cable
Single-mode fiber optic
Which of the following tests can be performed by a TDR?
Measure the length of a cable.
Identify the location of a fault on a cable.
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks.
Which of the following best describes what happens to network communications?
No device is able to communicate.
You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps.
Which tool should you use to test the drop cable and the connection to the network?
Certifier
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building.
Which of the following should you include in your plan?
Repeater
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server.
Which of the following troubleshooting actions are you most likely to perform first?
Replace the network card in the user’s computer.
Users report that the Internet is no longer accessible. You suspect that the line connecting your building to the Internet is not working properly.
Which of the following allows the service provider to remotely test the local loop?
Smart jack.
You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to the network. You discover that the UTP patch cable is run 75 feet from the wall outlet, passes through the ceiling and over several florescent light fixtures before reaching the client system.
Which of the following may be a cause of the connectivity problem?
EMI interfaace.
You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have any difficulty accessing the network.
During the relocation, you attach a patch cable from the client system to the wall jack and from the patch panel to the switch. Once connected you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one but you can still not connect.
Which of the following might you suspect as the problem?
Failed patch cable between the client system and the wall jack.
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building.
Which of the following are you most likely to experience?
Attenuation.
You have decided to implement Gigabit Ethernet on your network. Each switch port is connected to a single device. Following the installation, you find one device connected to a switch that is only running at 100 Mbps.
Which of the following are likely causes?
Crosstalk.
You have a cable Internet connection at home. The installer had connected the router near the outside wall of your house with RG-6 cable.
You move the cable router a distance of 50 meters using RG-8 cables and special connector adapters.
Which condition are you most likely to experience?
Echo
You want to measure the voltage, amps, and ohms of various devices.
Which tool should you use?
Multimeter.
Which of the following standards is typically used in a rollover cable?
RJ-232
Which of the following is a vaild IP (version 4) address? (Select 2)
2.2.2.2
172.16.1.26
Consider the following IP addresses .
Class A, B, B, C
Which three of the following are Class B addresses?
129.0.0.0
190.65.2.0
132.12.0.0
Which of the following IP addresses have a default subnet mask of 255.255.0.0?
129.0.0.1
191.168.2.15
168.16.5.1
What is the default subnet mask for the IP address 203.111.3.3?
255.255.255.0
A host on the network has an IP address of 129.11.99.78 using the default subnet mask. How would you identify the address and mask using CIDR notation?
129.11.99.78/16
You manage a subnet that uses the following subnet address: 198.162.1.0/23. Which of the following best describes how addressing is configured for the subnet?
Supernetting.
You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0 Which of the following describes the address type?
Classless
Which organization is responsible for allocating public IP addresses?
IANA
Which of the following best describes the purpose of using subnets?
Subnets divide an IP network address into multiple network addresses.
You’ve decided to use a subnet mask of 255.255.192.0 on the 172.17.0.0 network to create four separate subnets. Which network IDs will be assigned to these subnets in this configuration? (selec two)
172.17.128.0
172.17.0.0
You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with the hosts on the Internet. Which address would you use for the default gateway address?
You have a small network connected to the Internet as shown in the Exhibit. You need to configure the default gateway address on Wrk1 so that it can communicate with the hosts on the Internet. Which address would you use for the default gateway address?
The IP address assigned to Fa0/0 on Router 1
You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop-down lists, select the appropriate paramteres to configure the workstation's TCP/IP settings.
You have a small network with a single subnet connected to the Internet as shown in the Exhibit. The router has been assigned the two addresses shown. You need to manually configure the workstation to connect to the network. The workstation should use RouterA as the default gateway, and DNS1 as the DNS server address. From the drop-down lists, select the appropriate paramteres to configure the workstation’s TCP/IP settings.
IP Address: 192.168.12.46
Subnet Mask: 255.255.255.240
Default Gateway: 192.168.12.34
DNS Server: 192.162.1.22
You recently created a new network segment for Development. Because the hosts are now on a different network segment, they no longer contact the DHCP server. Both network segments are connected via a Cisco router.
Which of the following would be the best action to tack in order to fix the problem
Implement an IP Helper address on the router
Which of the following IP addresses ranges is reserved for Automatic Private IP Addressing?
169.254.0.1 – 169.254.255.254
What is the network address and subnet mask used by APIPA?
255.255.0.0 169.254.0.0
CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other but you are having trouble configuring Internet access. What is the likely cause of the problem?
Private addresses cannot directly communicate to hosts outside the local subnet.
After installing a new DHCP server on the network, you need to verify that the network devices are receiving IP addresses via DHCP. You reboot a Windows XP client system and using the ipconfig command, receive the following information:
Ethernet adapter Local Area Connection 1:
Description: CardBus-II 10/100 PC Card
Physical Address : 02-00-4C-3F-50
DHCP Enabled : Yes
Auto configuration Enabled : Yes
Auto configuration IP Address : 169.254.25.129
Subnet : 255.255.0.0
Default Gateway:
DNS Servers:

Which of the following statements are true?

The client system is unable to reach the DHCP server.
The client system is configured to use DHCP.
You have configured your organization’s DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days.
A user’s workstation is powered on and receives addressing information from this DHCP server Monday morning at 8 am.
When will the client contact the DHCP?
Wednesday morning
Which two of the following statementsabout the Dynamic Host Configuration Protocol (DHCP) are true?
It can deliver other configuration information in addition to IP addresses.
A DHCP server assigns addresses to requesting hosts.
Which of the following strategies are used to prevent duplicate IP addresses being used on a network?
Install a DHCP server on the network.
Use Automatic Private IP Addressing.
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.
Which device should you use?
DHCP Server.
You are implementing a DHCP server for your segment. Your segment’s IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments.
YOu configured the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstations. After configuring your workstations to get their IP address information dynamically, your users complain that they are unable to access web sites on the Internet.
How can you resolve this problem?
You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06).
Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP sever for the network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 12.168.2.1 to address 192.168.2.100. You use the subnet mask of 255.255.255.0. after making al setting changes on the DHCP sever, you reboot each client system but they are not able to obtain an ip address from the dhcp server. Which of the following would explain the failure?
the clients must be configured to obtain ip addressing from a dhcp server
You have a TCP/IP network with 50 hosts. There has been inconsistant communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned.
Which protocol can you implement on your network to help prevent problems such as this?
DHCP
You are configuring the DHCP Relay Agent role service on a Windows server.
Which of the following is a required step for the configuration?
Specify which server network interface the agent listens on for DHCP messages.
You have a Windows Server 2012 system that you want to use as a DHCP Relay Agent.
Which Windows Server 2012 service would you sue to do this?
Routing and Remote Access
You need to configure a Cisco RFC 1542 compliant router to forward any recieved DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1.
Which of the following commands would be used to configure the router?
IP helper-address 172.16.30.1
You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com Which device would you use?
DNS server
You want to implement a protocol on your network that allows computers to find the IP address of a host from a logical name. Which protocol should you implement?
DNS
Listed below are several DNS record types. Match the record the on the left with its function on the right.
Points a hostname to an IPv4
A
Provides alternate names to hosts that already have a host record.
CNAME
Points an IP address to a hostname
PTR
Points a hostname to an IPv6 address
AAAA
identifies servers that can be used to deliver mail.
MX
Listed below are several DNS record types. Match the record type on the left with its function on the right.
Identify a domain controller- SRV
identify a mail server- MX
Map a host name to an IPv4 address- A
Map an IPv4 address to a host name- PTR
which of the following services automatically creates and deletes host records wen an ip address lease is created or released?
DYNAMIC DNS
If dynamic DNS is being used, which of the following events will cause a dynamic update of the host records?
The DHCP server renews an ip address lease
The ipconfig/release command is entered on a workstation.
Which of the following are valid IPv6 IP addresses?
6384:1319:7700:7631:446A:5511:8940:2552
141:0:0:0:15:0:0:1
Which of the following is a valid IPv6 address?
FEC0::AB:9007
Match the IPv6 address configuration method on the right with it’s definition on the left.
Static Full Assignment:
The entire 128-bit address and all other configuration information is statically assigned to the host.

Static partial Assignment:
The prefix is statically assignment and the interface ID is delivered from the MAC address.

Stateless Auto-configuration:
Clients automatically generate the interface ID and learn the subnet prefix and default gateway through the neighbor discovery protocol (NDP)

Stateful DHCPv6:
Provides each client an IP address, default gateway, and other IP configuration

Stateless DHCPv6:
Supplies the client with the DNS server IP address only. Does not provide the client with an IP address and does not track the status of each client.

Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?
4-to-6 tunneling
You manage a network with two locations: Portland and Seattle. Both locations are connected to the Internet. All computers in both locations are configured to use IPv6. You would like to implement an IPv6 solution to meet the following requirements:

Hosts in each location should be able to use IPv6 to communicate with hosts in the other location through the IPv4 Internet.

You want to use a site-to-site tunneling method instead of a host-to-host tunneling method.
Which IPv6 solution should you use?

6-to-4
Which of the following are characteristics of Teredo tunneling?
Works through NAT
dual stack hosts
tunnel endpoints configured on hosts
You have a special server at work with a custom application installed. Connections to the server that use custom application must use IPv6. The server is currently running IPv4. You are the only person who connects to the server, and you always use your laptop for the connection. Your laptop supports both IPv4 and IPv6. The rest of your company network runs only IPv4. You need a cost effective solution to allow your laptop to connect to the server. Your solution must also support communication through NAT servers. Which method should you use?
Miredo
You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to leanrthe subnet prefix and default gateway.

Which IPv6 address assignment method is being used?

Stateless auto configuration
Which type of address is used in a packet to address the packet to a single host?
Unicast
Which type of address is the IP address 198.162.12.254/24?
Unicast
Which of the following address types is shared by multiple hosts, and is used to form groups of computers that should receive the same data stream?
Multicast
Which type of address is the IP address is the IP address 232.111.255.250?
Multicast
Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames?
IGMP
A video conference call consisting of multiple participants uses
Multicast
You administer a network with windows 200 unix servers, ad windows 2000 professionl, windows 98, and macintosh clients. A user of a windows 98 computer calls you one day and says he is unable to access respurces on the network. You type IPCONFIG on the users computer and receive the following output 0 ethernet adapter
Unavailable DHCP server
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use
ifconfig
Ipconfig
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet This workstation can communicate with some hosts on private network, but not with other host. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 – AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . Yes IPv4 Address 192 . 168 . 1 . 102(Preferred) Subnet Mask . 255 . 255 . 0 . 0 Default Gateway : 192 . 168 . 1.1 DNS Servers . . 192 . 168 . 2 . 20 192.168.1.27
Incorrect Subnet mask
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not with other hosts. you run ifconfig /all and see the following.

Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . .Broadcom network adapter
Physical Address . : 00 – AA-BB-CC-74-EF
DHCP Enabled . . . . . . . No
Autoconfiguration Enabled . Yes
IPv4 Address 192 . 168 . 1 . 102(Preferred)
Subnet Mask . 255 . 255 . 255 . 0
Default Gateway : 192 . 168 .2.1
DNS Servers . . 192 . 168 . 2 . 20

What is the most likely cause of the problem?

Incorrect default gateway
You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0 subnet which uses the default subnet mask. This workstation cannot communicate with any other hosts on private network. You run IPCONFIG/ALL and see the following: Ethernet adapter Local Area Connection : Connection- specific DNS Suffix . : mydomain . local Description . . . Broadcom network adapter Physical Address . : 00 – AA-BB-CC-74-EF DHCP Enabled . . . . . . . No Autoconfiguration Enabled . .: Yes IPv4 Address 192 …. :168 . 1 . 102(Preferred) Subnet Mask ……….: 255 . 255 . 225 . 0 Default Gateway …: 192 . 168 . 1.1 DNS Servers . ……: 192 . 168 . 2 . 20
Incorrect ip address
You work in an office that uses NetWare servers and Windows NT 4.0 servers.The network uses both the TCP/IP and IPX/SPX protocols. You are sitting at a workstation that uses Windows 95 OSR2.An application you are using is unable to contact Windows NT server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?
Ping
Your computer is sharing information with remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?
netstat
You administer a NetBIOS-based network that uses the TCP/IP protocol.You are trying to troubleshoot a computer that is unable t ocontact a server by its Net BIOS name.Which command can you use to check the connection?
Nbstat
Which command displays network activity statistics for TCP,UDP, and IP?
Netstat -s
You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2003 system.The system is operating satisfactorily and is able to communicate with other systems on the local network.However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured,or may be configured incorrectly.Which of the following utilities are you most likely to use to view the default gateway information for the system?
Ipconfig
While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet.You are able to ping the default gateway on your own network, so you suspect that the problem lies outside of the local network.
Which utility would you use to track the route a packet takes as it crosses the network?
Traceroute
Which TCP/IP utility gives you the following output?
interface: 192.168.4.101 on interface 0x3
internet address physical address type
192.168.1.23 00-d1-b6-b7-c2-af dynamic
arp
Which TCP/IP utility gives you the following output? Local Area Connection: 
Node IpAddress:
Which TCP/IP utility gives you the following output? Local Area Connection:
Node IpAddress:
Nbstat -c
Which TCP/IP utility gives you the following output? Route Table 
Interface List
Which TCP/IP utility gives you the following output? Route Table
Interface List
Netstat -r
Which TCP/IP utility gives you the following output? Reply from 192.168.1.168
Which TCP/IP utility gives you the following output? Reply from 192.168.1.168
Ping
Which TCP/IP utility gives you the following output? Active Connections
Proto/ local address/ foreign address/ state
Which TCP/IP utility gives you the following output? Active Connections
Proto/ local address/ foreign address/ state
Netstat -a
Which TCP/IP utility gives you the following output? Interface:192.168.1.111
Which TCP/IP utility gives you the following output? Interface:192.168.1.111
Arp -a
Which TCP/IP utility gives you the following output? Ethernet adapter Local Area Connection:
Which TCP/IP utility gives you the following output? Ethernet adapter Local Area Connection:
Ipconfig
Examine the following output: Active Connections
Proto local address foreign address state
Which of the following utilities produced this output?
Netstat
Which of the following tools would you use to view the MAC addresses associated with IP addresses that the local workstation has contacted recently?
Arp
You need to perform a reverse lookup of the 10.0.0.1 IP address. Which command can you use to accomplish this? (Select two. Each response is a complete solution.) A. nbtstat -a 10.0.0.3 B. ipconfig /dnslookup 10.0.0.3 C. dig -x 10.0.0.3 D. nslookup 10.0.0.3 E. arp 10.0.0.3
dig -x 10.0.0.3
nslookup 10.0.0.3
Mary calls to tell you that she can’t connect to an intranet server called WebSrvl. From her computer, you ping the server’s IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? A. tracert B. nslookup C. nbtstat D. netstat E. arp
nslookup
You are troubleshooting a network connectivity issue on a Unix system. You are able to connect to remote systems by using their IP address, but unable to connect using the hostname. You check the TCP/IP configuration, and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communication between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two .) A. traceroute B. tracert C. dig D. nslookup
dig
nslookup
Examine the following output : Server : helicuplar.xct.takro.net Address : 209.53.4.130 Name : westsim.com Address : 64.78.193.84 Which of the following utilities produced this output? A. nslookup B. tracert C. ipconfig D. netstat
nslookup
Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8 .2 <<>> westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;->>HEADER<< -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default -- 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 which of the following utilities produced this output?
Dig
Consider the following output from a dig command run on a Linux system. ; <<>> DiG 8 .2 <<>> westsimlll.com ;;res options :init recurs defnam dnsrch ;;got answer : ;;->>HEADER<< -opcode :QUERY , status : NOERROR , id :4 ;;flags : qr rd ra ; QUERY :l , ANSWER :l , AUTHORITY :2, ADDITIONAL :0 ;;QUERY SECTION : ;; westsimlll.com , type= A , class= IN ;;ANSWER SECTION : westsimlll .com . 7h33m IN A 76 .141 .43 .129 ;;AUTHORITY SECTION : westsimlll .com . 7h33m INNS dnsl .deriatctlll .com. westsimlll.com. 7h33m INNS dns2.de riatct222.com . ;;Total query time : 78 msec ;;FROM: localhost .localdomain to SERVER :default -- 202 .64 .49 .150 ;;WHEN: Tue Feb 16 23 :21 :24 2005 ;;MSG SIZE sent : 30 rcvd :l03 What is the IP address of the DNS server that performed this name resolution? A. 202.64.49.150 B. 76.141.43.129 C. 192.168.1.100 D. 16.23.21.24
202.64.49.150
A user reports that he can’t browse to a specific Web site on the Internet. From his computer, you find that a ping test to the Web server succeeds. A trace route test shows that 17 hops to the destination Web server. What is the most likely cause of the problem?
incorrect DNS server address
You want to be able to view the DNS server address that a computer is using. Which of the following utilities would you use?
ipconfig.
ifconfig.
Examine the following output:
Active Connections
Proto Local Address Foreign Address State
TCP SERVER1:1036 localhost:4832 TIME_WAIT
TCP SERVER1:4798 localhost:1032 TIME_WAIT
TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT
TCP SERVER1:2150 cpe-66-67-255-118.roc.res.rr.com:14100 ESTABLISHED
TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED
TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED

Which of the following utilities produced this output?

Netstat
Which TCP/IP utility gives you the following output?
nbtstat -c.
Which TCP/IP utility gives you the following output?
Interface: 192.168.4.101 on Interface 0x3
Internet Address Physical Address Type
192.168.1.23 00-d1-b6-b7-c2-af dynamic
arp.
You are troubleshooting a connectivity problem on a Linux server. You are unable to connect to another system on the local network, but are not able to connect to a server on a remote network.
You suspect that a default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on a Linux server?
ifconfig.
Which TCP/IP utility gives you the following output?
Reply from 192.168.1.68: bytes=32 time<10ms TTL=128 Reply from 192.168.1.68: bytes=32 time<10ms TTL=128Reply from 192.168.1.68: bytes=32 time<10ms TTL=128Reply from 192.168.1.68: bytes=32 time<10ms TTL=128 Packets: Sent = 4, Received = 4, Lost = 0 <0% loss>, Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
ping.
While troubleshooting a problem on a Linux system, you run a utility that generates the following output:
traceroute
You manage a network with multiple subnets connected to the Internet.

A user reports that she can’t access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet.

Which of the following is most likely the cause of the problem?

Missing route on the default gateway router.
You are the network administrator of a branch office of your company. The branch office network is part of a WAN that covers most of the United States. The office has two Windows 2000 servers, two UNIX severs, one Windows NT server, 90 Windows 98 clients, 40 Windows 2000 Professional clients, and five Macintosh clients.

Users have been complaining that they are unable to access resources over the WAN at the main headquarters. You suspect that one of the routers between your office and the main headquarters is not working properly.

What TCP/IP utility can you use to see if a router is not working properly?

tracert.
You are troubleshooting access to a server in a remote network. You use the tracert command and see the following:
Trace route to 192.168.2.250 over a maximum of 30 hops:
1 2 ms 2 ms 2 ms 192.168.12.11
2 2 ms 2 ms 2ms 192.168.11.1
3 5 ms 5 ms 3 ms 192.168.10.15
4 2 ms 2 ms 2 ms 192.168.9.1
5 5 ms 5 ms 3 ms 192.168.11.1
6 2 ms 2 ms 2 ms 192.168.10.15
7 5 ms 5 ms 3 ms 192.168.9.1
…additional output omitted

What is the problem?

Routing loop.
Which of the following commands would display the output shown here?
route print.
You manage a network of multiple subnets connected to the Internet.

A user reports that she can’t access the Internet. You investigate the problem and find that she can access all hosts on the private network, but no hosts on the Internet.

Which of the following is likely the cause of the problem?

Missing default route on a router.
You have configured a remote access server to accept dial-up connections for remote access clients.
Remote clients are able to connect successfully and access resources on the remote access server. However, the remote clients are not able to connect to other devices located on the same subnet where the remote access server is located.

Which action would likely correct the problem?

Enable proxy arp on the LAN connection for the remote access server.
Examine the following output:
4 22 ms 21 ms 22 ms sttlawa01gr02.bb.ispxy.com [154.11.10.62]
5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11]
6 39 ms 39 ms 39 ms Rwest.placa01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svl-core-03.inet.ispoxy.net [205.171.206.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.151.142.1]

Which of the following produced this output?

tracert.
You have just connected a new computer to your network. The network user static IP addressing.

You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem

Which of the configuration values would you most likely need to change?

Default gateway.
Which TCP/IP utility gives you the following output?
2 14 ms <10 ms 14 ms Loopback0.GWI.SLT1.ALTER.NET [137.39.2.123] 3 14 ms <10 ms 13 ms 122.at-6-0-0.XR1.SLT4.ALTER.NET [152.63.91.86] 4 <10 ms 14 ms <10 ms 0.so-0-1-0.TL1.SLT4.ALTER.NET [152.63.1.210] 5 41 ms 41 ms 41 ms 0.so-7-0-0.TL1.PQR3.ALTER.NET [152.63.32.41] 6 42 ms 41 ms 41 ms 0.so.6-0-0.XL1.SEA1.ALTER.NET [152.63.38.82] 7 41 ms 41 ms 41 ms PQS6-0.GW11.SEA1.ALTER.NET [152.63.107.17]
tracert.
Which of the following utilities would you use to view the routing table?
route.
What is the primary purpose of gateway redundancy?
To overcome a single point of failure on the next hop router.
Which of the following protocols provide gateway redundancy? select all that apply
HSRP
GLBP
VRRP
Which process reduces the size of the routing table by advertising a single route as a destination for a group of contiguous subnets?
Route summarization
Which of the following routing protocols uses relative link cost as a metric?
OSPF
Match the default administrative distance with the route type.
IGRP/100
RIP/120
Static Route/1
EIGRP internal route/90
OSPF/110
EIGRP Summary Route/5
Connected Interface/0
EIGRP external Route/170
Your company has decided to temporarily partner with a third-party organization for an upcoming project. This requires your company’s network and the third-party’s network to be connected via a dedicated WAN connection. what should you do to allow routing information to the exchange?
Configure a border router to use route redistribution.
You computer has an IP address of 161.13.5.15. Your computer is on a:
Public network
Which of the following IP addresses is a valid IP address for a host on a public network?
142.15.6.1
Which of the following is not one of the ranges of IP addresses defined in the RFC 1918 that are commonly used behind a NAT server?
169.254.0.1 – 169.254.255.254
You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer?
10.0.12.15
172.18.188.67
192.168.12.253
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the Internet.

From your work office, you can try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the Internet.

Why can’t you access the server?

Private addresses are not accessible through the Internet.
Which of the following associates a port number with a host on a private network?
PAT
You have a small network at home that is connected to the Internet. On your home network you have a server with the IP address of 192.138.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a Web server and allow Internet hosts to contact the server to browse a personal website.
What should you use to allow access?
Static NAT
Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server?
169.254.0.1 – 169.254.255.254
You are the network administrator for a small company that implements NAT to access the Internet. However, you recently acquired 5 servers that must be accessible from outside your network. Your ISP has provided you with 5 additional registered IP addresses to support these new servers but you don’t want the public to access these servers directly. You want to place these servers behind your firewall on the inside network yet still allow them to be accessible to the public from the outside.

Which method of NAT translation should you implement for these 5 servers?

Static
You want to connect your small company network to the Internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. What type of NAT should you implement?
Dynamic
Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?
Port forwarding
Which of the following routing protocols divides the network into areas, with all networks required to have an area 0 (area 0 identifying the backbone area)?
OSPF
Which of the following routing protocols is classified as a balance hybrid routing protocol?
EIGRP
Which of the following routing protocols are classified as link state routing protocols? select two
OSPF
IS-IS
What are the main differences between the OSPF and IS-IS routing protocols?
OSPF requires an area 0, while IS-IS does not.
Which of the following protocols has a limit of 15 hops between and two networks?
RIP
What is the main difference between RIP and RIPv2?
Rip is a classful protocol, while RIPv2 is a classless protocol.
Under which of the following circumstances might you implement BGP on your company network and share routes with internet routers?
If the network is connected to the internet using multiple ISPs
You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use?
IPG
You have a router configured to share routing information using RIP. In addition, you have a single static route that identifies a default route for all other networks. The next hop router for the default has changed. You need to make the change with the least amount of effort possible. What should you do?
Manually reconfigure the default route to point to the new next hop router.
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. the router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24.
The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. what should you do.
wait for convergence to take place.
you have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network.
Convergence
When multiple routes to a destination exist, what is used to select the best possible route?
Metric
Which of the following routing protocols uses paths, rules, and policies instead of a metric for making routing decisions?
BGP
Which of the following are true for the IS-IS routing protocol? select two
Divides large networks into areas
Supports IPv6 routing
One method of preventing routing loops is to not send information about a route back to the router from which the information came. What is this technique called?
Split horizon
What information does the next hop entry in a routing table identify?
The first router in the path to the destination network.
A router is connected to a network 192.169.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The router is also configured with a static route of 0.0.0.0 with a mask of 0.0.0.0. The router receives a packet addressed to the network 10.1.0.0/16. What will the router do with the packet.
Forward the packet to the next hop router specified by the route network 0.0.0.0
A router is connected to a network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. There is no default route on router. The router receives a packet addressed to network 10.1.0.0/16. What will the router do with the packet?
Drop the packet.
Which of the following is a characteristic of static routing when compared to dynamic routing?
All routers must be manually updated on the router.
Which two of the following tasks do routers perform?
Route data based on logical network addresses.
Maintain information about paths through an internetwork.
You have been recently hired to mange a network for a small company. Prior to your arrival, the entire network was migrated from IPv4 to IPv6. Which strategy could you imply to help prevent these issues from occurring?
Use a /127 prefix on the backbone segment.
You work for a large, multinational organization that has an extensive global network that is interconnected using WAN links and routers.
One of the intermediate routers is an MTU black hole.
You want to maintain security on your internal network
53
Using the Netstat command, you notice that a remote system
Downloading a file
You want to allow your users to download files from a server running the TCP
FTP
After blocking a number of ports to secure your server
Open port 25 to allow SMTP service
Users complain that they can’t connect to the website when they type
The HTTP port should be changed to 80
Which of the following does a router acting as a firewall use to control packets
ACL
You have a company network that is connected to the Internet. You want all users
Use firewalls to create a DMZ. Web Inside / Private Behind
You have just installed a packet-filtering firewall
Port number/source address of a packet/destination address of a packet
Which of the following describes how access lists
An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket numbers.
You have used firewalls to create a demilitarized zone
Put the Database on the private network/Put the Web server inside the DMZ
when designing a firewall, what is the recommended approach
Close all ports, open only ports required
Match the firewall type
Layer 2- V
Layer 3- R
Counts-R
Does-V
Different-R
Same-V
Your Cisco router has three
Add a permit
Which firewall implementation creates a buffer
DMZ
Which of the following are true about routed firewalls
Supports
Counts
An All-in-one security appliance is best
a Remote
Which of the following features are common functions
Bandwith shaping
Spam Filtering
You recently installed a new all-in-one security appliance in a remote office
Change the default
Configure the device’s authentication
Which of the following prevents access based on website ratings
Content filter
You manage a server that runs your company website
Proxy Server
Based on the diagram, which type of proxy is handling the client’s request
Reverse
Which of the following network services or protocols uses TCP/IP port 22
SSH
Which port number is used by SNMP
161
Which protocol and port number is used by BOOTP
UDP 67
To increase security on your company’s internal network
443
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows
The workstation is using NetBIOS to access shared resources on the server
You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427
Someone is using Voice over IP VOIP
You have been given a laptop to use for work
Host-based
You have just installed a packet-filtering firewall on your network
Destination address
Port number
Source address
You provide Internet access for a local school
Application Level
A small startup company has hired
The UTM represents a single point of failure
Match the firewall type on the right
Packet Filtering Firewall- 3
Circuit Level Proxy – 5
Application Level Gateway – 7
Routed Firewall – 3
Transparent Firewall – 2
Which of the following prevents access based on website rating and classifications?
Content filter
You manage a server that runs your company Web site. The Web server has reached its capacity, and the number of client requests is greater than the server can handle.

You would like to find a solution so that static Web content can be offloaded to a different server, while the Web server continues to process dynamic content.

Which solution should you implement?

Proxy server
Based on the diagram, which type of proxy server is handling the client’s request?
Reverse Proxy Server
Which of the following network services or protocols uses TCP/IP port 22?
SSH
Which port number is used by SNMP?
161
Which protocol and port number is used by BOOTP/DHCP?
UDP 67
To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
443
You are monitoring network traffic on your network and you see a large amount of traffic between a Windows workstation and a Window server on the following ports:
*137
*138
*139
Which is the source of this network traffic?
The workstation is using NetBIOS to access shared resources on the server.
You are monitoring network traffic on your network, and you see the traffic between two network hosts on port 2427. What is the source of this network traffic?
Someone is using Voice over IP (VoIP) to make a telephone call.
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks.
What solution should you use?
Host-based firewall
You have just installed a packet-filtering firewall on your network. Which options will you be able to set on your firewall?
Source address of a packet
Destination address of a packet
Port Number
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
Application-level
A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance:
• Firewall
• VPN
• Anti-spam
• Antivirus
You join the UTM device to the company’s Active Directory domain. The company’s traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public WiFi networks. What weaknesses exist in this implementation?
The UTM represents a single point of failure.
Match the firewall type on the right with the OSI layers at which it operates.
Note: Each OSI Layer can be used once, more than once, or not at all.
Packet Filtering Firewall
OSI Layer 3
Circuit-level Proxy
OSI Layer 5
Application-level Gateway
OSI Layer 7
Routed Firewall
OSI Layer 3
Transparent Firewall
OSI Layer 2
You are in the process of configuring an iSCSI storage area network (SAN) for your network…. Which tool should you use?
iSCSI Initiator
Arrange the Fibre Channel SAN implementations tasks in the order they should be performed.
Step 1- Install a Fibre Channel adapter in each server that will access the shared storage on the SAN.
Step 2- Deploy a Fibre Channel switch.
Step 3- Connect each server to the Fibre Channel switch using the appropriate fiber optic cabling for the equipment you are using.
Step 4- Deploy a shared storage device, such as an external RAID device containing multiple hard disk drives.
Which of the following does NOT accurately describe an iSCSI SAN?
Requires special hardware and knowledge to implement.
You manage a network with three dedicated storage devices, as shown in the diagram. Users on the network see only a single file server. Which network-based storage technology is being used?
NAS with Clustering.
In a SAN implementation, the servers that connect to shared storage devices are called___________________.
initiators
Which of the following are typical components of a NAS device? select two
A minimal network OS.
One or more NICs.
Which of the following protocols are used with VoIP?
SIP
RTP
Which of the following protocols are used by VoIP to set up, maintain, and terminate a phone call?
SIP
Which switch features are typically used with VoIP?
PoE
VLAN
Which of the following features is used with digital IP phones to supply power through a switch port?
PoE
Match each UC component on the left with its corresponding definition on the right.
UC Server – Manages the entire UC system
UC Gateway – Connects a digital network to an analog network
UC Server – Makes presence information available to users
UC Hardware Device – An IP phone for making phone calls
UC Gateway – Connects a UC network to the PSTN
UC Software Device – A smart phone used to access the UC system
UC Hardware Device – Designed to work specifically with the UC server
Your company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system?
Jitter
At what percent is packet loss noticeable in voice traffic?
1%
Which protocol doies VoIP use to interface with the PSTN?
MGCP
Your company recently installed a unified communication system. Employees are now able to inform each other of their availability.
Presence information
You’ve been asked by upper management if there is a way to integrate phone calls, emails, and instant messaging into a single platform. Which of the following systems should you recommend to them?
Unified communication
Which of the following protocols is used during the call control process of multimedia communications?
Session Initiation Protocol
In virtualization, what is the role of a hypervisor?
A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.
What type of virtualization completely simulates a real physical host?
Full Virtualization
Which component is most likely to allow physical and virtual machines to communicate with each other?
Virtual switch
Which of the following are advantages of virtualization? select two
Centralized administration
Easy migration of systems to different hardware
You need to provide DHCP and file sharing services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
Virtual servers.
You have configured a virtual network that includes the following virtual components:
*Four virtual machines (Virtual OS 1, Virtual OS 2, etc.)
*One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.
Give the port configuration for the virtual switch and the physical switch in the table below, click on on all of the virtual and physical machines Virtual OS 1 can communicate with.
Virtual OS 2
Virtual OS 3
You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?
Virtual servers
You have configured a virtual network that includes the following virtual components:
*Four virtual machines (Virtual OS 1, Virtual OS 2, etc.)
*One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network.
Give the port configuration for the virtual switch and the physical switch in the table below, click on on all of the virtual and physical machines Virtual OS 1 can communicate with.
Virtual Switch –
P1 – Virtual OS 1- Virtual Network1
P2 – Virtual OS 2 – Virtual Network2
P3 – Virtual OS 3 – Virtual Network1
P4 – Virtual OS 4 – Virtual Network2
P5 – Virtual Switch – Virtual Network1, Physical Network
Physical Switch
P1 – Physical Switch – Physical Network
P2 – Physica OS1 – Physical Network
P3 – Physica OS2 – Physical Network
P4 – Physica OS3 – Physical Network
P5 – Physica OS4 – Physical Network
Virtual OS 3
Physical OS 1
Physical OS 2
Physical OS 3
Physical OS 4
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do?
Create a new virtual switch configured for host-only (internal) networking.
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Match the virtualization feature on the right with the appropriate description on the left.
Flexibility – Moving virtual machines between hypervisor hosts
Testing – Verifying that security controls are working as designed
Server consolidation – Performing a physical-to-virtual migration (P2V)
Sandboxing – Isolating a virtual machine from the physical network
You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working.
To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations.
Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates.
Create a new virtual switch configured for bridged (external) networking
Connect the virtual network interfaces in the virtual machine to the virtual switch
What key advantage does a virtual router have over a physical router?
Multiple networks can be connected to a single interface.
You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?
Implement a virtual firewall within the hypervisor.
Which of the following statements about virtual NICs are true?
Virtual NICs need the appropriate driver installed to function.
Multiple virtual NICs can be added to a virtual machine.
Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network?
SaaS
Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?
PaaS delivers everything a developer needs to build an application onto the cloud infrastructure
Which of the following is NOT true regarding cloud computing?
Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services.
Public cloud
Provides cloud services to just about anyone
Private cloud
Provides cloud services to a single organization
Community cloud
Allows cloud services to be shared by several organizations
Hybrid Cloud
Integrates one cloud service with other cloud services
You were hired by a small start-up company. the company is in a small office and has several remote employees.
You ave been asked to find a business service that would accommodate the curren size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power.
Which cloud serve model should you use?
IaaS
You manage the information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture?
Verify that your network’s existing security infrastrucutre is working properly.

Install the latest firmware updates from the device manufacturer

You manage the information systems for a large manufacturing firm. Supervisory control and data acquistion (SCADA) devices are used on the manfucaturing floor to manager your organization’s automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection. You are concerned about the security of these devices. What can you do to increase their security posture?
Install the latest firmware updates from the device manufacturer

Verify that your network’s existing security infrastrucutre is working properly.

Why do attackers prefer static environment devices to conduct distributed network attacks? select two
These devices tend to employ much weaker security than traditional network devices

These devices are typically more difficult to monitor than traditional network devices.

Match the definition on the left with the SCADA technology term on the right
Remote Terminal Unit- Connects equipment to the network via a wireless signal and converts digital data from the network into signals that the equipment can process.
DCS- A network of components that work together in order to remotely manage industrial equipment.
Network Link- Connects the supervisory computer to the RTUs or PLCs.
Supervisory Computer-Communicates with and send control commands to connected SCADA devices.
Programmable logic Controller- Connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process
Which of the following is an example of smart technology embedded within networked devices associated with automated factory equipment?
SCADA systems
SCADA systems are typically implemented using which of the following components?
Remote terminal units (RTUs), and programmable Logic Controllers (PLCs)
What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment?
They are vulnerable to exploits due to weaker security.
An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device?
Hub
All of the 802.11 standards for the wireless networking support which type of communication path sharing technology?
CSMA/CA
Uses a narrow frequency band and hops data signals in a predictable sequence
FHHS
Breaks data into pieces and ends the pieces access multiple frequencies in a defined range
DSSS
Breaks data into very small data streams in order to send the information across long distances
OFDM
Which of the following is true of a wireless network SSID?
Groups wireless devices together into the same logical network
Which wireless networking component is used to correct multiple APs together?
DS
Which IEEE standard describes wireless communications?
802.11b
Which data transmutation rate is defined by the IEEE 802.11b wireless standard.
11Mbps
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 stand will work best in this situation?
802.11a
You are designing an update to your clients wireless network. The existing network uses 802.11b. Due to budget, which 802.11 standard will work best.
802.11g
Which IEEE wireless standard specify transmission speeds up to 54Mbps? select two
802.11a
802.11g
You have been contacted by OsCorp to recommend a wireless solution.
802.11g
Which of the following are frequencies defined by 802.11 committees for wireless networking. select two
2.4GHz
5.57GHz
Which technologies are used by the 802.11ac standard to increase network bandwidth? select two
Eight MIMO radio streams
80MHz donned channels
Your organization uses an 802.11b wireless network. Recently other tenets installed the following equipment in your building….
The wireless tv system
What is the frequency of 802.11a networking?
5.75GHz
How many total channels are available for 802.11a wireless networks?
23
How many total channels are available for 802.11g wireless networks?
11
Which wireless technology is used to enable 802.11a-ht and 802.11g-ht networks to emulate 802.11n network speeds?
Channel bonding
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point, and to be able to roam between the two access points. How should you configure the access points?
Same SSID, different channel.
You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?
Decrease the beacon interval.
You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network to connect to it. What should you do?
Configure a profile on the wireless client.
You have a small wireless network that uses multiple access points. The network currently uses WPA. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop?
TKIP encryption
Preshared key
You are building a wireless network within and between two buildings. The buildings are separated by more then 3000 feet. The wireless network should meet the following requirements….
Building 1-location A
Right-facing directional Antenna/WPA2 with CCMP
Building 1-location B
Omni directional Antenna/WPA2 with CCMP
Building 1-location C
Left-facing directional Antenna/WPA2 with CCMP
Building 1-location D
Right-Facing Parabolic Antenna/WPA2 with CCMP
Building 2-location A
Omni Directional/WEP with Open authentication
Building 2-location B
Left-facing Parabolic Antenna/WPA2 with CCMP
Your wireless network consist of multiple wireless 802.11n access points that are configured as follows…..This network is required to support an ever-increasing number of devices. what should you do?
Double the bandwidth assigned per channel to 40MHz
What purpose does a wireless site survey serve? select two
To Identify existing or potential sources of interference
To identify the coverage area and preferred placement of access points.
You are designing a wireless network for a client. Your client needs the network to support data rate of at least 150Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?
802.11n
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. Which 802.11 standard will work best in this situation? select two
802.11n
802.11a
You are designing an update to your clients wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs to slowly. She wants to upgrade the network to run 150Mbps or faster. Which 802.11 standard will work best in this situation.
802.11n
You have been hired to design a wireless network for a SOHO environment. Which of the following questions should you ask? select three
How many devices will need to be supported
Is the business expected to grow in size in the future
What type of data will be transmitted on the network
To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria. non-overlapping, low utilization, low interference.
channel 1
Match each wireless term or concept on the left with its associated description on the right
Compares the level of the WIFI signal to the level of background radio signals/ Signal to Noise ratio
Checks channel utilization and identifies sources of RF inference/ Spectrum analysis
Identifies how strong a radio signal is at the receiver/Received Signal Level
Identifies the number of useful bits delivered from the senders to the receiver/
Causes multiple copies of the same radio signal to be received by the receiving antenna/ Bounce
Degrades wireless network performance/ Device saturation
Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow for the creation of quest WLANs for keeping public wireless traffic separated from private traffic?
Distributed wireless mesh infrastructure
Match each wireless device on the left with is corresponding characteristics on the right.
Manages all of the Apps that are connected to it/ Wireless controller
Suppors 30 to 50 wireless clients per access point/ Wireless controller
Profides NAT routing and an ethernet switch in one device/ SOHO wireless router
Supports a maximum of 5-10 wireless clients/ SOHO wireless router
Pushes wireless configurations settings to connected access points/ Wireless controller
Match the wireless networking term or concept on the left with its appropriate description on the right.
Moving an wireless device/Roaming
Used by Cisco wireless equipment/ LWAPP
Specifies the number of clients/ Device density
Automatically partitions a single/ VLAN pooling
Graphically displays wireless/ Heat map
Connects tow wired networks/ Wireless bridge
Identifies how strong/
The number of useful bits/ Goodput
Match each type of access point on the left with the wireless network architecture that they are commonly used in on the right
Independent access point infrastructure/ Intelligent AP
Hub-and-spoke infrastructure/ Lightweight AP
Distributed wireless mesh infrastructure/ Intelligent AP
Which encryption method is used by WPA for wireless networks?
TKIP
You want to implement 802.1x authentication on your wireless network. Which of the following will be required>
RADIUS
You want to connect your client computer to a wireless access point connected to your wired network air work. The network Admin tells you that the access point is configured to use WPA2 personal with the strongest encryption method possible. SSID broadcast is ruined off. Which of the following must you configure manually on the client. select three
SSID
AES
Preshared Key
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement.
WPA2
You are concerned that the wireless access points may have been deployed within your organization without authorizations. What should you do. select two
Conduct a site survey
Check the MAC addresses on devices connected to your wired switch
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. What type of security risk is this?
Rogue access point
An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tried using airsnort to capture packets, but found that she couldn’t break the encryption. What attack techniques did the attack us? select two
Pharming
Evil twin
What is the LEAST secure place to locate an access point with an omni-directional antenna when creating a wireless cell?
Near a window
Which of the following measures will make your wireless network inviable to the casual attacker performing war driving?
Disable the SSID broadcast
You are the wireless network Admin for your organization. As the size of the organization has grown, you’ve decided to upgrade your wireless network to use 802.11x authentication instead of pre-shared keys. What should you do
Configure all wireless access points with client certs.
Configure the RADIUS server with a server cert.
You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as mush as possible. the floor plan of the office is shown below…
A-Direciton
B-Direction
C-Omni-Direction
D-Direciton
E-Direciton
F-Direciton
G-Direciton
You need to implement a wireless network between two buildings on a college campus. A wired network has already been implemented within each building. the buildings are 100 meters apart. select two
High-gain
Parabolic
Which of the following wireless security methods uses common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? select two
AES encryption
802.1x
Match each WIFI jamming attach on the left with its corresponding description on the right.
Transmits radio signals at random amplitudes and frequencies/ Random noise jamming
Transmits pulses of radio signals at random amplitudes and frequencies/Random pulse jamming
Repeatedly transmits high-intensity, short-duration RF burst at a rapid pace/ Spark jamming
You are setting up a wireless hotspot in a local coffee shop. For best results, you want todisperse the radio signals evenly throughout the coffee shop.Which of the following types of antennas would you use on the AP to provide a 360degree dispersed wave pattern?
Omni-Directional
You are troubleshooting a wireless connectivity issue in a small office. You determine that the 2.4GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standard could the network be using. select two
Bluetooth
802.11b
You are implementing a wireless network inside a local office. You require a wireless link to connect a laptop in the administrator’s office directly to a system in the sales department. In the default configuration, the wireless AP uses a 360dispersed RF wave design. After installed, the signal between the two systems is weak as many obstacles interfere with the signal.
Replace the Omni-directional antenna with a directional antenna
A user on your network has been moved to another office down the hall. after the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem?
The client system has moved to far away from the access point.
You have been hired to troubleshoot a wireless connectivity issue for two separate networks located within a close proximity. Both networks use a WAP from the same manufacturer and all settings, with the exception of SSIDs, remain configured to the default. Which of the following might you suspect as the cause of the connectivity problems?
Overlapping channels
You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for its customers who want Internet access. You decide to check your e-mail before the meeting begins, but when you open the browser you cannot gain Internet access. Other customers are on the Internet and because you use a wireless connection at work, you are sure your laptops wireless adapter works. What is the likely cause of this problem?
mismatched SSID
After installing a new 2.4GHz cordless phone system in your office, you notice that wireless network performance is adversely affected. Which of the following wireless networking standards are you most likely to be using? (Select two.)
802.11b
802.11g
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the coffee rom two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point on her floor
While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel ID that you intend to use. Which of the following strategies are you most likely to adopt in order to avoid a conflict between the networks?
Use a different channel ID
Mobile devices in your organization us the access point shown in the figure below to connect to your wireless network. what should you do. select two
Set the channel used by access pint B to 8
Set the access point B to sue 802.11n wireless network
which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building>
Place access points above where most clients are
you have physically added a wireless access point to your network and installed a wireless network card in two laptops running windows. Neither laptop can find the network and you have come to the conclusion that you must manually configure the wireless access points (AP). Which of the following values uniquely identifies the network AP?
SSID
You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point?
in the top floor
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
Place accès points above where most clients are
Your wireless network consists of multiple 802.11n access points that are configured as follows… what should you do
implement antenna diversity
If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?
622.08 Mb
To access the Internet through the PSTN, what kind of connectivity device must you use?
Modem
Which of the following are characteristics of ATM?(Select Two)
Uses fixed-length cells of 53-bytes
add labels to data units
Which four of the following are the responsibility of the WAN service provider?
CO
DCE
Local loop
PSE
Which type of network divides data to be transmitted into small units and routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?
Packet-switched
Which of the following WAN technologies provides packet switching over high-quality digital lines that speeds up to 1.544 Mbps or greater?
Frame Relay
Which WAN connection types use digital communications over public telephones?
DSL ISDN
Which of the following is true of Multiprotocol Label Switching? (Elect two.)
It can carry ATM, SONET, and Ethernet traffic.
CEF is required for all MPLS-enable Cisco routers
What is the maximum data rate of an ISDN BRI line?
128 Kbps
Which three of the following are characteristics of ISDN?
It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines
It is a dial-up service that uses existing copper wires for the local loop
It lets you transmit voice, video, and data over the same lines.
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link What type of connection is being used?
Point-to-point
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
CSU/DSU
Your client has acquired several small companies and would like to connect them together into one network. Not al of the routers are cisco devices and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?
PPP
RouterA is connected to RouterB through Serial1. You want to configure the link to use PPP with CHAP authentication with a password of CISCO. which set of commands would you use on RouterA to complete the configurations?
A- RouterA(config)#username RouterB password cisco
Two routers with the hose name SLC and PROVO have been configured to connect using PP with CHAP authentication through their BRI0 interfaces. what should you do to correct the problem>
On SLC, change the username password to chocolate
Which of the following statements about the functionality of LCP are true? select three
Username and passwords may be required during the handshake
LCP provides multilink support
Data can be compressed at the source and decompressed at the destination
Which of the following are benefits of LCP? select three
Provides load balancing across multiple links
Negotiates the use (or lack) of authentication before starting the session
Monitors data dropped on the link and avoids frame looping
What is the connection order used by two TCP/IP routers to open a session with PPP including authentications?
LCP, authentications, NCP
PPP supports authentications, compressions, and multiple network-layer protocols. Which of the following correctly sequences these functions when a PP link is established?
Negotiate compression settings, perform authentications, negotiate network layer protocols.
Which of the following protocols is used by PPP to enable support for multiple network-layer protocols?
NCP
Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels?
ISDN BRI
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satellite
Which of the following forms of networking is highly susceptible to eavesdropping and must be secured accordingly?
Wireless
Which of the following is the most susceptible to interference related to atmospheric conditions?
Satellite
Which of the following Internet access technologies support simultaneous voice and data traffic over the same physical line? (Select two.)
ISDN BRI
ADSL
Which of the following Internet services provides equal upload and download bandwidth?
SDSL
Which of the following are characteristics of VDSL? (Select Two)
Unequal download and upload speeds
Supports both data and voice at the same time
Which of the following technologies does GSM use to allow multiple connections on the same frequency?
Time division multiple access
Which of the following cellular network types does NOT provide Internet connectivity?
2G
Which of the following cellular types use MIMO to increase 3G data throughput? (Select two.)
LTE
HSPA+
Drag the cellular network specification on the left to its corresponding mobile technology generation on the right
2G – GSM CDMA
3G – LTE HSPA+
4G – WiMAX
Which of the following describe the EDGE cellular technology? (select two.)
The first Internet compatible technology
Offers speeds of 400-1,000 Kbps
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
DSL
Which of the following services are available regardless of whether the telephone company network is available?
Cable modem
Which type of Internet service uses the DOCSIS specification?
Coaxial cable
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? select two
TACACS+
RADIUS
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
Which of the following would be a required part of your configuration?
Configure the remote access servers as RADIUS clients.
Which of the following protocols can be used to centralize remote access authentication?
TACACS
You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement?
RAS
You are configuring your computer to dial up to the Internet. What protocol should you use?
PPP
Which of the following protocols or services is commonly used on cable Internet connections for user authentication?
PPPoE
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need.
You want the connection to be as secure as possible. Which type of connection will you need?
Remote access
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, the Ethernet and wireless connections are used to create a small network within your home.
Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
PPPoE
RADIUS is primarily used for what purpose?
Authenticating remote clients before access to the network is granted
Which of the following are characteristics of TACACS +?
Encrypts the entire packet, not just authentication packets
Which of the following ports are used with TACACS ?
49
Which type of device is required to implement port authentication through a switch?
RADIUS server
Which of the following are characteristics of TACACS +? select two
Allowing for a possible of three different servers, one each for authentication, authorization, and accounting.
Uses TCP.
you are troubleshooting physical layer issues with Gi0/1 interface in a router. you need to view and analyze the number of collisions detected on the interface
show interfaces Gi0/1
You are troubleshooting physical layer issues with the G0/1 interface on a router. You suspect a duplex mismatch error has occurred and need to determine the duplex settings configured on the interface. Which commands should you use?
show interfaces gi0/1
show interfaces gi0/1 status
Review the output from the show interfaces far/1 command on the switch 2 switch in the exhibit. what is wrong with the fa0/1 interface in this example?
A duplex mismatch exists with the device on the other end of the connection.
Consider the network shown in the exhibit. When you run the show interface command on switch1, you observe a significant number of runts on the Gio/1 interface. What does this statistic indicate?
Collisions are occurring.
You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice significant number of CRC errors displayed. What are the most likely causes? select two
Collisions
EMI or cross-talk on the cable connected to the interface
You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame was transmitted?
Late collisions
A workstation is connected to a switch on the Gi0/2 interface using a straight-through cable. The ethernet interface in the workstation has bee manually configured to use a 100Mbps link speed in full-duplex mode. Which of the following are true in this scenario? select three
The switch attempts to sense the link speed
If the link speed is 100Mbps or 100Mbps, half-duplex is used.
If the link speed is 1000Mbps or faster, full-duplex is used.
Consider the network shown in the exhibit.
You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands:
Switch2#show interfaces fa0/1 status
The devices connected to fa0/1 interface has auto negotiation disabled
Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available. so you contracted with a satellite provider to connect the branch office network to your home office network. What is the most likely cause of this poor WAN performance.
There is latency on the WAN link.
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network. What is the most likely cause of this poor WAN performance.
The WAN provider is throttling bandwidth on the link
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network.
You ran the show interface. What are the most likely causes of this WAN issues? select two
There is a problem with the service providers network
The WAN interface on one or both routers have been disabled.
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network.
You ran the show interface. What are the most likely causes of this WAN issues?
interface: up
protocol: statues down
There is a data link encapsulation protocol mismatch between the WAN interfaces on both ends of the link.
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network.
You ran the show interface. What are the most likely causes of this WAN issues?
There is an authentication misconfiguration issue the WAN interfaces on both ends of the link
Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office network to your home office network.
You ran the show interface. What are the most likely causes of this WAN issues?
There is an IP address misconfiguration issues between the WAN interfaces on both ends of the link.
You are troubleshooting a workstation connection… drop cable connecting the computer to the network.
Which type of document should you update?
Change documentation
You are troubleshooting a workstation connection… different port on the patch pane.
Which type of document should you update?
Wiring schematic
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
Which type of documentation would you consult to find the location of RJ-45 wall jacks and their endpoints in the intermediate distribution closet?
Wiring schematic
You need to find out what kind of laws might apple to… Which type of document would you consult?
Regulation
In troubleshooting a router, you want to identify which other devices…
Which type of document would most likely have this information?
Network diagram
Which of the following information are you likely to find in a policy document?
A requirement for using encrypted communications for web transactions
Which of the following information are you likely to find in a procedure document?
Details on how to test and deploy patches.
Which of the following documents would likely identify that drop cables on your network use T568A standard?
Wiring schematic
You want to make sure that the correct ports on a firewall have been opened or closed. Which document should you check?
Configuration documentation
A new law was recently passes that states that all businesses must keep a history of…
Which document type would you update first in response to this new law?
Policy
You are concerned about the amount of traffic that passed though a router…
Which document would help in identifying past average network traffic?
Baseline
You are in the habit of regularly monitoring performance statistics for your…
Which type of document should you update to reflect the change?
Baseline
Which of the following terms describes a test lab environment that does not require the use of physical hardware?
Virtual sandbox
You manage a network with a single switch. All hosts connect to the…
You want to increase the security of devices that are part of the accounting department…
What should you do?
Use a router to configure a subnet for the accounting computers
You walk by the server room and notice a fire has started. What should you do first?
Make sure everyone has cleared the area
Which of the following fire extinguisher types is best used for electrical fires that might result when working with computer components?
Class C
Which of the following fire extinguisher suppressant types is best used for electrical fires that might result when working with computer components?
Carbon dioxide (CO2)
Which of the following fire extinguisher types poses a safety risk to users in the area? (Select two)
– CO2
– Halon
Which of the following statements about ESD is not correct?
ESD is much more likely to occur when the relative humidity is above 50%
What is recommended humidity level for several rooms?
70%
You are adding a new rack to your data center…
The only space you have available in the data center is on the…
To protect against failures, you also plan to install a UPS in the rack along…
There are problems with this plan. What should you do?
Hire an electrician to install a wall outlet near the new rack
The power supply in a tower server system…
Next, you remove the power supply unit from the server and open it…
Which safety rules were violated in this scenario? (Select two)
– You should never open a computer power supply
– You should unplug a device from the wall outlet before connecting yourself to it with a static wristband
You have just started a new job as a network…
To improve the safety of your organization, you decide…
How should you get them?
Download them from the chemical manufacturers’ websites
Which of the following is an example of an internal threat?
A user accidentally deletes the new product designs
Which of the following is an example of privilege escalation?
Creeping privilieges
What is the greatest threat to the confidentiality of data in most secure organizations?
USB devices
When would choosing to do nothing about an identified risk be acceptable?
When the cost of protecting the asset is greater than the potential loss
When analyzing assets, which analysis method assigns financial values to assets?
Quantitative
Your company has developed and implemented countermeasures for the greatest risks to their assets… What is the remaining risk called?
Residual risk
Which of the following is not a valid response to a risk discovered during a risk analysis?
Denial
If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?
Negligence
Purchasing insurance is what type of response to risk?
Transference
When recovery is being performed due to a disaster, which services are to be stabilized first?
Mission critical
In business continuity planning, what is the primary focus of the scope?
Business processes
What is the primary goal of business continuity planning?
Maintaining business operations with reduced or restricted infrastructure capabilities or resources
Which of the following network strategies connects multiple servers together such that if one server fails, the other immediately take over its tasks, preventing a disruption in service?
Clustering
You manage the website for your company. The Web1 server hosts…
Which component is a single point of failure for the website?
Disk controller
You manage a website for your company. The website uses three…
Considering the availability of your website, which component represents a single point of failure?
Website storage
Match each third-party integration phase on the left with the tasks that need to be completed during that phase on the right. Each phase may be used once, more than once, or not at all.
Communicate vulnerability assessment…
– Ongoing operations
Disable VPN configurations…
– Off-boarding
Compare your organization’s…
– Onboarding
Disable the domain…
– Off-boarding
Identify how privacy…
– Onboarding
Draft an ISA…
– Onboarding
Conduct regular security…
– Ongoing operations
Match each Interoperability Agreement document on the left with the appropriate description on the right. Each document may be used once, more than once, or not at all.
Specifies exactly which…
– SLA
Creates an agreement…
– BPO
Provides a summary of…
– MOU
Documents how the…
– ISA
Defines how disputes…
– SLA
Specifies a present…
– BPO
Your organization is in the process of negotiating an Interoperability Agreement (IA) with another organization. As a part of this…
As a security administrator, which tasks should you complete during this phase? (Select two)
– Identify how data will be shared
– Identify how data ownership will be determined
Which is the most common failure of a security policy in an environment?
Lack of user awareness
Which business document is a contract that defines a set of terms that will govern future agreements between two parties?
Master Service Agreement
A user named Bob Smith has been assigned…
When provisioning Bob’s user account in…
On first logon, Bob is prompted to change…
What should you do to increase the security of Bob’s account? (Select two)
– Require stronger initial password when creating user accounts
– Train users not to use passwords that are easy to guess
You have installed anti-virus software on computers at your business…
What should you add to your security measures to help prevent this from happening again?
User awareness training
What is the main difference between vulnerability scanning and penetration testing?
Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter
What is the primary purpose of penetration testing?
Test the effectiveness of your security perimeter
A security administrator logs on to a Windows server on her organization’s…
What type of scan was conducted in this scenario?
Credentialed scan
A network utilizes a network access control (NAC) solutions to protect against malware. When a wired or wireless…
What is the process called?
Posture assessment
You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
Change management
Which component of a Change and Configuration Management policy identifies technical and budgetary considerations associated with a proposed change and also identifies any potential impacts to the network?
Feasibility anaylsis
Arrange the steps in the Change and Configuration Management process on the left in the correct order in which they should be completed on the right.
Step 1
– Identify the need…
Step 2
– Conduct a feasibility…
Step 3
– Define the procedure…
Step 4
– Notify affected parties…
Step 5
– Implement the change.
Step 6
Test the implementation
Step 7
– Document the change.
Which of the following is an example of privilege escalation?
Creeping privileges
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance.

What is the best way to do this?

Install a proxy server
You manage a server that runs your company Web site. The Web site includes streaming video that shows features of some of your products.

The link connecting your server to the Internet charges based on bandwidth use. When the bandwidth spikes, so does your bill. You would like to implement a solution to prevent the amount of traffic sent over the WAN link from exceeding a specific level.

Which solution should you implement?

Traffic shaper
You manage a server that runs your company Web site. The Web server has reached its capacity, and the number of client requests is greater than the server can handle.

You would like to find a solution so that a second server can respond to requests for Web site content.

Which solution should you implement?

Load balancing
You have a website that uses multiple servers for different types of transactions. For example, one server is responsible for static web content, while another is responsible for secure transactions. You would like to implement a devices to speed up access to your web content….. Which type of device should you choose?
Content switch
What is the primary security feature that can be designed into a networks infrastructure to protect and support availability?
Redundancy
What is the purpose of using Ethernet bonding? (Select two.)
Increases network performance.
Provides a failover solution for network adapters
You have a network server with two network interface cards. You want both network adapters to be used at the same time to connect to the same network to double the amount of data the server can send. Which feature would you use?
Ethernet bonding
Your network conducts training sessions for high-profile clients. As part of the training, clients connect to get a video feed of the instructor and other class activities. You want to make sure that video traffic related to the training is not delayed on the network.

Which solution should you implement?

QoS
QoS provides which of the following on a network?
Reduces latency of time-sensitive traffic
Match the COS priority on the left with the corresponding value on the right.
0-Best effort (default)
1-Backgroud
2-Excellent effort
3-Critical applications
4-Video(<100ms latency) 5-Video(<10ms latency) 6-Internetwork control 7-Network control
Which of the following statements about DSCP are true? select two
The DiffServ field is used to add precedence values
Classification occurs at layer 3
Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?
Multilayer switch
Your organizations uses a time-keeping application that only runs on Windows 2000. Because of this, there are several Windows 2000 workstations on your network. Last week you noticed unusual activity…. Which solution should you implement to protect the network….
Configure VLAN membership so that the Windows 2000 workstations are on their own VLAN
A new assistant network Admin was recently hired by your organization to relieve some of your workload. You assigned the assistant network Admin to replace a defective patch cable that connected port 1 on your patch panel to one of your network switches…. What should you do. choose two
Remove the patch cable connecting the first switch to the third switch
Enable STP on each switch
You are a network administrator for your computer. A frantic user calls you one morning exclaiming that “nothing is working.” What should you do next in your troubleshooting strategy?
Establish the symptoms.
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network.
You go to the office and see that one of the user’s stiletto heels has broken and exposed some of the wiring in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user’s computer.
What should you do next in your troubleshooting strategy?
Test the solution.
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online.
After doing some research you find that the most likely cause of the problem is a bug in the router’s software. A new patch is available from the manufacturer that is supposed to eliminate the problem.
What should you do next?
Identify possible effects of the solution.
Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists.
What should you do next?
Determine if escalation is needed.
A user reports that she cant connect to the internet. After some investigation, you find the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point.
What should you do next?
Create an action plan.
A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verity that it works.
What should you do next?
Identify the results and effects of the solution
A user reports that he cant connect to a specific Web site. You go to the user’s computer and reproduce the problem.
What should you do next?
Identify the affected areas of the network.
A user reports that she cant connect to a server on your network. You check the problem and find out that all users are having the same problem.
What should you do next?
Determine what has changed.
When troubleshooting network issues, its important to carry out tasks in a specific order. Drag the trouble shooting task on the left to the correct step on the right.
Step 1
Identify the problem
Step 2
Establish a theory of probable causes
Step 3
Test the theory to determine the cause
Step 4
Establish a plan of action
Step 5
Implement the solution or escalate
Step 6
Verify full system functionality
Step 7
Document findings, actions and outcomes
Match each troubleshooting command on the left with its function on the right. each utility may be used one, more than once, or not at all
Tests connectivity between two network hosts by sending IPv4 ICMP echo requests packets without modifying the TTL parameters/Ping
Computes lost/sent packet statistics for each hop in the route between two hosts/ Pathping
Used on Linux systems to identify the route between two IPv6 hosts/ Tracetroute6
Used on Windows systems to identify the route between two IPv4 hosts/ Tracert
Tests connectivity IPV6/
Which of the following are true about reverse proxy? select two
Can perform load and balancing, authentication, and caching.
Handles requests from the internet to a server n a private network
You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack.
Which should you do next?
Perform a memory dump
Which of the following is a file transfer protocol that uses UDP?
TFTP
You are configuring a switch so that you can manage it via PuTTY from the same network segment as the switch. On the switch, you enter the following commands.
Switch# config terminal
switch(config)#interface Evian 1
switch(config-if)#ip- address 192.168.1.10 225.225.225.0
will this configuration work?
No, the no shutdown command needs to be entered
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device.
Which too should you use?
Protocol analyzer
You manage a network with a single switch. On each switch port, a hub connects multiple devices to the switch.
which condition are you most likely to experience on the network ?
collisions
select the statement that best describes a broadcast storm.
A Broadcast storm occurs when there are so many broadcast messages on the network that they approach or exceed the network bandwidth..
Which of the following solutions would you implement to eliminate switching loops?
spanning tree
You manage a network that uses a single switch. All ports within your buildings connect through he single switch . Which feature should you implement?
VLANs
You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available.
Which feature should your switch support?
spanning tree
You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive doc.

What should you use for this situation?

VLAN
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches.
Which feature prevents switching loops and ensures there is only a single active patch between any two switches?
Spanning tree
Which feature prevents switching loops and ensures there is only a single active path between any two switches?
spanning trees
A user reports that network access from her workstation is very slow. The problem does not seem to be affecting any other users.
Which of the following conditions is the most likely cause?
Duplex mismatch
You manage a local area network with several switches. A new employee has started today so you connect her workstation to a switch port.

Which of the following is the most likely cause of the problem?

Incorrect VLAN assignment
You manage a network with multiple switches. You find that your switches are experiencing heavy broadcast storms.

Which of the following will help reduce the effects of a broadcast storm?

Enable spanning tree on the switches
Which of the following solutions would you implement to eliminate switching loops?
spanning tree
While viewing the status of the interfaces on a Cisco switch, you see abnormally large of oversized ethernet frames being received on one interface. This interface is connected to a workstation located on the 2nd floor.
What could be causing this to happen?
The workstation’s network board is jabbering
The network board in a workstation is currently configured as follows:
show running-config interface
show interface
Which of the following features dynamically places switch ports in blocking or forwarding states?
Spanning tree
You manage a network that uses multiple switches. You want to provide muliple paths between switches so that if one link goes down, an alternate path is available.
Which feature should your switch support?
Spanning tree
What problem does the Spanning Tree protocol prevent?
Switching loops from developing when redundant paths are implemented between switches.
Which of the following are advantages of using the Spanning Tree Protocol (STP) in network segmented bridges?
Prevents message loops from forming

Identifies the optimal path between network devices.

Lets you provide redundancy by using more then one connection between devices, making your network more reliable.

Which statements accurately describes port states of both bridges and switches?
Ports in a blocked state still receive BPDUs

In the learning state the MAC address table can be populated, but frames not forwarded.

A switch running STP is a backup bridge. What state is it in?
Blocking
Switches running the STP are in the process of exchanging BPDUs and defining their roles. In what state are the switches?
listening
A switch running STP is in a learning state. A message destined for a different network segment arrives at the switch.
Which of the following best describes what the switch will do?
It uses the source MAC address and network segment information to build its bridge database, but does not forward the message
A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do?
It does not record the address or segment information. It does not forward the message
You have just connected four switches as shown in the Exhibit. 
Assuming the default switch configuration, which switch will become the root bridge?
You have just connected four switches as shown in the Exhibit.
Assuming the default switch configuration, which switch will become the root bridge?
B
You have two switches connected as shown in the Exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use portfast command?
You have two switches connected as shown in the Exhibit. You would like to configure rapid spanning tree on switch A. On which ports would you use portfast command?
Fa0/1 and Fa0/2
You have just connected four switches as shown in the Exhibit. 
Assuming the default switch configuration, how can your force Switch C to become a root bridge?
You have just connected four switches as shown in the Exhibit.
Assuming the default switch configuration, how can your force Switch C to become a root bridge?
Configure a priority number of 4096 for switch C
You have three switches configured as shown in the Exhibit. 
How can you guarantee that switch C becomes the root bridge?
You have three switches configured as shown in the Exhibit.
How can you guarantee that switch C becomes the root bridge?
Configure switch C with a lower priority value
You need to configure spanning tree on a Cisco switch. You’d like to use a protocol that confirms to the 802.1w standards.
Which protocol should you use?
Rapid PVST+
Match the Etherchannel protocol on the left with its characteristics on the right.
Desirable mode places the port in a negotiating state. Port Aggregation Protocol (PAgP)

Based on the 802.3ad standard
link Aggregation control protocol(LACP)

Passive mode places the port into a passive negotiation state. link aggregation control protocol (LACP)

Auto mode places the port into a passive negotiating state. Port Aggregation Protocol (PAgP)

Active more places the port in a negotiating state.
link Aggregation control protocol(LACP)

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches.
Which feature allows the switches to pass VLAN traffic between the switches?
Trunking
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1.
What should you configure to allow communication between these two devices through the switches?
Trunking
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
Trunk Ports
Computers A and B are on the same VLAN and are separated by two switches, as shown in the exhibit. Computer A sends a Fram to Computer B. 

Which of the following best describes the composition of the frame as it travels from A to B?
Computers A and B are on the same VLAN and are separated by two switches, as shown in the exhibit. Computer A sends a Fram to Computer B.

Which of the following best describes the composition of the frame as it travels from A to B?

Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B.
Which of the following statements accurately describes a VLAN ID?
Switches append a VLAN ID to the header of each frame to identify the virtual network to which it belongs.
Which of the following are reasons to configure VLAN’s on a switch as opposed to using switches without VLANs?
Increased Security
Increased Number of broadcast domains
Which of the following benefits apply only to creating VLANs with switches and not to segmenting the network with regular switches?
You can create multiple broadcast domains
you have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network?
you have two switches connected together as shown in the following diagram. How many broadcast domains are there in the network?
2
Which of the following statements describe how VLANs effect broadcast traffic within an internetwork?
Devices on the same VLAN have the same subnet address

Broadcast traffic is transmitted only within a VLAN

Which of the following are true using multiple VLANS on a single switch? select two
The number of broadcast domains increases

The number of collision domains remain the same

A virtual LAN can be created using which of the following?
Switch
You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?
Switch
Which of the following best describes the concept of VLAN?
Devices on the same network logically grouped as if they were on separate networks
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
Switch port
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports.

You define VLAN 1 and VLAn 2 on each switch. A device on the first switch in VLAN 1 needs to be communicate with a device on the same switch is VLAN 2.

What should you configure so that the two devices can communicate?

Routing
You need to keep users in all other departments from accessing the servers used by the finance department.
Which of the following technologies should you use to logically isolate the network?
VLANs
Consider the network shown in the exhibit. You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces you run the following commands:
What is the issue with this network?
The device connected to the Fa0/1 interface has auto-negotiation disabled.
A workstation is connected to a switch on the Gi0/2 interface using a straight through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed and full duplexing. Which of the following are true in this scenario? (Select three.)
If the link speed is 1000 Mbps or faster, full-duplex is used.
If the link speed is 10 Mbps or 100 Mbps, half-duplex is used.
The switch attempts to sense the link speed. If it can’t, the slowest link speed supported on the interface is selected.
You need to configure the FastEthernet 0/1 interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connected to the other end of the link.
Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.
Enter global configuration mode: conf t
Enter interface configuration mode: int fa0/1
Set the speed of the interface: speed auto
Set the duplex setting for the interface: duplex auto
You need to disable the FastEthernet 0/0 interface on a switch. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.
Enter global configuration mode: conf t
Enter interface configuration mode: int fa0/0
Disable the interface: shutdown
Verify the interface is disabled: show ip interface brief
The FastEthernet 0/0 interface on a switch is currently disabled. You need to enable it so a workstation can be connected to it. Drag the command on the left to the appropriate configuration step on the right to accomplish this. Not all of the commands may be required.
Enter global configuration mode: conf t
Enter interface configuration mode: int fa0/0
Verify the interface is disabled: show interface status
Enable the interface: no shut
A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF.
What will the switch do with the frame?
Send it out all ports except for the port it was received on
Which command would you use on a switch to enable management from a remote network?
IP default-gateway 192.168.10.185
What does the ip address dhcp command all you to do?
Configures the switch to obtain an IP address from a DHCP server
You are configuring a switch so that you can manage it via PuTTY from the same network segment as the switch. On the switch, you enter the following commands.
Switch# config terminal
switch(config)#interface Evian 1
switch(config-if)#ip- address 192.168.1.10 225.225.225.0
will this configuration work?
No, the no shutdown command needs to be entered
Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.
Competes with normal network traffic for bandwidth.
In-band Management

Uses a dedicated communication channel.
Out-of-band management

Must be encrypted to protect communications from sniffing.
In-band management

Does not compete with normal network traffic for bandwidth.
Out-of-band management

Affected by network outages.
In-band management

Match each switch management method on left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all.
Commonly sold at retail stores
Unmanaged switch

Provide port security features.
Managed switch

Support VLANs
Managed switch

Provide very few configuration options
Unmanaged switch

Can be configured over a network connection
Managed switch

Can be configured over a dedicated communication channel
Managed switch

You reconfiguring PuTTY to be used to access the CLI of Cisco switch
Which of the following configuration values would PuTTY from connection? (Select two.)
4600 baud
Flow contro = RTS/CTS
Match the Cisco device password type on the left with its function on the right
Controls the ability to log on through a LAN or WAN interface configured on the device
VTY

Controls the ability to switch configuration modes
EXEC

Controls the ability to connect to the device using a direct connection
Console

A router is configured with the login, no password condition for console access.
Which of the following statements is true about access via a Telnet or SSH session?
Access is denied
You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? select two
Apply all patches and updates

Change default account password

As a victim of a Smurf attack, what protection measure is the most effective during the attack?
Communication with our upstream provider
Which of the following attacks tries to associate an incorrect MAC address with a know IP address?
ARP poisoning
Which of the following best describes the Ping of Death exploit?
An ICMP packet larger than 65,536 bytes?
Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker’s computer?
ARP poisoning
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?
VPN concentrator
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?
VPN concentrator
A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database.
Because she rarely…
many of the things…
Which key step should you take when implementing this configurations? select two
Configure the VPN connection to us IPsec

Configure the browser to sent HTTPS requests through the VPN connection

A VPN is used primarily for what purpose?
Support secured communications over an untrusted network.
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
PPTP
Which of the following protocols can your portable computer use to connect to your company’s network via a virtual tunnel through the internet? select two
L2TP
PPTP
IPsec is implemented through two separate protocols. What are these protocols called? select two
AH
ESP
Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?
IPsec
Which of the following statements about SSL VPN are true? select two
Uses port 443
Encrypts the entire communication session
Which of the following can route layer 3 protocols across an IP network?
GRE
You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?
Your copy is the same as the copy posted on the website
Which of the following network devices or services prevents the use of IPsec in most cases?
NAT
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client?
Implement a hardware checkout policy
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
Turnstiles
Which of the following are solutions that address physical security?(Select two)
Require identification and name badges for all employees //Escort visitors at all times
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
Deploy a mantrap
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
500 resolution, 50mm, .05 LUX
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
PTZ
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
Security guards
Which of the following CCTV types would you use in areas with little or no lights?
Infrared
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
Varifocal
Which of the following controls is an example of a physical access control method?
Locks on doors
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops.
Which of the following is the best protection to implement to address your concerns?
Use cable locks to chain the laptops to the desks
Match each physical security control on the left with an appropriate example of that control on
the right. Each security control may be used once, more than once, or not at all.
Hardened carrier
Protected cable distribution
Biometric authentication
Door locks
Barricades
Perimeter barrier
Emergency escape plans
Safety
Alarmed carrier
Protected cable distribution
Antipassback system
Physical access control
Emergency lighting
Safety
Exterior floodlights
Perimeter barrier
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks.
Which securityrelated recommendations should you make to this client? (Select two.)
Control access to the work area with locking doors and proximity readers.
//Relocate the switch to the locked server closet.
Which of the following is the most important thing to do to prevent console access to a network
switch?
Keep the switch in a room that uses a cipher lock.
You’ve just deployed a new Cisco router that connects several network segments in your organization.
The router is physically located in a cubicle near your office. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of [email protected] You have used the MD5 hashing algorithm to protect the password.
What should you do to increase the security of this device?
Move the router to a secure server room
What is the primary countermeasure to social engineering?
Awareness
Which of the following are examples of social engineering?
Dumpster diving //Shoulder surfing
How can an organization help prevent social engineering attacks?
Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email.
What type of attack is this?
Phishing
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn’t know and he is asking for immediate clarification on several of the project’s details so the project can get back on schedule. Which type of an attack best describes the scenario?
Whaling
Which of the following is a common form of social engineering attack?
Hoax virus information e-mails
Which of the following is not a form of social engineering?
Impersonating a user by logging on with stolen credentials
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
Verify that the email was sent by the administrator and that this new service is legitimate
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can “fix the restroom.”
What should you do?
Direct him to the front entrance and instruct him to check in with the receptionist.
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
Establish and enforce a document destruction policy
What is the primary difference between impersonation and masquerading?
One is more active, the other is more passive
Match the social engineering description on the left with the appropriate attack type on the right.
Phishing
-An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information.
Whaling
-An attacker gathers personal information about the target individual, who is a CEO.
Spear phishing
-An attacker gathers personal information about the target individual in an organization.
Dumpster diving
-An attacker searches through an organization’s trash for sensitive information.
Piggybacking
-An attacker enters a secured building by following an authorized employee through a secure
door without providing identification.
Vishing
-An attacker uses a telephone to convince target individuals to reveal their credit card
Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
Social validation
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
Vishing
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH.
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won’t be able to configure the firewalls that might be controlling access to the Internet in these locations.
SSL
Which protocol does HTTPS use to offer greater security for Web transactions?
SSL.
You can use a variety of methods to manage the configuration of a network router. Match the
management option on the right with its corresponding description on the left. (Each option can
be used more than once.)
SSL
Uses publickey cryptography
HTTP
Transfers data in clear text
SSH
Uses publickey cryptography
Telnet
Transfers data in clear text
Console port
Cannot be sniffed
Telnet is inherently insecure because its communication is in plain text and is easily intercepted.
Which of the following is an acceptable alternative to Telnet?
SSH
Which security protocols use RSA encryption to secure communications over an untrusted
network? (Select two.)
Secure Sockets Layer
Transport Layer Security
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
TLS//
SSL
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?
Port authentication.
Which of the following is a mechanism for granting and validating certificates?
PKI
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?
TACACS+
RADIUS
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?
EAP
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL.
Which method would you use to get a certificate for the server?
Obtain a certificate from a public PKI
Which of the following are used when implementing Kerberos for authentication and authorization? Select two
Time server
Ticket granting server
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
Which of the following would be a required part of your configurations?
Configure the remote access server as RADIUS clients
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch.
Which of the following should you implement?
802.1x
Which of the following features of MS-CHAP v2 that is not included in CHAP?
Mutual authentications
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?
Username
Which of the following is the strongest form of multi-factor authentications?
A password, a biometric scan, and a token device
Which of the following is an example of two-factor authentications?
A token device and a pin
Which of the following is an example of three-factor authentication?
Token device, keystroke analysis, cognitive question
Which of the following are examples of Type 2 authentication credentials? select two
Smart card
Photo ID
Match the authentication factor types on the left with the appropriate authentication factor on the right.
Pin
Something you know
Smartcard
something you have
Password
Something you know
Retina scan
Something you are
Fingerprint scan
Something you are
Hardware token
Something you have
User name
Something you know
Voice récognition
Something you are
WI-FI triangulation
Somewhere you are
Typing behaviors
Something you do
which of the following attacks, if successful, causes a switch to function like a hub?
MAC flooding
You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
Client-side scripts
You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires and ID card to gain access…What should you do to increase the security of this device?
Use a stronger administrative password
Which of the following is a text file provided by a website to a client that is stored on a user’s hard drive in order to track and record information about the user?
Cookie
When you browse to a website, a pop-up window tells you that your computer has been infected with a virus…spyware on your system.
Drive-by download
While using a web-based order form…The value entered is large enough to exceed the maximum value…A large sum of money. What type of attack has occurred in this scenario?
Integer overflow
In a variation of the brute force attack, an attacker may use a predefined list…best addresses this issue?
A strong password policy
Which of the following attacks is a form of software exploitation…input variable is designed to handle?
Buffer overflow
You are an IT consultant and are visiting a new client’s site to become familiar with their network. As you walk around the facility you note the following:
When you enter thefacility a receptionist greets you and escorts you through a locked door to the work area where the office manager sits.
The office manager informs you that the orgnaizations servers are kept in a locked closet. An access card is required to enter the server closet
She infroms you that the server backups are configured to run each night. A rotation of tapes are used as the backup media
You notice the orgnaiation’s network switch is kept in the server closet
You notice that the router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks.
The office manager information you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the rpocess. You carry the workstation to our car and bring it back to your office to work on it.
What securityrelated recommendations should you make to the client?
Implement a hardware checkout policy
Which of the following are solutions that address physical security?
Escort visitors at all times
Require identification and name badges for all employees
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
Turnstiles
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
Deploy a man trap
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
500 resolution, 50mm, .05 LUX
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
PTZ
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
Security guards
Which of the following CCTV types would you use in areas with little or no lights?
Infrared
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
Varifocal
Which of the following controls is an example of a physical access control method?
Locks on doors
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
Use cable locks to chain the laptops to the desks
Match each physical security control with the appropriate example:
Hardened carrier:
Protected cable distribution

Biometric authentication:
Door locks

Barricades:
Perimeter barrier

Emergency escape plans:
Safety

Alarmed carrier:
Protected cable distribution

Anti-passback system:
Physical access control

Emergency lighting:
Safety

Exterior floodlights:
Perimeter barrier

You are an IT consultant and are visiting a new client’s site to become familiar with their network. As you walk around the facility you note the following:
When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager’s cubicle. The receptionist uses a notebook system that is secured with a cable lock.
The office manager infroms you that the organizations servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.
She informs you that the server backups are configured to run each night. A rotation of external usb hard drisks are used a backup media
You notice the orgnaization’s network switch is kept in an empty cubicle adjacent to the office managers workspace
You notice that a router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks.

Which security related recommendations should you make to this client?

Relocate the switch to the locked server closet
Control access to the work area with locking doors and card readers
Which of the following is the most important thing to do to prevent console access to a network switch?
Keep the switch in a room that uses a cipher lock.
You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration from your notebook computer using an SSH client with the user name of admin01 and a password of [email protected] You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
Move the router to a secure server room
Which of the following statements about the use of anti-virus software is correct?
Anti-virus software should be configured to download updated virus definition files assoon as they become available.soon as they become
You have installed anti-virus software on the computers on your network. You update thedefinition and engine files, and configure the software to update those files every day.
What else should you do to protect your systems from malware?(Select two.)
Schedule regular full system scans.
Educate users about malware.
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This isan example of which kind of attack?an example of which kind of attack
DDoS
Which of the following is the best countermeasure against man-in-the middle attacks?
IPsec
A collection of zombie computers have been setup to collect personal information.
What type of malware do the zombie computers represent?
Botnet
Which of the following describes a logic bomblogic bomb?
A program that performs a malicious activity at a specific time or after a triggering event
Which of the following are characteristics of a rootkitrootkit? (Select two.)
Hides itself from detection
Requires administrator-level privileges for installation
Which of the following best describes spyware?
It monitors the actions you take on your machine and sends the information back to itsoriginating source.
A relatively new employee in the data entry cubical farm was assigned a user account similar tothat of all of the other data entry employees. However, audit logs have shown that this useraccount has been used to change ACLs on several confidential files and has accessed data inaccount has been used to change

This situation indicates which of the following has occurred?

Privilege escalation
What are the most common network traffic packets captured and used in a replay attack?
Authentication
Which of the following are denial of service attacks? (Select two.)
Smurf
Fraggle
An attacker uses an exploit to push a modified hosts file to client systems. This hosts fileredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andfinancial information.financial information.
What kind of exploit has been used in this scenario?
Pharming
DNS poisining
Users in your organization receive email messages informing them that suspicious activity hasbeen detected on their bank account. They are directed to click a link in the email to verify theirbeen detected on their bank account. They are directed to click a link in the email to verify theironline banking username and password.
The URL in the link is in the .ru top-level DNS domain.online banking username and password.
What kind of attack has occurred?
Phishing
A programmer that fails to check the length of input before processing leaves his codevulnerable to what form of common attack?
Buffer overflow
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it.
What securityrelated recommendations should you make to this client?
Implement a hardware checkout policy
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
Turnstiles
Which of the following are solutions that address physical security?(Select two)
Require identification and name badges for all employees //Escort visitors at all times
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
Deploy a mantrap
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
500 resolution, 50mm, .05 LUX
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
PTZ
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
Security guards
Which of the following CCTV types would you use in areas with little or no lights?
Infrared
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
Varifocal
Which of the following controls is an example of a physical access control method?
Locks on doors
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops.
Which of the following is the best protection to implement to address your concerns?
Use cable locks to chain the laptops to the desks
Match each physical security control on the left with an appropriate example of that control on
the right. Each security control may be used once, more than once, or not at all.
Hardened carrier
Protected cable distribution
Biometric authentication
Door locks
Barricades
Perimeter barrier
Emergency escape plans
Safety
Alarmed carrier
Protected cable distribution
Antipassback system
Physical access control
Emergency lighting
Safety
Exterior floodlights
Perimeter barrier
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks.
Which securityrelated recommendations should you make to this client? (Select two.)
Control access to the work area with locking doors and proximity readers.
//Relocate the switch to the locked server closet.
Which of the following is the most important thing to do to prevent console access to a network
switch?
Keep the switch in a room that uses a cipher lock.
You’ve just deployed a new Cisco router that connects several network segments in your organization.
The router is physically located in a cubicle near your office. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of [email protected] You have used the MD5 hashing algorithm to protect the password.
What should you do to increase the security of this device?
Move the router to a secure server room
What is the primary countermeasure to social engineering?
Awareness
Which of the following are examples of social engineering?
Dumpster diving //Shoulder surfing
How can an organization help prevent social engineering attacks?
Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email.
What type of attack is this?
Phishing
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn’t know and he is asking for immediate clarification on several of the project’s details so the project can get back on schedule. Which type of an attack best describes the scenario?
Whaling
Which of the following is a common form of social engineering attack?
Hoax virus information e-mails
Which of the following is not a form of social engineering?
Impersonating a user by logging on with stolen credentials
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
Verify that the email was sent by the administrator and that this new service is legitimate
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can “fix the restroom.”
What should you do?
Direct him to the front entrance and instruct him to check in with the receptionist.
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
Establish and enforce a document destruction policy
What is the primary difference between impersonation and masquerading?
One is more active, the other is more passive
Match the social engineering description on the left with the appropriate attack type on the right.
Phishing
-An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information.
Whaling
-An attacker gathers personal information about the target individual, who is a CEO.
Spear phishing
-An attacker gathers personal information about the target individual in an organization.
Dumpster diving
-An attacker searches through an organization’s trash for sensitive information.
Piggybacking
-An attacker enters a secured building by following an authorized employee through a secure
door without providing identification.
Vishing
-An attacker uses a telephone to convince target individuals to reveal their credit card
Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
Social validation
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
Vishing
Which of the following protocols can be used to securely manage a network device from a remote connection?
SSH.
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won’t be able to configure the firewalls that might be controlling access to the Internet in these locations.
SSL
Which protocol does HTTPS use to offer greater security for Web transactions?
SSL.
You can use a variety of methods to manage the configuration of a network router. Match the
management option on the right with its corresponding description on the left. (Each option can
be used more than once.)
SSL
Uses publickey cryptography
HTTP
Transfers data in clear text
SSH
Uses publickey cryptography
Telnet
Transfers data in clear text
Console port
Cannot be sniffed
Telnet is inherently insecure because its communication is in plain text and is easily intercepted.
Which of the following is an acceptable alternative to Telnet?
SSH
Which security protocols use RSA encryption to secure communications over an untrusted
network? (Select two.)
Secure Sockets Layer
Transport Layer Security
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
TLS//
SSL
A service Level Agreement (SLA) defines the relationship between, and the contractual responsibilities of, providers and recipients of service. Which of the following characteristics are most important when designing an SLA? select two
Detailed provider responsibilities for all continuity and disaster recovery mechanisms.

Clear and detailed descriptions of penalties if the level of service is not provided

What is the most important element related to evidence in addition to the evidence itself?
Chain of custody document
You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court.
What type of document is this?
Chain of custody
Which method can be used to verify that a bit-level image copy of a hard drive is an exact clone of the original hard drive collected as evidence?
Hashing
The immediate preservation of evidence is paramount when conducting a forensic analysis. Which of the following action is most likely to destroy evidence?
Rebooting the system
You manage the network for your company. You have recently discovered information on a computer hard drive that might indicate evidence of illegal activity. You want to perform forensic activities on the disk to see what kind of information it contains.
What should you do first?
Make a bit-level copy of the disk
Arrange the computer components listed on the left in order of decreasing volatility on the right.
CPU registers and caches
System RAM
Paging file
Hard Disk
File system backup on an external USB drive
After an intrusion has occurred and the intruder has been removed from the system, which of the following is the best next step or action to take?
Back up all logs and audits regarding the incident
Which of the following is an important aspect of evidence gathering?
Backing up all logs files and audit trails
When conducting a forensic investigation, and assuming that the attack has been stopped, which of the following actions should you perform first?
Document whats on the screen
During a recent site survey, you find a rogue wireless access point on your network. Which of the following actions should you take first to protect your network, while still preserving evidence?
Disconnect the access point from the network
You have discovered a computer that is connected to you r network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack.
Which should you do next?
Perform a memory dump
You have recently discovered that a network attack has compromised your database server. In the process, customer credit card numbers might have been taken by an attacker.
You have stopped the attack and put measures in place to prevent the same incident from occurring in the future.
What else might you be legally required to do?
Contact your customers to let them know of the security breach.
In which stage of the evidence lifecycle is the forensic report created?
Preservation and analysis
Members off the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks.
You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches have been installed.
Which solution should you use?
NAC
You have a company network with a single switch. All devices connect to the network through the switch.
You want to control which devices will be able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download.
Which of the following components will be part of your solutions? select two
802.1a authentications
Remediation servers
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network.
What feature should you configure?
Port authentication
In which of the following situations would you use port security?
You want to restrict the devices that could connect through a switch port.
You are the network administrator for a city library. Thought the library are several groups of computers that provide public access to the internet…..
The library computers are in croups of four. each group of four computers is connected to a hub that is connected to the library network…
What can you do?
Configure port security on the switch
Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access.
You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented.
VLAN
A network switch detects a DHCP frame on the LAN that appears to have come from a DHCP server that is not located on the local network. In fact, it appears to have originated from outside the organizations firewall.
As a result, the switch drops the DHCP message from that server.
Which security feature was enabled on the switch to accomplish this?
DHCP snooping
A network switch is configured to perform the following checks on its ports.
-all ARP requests
-each intercepted request
-if the packet has a valid Binding
-if the packet has an invalid binding
What security feature was enabled on the switch to accomplish this?
Dynamic ARP inspection
Which type of security uses MAC addresses to identify devices that are allowed or denied a connection to a switch?
Port security
Match the port security MAC address type on the left with its description on the right
MAC address manually identified as an allowed address SecureConfigured

MAC address that has been learned and allowed by the switch SecureDynamic

MAC address that is manually configured or dynamically learned that is saved in the config file
SecureSticky

You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your networks security.
You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. the remediation network needs to be isolated from the secure network.
Which should you implement to do this?
Network segmentation
Match the network Access Protection (NAP) component on the left with is description on the right.
Generates a stament of Health (SoH) that reports the client configuration for health requirements.
NAP Client
Runs the System Health Validator (SHV)
NAP Server
Is the connection point for clients to the network
Enforcement Server (ES)
Contain resources accessible to non-compliant computers on the limited-access network.
Remediation Server
You have decided to perform a double blind penetration test. Which of the following actions would you perform first?
Inform senior management
Which of the following activities are typically associated with penetration testing? (select two)
Attempting social engineering
Running a port scanner
Which of the following types of penetration test teams will provide you information that is most revealing of a real-world hacker attack?
Zero knowledge team
A security administrator is conducting a penetration test on a network. She connects a notebook system running Linux to a wireless network and then uses NMAP to probe various network hosts to see which operating system they are running.
Which process did the administrator use in the penetration test in this scenario?
Active fingerprinting
A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts.
Which process did the administrator use in the penetration test in this scenario?
Passive fingerprinting
Drag each penetration test characteristic on the left to the appropriate penetration test name on the right.
White box test
The tester has detailed information about the target system prior to starting the test.

Grey Box test
The tester has the same about of information that would be available to a typical insider in the organization.

Black box test
The tester has no prior knowledge of the target system.

Single blind test
Either the attacker has prior knowledge about the target system, or the administrator knows that the test is being performed.

Double blind test
The tester does not have prior information about the system and the administrator has no knowledge that the test is being performed

Match each network enumeration technique on the left with its corresponding description on the fish.
Identifying phone number with modems
War dialing

Scanning for wireless access points
Wardriving

Identifying operating system type and version number
Banner grabbing

Identifying services that can pass through a firewall
Firewalking

What is the main difference between vulnerability scanning and penetration testing?
Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.
Which of the following is included in an operations penetration test? (select three)
1. Looking through discarded papers or media for sensitive information
2.Eavesdropping or obtaining sensitive information from items that are not properly stored
3.Acting as an imposter with the intent to gain access or information
Which phase or step of security assessment is a passive activity
Reconnaissance
What is the primary purpose of penetration testing?
Test the effectiveness of your security perimeter
Which of the following identifies an operating system or network service based upon it response to ICMP messages?
Fingerprinting
Which of the following uses hacking techniques to proactively discover internal vulnerabilities?
Penetration testing
Which of the following activities are considered passive in regards to the functioning of anintrusion detection system? (Select two.)
Monitoring the audit trails on a server
Listening to network traffic
An active IDS system often performs which of the following actions? select two
Update filters to block suspect traffic
Perform reverse lookups to identify an intruder
What does an IDS that uses signature recognition use for identifying attacks?
Comparison to a database of know attacks
Which of the following are security devices that perform stageful inspections of packet data, looking for patterns that indicate malicious code? select two
IPS
IDS
Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. What step must be taken to ensure that the information is useful in maintaining a secure environment?
Periodic reviews must be conducted to detect malicious activity or policy violations.
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?
IDS
You are connected about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when poosible to stop or prevent the attacks.
Which tool should you use?
IPS
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks.
Which solution should you implement?
Host based IDS
You are concerned about protecting your network from network-based attacks from the internet. Specifically, you are concerned about zero day attacks (attacks that have not yet been identified or that do not have prescribed protections.)
Which type of device should you use?
Anomaly based IDS
If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?
Disconnect the intruder
You have worked as a network Admin for a company for seven months. One day all picture files on the server become corrupted.
You discover that a user downloaded a virus from the internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss adam at that this situation does not occur.
What should you do?
Install a network virus detection software solution.
Which of the following actions should you take to reduce the attack surface of a server?
Disable unused services
You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services.
Which tool should you use?
Port scanner
Which of the following intrusion detection and prevention systems use fake resources to entice intruders by displaying a vulnerability, configuration flaw, or valuable data?
honeypot
What does a tarpit specifically do to detect and prevent intrusion into your network?
Answer connection requests in such a way that the attacking computer is stuck for a period of time
You have a Web site that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before the performance is negatively impacted.
Which tool should you use?
Load tester
You are concerned about attacks directed against your firewall on your network. You would like to examine the content of individual frames sent to the network.
Which tool should you use?
Packet sniffer.
You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding.
Which tool should you consult to identify the problem?
Application log.
You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month.
Which tool should you use?
Event log.
You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device.
Which feature should you enable on the switch so you can see frames from all devices connected to the switch?
Mirroring.
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device.
Which tool should you use?
Protocol analyzer.
You decide to use a packet sniffer to identify the type of traffic sent to the router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router.
When you run the software, you only see frames addressed to the four workstations but not to the router.
Which feature should you configure?
Mirroring.
You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B.
On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B.
What should you do?
Run the packet sniffer application on Host B.
You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link.
Which tool should you use?
Throughput tester.
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffer software on a device which is connected to the same hub that is connected to the router.
When you run the software, you only see frames addressed to the workstation and not other devices.
Which feature should you configure?
Promiscuous mode.
You want to know what protocols are being used on your network. You’d like to monitor network traffic and sort traffic based on protocol.
Which tool should you use?
Packet sniffer.
You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network.
You go to the office and see that one of the user’s stiletto heels has broken and exposed some of the wiring in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user’s computer.
What should you do next in your troubleshooting strategy?
Test the solution.
Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists.
What should you do next?
Determine if escalation is needed.
A user reports that he can’t connect to a specific Web site. You go to the user’s computer and reproduce the problem.
What should you do next?
Identify the affected areas of the network.
You are a network administrator for your computer. A frantic user calls you one morning exclaiming that “nothing is working.” What should you do next in your troubleshooting strategy?
Establish the symptoms.
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online.
After doing some research, you find that the most likely cause of the problem is a bug in the router’s software. A new patch is available from the manufacturer that is supposed to eliminate the problem.
What should you do next?
Identify possible effects of the solution.
A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works.
What should you do next?
Identify the results and effects of the solution
A user reports that she can’t connect to a server on your network. You check the problem and find out that all users are having the same problem.
What should you do next?
Determine what has changed.
A user reports that she can’t connect to the internet. After some investigation, you find the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point.
What should you do next?
Create an action plan.
While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect the problem lies outside the local network.
Which utility would you use to trace the route a packet takes as it crosses the network?
traceroute.
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wirelesss telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?
802.11a
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
802.11n
Which of the following is a firewall function?
Packet filtering
You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks.
Which of the following best describes what happens to network communications?
No device will be able to communicate
You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.
DHCP server
You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?
Perform a memory dump
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You watn wireless users to be able to connect to either access point, and to be able to raom between the two access points.

How should you configure the access points?

Same SSID, different channel
While viewing the status of the interfaces on a Cisco switch, you see an abnormally large
number of CRC errors on one interface. This interface is connected to a user’s workstation
located in a cubicle on the 2nd floor.
What could be causing this to happen?
A strong EMI emitter near the cable run connected to that interface.
You manage a network with multiple subnets connected to the Internet.

A user reports that she can’t access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet.

Which of the following is most likely the cause of the problem?

Missing route on the default gateway router.
What is the primary goal of business continuity planning?
Maintaining business operations with reduced or restricted infrastructure capabilities or resources.
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device’s console.

However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It’s becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.

What should you do?

Use syslog to implement centralized logging.
Which of the following describes the point where the service provider’s responsibility ends and the customer’s
responsibility begins for installing and maintaining wiring and equipment?
A Smart jack
B tor
C Punchdown block
D Vertical cross connect
E Demarc
Demarc
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer.While talk to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works.

What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is release on a short-term, periodic basis (typically monthly)?

A. Targeted software patch
B. Hotfix
C. Kernel fix kit
D. Service pack

Hotfix

Explanation: A hotfix is an operating system patch that corrects a specific known problem. Microsoft typically releases hotfixes monthly.

Service packs include a collection of hotfixes and other system updates. Service packs are not released as Often, but contain all hotfixes released to that time.

Which of the following are differences between RADIUS and TACACS+?
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.
A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server.
Which of the following troubleshooting actions are you most likely to perform first?
Replace the network card in the user’s computer.
You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building.
Which of the following are you most likely to experience?
Attenuation.
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
Deploy a mantrap
Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?
TCP
What are the most common network traffic packets captured and used in a replay attack?

DNS query
File transfer
Authentication
Session termination

Authentication
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
CSU/DSU
Which of the following are advantages of using fiber optic cabling for a network, as opposed to other types of cabling? (select two)
1) Immunity to electromagnetic interference

2) Greater cable distances without a repeater

You have been asked to implement a network infrastructure that will accommodate failed connections. Which of the following network typologies provide redundancy for a failed link?
Mesh
Which of the following network technologies is packaged as part of a BRI plan?
ISDN
Which mechanisms could you use to resolve a hostname into its associated IP address? (select two)
1) DNS

2) hosts file

A healthcare organization provides mobile clinics throughout the world and needs to transfer patient statistical data to a central database via the Internet. Which network technology should you select to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
Satellite
Which of the following is true of a network using the 1000Base-T standard? (select two)
1) The network uses copper UTP cables

2) The network operates at one gigabit per second

Which of the following describes an IPv6 address? (select two)
1) 128-bit address

2) Eight hexadecimal quartets

Which of the following is not one of the ranges of IP addresses defines in RFC 1918 that are commonly used behind a NAT server?
169.254.0.1 – 169.254.255.254
You want to implement a fault tolerant topology as you interconnect routers on your wide area network. Which of the following would meet your needs?
Mesh
You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the individual wires to the connector. Which wire should be connected to pin 1?
Green with white
Which of the following are not valid IP addresses? (select three)
1) 145.8.260.7

2) 257.0.122.55

3) 45.22.156.256

When configuring an ADSL installation, where should you to install the DSL filters?
On connections leading to an analog phone
Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?
Disable SSID broadcast
Which of the following are used to connect a cable modem to the Internet connection? (select two)
1) RG-6 coaxial cable

2) F-type connectors

Which of the following terms refers to a network resource sharing model that uses access to control lists saved on each computer? (select two)
1) Peer-to-peer

2) Workgroup

Which of the following protocols is used by an e-mail client to retrieve messages from an e-mail server and gives users the option to keep mail messages on the server?
IMAP
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While she normally works from her office, today she is trying to access the wireless network from a conference room which is across the hall and next to the elevator. What is the most likely cause of her connectivity problem?
Interference is affecting the wireless signal
Which connector is used with unshielded twisted pair (UTP) cable?
RJ-45
Which of the following protocols is non-routable and requires another protocol to enable internetwork communications?
NetBOIS
In which of the following topologies does each device on the network act as a repeater, sending the signals to the next device?
Ring
You’ve just finished installing a wireless access point from a client. Which action best protects the access point from unauthorized configuration settings?
Changing the administrative password
How do switches and bridges learn where devices are located on a network?
When a frame enters a port, the source MAC address is copied from the frame header
You want to allow your users to download files from a server running the IP protocol. You want to protect access to the files by requiring user authentication to access specific directories on the server. Which IP protocol should you implement to provide this capability?
FTP
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
11 Mbps
You have just signed up for a broadband home Internet service that uses coaxial cable. Which connector type will you most likely use?
F-type
Which type of connector do you use to connect a modem to a standard telephone line?
RJ-11
You need to attach an RJ-45 connector to the end of a Cat 6 UTP cable. Which tool should you use?
Crimper
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?
WPA2
Which of the following topologies connects all devices to a trunk cable?
Bus
Which of the following best describes how a switch functions?
It connects multiple cable segments (or devices), and forwards frames to the appropriate segment
You need to place a wireless access point in your two-story building? While trying to avoid interference, which of the following is the best location for the access point?
In the top floor
Which of the following features on a wireless network allows or rejects client connections based on the hardware address?
MAC address filtering
You need to trace the route a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?
Tone probe
Which of the following IP addresses are Class B addresses? (select three)
1) 192.0.0.0

2) 190.65.2.0

3) 132.12.0.0

Which of the following are characteristics of the 802.11g wireless standard? (select three)
1) Operates in the 2.4 GHz range

2) Maximum bandwidth of 54 Mbps

3) Backwards compatible with 802.11b devices

You have a computer that is connected to the Internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (select three)
1) 192.168.12.253

2) 192.18.188.67

3) 10.0.12.15

Which of the following IP address ranges is reserved for Automatic Private IP Addressing?
169.254.0.2 – 169.254.255.254
Which of the following applications is more likely to justify the investment in Category 6 cable?
Streaming video
You have a network that uses a logical bus topology. How do messages travel through the network?
Messages are broadcast to all devices connected to the network
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
Users with the correct WEP key
You are installing a satellite connection so your home office can connect to the Internet. Which of the following statement is true?
The satellite dish must be pointed in the correct direction for communicating with the satellite
Which of the following best describes an IP address class?
The class defines the default network address portion of the IP address
You have a network that uses a logical ring topology. How do messages travel through the network?
Messages travel from one device to the next until they reached the destination device
Which of the following is true of a network using the 10Base-T standard? (select two)
1) The maximum cable distance is 100 meters

2) The network operates at ten megabits per second

Which kind of connector do you use to connect a modem to a standard telephone line?
RJ-11
Which type of network medium is used by an Integrated Services Digital Network (ISDN) adapter?
Copper telephone wire
Which of the following is a rating of the amount of data that can be sent over a network in a period of time?
Bandwidth
A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. While talking to her, you discover that she is trying to work from the break room two floors above the floor where she normally works. What is the most likely cause of her connectivity problem?
The user is out of the effective range of the wireless access point on her floor
Which IP protocol is used by Web browsers and Web servers to exchange files?
HTTP
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address?
ARP
You’ve just installed a wireless access point (AP) for your organization’s network. You know that the radio signals used by the AP extend beyond your organization’s building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (select two)
1) Configure the AP to filter out unauthorized MAC addresses

2) Disable DHCP on the AP

Which of the following are characteristics of coaxial network cable? (select two)
1) It uses two concentric metallic conductors

2) It has a conductor made from copper in the center of the cable

Which of the following terms describes a group of computers and users that utilize centralized resources, administration, and security settings? (select two)
1) Domain

2) Directory

Which protocols are used on the Internet to transmit Web pages from Web browsers running on client workstations? (select two)
1) HTTP

2) HTTPS

Which connector is used with unshielded twisted pair (UTP) cable?
RJ-45
Which of the following are valid IPv6 addresses? (select two)
1) 141:0:0:0:15:0:0:1

2) 6384:1319:7700:7631:446A:5511:8940:2552

Which of the following protocols carry phone calls over an IP-based network?
VoIP
What type of cabling can be used for an Ethernet 100Base-T (100 Mbps) network? (select two)
1) Cat 6 UTP

2) Cat 5 UTP

You are configuring an ADSL connection. Which of the following will be part of the configuration? (select two)
1) Filters of splitters

2) RJ-11 connectors

You’ve enabled Remote Desktop on a Windows workstation. Which port must be opened in the server’s firewall to allow remote clients to access the desktop?
3389
Which network component connects a device to the transmission media and allows it to send and receive messages?
Network interface card
You have just signed up for a broadband home Internet services that uses coaxial cable. Which connector type will you most likely use?
F-type
You have implemented an ad-hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network?
Mesh
You have an Ethernet network using the 10Base-T standard. Network devices are connected together using hubs. Which of the following is true?
The network uses half-duplex communications
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?
Send the frame out ports 2-8
Which of the following locations will contribute the greatest amount of interference for a wireless access point? (select two)
1) Near backup generators

2) Near cordless phones

What is the least secure place to locate the access point when creating a wireless network?
Near a window
Which of the following topologies connects each network device to a central hub?
Star
You’ve just installed the DNS service on a Windows server. Which port must be opened in the server’s firewall to allow clients to access the service?
53
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
Ethernet
Which tool in Windows would you use to browse all networks and shared folders to which a user has access? (select three)
1) Network

2) Computer

3) Windows Explorer

Which service can you use on your network to automatically assign IP addresses to hosts and to help prevent the same address from being assigned to two different hosts?
DHCP
Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet?
802.11a
Which of the following is a valid IPv6 address?
FEC0::AB:9007
You need to connect the end of a Cat UTP cable to a 100 punch down block. Which tool should you use?
Punchdown tool
You want to use your Windows workstation to browse the web sites on the Internet. You use a broadband DSL connection to access the Internet. Which network protocol must be installed on your workstation to do this?
IP
Which of the following is a valid MAC address?
C0-34-FF-15-01-8E
Which of the following IP addresses have a default subnet mask of 255.255.0.0 (select three)
1) 168.16.5.1

2) 129.0.0.1

3) 191.168.2.15

What device is used to create a physical star topology?
Switch
Which of the following are characteristics of coaxial network cable? (select two)
1) It uses two concentric metallic conductors

2) It has a conductor made from copper in the center of the cable

You are setting up a small network in your office with one Windows server and 50 Windows workstation. You want to spend as little time as possible configuring the workstations with IP addressing information. What should you do?
Install the DHCP service on your server
You are installing networking cable in the air space between the ceiling and the roof of a building. Which type of cabling should you use?
Plenum
Which of the following is used on a wireless network to identify the network name?
SSID
Which of the following is true when the DHCP setting is disabled in a wireless network?
Wireless clients must use a static IP address within the correct IP address range to connect to the network
Which of the following IP addresses are Class C addresses? (select three)
1) 223.16.5.0

2) 222.55.0.0

3) 192.15.5.55

Your network follows the 1000Base-T specifications for Gigabit Ethernet. What is the maximum cable segment length allowed?
100 meters
You’ve used your Windows workstation to map a drive to a shared folder on a Windows server. Which protocol was used to access the share?
SMB
Which network type uses light pulses to transmit data?
Fiber optic
Which of the following is the best definition for a LAN?
A network in a small geographic area, like in an office
Which of the following are security protocols for wireless networks? (select two)
1) WEP

2) WPA

What type of network describes a workgroup?
Peer-to-peer network
Which of the following correctly describe the most common format for expressing IPv6 addresses? (select two)
1) Hexadecimal numbers

2) 32 numbers, grouped using colons

Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents?
Hub
Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?
Place access points above where most clients are
Which of the following features is supplied by WPA2 on a wireless network?
Encryption
Which of the following statements accurately describes how a modem works? (select two)
1) It demodulates analog data from a telephone network into digital PC data

2) It modulates digital data from the PC into analog data and transmits it on a telephone network

You have a small network that uses a hub to connect multiple devices. What physical topology is used?
Star
Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?
Ad hoc
Which of the following IP addresses belong to the Class A network 114.0.0.0? (select three.) Tip: Assume the network is indicated by the default portion of the IP address
1) 114.0.0.15

2) 114.122.66.12

3) 114.58.12.0

What is the default subnet mask for the IP address 203.111.3.3?
255.255.255.0
What is a major benefit of STP over UTP?
Greater resistance to interference
You recently installed a small office home office wireless router. To avoid security holes and bugs, what should you do to the route?
Update the firmware
You are talking with a customer support technician on the telephone. The technician recommends downloading a particular driver from Internet. When you try to connect to the Internet using your modem, you can’t What is the problem?
You need to hang up
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in the situation?
802.11n
Which tool would you use in Windows Vista/7 to manage network connections?
Network and Sharing Center
You are a software developer and you are creating a multimedia streaming application. Data will be streamed from your streaming server to streaming clients over IP networks. Which transport protocol should your application use to send data between the clients and the server?
UDP
What protocol is used to send e-mail messages from a mail client to a mail server?
SMTP
A user on your network has been moved to another office down the hall. After the move she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the case of the problem?
The client system has moved too far away from the access point
You want to implement name resolution on the Linux workstations in your company. Which protocol will you use to do this?
DNS
Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (select two)
1) It can deliver a DNS server address in addition to the host IP address

2) A workstation must request addressing information from a DHCP server

You are troubleshooting network connections on a Windows workstation and you want to view a list of connections on the computer. How can you do this? (select two)
1) On the Start menu, click Control panel, then click Network and Internet

2) On the Start menu, right-click Network and select Properties

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (select two)
1) 802.11g

2) 802.11a

Which of the following are advantages of using a domain to manage a network? (select two)
1) Centralized administration

2) Scalability

Which of the following are features of Basic Rate ISDN (BRI)? (select three)
1) Dial-up connection

2) Two data channels

3) One control channel

What type of cabling could be used for an Ethernet 100BaseT (100 Mbps) network? (select two)
1) Cat 6 UTP

2) Cat 5 UTP

Which actions allow you to access the Internet on your laptop via a cellular network?
Install a cellular USB adapter in a open port on the laptop
A customer has called an indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed Internet connection. Which of the following will help resolve this issue? (select two)
1) Disable SSID broadcast on the AP

2) Implement WPA2

Which of the following topologies connects each device to a neighboring device?
Ring
Which of the following protocols do e-mail clients use to download messages from a remote mail server?
POP3
Which TCP/IP configuration parameter identifies the router that is used to reach hosts on remote networks?
Default gatway
Which of the following are good reasons to enable NAT?
To translate between Internet IP addresses and the IP addresses on your private network
Which of the following LAN devices receives a signal on one port, and the forwards that signal only to the port where the destination device is connected?
Switch
Which of the following is a valid IP address? (select two)
1) 2.2.2.2

2) 172.16.1.26

To access the Internet through the Publicly Switched Telephone Network (PSTN), what kind of connectivity device must you use?
Modem
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
Firewall
Which of the following are true of a circuit proxy filter firewall?(Select two)
Operates at the Session Layer AND Verifies sequencing of session packets
You have just installed a packet-filtering firewall on your network. What options will you be able to set on your firewall? Select all that apply.
Source address of a packet, Destination address of a packet, AND Port Number
When designing a firewall, what is the recommended approach for opening and closing ports?
Close all ports; open only ports required by applications inside the DMZ
You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?
IP address
Which of the following are characteristics of a packet filtering firewall?(Select two)
Stateless AND Filters IP address and port
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-bases attacks. What solution should you use?
Host based firewall
Which of the following functions are performed by proxies?(Select two)
Block employees from accessing certain Web sites AND Cache web pages
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
Circuit-level
You connect your computer to a wireless network available at the local library. You find that you can access all web sites you want on the Internet except two. What might be causing the problem?
A proxy server is blocking access to the web sites
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?
ACL
Which of the following are characteristics of a circuit-level gateway?(Select two)
Filters based on sessions AND Stateful
Which of the following is a firewall function?
Packet filtering
Which of the following firewall types can be a proxy between servers and clients?(Select two)
Application layer firewall AND Circuit proxy filtering firewall
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
Application level
You have run a vulnerability scanning tool and identified several patches that need to be applied to a system. What should you do next after applying the patches
Run the vulnerability assessment again
Which of the following is the name of the type of port scan which does not complete the full three-way handshake of TCP, but rather listens only for either SYN/ACK or RST/ACK packets?
TCP SYN scan
Which of the following identifies standards and XML formats for reporting and analyzing system vulnerabilities?
OVAL
You want to identify all devices on a network along with a list of open ports on those devices. You want the results displayed in a graphical diagram. Which tool should you use?
Network Mapper
Which of the following are performed by the Microsoft Baseline Security Analyzer (MBSA) tool? (select three)
1. Check user accounts for weak passwords
2. Check for missing patches
3. Check for open ports
You want to be able to identify the services running on a set of servers on you network. Which tool would best give you the information you need?
Vulnerability Scanner
You want to use a vulnerability scanner to check a system for known security risks. What should you do first?
Up date the scanner definition files
Which of the following functions can a port scanner provide? (select two)
1. Determining which ports are open on a firewall
2. Discovering unadvertised servers
You want to use a tool to scan a system for vulnerabilities including open ports, running services, and missing patches. Which tool would you use? (select two)
1. Nessus
2. Retina
You are using a vulnerability scanner that conforms to the OVAL specifications. Which o the following items containing a specific vulnerability or security issue that could be present on a system?
Definition
You want to check a server for user account that have weak password. Which tool should you use?
John the Ripper
You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?
Port Scanner
Man-in-the-middle attack.
Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?
Awareness.
What is the primary countermeasure for social engineering?
Rogue Access Point.
Your company security policy states that wireless networks are not to be used because of the potential security risks they present to your network.
One day you find that an employee has connected to a wireless access point to the network in his office.
What type of security risk is this?
Dumpster diving.
Shoulder surfing.
Which of the following are examples of social engineering?
A worm can replicate itself and does not need a host for distribution.
What is the main difference between a worm and a virus?
Denial of Service.
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
Padded cell.
A Smurf attack requires all but which of the following elements to be implemented?
Phising.
Users on your network report that they have received an e-mail stating that the company has just launched a new Website for employees, and to access the Website they need to go there and enter their username and password information. No one in your company has sent this email.
What type of attack is this?
Install a network virus detection software solution.
You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted.
You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur.
What should you do?
IPSec.
Which of the following is the best countermeasure against man-in-the-middle attacks?
Anti-virus software should be configured to download updated virus definitions as soon as they become available.
Which of the following statements about the use of anti-virus software is correct?
A false server intercepts communications from a client by impersonating the intended server.
Which of the following describes a man-in-the-middle attack?
Virus.
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
It infects the MBR of a hard drive.
Which of the following is not a primary characteristic of a worm?
Smurf.
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?
Educate employees on the risks and countermeasures.
Publish and enforce clearly-written security policies.
How can an organization help prevent social engineering attacks?
Denial of Service attack.
Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occuring?
Anti-virus software.
Which of the following measure are you most likely to implement in order to protect against a worm or Trojan horse?
What must you install between networks and a T1 line for your networks to use the T1 line?
CSU/DSU
You are implementing Internet connectivity for a new start-up company. Your client will provide on-line storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20 – 30 Mbps.
Which type of service should you implement?
T3
You have a series of WAN links that connects to your site to multiple other sites. Each remote site is connected to your site using a dedicated line.
What type of connection is being used?
Point-to-point
Which type of network establishes a dedicated physical connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communication is complete?
Circuit-switched
Which of the following describes the lines used in the local loop for dial-up telephone access?
POTS
Which of the following terms identifies the network of dial-up telephone and the long-distance lines?
PSTN
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
CSU/DSU
Which type of network divides data to be transmitted into small units and then routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?
Packet-switched
Which of the following are characteristics of SONET?
Transport protocol used for other traffic types.
Dual counter-rotating fiber optic rings.
What is the speed of an OC-3 connection?
155 mbps
Which of the following is an WAN technology that allows for interoperability of vendor hardware for fiber optic networking?
SONET
You have site in your network that is connected to multiple other sites. A single virtual circuit is used to connect all other sites.
What type of connection is being used?
Point-to-multipoint
Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?
MPLS
If the SONET (OC-1) base rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?
622.06 Mb
Which of the following are characteristics of ATM?
Uses fixed-length cells of 53-bytes.
Adds labels to data units.
Which of the following correctly describes the T1 carrier system?
T1 lines use two pairs of copper wires.
A single T1 channel can transfer data at 64 Kbps.
Which of the following are characteristics of MPLS?
Supports variable-length data units.
Adds labels to data units.
Which type of active scan turns off all flags in a TCP header?
Null
Which of the following could easily result in a denial of service attack if the victimized system had too little free storage capacity?
Spam
Which of the following Denial of Service (DoS) attacks uses ICMP packets and will only be successful if the victim has less bandwidth than the attacker?
Ping Flood
Which of the following Denial of Service (DoS) attacks does the victim’s system rebuild invalid UDP packets, causing the system to crash or reboot?
Teardrop
An attacker is conducting passive reconnaissance on a targeted company. Which of the following could he be doing? (#2)
Browsing the organization’s website.
What are the most common network traffic packets captured and used in a replay attack?
Authentication
A router on the border of your network detects a packet with a source address that is from an internal client but the packet was received in the Internet-facing interface. This is an example of what form of attack? (#1)
Spoofing
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?
Smurf
Which of the following best describes the ping of death?
An ICMP packet that is larger than 65,536 bytes
A SYN attack or a SYN flood exploits or alters which element of the TCP three-way handshake?
ACK
A SYN packet is received by a server. The SYN packet has the exact same address for both the sender and receiver addresses, which is the address of the server. This is an example of what type of attack?
Land Attack
You suspect that an Xmas tree attack is occurring on a system. Which of the following could result if you do not stop the attack?(Select two)
The system will be unavailable to respond to legitimate requests AND the threat agent will obtain information about open ports on the system
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attacks?
DDoS
Which of the following best dedscribes a man-in-the-middle attack?
A false server intercepts communications from a client by impersonating the intended server
Which of the following attacks tried to associate an incorrect MAC address with a known IP address?
ARP Poisoning

Get instant access to
all materials

Become a Member