ACT CompTIA Network+ N10-008 Practice Test Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Identify and list the types of secure protocols that use communications protected by the host’s private key.

SELECT ALL THAT APPLY

Secure Hash Algorithm (SHA)

HyperText Transfer Protocol over SSL/TLS (HTTPS)

Message Digest (MD5)

Secure Shell (SSH)

A

HyperText Transfer Protocol over SSL/TLS (HTTPS)
Secure Shell (SSH)

When using a secure channel, such as Secure Shell (SSH), the communications are protected by the host’s private key. SSH typically uses a utility such as ssh-keygen.

When using a secure channel, such as HTTP over SSL/TLS, the communications are protected by the host’s private key. HTTPS make a certificate signing request (CSR) with new key material and submit it to the certificate authority (CA) that issues digital certificates.

Secure Hash Algorithm (SHA) is a secure hash algorithm and is a means of fingerprinting a file.

Message Digest (MD5) is a secure hash algorithm and is a means of fingerprinting a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator configured a group of routers so that one router is the master, and all other routers are prioritized backups that monitor to the master and if the master loses connectivity one of the backups becomes the new master based on priority. What is the administrator using?

VRRP

Multipathing

NIC Teaming

ISP

A

VRRP

The administrator is using Virtual Router Redundancy Protocol (VRRP) where the active router is known as the master and all other backup routers monitor the status of the master.

An organization may need to contract multiple Internet Service Providers (ISPs) and use routing policies to forward traffic over multiple external circuits to provide fault tolerance and load balancing.

Network Interface Card (NIC) teaming on a host means combining two or more separate cabled links between a host and a switch into a single logical channel.

Multipathing means that a network node has more than one physical link to another node and is a default feature of full and partial mesh internetworks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network architect is updating the organization’s network to use one set of credentials to access corporate equipment, further mitigating threats and vulnerabilities. What is the architect creating for each employee?

Vendor assessment

Vulnerability assessment

Threat assessment

Single sign-on (SSO)

A

Single sign-on (SSO)

A single sign-on (SSO) system allows the user to authenticate once to a local device and access compatible application servers without having to enter credentials again.

A vulnerability assessment is an evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system.

A vendor management assessment is a process for selecting supplier companies and evaluating the risks inherent in relying on a third-party product or service.

Threat assessment is the process of identifying threat sources and profiling the types and capabilities of threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network consultant is conducting a test to determine the amount of data transferred through a connection over a given period. What is the consultant testing?

Netflow data

Bandwidth

Baselines

Audit Logs

A

Bandwidth

Generally, bandwidth refers to the amount of transferable data through a connection over a given period.

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type events. An audit log is also an access log or security log.

Reviewing baselines is the process of evaluating whether a baseline is still fit for purpose or whether a network technician should establish a new baseline.

Netflow is a Cisco-developed means of reporting network flow information to a structured database. NetFlow allows a better understanding of IP traffic flows as used by different network applications and hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A school with no resources stages an enterprise mobility management solution for their planned “Bring Your Own Device” (BYOD) program. A network analyst will caution them about obstacles they will need to mitigate as a successful part of this rollout. What are the obstacles? (Select all that apply.)

SELECT ALL THAT APPLY

Security

Feature licensing

Misconfigured firewall

Compatibility

A

Security
Compatibility

BYOD device variety also causes security issues, especially in terms of unpatched devices. Another issue is that the device is not fully under the administrative control of the IT department. An insider threat actor could install apps that might risk school data or misuse the device to exfiltrate data.

The wide range of BYOD devices, mobile OS versions, and vendor support for patches do the job of ensuring that each device can connect to network apps and data resources highly complex.

Licensing for servers and network appliances can be complex, and it is easy to make configuration errors. Although this would be a problem, it would not be specific to a BYOD subset of devices.

Although a misconfigured firewall would be something to address, it would affect all BYOD devices and school-owned devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator is trying to set up IP assignments to be automatic for all broadcast domains. How can they enable this for routers?

Dynamic assignment

Stratum

IP helper

DHCP relay

A

DHCP relay

A DHCP relay agent can be configured to provide forwarding of DHCP traffic between subnets. Routers that can provide this type of forwarding are described as RFC 1542 compliant.

This IP helper functionality can be configured on routers to allow set types of broadcast traffic (including DHCP) to be forwarded to an interface.

A disadvantage of the standard dynamic assignment method is that it does not guarantee that any given client will retain the same IP address over time.

Top-level NTP servers (stratum 1) obtain the Coordinated Universal Time (UTC) via a direct physical link to an accurate clock source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network administrator implemented video surveillance mechanisms to provide a layer of defense in the event prevention-based controls fail to work. If this security mechanism is effective, it ensures which of the following options? (Select all that apply.)

SELECT ALL THAT APPLY

Detecting attempts to penetrate a barricade

Recording of movement and access

Improving resilience of perimeter gateways

Shorter response times and fewer guards needed

A

Detecting attempts to penetrate a barricade
Recording of movement and access
Improving resilience of perimeter gateways

Detection-based controls provide an important layer of defense if prevention-based controls fail to work. Effective surveillance mechanisms ensure attempts to penetrate a barricade are detected.

Detection-based controls provide an important layer of defense if prevention-based controls fail to work. Surveillance is another layer of security designed to improve the resilience of perimeter gateways.

Detection-based controls provide an important layer of defense if prevention-based controls fail to work. The other big advantage of video surveillance is that movement and access can be recorded.

The main drawback to surveillance is longer response times, and security may be compromised if not enough staff are in place to monitor the camera feeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A fancy new office floor uses high-gloss, shiny tile on the walls and on the building’s inside pillars. Employees are reporting connectivity issues and slow download speeds. Identify the most likely reason for the reported issues.

Signal mismatch

Signal refraction

Signal absorption

Signal reflection

A

Signal reflection

A signal reflection is a multipath interference caused by mirrors or shiny surfaces. A high-gloss, shiny tile will have a mirror effect. A variable delay in the signal is also introduced in this case.

A signal refraction occurs when radio waves bend and take a different path to the receiver caused by glass or water.

A signal absorption happens when obstacles such as walls are in the signal’s patch. Concrete walls are the most effective at absorbing the wireless signal.

A signal or frequency mismatch occurs, for example, when a laptop with a network interface card (NIC) using a 2.4 Ghz frequency attempts to connect to an access point (AP) using the 5.0 Ghz frequency. All users are connecting in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are characteristics of cloud services as opposed to local services? (Select all that apply.)

SELECT ALL THAT APPLY

Direct attached storage

Pay-per-use

Virtualization

Rapid elasticity

A

Pay-per-use
Rapid elasticity

Cloud service provides rapid elasticity. This means it can scale quickly to meet peak demand. A company may operate a single web server for part of the year but provision additional instances for the busy periods.

Pay-per-use is a feature provided by many cloud services like Amazon Web Services and Microsoft Azure Cloud. Customers only use services as needed, making it cost efficient.

Virtualization is used on cloud and local services. Although virtualization makes cloud possible, it is not exclusive to cloud services. vSphere virtual solutions can be used as stand alone.

Direct attached storage (DAS) is a storage drive within a computer server. Although cloud services may operate on physical hosts with DAS, it is not exclusive to cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network engineer is designing a network in various offices to create multiple broadcast domains. Each has its own Virtual Local Area Network (VLAN). When configuring these multiple broadcast domains on the switch, the switch will be operating at what layer of the OSI model?

Layer 7

Layer 2

Layer 5

Layer 3

A

**Layer 3 **

Layer 3 of the OSI model is the Network layer. Information is sent and configured using logical network addresses (e.g. IP address). Layer 3 switches are capable of creating multiple broadcast domains using multiple subnet IP ranges.

Layer 2, or the Data link layer, is responsible for transferring data between nodes on the same logical segment using local or hardware addresses (e.g. MAC address).

Layer 7 or the application layer provides an interface for software programs on the network. A switch will never operate at layer 7.

Layer 5 or the Session layer represents the dialog control functions to exchange messages between the client and server. SSH (Secure Shell) is an example of using the session layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A tech team provides a network technician with a faulty device. They want a new one with the same parameters as the failed device. What should the parameters on the new device be?

Baseline Configuration

Business Continuity Plan

Audit and Assessment Report

Change Management

A

Baseline Configuration

Each device should have a documented baseline configuration. The deployment process should be capable of applying this configuration to a replacement device or restoring a faulty device.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

An audit and assessment report makes recommendations on where the network is not meeting goals for performance or security.

Business continuity planning (BCP) identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network engineer is setting up a network in a new building. What should the engineer complete to make sure the access points are properly placed?

nmap

Asset tags

Site survey

Baseline report

A

Site survey

A site survey is documentation about a location to build an ideal wireless infrastructure. It often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and identifying sources of interference.

A baseline is a snapshot of a known good configuration and how a device operates at that known good configuration.

Asset tags are important to gather when setting up a network to track where devices are, but it does not help the network’s performance.

The Nmap Security Scanner is widely used for IP scanning, both auditing and penetration testing tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What application can define policy decisions on the control plane?

Software Defined Networking (SDN)

Network Controller

Storage Area Network (SAN)

Distributed switching

A

Software Defined Networking (SDN)

A Software Defined Networking (SDN) application, or suite of applications, can be used to define policy decisions on the control plane.

The decisions that are defined by the SDN are implemented on the data plane by a network controller application. The network controller application interfaces with the network devices using Application Programming Interfaces (APIs).

Distributed switching accommodates the design goals of adaptability and scalability and is a hierarchical model.

A Storage Area Network (SAN) is one that interconnects storage devices, such as tape drives, to make pools of shared storage capacity available to servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network technician is setting up DHCP scopes for printers. Which of the following would be the best practice for these? (Select all that apply.)

SELECT ALL THAT APPLY

Dynamic assignment

Lease time

Reservation

Static assignment

A

Reservation
Static assignment

A reservation is a mapping of a MAC address or interface ID to a specific IP address within the DHCP server’s address pool.

Statically assigned addresses can be assigned from a specially configured exclusion range if this is supported by the server.

One disadvantage of the standard dynamic assignment method is that it does not guarantee that any given client will retain the same IP address over time.

A long lease time means the client does not have to renew the lease often, but the DHCP server’s available pool of IP addresses is not replenished frequently. Printers should be fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A technology company is investigating the possibility of working with a marketing company on the development and advertising of a new product. In order to discuss the details of the product without concern that the marketing firm will share it with other technology companies, what will the technology company ask the marketing firm to sign?

Memorandum of understanding

Security policy

Service level agreement

Non-disclosure agreement

A

Memorandum of understanding

The technology company will ask the marketing firm to sign a memorandum of understanding (MOU) which is a preliminary agreement to express an intent to work together and almost always have clauses stating that the parties shall respect confidentiality.

A non-disclosure agreement (NDA) defines the permitted uses of sensitive data, the enforcement of storage and distribution restrictions, and what penalties for breaches of the agreement will incur.

Security policy establishes a duty for each employee to ensure the confidentiality, integrity, and availability of any data assets or processing systems that they use as part of their job.

A service level agreement (SLA) is a contractual agreement setting out the detailed terms under which a service provider provides an ongoing service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A network engineer conducts a redundancy check and identifies that interference exists due to a poor-quality cable. What is this finding called?

CRC

Logging Levels

MIB

CRC error

A

CRC error

Interference usually causes CRC errors. This interference might be due to poor quality cable or termination, attenuation, mismatches between optical transceivers or cable types, or some external factor.

The error checking field contains a 32-bit (4-byte) checksum called a Cyclic Redundancy Check (CRC) or Frame Check Sequence (FCS).

The logging level configured on each host determines the maximum level at which events are recorded or forwarded.

The agent is a process (software or firmware) running on a switch, router, server, or other SNMP-compatible network devices. This agent maintains a database called a Management Information Base (MIB) that holds statistics relating to the device’s activity, such as the number of frames per second handled by a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network administrator is deciding which session control protocol they should use for their environment. Which of the following would they use?

EGP

RIP

RTP

SIP

A

SIP

The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end-user devices (also known as user agents), such as IP-enabled handsets or client and server web conference software.

While SIP provides session management, the actual delivery of real-time data uses different protocols. The principal one is Real-time Transport Protocol (RTP).

The Routing Information Protocol (RIP) is a distance vector routing protocol. RIP only considers a single piece of information about the network topology.

An Exterior Gateway Protocol (EGP) can advertise routes between autonomous systems. An EGP includes a field to communicate the network’s autonomous system ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An office installed a wireless Access Point (AP). A network technician is in the area, surveying the signal from the AP and other background noises. The technician is looking for an above average Signal-to-Noise Ratio (SNR) to approve use of the AP. Which of the following readings would the technician consider unsatisfactory? (Select all that apply.)

SELECT ALL THAT APPLY

Background noise decibel is high.

RSSI (Received Signal Strength Indicator) decibel is low.

AP signal decibel is high.

SNR is high.

A

Background noise decibel is high.
RSSI (Received Signal Strength Indicator) decibel is low.

RSSI (Received Signal Strength Indicator) is an access point (AP) signal expressed as a percentage or decibel reading (dBm). A low dBm reading is unsatisfactory.

Background noise dBm must be as low as possible. AP signal dBm should be higher than background noise, and never the same to be rated good.

An AP signal with a high decibel reading (dBm) with the number beginning in the negative range and moving towards 0, is good. A -50 dBm is better than -65 dBm.

The signal-to-noise ratio must be high to be rated good. For example, if signal is 65 dBm and noise is 90 dBm, the SNR is 25 decibels (dB). A SNR at 5 dB would be worse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

fiber link is terminated at a demarc. Which of these solutions would accomplish that?

Smartjack

VDSL

FTTP

FTTN

A

FTTP

The most expensive solution is Fiber to the Premises (FTTP). The essential point about both these implementations is that the fiber link is terminated at the demarc.

Fiber to the Node (FTTN) retains some sort of copper wiring to the demarc while extending the fiber link to a communications cabinet servicing multiple subscribers.

Service providers with their roots in telephone networks use Very high-speed DSL (VDSL) to support FTTC. It allows for both symmetric and asymmetric modes.

A T1 line from the service provider is terminated at the demarc on a smartjack. The smartjack has an RJ-48C or RJ-48X interface on the customer side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An engineer plans to configure a device as transparent, rather than non-transparent, at an organization. Which device does the engineer configure?

Firewall

Load balancer

Proxy server

Content filter

A

Proxy server

A proxy server is used as a middle-man for Internet access. A transparent proxy is configured on an inline device, while a nontransparent proxy is configured on a client machine.

Content filtering is a feature found in security appliances, such as firewalls. With content filtering enabled, people can block websites based on criteria such as topic categorization.

Firewalls are principally used to implement security zones, such as intranet, screened subnet topology, and Internet.

A load balancer distributes client requests across available systems, like server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A cyber engineer tests the organization’s network firewall to see if any vulnerabilities can be observed. What is the name of this test?

Penetration

Kerberos

LDAP

Honeypot

A

Penetration

Penetration testing aims to model how exposed the organization is to vulnerabilities that threat actors could exploit.

The client submits the Kerberos credentials (a Ticket Granting Ticket) obtained when the user logged onto the workstation to the server using the Generic Security Services Application Program Interface (GSSAPI).

Lightweight Directory Access Protocol (LDAP) is not a directory standard but a protocol used to query and update an X.500-like directory.

A honeypot is a computer system set up to attract attackers, intending to analyze attack strategies and tools, provide early warning of attack attempts, or possibly as a decoy to divert attention from actual computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

There has been a system breach on the corporate network utilizing the installation of particular software. The security manager asks for a report to show which computers have this software installed on them. What data should the security administrator investigate to provide the requested information?

Syslog

Encapsulation errors

CRCs

Netflow data

A

Syslog

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.

Netflow is a Cisco-developed means of reporting network flow information to a structured database. NetFlow allows a better understanding of IP traffic flows as used by different network applications and hosts.

Encapsulation errors will prevent transmission and reception. If you check the interface status, the physical link will be up, but the line protocol will be down.

CRC errors are caused by interference. This interference might be due to poor quality cable or termination, attenuation, mismatches between optical transceivers or cable types, or some external factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What describes what happens when traffic is recirculated and amplified by loops in the switching topology?

Asymmetrical routing

Broadcast storm

Hardware failure

Routing loop

A

Broadcast storm

In a broadcast storm, traffic is recirculated and amplified by loops in a switching topology, causing network slowdowns and crashing switches.

A routing loop occurs when two routers use one another as the path to a network. Packets are caught in a routing loop circle around until the TTL expires. One symptom of a potential routing loop is for routers to generate ICMP Time Exceeded error messages.

Asymmetrical routing refers to a topology where the return path is different from the forward path.

Hardware failure may cause issues on a network but typically does not cause a flood of traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A user logged on to a desktop client and was immediately prompted to enter credit card information to proceed. What type of attack is the user witnessing on screen?

Brute-force attack

Ransomware

MAC spoofing

Phishing

A

Ransomware

Ransomware is malware that tries to extort money from the victim. For example, it does this by appearing to lock the victim’s computer or by encrypting their files.

Phishing is an email-based social engineering attack, where the attacker sends an email from a supposedly reputable source to try to elicit private information from the victim.

Brute-force attack is a password attack where software tries to match the password hash against one of every possible combination it could be to gain access to a system.

Media Access Control (MAC) or IP spoofing is when a threat actor spoofs the value of a valid MAC or IP address to try to circumvent an access control list or impersonate a legitimate server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A network port does not seem to be working properly. Which of the following tools can be used to test if the the port is sending out data?

Loopback plug

Crimper

Patch cable

OTDR

A

Loopback plug

A loopback plug or adapter is a specially wired RJ-45 plug with a 6” stub of cable used to test for faulty ports and network cards.

A patch cable is an Ethernet or optical cable used to connect two electronic devices to each other. It is mostly referred to as short cables that “patch” certain physical routes from a patch panel or a switch.

A cable crimper is used to create network cables with terminated ends such as a patch cable. Different types of crimpers are specific to the type of connector and cable.

An OTDR (optical time domain reflector) is a fiber optic testing tool. it tests for attenuation using an optical source and optical power meter (or light meter).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A network administrator wants a network switch to authenticate attached devices before activating their port on the switch. When combined, which authentication methods provide the means to validate a client’s access to the network before being allowed access? (Select all that apply.)

SELECT ALL THAT APPLY

IEEE 802.1X

EAP

Local authentication

TACACS+

A

IEEE 802.1X
EAP

The Institute of Electrical and Electronics Engineers (IEEE) 802.1X uses authentication, authorization, and accounting (AAA) architecture that are made up of three components: a supplicant, network access point, and AAA server.

The Extensible Authentication Protocol (EAP) provides a framework for deploying multiple types of authentication protocols and technologies, many of which use a digital certificate on the server and/or client machines.

Terminal Access Controller Access Control System (TACACS+) is a similar protocol to RADIUS and is often used in authenticating administrative access to routers and switches.

The local authentication provider is the software architecture that underpins the mechanism by which the user is authenticated before starting a shell. This is a login (Linux) or a logon or sign-in (Microsoft).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A custom client application is unable to communicate with the internal Internet Information Services (IIS) server. Pinging or establishing a telnet connection from a workstation to the server works normally using an IP address or FQDN. Examine the following reasons and determine possible causes for this network issue. (Select all that apply.)

SELECT ALL THAT APPLY

The SSL (Secure Sockets Layer) certificate is not trusted.

The IIS service is not running.

TCP ports are blocked.

The client cannot resolve server’s name.

A

The IIS service is not running.
TCP ports are blocked.

The application on the client workstation may be communicating over a blocked Transmission Control Protocol (TCP) port. The workstation can communicate using Telnet via TCP port 23; ports may need to be manually allowed in and out.

The IIS service may not be working, causing the client application not to connect as well. Services on a Windows computer is viewable using the Services management console (services.msc).

As both a ping and Telnet test are successful between the client and the server using both an IP address and the hostname, name resolution is found to be working properly.

The client was not accessing the IIS server using a web browser, which indicates if a server certificate was installed or trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A licensed wiring professional runs Cat 6A cable in lengths under 55 meters in an office building. What specification of cabling does the professional install?

100BaseT

1000BaseT

1000BaseLX

10GBaseT

A

10GBaseT

10GBaseT Ethernet specifies speeds of 10 gigabits. Cat 6, 6A, and 7 twisted pair cables fall under the 10GBaseT Ethernet specification.

100BaseT is a legacy cabling standard that supports speeds up to 100 megabits per second.

1000BaseT Ethernet specifies speeds of 1 gigabit. It is important to note that Cat 6 and Cat 6A fall under multiple specifications using criteria such as cable length.

1000Base-LX is a specification for gigabit Ethernet net using fiber optic cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A data center technician is setting up high-speed connections between servers and storage but wants to save on cost. What would be a good way to do this?

NFV

FC

FCoE

iSCSI

A

FCoE

Provisioning separate Fibre Channel adapters and cabling is expensive. As its name suggests, Fibre Channel over Ethernet (FCoE) is a means of delivering Fibre Channel packets over Ethernet cabling and switches.

Fibre Channel (FC) is defined in the T11 ANSI standard. Provisioning separate Fibre Channel adapters and cabling is expensive but can provide higher speeds.

Internet Small Computer System Interface (iSCSI) is an IP tunneling protocol that enables the transfer of SCSI data over an IP-based network. iSCSI works with ordinary Ethernet network adapters and switches.

Virtual appliances might be developed against a standard architecture, such as ETSI’s Network Function Virtualization (NFV).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A network engineer has installed a new switch. What should the engineer check to troubleshoot the trunk port connected to the corporate network?

Byte count

Latency

Link state

Duplex/speed

A

Link state

Link state measures whether an interface is working (up) or not (down). You should configure an alert if an interface goes down so that you can investigate immediately. You may also want to track the uptime or downtime percentage so that you can assess a link’s reliability over time.

It is often helpful to monitor both packet counts and bandwidth consumption. High packet counts will incur a processing load on the CPU and system memory resources.

If an interface operates in half-duplex mode, there is likely to be a problem unless you support a legacy device.

Latency is the time it takes for a transmission to reach the recipient, measured in milliseconds (ms).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The IT floor of a bank building contains servers that hold confidential data and the bank needs to regulate access to sensitive areas within the building. Analyze the scenario to determine which options can be implemented to allow employees to authenticate through locked barriers. (Select all that apply.)

SELECT ALL THAT APPLY

Smart Badge

Cameras

Radio Frequency Identification (RFID)

Biometric Device

A

Smart Badge
Biometric Device

A smart badge comes with an integrated chip and data interface that stores the user’s key pair and digital certificate. The user presents the card and enters a PIN and then the card uses its cryptographic keys to authenticate securely via the entry point’s badge reader.

A biometric device is activated by human physical features, such as a fingerprint, voice, retina, or signature.

Detection-based controls provide an important additional layer of defense in the event that prevention-based controls, such as key fob security, fail to work.

Radio Frequency Identification (RFID) is a means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A network engineer wants to install an antenna that could receive and send data from all directions. What type of directional antenna would the network technician use?

Wi-Fi Protected Access

Regulatory Impacts

Directional

Omni

A

Omni

The antenna type determines the propagation pattern or shape of the radio waves transmitted. Most wireless devices have simple omnidirectional vertical rod-type antennas, which receive and send signals in all directions more-or-less equally.

The exact use of channels can be subject to different regulations in different countries. Regulatory impacts also include a strict limit on power output, constraining the range of Wi-Fi devices.

The first version of Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard.

Directional is the angle that an antenna sends and receives traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A network administrator would like to setup a group of servers to retrieve the same content from a single host on the internal network. Which of the following will allow this type of data flow? (Select all that apply.)

SELECT ALL THAT APPLY

IGMP must be used to configure group membership.

A broadcast domain must be configured on the switches.

A multicast IP address is assigned to the servers.

A broadcast IP address is assigned to the servers.

A

IGMP must be used to configure group membership.
A multicast IP address is assigned to the servers.

IPv4 multicasting allows one host on the public or private network to send content to other hosts that have joined a multicast group. Each server will be given the same multicast IP address to join the group.

Internet Group Management Protocol (IGMP) is used to configure group memberships and IP addresses.

Broadcast IP addresses are not assigned to a single host. The last address in any IP network is the broadcast address (e.g. 192.168.1.255).

A broadcast domain is when all the hosts receive the same broadcast packets, and it is not specific to any group of hosts. A basic layer 2 switch is an example of a broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A network professional is installing software onto every company computer and phone that requires several layers of protection for authentication. What is this called?

Multifactor

Network segmentation enforcement

Screened subnet

Zero-Day

A

Multifactor

An authentication technology or mechanism is considered strong if it combines the use of more than one authentication data type (multifactor).

At layers two and three, network segmentation enforcement is applied using a combination of virtual LANs and subnets. Each segment is a separate broadcast domain.

A screened subnet uses two firewalls placed on either side of the perimeter network zone. The edge firewall restricts traffic on the external/public interface and allows permitted traffic to the hosts in the perimeter zone subnet.

A vulnerability that is exploited before the developer knows about it or can release a patch is called a zero-day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A user filed a complaint with their company’s helpdesk support team about threatening pop-up messages. The messages say the user’s files are encrypted due to terroristic activity and that the data will stay encrypted until paid in bitcoin. What type of attack is the user most likely witnessing?

DNS poisoning

ARP spoofing

Ransomware

MAC spoofing

A

Ransomware

Ransomware is a type of malware that tries to extort money from the victim. The crypto-malware class of ransomware attempts to encrypt data files with an encryption key.

Domain Name System (DNS) poisoning is an attack that compromises the name resolution process. The attacker will replace the valid IP address for a trusted website, with the attacker’s IP address.

Media Access Control (MAC) or IP spoofing is when a threat actor spoofs the value of a valid MAC or IP address to try to circumvent an access control list or impersonate a legitimate server.

ARP spoofing, or ARP cache poisoning, perpetrates an on-path attack by broadcasting unsolicited ARP reply packets, also known as gratuitous ARP replies, with a spoofed source address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A systems administrator wants to put in place a procedure for patch management on a Cisco network switch. Which of the following actions should be added to that procedure when preparing to flash the chip? (Select all that apply.)

SELECT ALL THAT APPLY

Load the old image at the device startup.

Complete environment and compatibility checks.

Make a backup of the system configuration.

Rollback the firmware version and updates.

A

Complete environment and compatibility checks.
Make a backup of the system configuration.

Updating firmware is known as flashing the chip. It is important to make a backup of the system configuration (especially for a firewall) before performing a firmware update or upgrade.

Complete an environment and compatibility check before upgrading the firmware. This may include using, for example, the IOS Software Checker for Cisco network devices to identify the “first fix” version.

Loading an old image at startup may not be compatible with the latest IOS software. Work with the current image for a proper upgrade.

Downgrading (or rollback) refers to reverting to a previous version of the software or firmware. This is only necessary to fix a problem caused by a recently upgrade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A network technician is setting up network devices at a remote branch office. A small switch in the corner of the office connects the various workstations using category 6 Ethernet cables. A wireless access point in the center of the office connects company iPads. Some workstations are given wireless Network Interface Cards (NICs) because they are harder to reach. Which of the following devices in this scenario are layer 2 devices? (Select all that apply.)

SELECT ALL THAT APPLY

Category 6 Ethernet cable

Wireless Access Point

Network Switch

Wireless NICs

A

Wireless Access Point
Network Switch
Wireless NICs

A Wireless Access Point (WAP) is a layer 2 device that allows nodes with wireless network cards to communicate and creates a bridge between wireless networks and wired ones.

A basic network switch is a layer 2 device that is a more advanced type of bridge with many ports. It creates links between large numbers of nodes more efficiently.

Wireless or standard Network Interface Cards (NICs) are layer 2 devices that join a host to network media.

Category 6 (Cat6) Ethernet cables are part of layer 1 or the physical layer of the OSI model. They link nodes using a form of transmission or physical media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Networks are vulnerable to several types of malicious attacks, and network engineers must prevent such attacks by various means. One means of protection available prevents denial of service (DOS) against a route processor over control or management plane protocols and packets. What answer choice describes this security method?

Dynamic ARP inspection

MAC filtering

Control plane policing

Preshared keys (PSKs)

A

Control plane policing

Control plane policing is a security method that prevents DoS attacks against a route processor over control or management plane protocols and packets.

MAC filtering is a security method where an access control list can be applied to a switch or access point so that only clients with approved MAC addresses can connect to it.

Dynamic ARP inspection is a security feature that prevents a host attached to an untrusted port from flooding the segment with gratuitous ARP replies.

Preshared keys (PSKs) are used in WPA2 for authentication that uses a passphrase to generate the key used to encrypt communications, also referred to as group authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following Domain Name System (DNS) records can identify a record that is providing a network service or protocol?

TXT

PTR

NS

SRV

A

SRV

An SRV (service) record is used to identify a record that is providing a network service or protocol. They are often used to locate VoIP or media servers.

An NS (name server) record identifies authoritative DNS name servers for the zone. In most enterprise networks, each zone will have at least two DNS servers holding a replicated copy of the zone.

A PTR (pointer) record is found in reverse lookup zones and is used to resolve an IP address to a host name.

A TXT record stores any free-form text that may be needed to support other network services. They are most commonly used as part of Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A network engineer is looking to support the local area network by implementing a payload that can manage up to 9,000 bytes. What could the engineer use to meet this byte requirement?

Spanning Tree Protocol

Duplex

Flow Control

Jumbo Frames

A

Jumbo Frames

A jumbo frame supports a data payload of up to around 9,000 bytes. This reduces the number of frames that need to be transmitted, reducing the amount of processing that switches and routers need to do.

IEEE 802.3x flow control allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames.

Most Ethernet interfaces operate in full-duplex mode. If an interface operates in half-duplex mode, there is likely to be a problem unless you support a legacy device.

The spanning tree protocol (STP) is a means for the bridges or switches to organize themselves into a hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A network engineer has prepared a new switch for installation. What did the engineer install on the new switch?

Netflow data

Baselines

Link state

MIBs

A

Baselines

A performance baseline establishes the resource utilization metrics at a point in time, such as when the system is installed. Baselines provide a comparison to measure system responsiveness later.

Management Information Base (MIB) holds statistics relating to the device’s activity, such as the number of frames per second handled by a switch.

Netflow is a Cisco-developed means of reporting network flow information to a structured database. NetFlow allows a better understanding of IP traffic flows as used by different network applications and hosts.

Link state measures whether an interface is working (up) or not (down).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

An administrator normally working on a remote server using Remote Desktop Protocol (RDP), loses the session abruptly. The administrator pings the server and does not receive a reply. An RDP session is attempted again, and the administrator can log in. Why was the administrator unable to ping the server?

IP traffic was not encypted.

IP traffic was not tunneled.

ICMP traffic was blocked.

TCP traffic was blocked.

A

IICMP traffic was blocked.

nternet Control Message Protocol (ICMP) is used for status messaging and connectivity testing. An inbound rule blocking ICMP traffic using a firewall will prevent a reply if a ping command is used externally on the server.

Transmission Control Protocol (TCP) operates at the transport layer to provide connection-oriented, guaranteed delivery of packets. RDP uses TCP port 3389, which is not blocked.

Encapsulating Security Payload (ESP/50) and Authentication Header (AH/51) are used with the encrypted form of IP (IPSec).

Generic Routing Encapsulation (GRE/47) is used to tunnel packets across an intermediate network. This is used (for example) in some virtual private network (VPN) implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A network technician purchasing a computer wants to ensure that it has enough temporary processing to fulfill the software requirement. What are they looking for?

Latency

Jitter

Bandwidth

Memory

A

Memory

Memory is considered the component of computers that temporarily stores actively used data.

Latency is the time it takes for a transmission to reach the recipient, measured in milliseconds (ms). You can test the latency of a link using tools such as ping, pathping, and mtr. When assessing latency, you need to consider the Round Trip Time (RTT).

Jitter is a variation in the delay. Jitter manifests itself as an inconsistent rate of packet delivery. Jitter is also measured in milliseconds, using an algorithm to calculate a sample of transit times value.

Generally, bandwidth refers to the amount of transferable data through a connection over a given period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A network technician is comparing types of VPN configurations. One VPN configuration will route all traffic via the VPN gateway and another VPN configuration only routes the private network traffic via the VPN gateway. What is the network technician comparing?

SSH

Virtual network computing (VNC)

Split tunnel vs. full tunnel

Remote desktop gateway

A

Split tunnel vs. full tunnel

Split tunnel VPNs only route private network traffic through the VPN gateway. Full tunnel VPNs route all network traffic via the VPN gateway.

SSH (secure shell) is a secure way to connect remotely to network appliances for in-band management.

Virtual network computing (VNC) is a popular alternative to Remote Desktop, similar to another application called TeamViewer.

Remote desktop gateway can be a means of implementing a clientless VPN and can also allow a user to access networked applications. A gateway can be used to connect a user to a virtual desktop, where a client operation system and applications software is provisioned as a virtual appliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A cyber consultant examines the security of the control room and evaluates the organization’s maturing level and its use of security policy and controls. What is the name of this assessment?

Posture assessment

Threat assessment

Process assessment

Penetration testing

A

Posture assessment

Posture assessment is often performed with reference to an IT or security framework. The framework can assess the organization’s maturity level in its use of security policies and controls.

Process assessment involves identifying critical systems and assets that support these functions.

Penetration testing aims to model how exposed the organization is to vulnerabilities that threat actors could exploit.

Threat assessment is the process of identifying threat sources and profiling the types and capabilities of threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What access security controls are important to consider when managing remote access for network administrators? (Select all that apply.)

SELECT ALL THAT APPLY

Remote desktop connection

Authentication

Secure shell session

Authorization

A

Authentication
Authorization

Administrative access to devices must always using strong authentication security controls. This verifies the administrator’s identity and provides accountability.

Administrators must be authorized to log on to a device and use/manage it’s services. Authorization can be given to individual users or groups. Authorization determines what rights and privileges a particular entity has.

A secure shell (SSH) session is an access method or connection that allows an administrator to securely implement remote configuration changes to network devices.

A remote desktop connection is an access method that allows an administrator to access, for example, a Windows server that host firewall services from which further administrative changes can be made using a graphical user interface (GUI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

A Linux administrator is configuring a Linux server’s network interface card. The server must have a static IP (Internet Protocol) address for a Class C network. Settings must be verified. Analyze and select which commands would be most appropriate to run in this scenario. (Select all that apply.)

SELECT ALL THAT APPLY

ifconfig

ifconfig eth0 netmask 255.255.255.0

ifconfig eth0 broadcast 192.168.101.100

ifconfig eth0 192.168.101.120

A

ifconfig
ifconfig eth0 netmask 255.255.255.0
ifconfig eth0 192.168.101.120

The ifconfig utility is used on Linux and Unix hosts to gather and configure network settings. The ifconfig eth0 192.168.101.120 command sets the static IP address of eth0 or the first network interface (NIC) card of the host.

The ifconfig eth0 netmask 255.255.255.0 command sets the subnet mask. This is the default subnet mask for a Class C network.

The ifconfig command with no arguments will output a list of all active interfaces and their details. This can be used to verify a change after it has been made.

The ifconfig eth0 broadcast 192.168.101.100 command sets the broadcast IP address to the given interface. This is not applicable in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A network consultant reviews protocols to determine if bonded links between the switch ports and the end system were auto negotiated? What is the name of this protocol?

MAC address tables

VLAN

LACP

PoE+

A

LACP

Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.

A switch learns MAC addresses by reading the source address when a port receives a frame. The address mapping for that port normally caches in a MAC address table.

VLAN can reduce broadcast traffic when a network has expanded beyond a certain number of hosts or users. From a security point of view, each VLAN can represent a separate zone.

PoE+ are powered devices that can draw up to about 25 W, with a maximum current of 600 mA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

A network technician attempts to set up the configuration to help prevent dropped packets, delay, or jitter for voice communications. What ensures that audio and video are free from these issues?

QoS

Session control

Data transport

SIP

A

QoS

Quality of Service (QoS) ensures that voice or video communications are free from problems, such as dropped packets, delays, or jitter.

Session control handles use discovery, availability advertising, negotiating session parameters, and session management and termination.

Data transport handles the delivery of the actual video or voice information.

The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end-user devices, such as IP-enabled handsets or client and server web conference software. Each device, conference, or telephony user is assigned a unique SIP address known as a SIP Uniform Resource Indicator (URI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A security administrator wants to ensure that the router setup prevents badly addressed packets from permanently circulating the network. Which of the following accomplishes this?

Static routing

QoS

TTL

Administrative distance

A

TTL

At each router, the Time to Live (TTL) IP header field is decreased by at least 1. This prevents badly addressed packets from permanently circulating the network.

Quality of Service (QoS) ensures that voice or video communications are free from problems, such as dropped packets, delays, or jitter.

Static routing tables are manually configured and require a lot of maintenance when there is a change in the network. This is not ideal for a robust network.

An Administrative Distance (AD) value expresses the relative trustworthiness of the protocol supplying the route. Default AD values are coded into the router but can be adjusted by the administrator if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

There are many ways to authenticate a user based on an authentication card they have. However, a user must keep up with and is responsible for the authentication card as dictated through company onboarding training. Which of the following mitigates the risk of a lost or stolen authentication card?

Card used self-signed certificates

Card is contactless

User must present fingerprint

Prompts user for a PIN

A

Prompts user for a PIN

A smart badge authenticates a user based on something they have. When a user inserts a smart badge, the card software prompts the user for a PIN or password, which mitigates the risk of the card being lost or stolen.

A smart badge is either contact based (must be physically inserted into a reader) or contactless (data is transferred using a tiny antenna in the card). This does not provide any security benefit.

Self-signed certificates are generally not trustworthy. The smart badges store the user’s key pair and digital certificate from a trusted certificate authority (CA).

Biometric systems would be an additional access control hardware or device that can examine a user’s fingerprint, voice, retina, or signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A network technician is tasked with determining the site technological capabilities of each building in the organization. When looking at the current building, the technician confirms that the building is currently empty but has the approved equipment install permits on site. What type of site is this?

Cold Site

Warm Site

Firewalls

Hot Site

A

Cold Site

A cold site takes longer to set up. A cold site may be an empty building with a lease agreement in place to install whatever equipment is required when necessary.

A hot site means that the site is already within the organization’s ownership and is ready to deploy. For example, a hot site could consist of a building with operational computer equipment that is kept updated with a live data set.

A warm site could be similar, but with the requirement that the latest data set will need to be loaded.

The basic function of a firewall is traffic filtering. The firewall processes traffic according to rules; traffic that does not conform to a rule that allows it access is blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A user gets shocked, and the computer turns off. The system administrator notices scorching on the power port of the laptop and questions the user about the power source. The user admits to using a personal power supply for the work computer. What hazard did the user introduce to the system?

CPU usage

Humidity

Temperature

Electrical

A

Electrical

Computer systems need a stable power supply, free from outages (blackouts), voltage dips (brownouts), and voltage spikes and surges.

Electrical systems need to be shut down immediately in the presence of any significant amount of water. Water vapor in the air (humidity) risks condensation forming within a device chassis, leading to corrosion and short circuit faults.

High temperatures will make it difficult for device and rack cooling systems to dissipate heat effectively. High temperatures increase the risk of overheating components within the device chassis and consequent faults.

CPU utilization can indicate a problem with network traffic, or there may be a need for an upgrade.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A helpdesk technician is helping a user attempt to connect to the network but they are receiving a 169 address. What is this?

Default gateway

Classful addressing

Link-local

Loopback

A

Link-local

Automatic Private IP Addressing (APIPA), or link-local, was developed by Microsoft as a means for clients that could not contact a DHCP server to communicate on the local network anyway.

Classful addressing allocates a network ID based on the first octet of the IP address. While routers have performed classless routing, the 169 address is more specifically an APIPA address.

127.0.0.0 to 127.255.255.255 (or 127.0.0.0/8) is reserved and is used to configure a loopback address.

The default gateway is a router configured with a path to remote networks. The helpdesk technician may want to check the default gateway as part of their troubleshooting though.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A network engineer monitors the network and follows information packets as they move through the network from hosts to endpoints. What is the engineer observing?

Traffic logs

Send/Receive Traffic

Traps

Speed/duplex

A

Send/Receive Traffic

Sending and receiving traffic involves the movement of information within a system.

Switches normally support a range of Ethernet standards so that older and newer network adapters can all connect to the same network. In most cases, the port on the switch is set to auto-negotiate speed (10/100/1000) and full- or half-duplex operation.

Traffic logs record statistics for computing, storage, and network resources over a defined period.

A trap is an agent that informs the monitor of a notable event (port failure, for instance). The threshold for triggering traps can be set for each value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

An electrician creates several cat 6 cables to connect new computers to a network at a small company. The IT staff discovers that two cables do not work properly due to faulty crimping. Of the available methods to inspect the cables, which of the following should the IT staff utilize to find cables that do not work?

Cable tester

Tone generator

Packet sniffer

Spectrum analyzer

A

Cable tester

A cable tester provides detailed information on the physical and electrical properties of a cable. A cable tester can be used to check that the cable pins are functioning properly.

A network tone generator and probe are used to trace and identify a cable from one end to the other. This may be necessary when cables have not been labeled properly.

Electromagnetic Interference (EMI) from radio or electromagnetic sources working in the same frequency band as a Wi-Fi device can be detected with a spectrum analyzer.

A packet sniffer is a device or program that is used to monitor network communication and capture data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Virtual hosts on the network have system clocks that are out of sync. After further investigation, the network administrator configures the hosts to the sync system time with domain controllers. What may be causing these clocks to go out of sync? (Select all that apply.)

SELECT ALL THAT APPLY

The TCP port 443 is blocked.

The NTP is misconfigured.

The UDP port 123 is blocked.

The TCP ports 636 and 143 are blocked.

A

The NTP is misconfigured.
The UDP port 123 is blocked.

Network Time Protocol (NTP) enables the synchronization of time-dependent systems and software. A time source such as a DC (domain controller) can be misconfigured on the virtual hosts which prevent syncing.

Network Time Protocol (NTP) works over UDP port 123. Blocking the passing of this port on the server or network level can prevent time from syncing across all virtual hosts.

Network Time Protocol (NTP) operates over Universal Datagram Protocol (UDP). Port 636 is for secure LDAP and port 143 is for IMAP.

Hypertext Transfer Protocol Secure (HTTPS) provides the means for a client to access secure web sites. It uses TCP port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A network engineer received a ticket that people cannot connect to the printer. After researching the issue, the printer is property wired, as are the workstations. However, the network was misconfigured, leading to the printer being tagged incorrectly. What is the most likely cause of the issue?

Missing route

Broadcast storm

Incorrect VLAN

Interface status

A

Incorrect VLAN

VLAN assignments can be configured manually, and the administrator may have made a mistake, so check the interface configuration for the switch port.

A missing route may arise because a required static routing entry has not been entered or has been entered incorrectly.

In a broadcast storm, traffic is recirculated and amplified by loops in a switching topology, causing network slowdowns and crashing switches.

Use the LED status indicators and switch’s command-line utility to check the interface status. If a port is down, it will not be lit up by an LED indicator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

While pricing new equipment for the Information Technology department, the network technician attempted to measure the expected lifetime of certain products. What was the technician trying to calculate?

RPO

MTBF

MTTF

PDU

A

MTBF

Mean Time Between Failures (MTBF) represents the expected lifetime of a product. The calculation for MTBF is the total operational time divided by the number of failures.

Mean Time to Failure (MTTF) expresses a similar metric for non-repairable components. For example, a hard drive may be described with an MTTF, while a server, which the network engineer could repair by replacing the hard drive, would be described with an MTBF.

At each level (except the physical layer), the sending node adds a header to the data payload, forming a “chunk” of data called a Protocol Data Unit (PDU).

Recovery Point Objective (RPO) is the data loss that a system can sustain, measured in time units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A security analyst from a major company approaches a systems administrator wanting to set up fake servers so that they can study activity which should not be happening and look for other signs of that activity in their environment. Which of the following are they trying to set up?

Screened subnet

Penetration test

Honeypot

Vulnerability assessment

A

Honeypot

A honeypot is a computer system set up to attract attackers, with the intention of analyzing attack strategies and tools, to provide early warning of attack attempts, or possibly as a decoy to divert attention from actual computer systems.

A screened subnet uses two firewalls placed on either side of the perimeter network zone. This was formerly known as a demilitarized zone (DMZ).

A vulnerability assessment is an evaluation of a system’s security and ability to meet compliance requirements based on the configuration state of the system.

Penetration testing aims to model how exposed the organization is to vulnerabilities that could be exploited by threat actors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A network technician wants to achieve over 1Gbps with wireless standards. Which of the following could they use? (Select all that apply.)

SELECT ALL THAT APPLY

802.11ax

CDMA

802.11n

Wifi 5

A

802.11ax
Wifi 5

As with Wi-Fi 6 (802.11ax), products brand using the combined throughput. AX6000 allows 1,148 Mbps on the 2.4 GHz radio and 4,804 over 5 GHz.

The aim for Wi-Fi 5 (802.11ac) is for throughputs similar to Gigabit Ethernet or better, but over 5Ghz. As with 802.11n, only enterprise-class equipment has enough antennas to use three streams or more.

With Code Division Multiple Access (CDMA), each subscriber uses a code to key the receiver and modulation. This “key” extracts the subscriber’s traffic from the radio channel.

The data rate for 802.11n is 72 Mbps per stream. Assuming the maximum number of four spatial streams and optimum conditions, the nominal data rate could be 600 Mbps for a 40 MHz bonded channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

An engineer uses fiber optic cable for a run within a building to a centralized fiber distribution panel in a network closet. Which type of transceiver does the engineer use to achieve 40 GbE speed?

Bix

mini-GBIC

SFP+

QSFP

A

QSFP

Quad Small Form Factor Pluggable (SFP) (QSFP and QSFP+) is a transceiver form factor designed to support 40 GbE plus other high bandwidth applications (including InfiniBand and SONET).

Small Form Factor Pluggable (SFP) uses Lucent Connectors (LC) connectors and is designed for Gigabit Ethernet. SFP+ is an updated specification to support 10GbE.

Transceiver modules previously used the Gigabit Interface Converter (GBIC) form factor, but Small Form Factor Pluggable (SFP), also known as mini-GBIC, have largely replaced them.

Bix refers to a block type. Where a 110 block uses a two-piece design where wafer blocks are installed over the main block, the competing format BIX uses a single module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

A communications company uses TIA/EIA IS-95 handsets that require each subscriber to use a code to key the modulation of their signal. The receiver uses this “key” to extract the subscriber’s traffic from the radio signal. What type of handsets is the company using?

Independent Basic Service Set (Ad-Hoc)

Omni

LTE

CDMA

A

CDMA

Code Division Multiple Access (CDMA) means that each subscriber uses a code to key the modulation of their signal and this “key” is used by the receiver to extract the subscriber’s traffic from the radio channel.

In an ad hoc topology, the wireless adapter allows connections to and from other devices. In 802.11 documentation, this is called an Independent Basic Service Set (IBSS).

Long Term Evolution (LTE) is a converged 4G standard supported by GSM and CDMA network providers.

Antennas transmit signals in different ways. For example, an Access Point (AP) designed for ceiling mounting may produce a stronger signal in a cone directed downwards. The office should install an AP with an outward omnidirectional path with a stronger signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A network administrator is measuring Key Performance Indicators (KPI) for an industrial network. Which of the following are examples of a KPI? (Select all that apply.)

SELECT ALL THAT APPLY

Fault tolerance

IT contingency planning (ITCP)

Mean Time to Repair (MTTR)

Mean Time Between Failures (MTBF)

A

Mean Time to Repair (MTTR)
Mean Time Between Failures (MTBF)

Mean Time Between Failures (MTBF) is a Key Performance Indicator measuring the expected lifetime of a product. This is intended for assets meant to be replaced rather than repaired. The calculation is the total lifetime of all devices combined divided by the number of failures.

Mean Time to Repair (MTTR) is a measurement of the mean time it takes to repair assets or correct a fault to the point of restoration and recovery of network services. It is another Key Performance Indicator (KPI).

Fault tolerance is the ability of a network or system to experience failures and maintain the same level of functionality and service. It is not a directly measurable metric and is not a Key Performance Indicator (KPI).

IT contingency planning (ITCP) is identifying points of failure and determining the impact and acceptability of that impact on the network and on availability. Key performance indicators are measured during contingency planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which of the following Domain Name System (DNS) records can resolve a hostname to an Internet Protocol Version 4 (IPv4) address?

MX

A

AAAA

CNAME

A

A

An A record is used to resolve a host name to an IPv4 address. This is the most common type of record in a Domain Name System (DNS) zone.

An AAAA record performs the same function as an A record, but for resolving a host name to an IPv6 address.

A Canonical Name (CNAME) record represents an alias for a host such as A or AAAA. For example, the true name of a web server could be masked as the alias WEB.

A Mail Exchanger (MX) record is used to identify an email server for the domain. In a typical network, multiple servers are installed to provide redundancy. Each one will be represented with an MX record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A security analyst is looking at various network traffic but can’t make heads or tails of most of the packets. Which of the following traffic would they be able to read without private keys?

Port 995

Port 993

Port 587

Port 110

A

Port 110

Port 110 is POP3. The Post Office Protocol (POP) is an early example of a mailbox access protocol. Examples of POP client applications would be Microsoft Outlook or Mozilla Thunderbird.

POP can be secured by using TLS encryption. The default TCP port for secure POP (POP3S) is port 995.

A client connects to an IMAP server over TCP port 143, but this port is unsecure. Connection security can be established using a TLS. The default port for IMAPS is TCP/993.

Port 587 is SMTP using TLS. Servers configured to support port 587 should use STARTTLS and require authentication before message submission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A multi-tenant third-party cloud service that is available via the Internet can be described as which of the following cloud delivery models?

Community

Public

Hybrid

Private

A

Public

A public, or multi-tenant model, is hosted by a third-party and shared with other subscribers. This is commonly known by consumers as cloud computing.

A private model is completely private to and owned by the organization. This is geared more toward banking and governmental services that require strict access control.

A hybrid model uses a mixture of private and public cloud services, which may be on-premise or off-premise. Virtual machines and services are able to migrate between the two.

A community model is where several organizations share the costs of either a hosted private or fully private cloud. Security may be a concern with this implementation type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A security researcher is looking at a network with established close-range network links between a variety of devices, such as smartphones, tablets, headsets, and printers. Which of the following are they looking at?

PAN

SME

CAN

MAN

A

PAN

Personal area networks (PAN) and wireless PAN (WPAN) have gained some currency over the last few years. With a peer-to-peer PAN, one might establish close-range network links between a variety of devices, such as smartphones, tablets, headsets, and printers.

The term metropolitan area network (MAN) is sometimes used for something a bit smaller than a WAN: a city-wide network encompassing multiple buildings.

The term campus area network (CAN) is sometimes used for a LAN that spans multiple nearby buildings.

Small and medium-sized enterprise (SME) networks are networks supporting dozens of users. Such networks would use structured cabling and multiple switches and routers to provide connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

A network technician is trying to ensure that each channel has sufficient power in a WDM. Which of the following should they use?

Cable tester

Spectrum analyzer

Sniffer

Tone generator

A

Spectrum analyzer

An optical spectrum analyzer (OSA) is typically used with wavelength division multiplexing (WDM) to ensure that each channel has sufficient power. At very long distances, the attenuation of different wavelengths can vary.

A cable tester provides detailed information on the physical and electrical properties of a cable.

A network tone generator and probe are used to trace and identify a cable from one end to the other. This may be necessary when cables have not been labeled properly.

A packet sniffer is a device or program that is used to monitor network communication and capture data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The CIO asks an IT systems administrator to configure a passive threat management solution. IT utilizes which type of technology?

IDS

Wireless Controller

Firewall

IPS

A

IDS

An Intrusion Detection System (IDS) is a system that scans, audits, and monitors the security infrastructure for signs of attacks in progress. An IDS uses a passive approach to threat management.

A wireless controller is a hardware device or software application which can centralize the management function of a wireless network. An extended service set is defined in a wireless network.

An Intrusion Prevention System (IPS) is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it. An IPS uses an active approach to threat management.

Firewalls are principally used to implement security zones, such as intranet, screened subnet topology, and Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following can you use to remotely manage network systems or devices without a graphical user interface (GUI)? (Select all that apply.)

SELECT ALL THAT APPLY

HTTP

HTTPS

SSH

Telnet

A

SSH
Telnet

Secure Shell (SSH) is a remote administration and file-copy program that supports remote management of devices using TCP port 22. SSH is typically used without a GUI.

Telnet is a TCP/IP application protocol supporting remote command-line administration of a host (terminal emulation). It uses TCP port 23 by default. Telnet is typically used without a GUI.

Hyper Text Transfer Protocol (HTTP) is used to provide web content to browsers. It uses port 80 and can provide an unsecure web management interface of remote devices and systems.

HTTP Secure (HTTPS) is a subset of HTTP that allows for secure communication using SSL/TLS between the client and server. This protocol uses port 443 and provides a secure web management interface of remote devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A new web server on the domain is called WEBMARKETING01.proprints.co. The marketing department worked remotely on setting up this web server for the past two days. After joining the server to the domain, a remote session cannot be established. Pinging the FQDN (Fully Qualified Domain Name) also fails. Using a divide and conquer approach, how would a network admin most likely begin to theorize a probable cause?

Theorize a port issue at Layer 4.

Theorize an IP issue at Layer 3.

Theorize a cable issue at Layer 1.

Theorize an MAC issue at Layer 2.

A

Theorize an IP issue at Layer 3.

In a divide and conquer approach, you start with the layer most likely to be causing the problem. The DNS A record including the server’s IP address may not have been created yet. Ping the FQDN, if IP resolution fails, fix the A record.

A MAC (Media Access Control) address is not the immediate concern because the previous remote access assumes local LAN was accessible.

A port issue, like TCP port 3389 for RDP (Remote Desktop Protocol) is most likely not the case because remote access worked previously to join server to the domain.

A possible failure of a physical cable is most likely not the cause since the issue occurred after a change in software settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What layer of the Open Systems Interconnection (OSI) model does a router switch in?

4

1

2

5

A

2

The second layer of the OSI model refers to the data link layer, which involves switches, bridges, Network adapters, and access points.

The first layer of the OSI model refers to the physical layer, which involves the cabling that connects devices. This may involve fiber optic cabling as well as copper cablings, such as ethernet cat-5 or cat-6.

Layer four of the OSI model refers to the transport layer, which involves the protocols: transport connection protocol (TCP) and user datagram protocol (UDP).

Layer five of the OSI model refers to the session layer, which involves the communication sessions between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What step of the CompTIA Network+ troubleshooting methodology refers to identifying the problem?

4

2

3

1

A

1

The first step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes identifying symptoms.

The second step of the CompTIA Network+ troubleshooting methodology is establishing a theory of probable cause. This involves questioning the obvious and considering multiple approaches.

The third step of the CompTIA Network+ troubleshooting methodology is to test the theory to determine a cause. If the theory is not confirmed, it is important to reestablish a new theory or escalate.

The fourth step of the CompTIA Network+ troubleshooting methodology is to establish a plan of action to resolve the problem and identify potential effects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A company just moved into a new office space, and a network technician has been hired to set up a wireless infrastructure. What would the proper first step be for the technician?

Plan for overcapacity

Complete a site survey

Print out a heat map

Calculate Electromagnetic interference (EMI)

A

Complete a site survey

A site survey is performed first by examining the blueprints or floor plan of the premises to understand the layout and identify features that might produce radio frequency interference (RFI).

A heat map would show areas with a strong signal in greens and yellows with warning oranges and reds where signal strength drops off. This would be completed after installation.

Overcapacity (or device saturation) occurs when too many client devices connect to the same AP.

Electromagnetic interference (EMI) is interference from a powerful radio or electromagnetic source working in the same frequency band, such as a Bluetooth device, cordless phone, or microwave oven.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What term refers to the orientation of waves propagating from a wireless antenna?

Parabolic

Radio frequency attenuation

Placement

Polarization

A

Polarization

Polarization refers to the orientation of the wave propagating from the antenna. To maximize signal strength, the transmission and reception antennas should normally use the same polarization.

Parabolic refers to an antenna type form factor for specific applications.

Antenna placement helps to eliminate attenuation and interference problems.

Radiofrequency attenuation (RF attenuation) is the loss of signal strength due to distance and environmental factors. They are also referred to as free space path loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A network technician patches the vulnerability and verifies full system functionality after identifying a vulnerability on a network switch operating system. Justify the technician’s decision to document any findings, actions, or outcomes that may have taken place during the process. (Select all that apply.)

SELECT ALL THAT APPLY

They record network performance.

They establish a new baseline for the template.

They create installation procedures.

They estimate purchases on new firewall software.

A

They establish a new baseline for the template.
They create installation procedures.

A new baseline is established and documented any time a change is made to a device’s settings and/or software. This is beneficial for security audits and future installations of the same device.

Creating installation instructions for this type of patching, especially recording the file name and version of the patch, will ensure the process can be duplicated with a high success rate.

Documenting the fixing of a device vulnerability does not typically warrant the need to estimate purchases of new switches.

Unless performance was an issue, prior to installing the security patch, such a test or recording is not necessary. A performance test and results, if required, would be performed when testing a theory to determine cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

A network engineer is noticing a lot of traffic collisions on the network. What should the engineer investigate to help lower the collision rates?

DNS

Routing loop

Switching loop

Duplex settings

A

Duplex settings

Duplex settings refer to the ability of a network device to transmit or receive at the same time or not. Half-duplex means only one can happen at a time, while Full-duplex means send/receive can happen simultaneously. If not configured properly, collisions can occur.

A routing loop occurs when two routers use one another as the path to a network. Packets caught in a routing loop circle around until the TTL expires. One symptom of a potential routing loop is for routers to generate ICMP Time Exceeded error messages.

A switching loop is where flooded frames circulate the network perpetually.

Domain Name Service is used to translate domain names (i.e. www.comptia.com) to its actual IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A security admin has been tasked to audit a new web server on the network. The admin’s task is to ensure the server does not have any unecessary open ports or services running on it. Deduce the best course of action for checking the server if the admin knows the Internet Protocol (IP) address of the server.

Run the nslookup utility from the web server

Run the nestat utility from a laptop

Run the nmap utility from a laptop

Run the dig utility from the web server

A

Run the nmap utility from a laptop

The nmap utility is a versatile port scanner used for topology, host, service, and OS (Operating System) discovery and enumeration. The admin will run it from a local node such as a laptop in order to scan the remote server’s connections.

The netstat utility can output the status on active ports and TCP connections on a local host to verify any unnecessary ports or services running. Running this on the laptop will only provide details about the laptop.

The nslookup utility is a software tool for querying DNS server records.

The dig utility is used to query a DNS (Domain Name System) and return information about a domain name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A systems administrator installs a connectivity device that results in a high number of data collisions. Which device did the administrator install?

Bridge

Media converter

Hub

Switch

A

Hub

A hub (also known as a dumb device) connects computers to a network in a star configuration. A hub lacks the features contained in a switch such as traffic control based on physical addressing.

A bridge is an appliance or application that connects different networks as if they were one network.

Media converters are layer 1 devices and are used to convert one cable type to another. These components alter the characteristics of one type of cable to match those of another.

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address, which is also known as a Media Access Control (MAC) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

A network technician wants to create efficiencies in network traffic by implementing a device which applies microsegmentation by establishing a point-to-point link between any two network nodes. Which of the following should they implement?

Hub

Bridge

Access Point

Layer 2 switch

A

Layer 2 switch

An Ethernet layer 2 switch performs the same sort of function as a bridge, but in a more granular way. In effect, the switch establishes a point-to-point link between any two network nodes. This is referred to as microsegmentation.

An Ethernet bridge works at the data link layer (layer 2) to establish separate physical network segments while keeping all nodes in the same logical network.

A hub acts like a multiport repeater so that every port receives transmissions sent from any other port.

A wireless access point (AP) allows nodes with wireless network cards to communicate and creates a bridge between wireless networks and wired ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

A network technician wants to gain visual coverage for an area obscured from trees surrounding the west side of the building. What could the technician use to gain visibility in that area?

SCADA

Cameras

HVAC Sensors

Layer 3 Capable Switches

A

Cameras

A security camera is either fixed or operates using Pan-Tilt-Zoom (PTZ) controls. Different cameras suit different purposes. If you want to record the image of every person entering through an access control vestibule, a fixed, narrow focal length camera positioned on the doorway will be perfectly adequate.

An HVAC uses temperature sensors and moisture detection sensors (to measure humidity).

A supervisory control and data acquisition (SCADA) system replaces a control server in large-scale, multiple-site industrial control systems (ICSs).

A layer 3 capable switch is one that is optimized for routing between VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which device type does an IT systems engineer install to control logical network traffic?

Hub

Modem

Switch

Router

A

Router

A router is a layer 3 device. A router can be used to segregate network devices by using a logical address such as an Internet protocol (IP) address.

A network switch in its simplest form is a layer 2 network device. Switches can handle and control traffic based on a node’s physical address which is also known as a hardware address or media access control (MAC) address.

A hub is a known as a dumb device that simply connects computers to a network in a star configuration. A hub lacks the features contained in a switch.

A modem is a device that enables digital data to be sent over an analog medium, such as a telephone line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

A network technician is trying to determine which digital communication frequencies would be best at penetrating through the solid surfaces of the walls. Which would be the best solution?

2.4 GHz

AC (Wifi 5)

3G, 4G, 5G

5GHz

A

2.4 GHz

2.4 GHz is better at propagating through solid surfaces, making it ideal for providing the longest signal range.

3G is a digital communication generation that deployed various packet-switched technologies to mobile devices. 4G converged to a standard supported by GSM and CDMA network providers. 5G was a complex system with expectations to provide fixed-wireless broadband solutions.

5 GHz is less effective at penetrating solid surfaces and does not support the maximum ranges achieved with 2.4 GHz standards. The band supports individual channels and suffers less from congestion and interference, supporting higher data rates at shorter spans.

Wi-Fi 5 (802.11AC) works only in the 5 GHz band. A network technician can use the 2.4 GHz band for legacy standards (802.11g/n) in mixed mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following solutions is designed to switch traffic to an alternative processing node?

IPS

Load balancer

Router

Proxy server

A

Load balancer

A load balancer distributes client requests across available systems such as server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.

A router is a layer 3 device. A router can be used to segregate network devices by using a logical address such as an Internet protocol (IP) address.

A proxy server is used as a middle-man for network access, such as Internet access. A proxy can control what a system can or cannot connect to.

An intrusion prevention system (IPS) is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it. An IPS is considered to use an active approach to handling threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A network security engineer is performing network penetration testing. The engineer is using Nmap to make a map of all network devices and wants to identify all host addresses on the network more quickly by skipping OS fingerprinting until after a target machine is selected. Suggest an Nmap switch that will allow the engineer to perform host discovery only.

-sT
-p
-sn
-sU

A

-sn

Using Nmap with the -sn switch will suppress the port scan, which can reduce scanning time on large networks.

TCP connect scanning is a more visible scan that establishes full connections with remote hosts.

By default, Nmap scans 1,000 commonly used ports. The -p argument can be used to specify a port range.

UDP ports can be scanned using the -sU argument. As these do not use ACKs, Nmap needs to wait for a response or timeout to determine the port state, so UDP scanning can take a long time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What advantage does Collision Detection (CD) bring to the carrier-sense multiple access (CSMA) media access control method?

Separate collision domains for each port

10 Gbps speeds

Instant termination upon collision

Full-duplex transmission

A

Instant termination upon collision

CSMA Collision Detection utilizes half-duplex transmission to detect when a signal is present on an interface’s transmit and receive lines simultaneously. A jamming signal is then used to keep other nodes from transmitting for a period of time.

Separate collision/broadcast domains for each port can be done by using VLAN segmentation. It can also be done with a Layer 3 capable switch.

Bandwidth can be affected by many factors such as cable category, router capabilities, etc. However, CSMA with Collision Detection does not increase bandwidth directly and is concerned with packet collisions.

Because CSMA Collision Detection relies on half-duplex transmission to detect collisions, full-duplex is not used. Modern Ethernet with full-duplex does not require CSMA/CD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

A network engineer is creating a network diagram based on a list of media access control (MAC) addresses used in a network. At what layer of the OSI model are all hosts identified by a specific MAC address?

Physical layer

Transport layer

Data-link layer

Network layer

A

Data-link layer

The data link layer (layer 2) is responsible for transferring data between nodes on the same logical segment. At the Data Link layer, a segment is one where all nodes can send traffic to one another using hardware (MAC) addresses.

The physical layer of the OSI model (layer 1) is responsible for the transmission and receipt of the signals that represent bits of data from one node to another node.

The transport layer is known as the end-to-end or host-to-host layer. A function of the transport layer is to identify each type of network application by assigning port numbers.

The network layer (layer 3) is responsible for moving data (routing) around a network of networks, known as an internetwork or the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

An IT security employee discovered a rogue access point (AP) and traced the activity to a smartphone tethered to a workstation on the corporate network. What would this type of attack allow a malicious user to do?

SELECT ALL THAT APPLY

Allow access to private information

Force clients to authenticate to the AP

Perform on-path attacks

Capture user logon attempts

A

Allow access to private information
Perform on-path attacks
Capture user logon attempts

A rogue access point (AP) can be set up with a tethered smartphone. Connecting to a LAN without security, the unauthorized AP creates a malicious backdoor, and can be used to capture user logon attempts.

The threat actor (or owner of the smartphone) can perform on-path attacks by intercepting and relay data between two hosts.

As information is sent between this rogue AP and wireless clients, intercepted data may contain private information from users which can be used to gain access to other areas of the network.

The rogue AP will may not immediately force clients to authenticate to it, but it provides another option that users may want to explore and connect to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A network technician is installing sensors to measure environmental conditions in an equipment closet. A sensor is attached to the fire suppression system. What will this sensor detect?

Humidity

Flooding

Electrical

Temperature

A

Flooding

Regarding flooding, there may be natural or person-made flood risks from nearby watercourses and reservoirs or leaking plumbing or fire suppression systems.

High temperatures will make it difficult for device and rack cooling systems to dissipate heat effectively.

Regarding electricity, computer systems need a stable power supply, free from outages (blackouts), voltage dips (brownouts), and voltage spikes and surges.

Regarding humidity, more water vapor in the air risks condensation forming within a device chassis, leading to corrosion and short circuit faults. Conversely, very low humidity increases the risks of static charges building up and damaging components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A security engineer for a company wants to implement an authentication, authorization, and accounting (AAA) server to validate user credentials so users can remotely access the network services via a virtual private network (VPN). Identify the protocol the security engineer should implement if the server and client configure the same shared secret.

Directory services

Lightweight Directory Access Protocol (LDAP)

TACACS+ (Terminal Access Controller Access Control System Plus)

Remote Authentication Dial-in User Service (RADIUS)

A

Remote Authentication Dial-in User Service (RADIUS)

RADIUS is a way of implementing an AAA server. Remote access devices, such as VPN servers, function as client devices of the RADIUS server.

Most directory services are implementations of the Lightweight Directory Access Protocol (LDAP). LDAP is not a directory standard, but a protocol used to query and update an x.500 standard directory. LDAP is supported in current directory products such as Windows Active Directory.

TACACS+ is used in authenticating administrative access to routers and switches. TACACS+ uses reliable delivery offered by TCP making it easier to detect when a server is down.

Directory services is a network service that stores identity information about all the objects in a network, including users, groups, servers, client computers, and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

A wiring professional terminates the ends of some coaxial cables. Which one of these connectors can the professional use?

QSFP+/SFP+

RJ-11/RJ45

LC

F-Type

A

F-Type

Coaxial cables are usually terminated using F-type connectors, which are secured by screwing into place.

The Lucent Connector (LC) is a small form factor fiber optic connector with a tabbed push/pull design. The small size of LC allows for higher port density.

RJ-11 connectors are used with 2- or 3-pair UTP. where the four center wires are most commonly used. RJ-45 connectors are used with 4-pair (8-wire) cables.

Enhanced quad small form-factor pluggable (QSFP+) is designed to support 40 GbE by provisioning 4 x 10 Gbps fiber links. SFP+ uses LC connectors and is also designed for Gigabit Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Which of the following policies would best help if users want to secure their devices and online accounts against tampering or abuse, particularly against dictionary attacks?

Disable unneeded switchports

Avoid common passwords

Setup private VLANs

Setup firewall access control lists

A

Avoid common passwords

Many users rely on simple passwords, which has led to databases of common credentials being posted online. Password database “dumps” give attackers a useful dictionary when password cracking.

Disable switch ports to prevent the attachment of unauthorized client devices. You can also isolate unneeded ports to a black hole Virtual LAN (VLAN) that has not route to the network.

A private virtual local area network (PVLAN) applies an additional layer of segmentation by restricting the ability of hosts within a VLAN to communicate directly with one another.

Firewall access control lists (ACLs) are configured on the principle of least access which only allow the minimum amount of traffic required for the operation of valid network services and no more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

A network administrator is unable to access files on a remote system. A network firewall seems to be blocking traffic from passing through. Which of the following will the administrator most likely need to reconfigure for inbound and outbound traffic?

SELECT ALL THAT APPLY

TCP port 110

SMTP traffic

TCP port 20

TFTP traffic

A

TCP port 20
TFTP traffic

Trivial File Transfer Protocol (TFTP) is a file transfer service which is a connectionless protocol running over UDP port 69. It is suitable for transferring small files.

File Transfer Protocol (FTP) is a connection-oriented protocol running over TCP port 20 and 21. TCP port 20 is used for data connection on the server side, and TCP port 21 is used as a control port.

Simple Mail Transfer Protocol (SMTP) makes the connection from the sender’s server to that of the recipient and transfers an email message. It uses port 25.

Post Office Protocol (POP) is a mailbox protocol now commonly used as POP3. The client establishes a connection to the POP server on TCP port 110 and contents are downloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

A network technician suspects a short in the network cable and wants to test it. Identify which of the following tools will provide this capability.

Spectrum analyzer

Loopback adapter

Tone generator

Multimeter

A

Multimeter

A multimeter is for testing electrical circuits, but they can test for the continuity of any sort of copper wire, the existence of a short, and the integrity of a terminator.

A network tone generator applies a signal on the cable to be traced by a probe, and can be used to follow the cable over ceilings and through ducts.

A spectrum analyzer, typically a handheld device, is used to analyze radio or electrical interferences. The exact location can be pinpointed using this device.

A loopback plug or adapter is a specially wired RJ-45 plug with a 6” stub of cable used to test for faulty ports and network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

An attacker exploited a vulnerability within the operating system of a computer inside a bank’s network. Although the attacker posed no serious threat, the network administrator wants to start taking security more seriously. Recommend a best practice that can help mitigate operating system vulnerabilities in the network.

SELECT ALL THAT APPLY

Implement control plan policing

Implement patch management

Enable only required services

Enable DHCP snooping

A

Implement patch management
Enable only required services

Patch management refers to the procedures put in place to manage the installation of updates for hardware and software that can mitigate operating system (OS) vulnerabilities.

Any services or protocols that are not used should be disabled. For example, disabling Transmission Control Protocol (TCP) port 23 to prevent the use of telnet on an OS.

A control plane policing policy is designed to mitigate the risk from route processor vulnerabilities. Such a policy can use Access Control Lists (ACLs) to allow or deny control traffic from certain sources.

Dynamic Host Configuration Protocol (DHCP) snooping is a type of switch port security setting that inspects DHCP traffic arriving on access ports to ensure that a host is not trying to spoof its MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

A gamer is using a wireless AC router connected to a fiber optic network from the local Internet Service Provider (ISP). The gamer must ensure the ISP is providing close to advertised network speeds. Which is the most appropriate tool to gauge the available bandwidth?

A packet sniffer

A speed testing website

A Wi-Fi analyzer

A port scanner

A

A speed testing website

A bandwidth or broadband speed tester website measures the time taken to download and upload a randomized stream of data to a web host. This is a common speed test with Internet Service Providers (ISPs).

A Wi-Fi analyzer is software that records statistics for the access point that the client is currently associated with. It can also detect other access points in the vicinity.

A port scanner is software that enumerates the status of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) ports on a target system. One example is the nmap command-line utility.

A packet sniffer such as winpcap for Windows can read and capture packets on a port and save the information to a file on disk. This does not test bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

An organization is putting an employee through security checkpoints that include a background investigation, account creation with proper privileges, assigning a laptop, and completing security training. What kind of policy is the employee under?

Remote access policy

BYOD policy

Onboarding policy

Offboarding policy

A

Onboarding policy

The employee is under an onboarding policy which is the process of welcoming a new employee to the organization with tasks that affect security.

Offboarding is the process of ensuring that an employee leaves a company gracefully and includes disabling accounts, returning company assets, and wiping personal assets of company data.

Remote access policies are technical policy controls that govern the employees’ use of remote access privileges where employers assign the right for employees to connect to the corporate network from a remote location.

A bring your own device (BYOD) policy means that employees can use their own personal devices on the corporate network so long as it meets a minimum specification required by the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A network configuration includes the ability to inspect packets at the application layer to identify potential threats. Which of the following choices uses the new configuration?

Firewall

Load balancer

Switch

Proxy server

A

Firewall

Firewalls are can be done at application layer and are principally used to implement security zones, such as intranet, screened subnet topology, and Internet.

A proxy server is used as a middle-man for network access, such as Internet access. A proxy can control what a system can or cannot connect to.

A load balancer distributes client requests across available systems, like server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address, which is also known as a Media Access Control (MAC) address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

A user submitted a ticket saying they only have 1 bar of signal at their desk. What issue is the user having in regards to wireless access?

RF attenuation

Interference

Distance

Speed

A

Distance

Distance to an access point will cause issues the further away you are. As the signal gets weaker, a device will spend more power trying to connect and slow data transfer.

Speed is important to a wireless network, but that may only be a symptom of the issue. Distance would be the cause of the speed issue.

Interference can be caused by several factors, including neighboring equipment that may use the same frequency of radio waves.

Radiofrequency attenuation (RF attenuation) is the loss of signal strength due to distance and environmental factors. Also referred to as free space path loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

A helpdesk operator is reviewing the part of a MAC address which determines whether the frame is addressed to an individual node or a group. What is this called?

VNF

EUI-64

I/G

OUI

A

I/G

The I/G bit of a MAC address determines whether the frame is addressed to an individual node (0) or a group (1). The latter is used for broadcast and multicast transmissions.

A EUI-64 is a 64-bit hardware address. A translation mechanism allows a 48-bit MAC address to be converted to a EUI-64. EUI-64 addresses can be used with IPv6.

The first six hex digits (3 bytes or octets), also known as the Organizationally Unique Identifier (OUI), identify the manufacturer of the adapter. The last six digits are serial numbers.

Virtual Network Function (VNF) specifies and deploys instances of each virtual appliance. VNFs are designed to run as VMs on standard CPU platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

A systems administrator is setting up a static IP for a new server with a Class A IP scheme. Which netmask lines up with a class A address?

/16

/24

/8

/32

A

/8

The first octet for Class A falls from 1 – 126 and the netmask is 255.0.0.0 (/8). Class A network addresses support large numbers of hosts—over 16 million. However, there are only 126 Class A network addresses.

The first octet for Class B falls from 128 – 191 and the netmask is 255.255.0.0 (/16). There are 16,000 Class B networks, each containing up to about 65,000 hosts.

The first octet for Class C falls from 192 – 223 and the netmask is 255.255.255.0 (/24). Class C networks support only 254 hosts each, but there are over 2 million of them.

Class D addresses (224.0.0.0 through 239.255.255.255) are used for multicasting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

A network engineer reviewed the password database for the company’s networks and servers and identified that the passwords were all common words and animal names. Concerned that this would be easy to compromise, the engineer alerted this concern to the cyber team. What kind of attack could have occurred if the passwords were not changed?

Ransomware

Evil twin

Dictionary

Phishing

A

Dictionary

Password cracking software uses dictionary terms to assist in gaining access to a password-protected account or system.

A rogue AP masquerading as a legitimate one is called an evil twin. An evil twin might advertise a similar network name (SSID) to the legitimate one. For example, an evil twin might be configured with the network name “company” where the legitimate network name is “company.”

Social engineering and techniques such as phishing and pharming, where the attacker sets up a false website in imitation of a real one, are types of spoofing attacks. It is also possible to abuse how a protocol works or how network packets are constructed to inject false or modified data onto a network.

Ransomware is a type of malware that tries to extort money from the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

A network consultant is looking into a matter where the interface is discarding incoming and outgoing frames. In this instance, the packets are too large. What is the name for these packets?

Uptime/Downtime

Bandwidth

Giants

Runts

A

Giants

An interface may discard incoming or outgoing frames for several reasons, including checksum errors, mismatched MTUs, and too large packets (giants).

An interface may discard incoming or outgoing frames for several reasons, including checksum errors, mismatched MTUs, and too small packets (runts).

If an interface goes down, a network technician must configure an alert to investigate immediately. Track the uptime or downtime percentage so that the technician can assess the link’s reliability over time.

Generally, bandwidth refers to the amount of data transferable through a connection over a given period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Users report that one of the access points seems not to be working properly. When they go to download files, it takes forever. The sysadmin noticed that the access point is pretty old and should be replaced with a more powerful one. What issue would replacing the access point help to fix?

RF attenuation

Interference

Speed

Distance

A

Speed

Speed is important to a wireless network, but that may only be a symptom of the issue. Distance would be the cause of the speed issue.

Interference can be caused by several factors, including neighboring equipment that may use the same frequency of radio waves.

Radiofrequency attenuation (RF attenuation) is the loss of signal strength due to distance and environmental factors. Also referred to as free space path loss.

Distance to an access point will cause issues the further away you are. As the signal gets weaker, a device will spend more power trying to connect and slow data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Mobile users in an organization complain about limited functionality in a company’s headquarters. The IT staff decide to extend mobile access capabilities by widening the current wireless network. When evaluating the expansion configuration, a wireless access point media access control (MAC) address relates to which option?

Basic Service Set Identifier (BSSID)

Extended Service Set (ESS)

Basic Service Set (BSS)

Base station

A

Basic Service Set Identifier (BSSID)

The media access control (MAC) address of a wireless access point (AP) is used as the Basic Service Set Identifier (BSSID).

An access point mediates communications between wireless stations and it can also provide a bridge to a cabled network segment. This is known as a Basic Service Set (BSS).

Wireless networks deploy in an infrastructure topology. In an infrastructure topology, each station connects through a base station or access point (AP).

An Extended Service Set (ESS) groups more than one Basic Service Set (BSS) together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

A network engineer reviews a report that makes recommendations where the network is not meeting goals for performance or security. What is the name of this report?

Audit and Assessment Report

Business Continuity Plan

Acceptable Use Policy

IDF/MDF

A

Audit and Assessment Report

An audit and Assessment report makes recommendations on where the network is not meeting goals for performance or security.

In an extensive network, one or more Intermediate Distribution Frames (IDFs) provide termination for access layer switches that serve a given area, such as a single office floor. The Main Distribution Frame (MDF) is the location for distribution/core level internal switching.

Acceptable use policy (AUP) is a policy that governs employees’ use of company equipment and Internet services.

Business continuity planning (BCP) identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

A server instructs a switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. What is the name of this mechanism?

Port Mirroring

Flow Control

Port Security

Speed

A

Flow Control

Flow control allows a server to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. This is also called 802.3x.

Port security prevents a device attached to a switch port from communicating on the network unless it matches a given MAC address or other protection profile.

Port mirroring copies ingress and egress communications from one or more switch ports to another port. This monitors communications passing over the switch and is also called a switched port analyzer (SPAN).

Speed is the rate at which something travels from one location to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

A computer technician is reading archived logs and identifies that the company was using 802.11n. Not knowing what this Wi-Fi category meant, the technician researched its origins. In recent years, what was 802.11n renamed?

3G, 4G, 5G

Wi-Fi 6

Wi-Fi 4

Wi-Fi 5

A

Wi-Fi 4

Wi-Fi standards are becoming renamed with simpler digit numbers. 802.11n is now officially designated as Wi-Fi 4.

Wi-Fi 5 (802.11AC) works only in the 5 GHz band. The network engineer can use the 2.4 GHz band for legacy standards (802.11g/n) in mixed mode.

3G is a digital communication generation that deployed various packet-switched technologies to mobile devices. 4G converged to a standard supported by GSM and CDMA network providers. 5G was a more complex system with expectations to provide fixed-wireless broadband solutions for homes and businesses.

Wi-Fi 6 uses more complex modulation and signal encoding to improve the amount of data sent per packet by about 40%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

A network engineer needs to integrate the corporate wireless local area network (WLAN) with the wired local area network (LAN) authentication scheme, but wants both the client and server to use public key certificates. Which of the following is an authentication protocol that would allow this type of mutual authentication?

Extensible Authentication Protocol Transport Layer Security (EAP-TLS)

Protected Extensible Authentication Protocol (PEAP)

Flexible Authentication via Secure Tunneling (EAP-FAST)

Challenge Handshake Authentication Protocol (CHAP)

A

Extensible Authentication Protocol Transport Layer Security (EAP-TLS)

Extensible Authentication Protocol (EAP) allows WLAN authentication to be integrated with the wired LAN authentication scheme. With EAP-TLS, as both supplicant and server are configured with certificates, this provides mutual authentication.

Protected Extensible Authentication Protocol (PEAP) also uses an encrypted tunnel, but PEAP only requires a server-side public key certificate. The supplicant does not require a certificate.

Flexible Authentication via Secure Tunneling (EAP-FAST) uses a Protected Access Credential (PAC) to set up the tunnel, which is generated for each user from the authentication server’s master key.

Challenge Handshake Authentication Protocol (CHAP) is an authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

A service provider is negotiating a Service Level Agreement (SLA) with a client involving the repair of broken server nodes when failure occurs. The service provider mentions a prior contract that included about 20 billable hours a month, which involved the repair of about five servers a month. Calculate the MTTR (Mean Time To Repair).

20 hours - 5 repairs = 15 hours

5 repairs * 20 hours = 100 hours

20 hours + 5 repairs = 25 hours

20 hours / 5 repairs = 4 hours

A

20 hours / 5 repairs = 4 hours

Mean Time to Repair (MTTR) is the average time taken for a device or component to be repaired, replaced, or otherwise recovered from a failure. MTTR is calculated by dividing the total number of hours by the total number of repairs.

Mean Time to Repair (MTTR) cannot be calculated by multiplying the total number of hours by the total number of repairs.

Mean Time to Repair (MTTR) cannot be calculated by adding the total number of hours by the total number of repairs.

Mean Time to Repair (MTTR) cannot be calculated by subtracting the total number of hours by the total number of repairs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

A computer technician wants to purchase a cable modem capable of combining multiple channels to increase traffic flow from two 20 MHz channels to a single 40 MHZ channel. What is the combination of channels called in this instance?

Channel Bonding

Roaming

CDMA

Extended Service Set

A

Channel Bonding

803.802.11n products can also use channels in the 2.4 GHz band or the 5 GHz band. 802.11n also allows two adjacent 20 MHz channels to be combined into a single 40 MHz channel, referred to as channel bonding.

A network engineer can group more than one BSS in an Extended Service Set (ESS).

Code Division Multiple Access (CDMA) means that each subscriber uses a code to key the modulation of their signal and this “key” is used by the receiver to extract the subscriber’s traffic from the radio channel.

Clients can roam within an extended service area (ESA). An ESA is created by installing APs with the same SSID and security configuration connected by a wired network or Distribution System (DS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

An engineer needs to connect a fiber connection to a network that uses category 5 twisted pair cabling. Which of the following solutions will connect the two at the physical layer of the OSI reference model?

Hub

Media converter

Switch

Bridge

A

Media converter

Standalone media converters are used to convert one cable type to another.

A bridge is a hardware device that connects varying subnets together.

A hub is a known as a dumb device that simply connects computers to a network in a star configuration. A hub lacks the features contained in a switch.

A network switch in its simplest form is a layer 2 network device.

Switches can handle and control traffic based on a node’s physical address which is also known as a hardware address or media access control (MAC) address. A switch segregates devices from communicating by using methods such as VLANs or policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What allows fine-grained control over traffic parameters?

Differentiated Services (DiffServ)

Traffic Shaping

Quality of Service (QoS)

Class of Service (CoS)

A

Quality of Service (QoS)

Quality of Service (QoS) allows fine-grained control over traffic parameters. Protocols, such as Multiprotocol Label Switching (MPLS), provides QoS. MPLS can reserve the required bandwidth and pre-determine statistics when configuring the link.

Class of Service (CoS) categorize protocols into groups that require different service levels and provide a tagging mechanism to identify a frame or packet class.

The Differentiated Services (DiffServ) framework classifies each packet passing through a device. Router policies can then be defined to use the packet classification to prioritize delivery.

Traffic shaping enables administrators to closely monitor network traffic and to manage that network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

An engineer needs to place a device that will act as a repeater on a network. Which device does the engineer use?

Bridge

Wireless range extender

Router

Firewall

A

Wireless range extender

Wireless networks can be expanded by using devices called wireless range extenders (WREs). A range extender is essentially a lightweight access point (AP) functioning in repeater mode only.

A bridge is an appliance or application that connects different networks as if they were one network.

A firewall or unified threat management (UTM) device is a hardware device that is used to prevent external network threats.

A router is a hardware appliance or application that connects different networks/subnets for communication purposes, but keeps them as separate networks. A router is a layer 3 device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

A network engineer attempts to determine if they are permitted or prohibited from installing nonstore apps onto a company device. Additionally, the engineer wants to understand if rooting/jailbreaking is permitted. What policy would the network engineer review?

NDA

MOU

Acceptable Use Policy

Onboarding and Offboarding Policy

A

Acceptable Use Policy

Acceptable use policy (AUP) is a policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers. Also called fair use policy.

A non-disclosure agreement (NDA) is the legal basis for protecting information assets.

A memorandum of understanding (MOU) is a preliminary or exploratory agreement to express an intent to work together.

Onboarding is the process of welcoming a new employee to the organization. Similar principles apply to taking on new suppliers or contractors. Offboarding is the process of ensuring that an employee leaves a company gracefully.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

A firewall configuration handles threat management with an active approach. Which feature operates this way?

AAA server

IPS

Wireless Controller

Amplification

A

IPS

An Intrusion Prevention System (IPS) is an inline security device that monitors suspicious network and/or system traffic and reacts in real time to block it. An IPS uses an active approach to threat management.

A repeater is a device that amplifies an electronic signal to extend the maximum allowable distance for a media type.

A wireless controller is a hardware device or software application which can centralize the management function of a wireless network. An extended service set is defined in a wireless network.

An authentication, authorization, and accounting (AAA) device uses a security concept where a centralized platform verifies object identification, ensures the object is assigned relevant permissions, and then creates an audit trail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

A security analyst is setting up detections to look for unauthorized domain transfers from their external-facing DNS servers. Which of the following ports should they monitor?

TCP 443

UDP 53

TCP 53

UDP 520

A

TCP 53

Some DNS servers are also configured to allow connections over TCP port 53, as this allows larger record transfers (over 512 bytes).

A DNS server is usually configured to listen for queries on UDP port 53, but zone transfers are over TCP because of the large size.

RIPv1 is a classful protocol and uses inefficient broadcasts to communicate updates over UDP port 520. RIPng (next generation) is a version of the protocol designed for IPv6. RIPng uses UDP port 521.

Encrypted web traffic between the client and server is sent over TCP port 443 (by default), rather than the open and unencrypted port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A network specialist has been installing antennas around the building to get clear coverage. Some of the operators stated that they can hear the transmission but cannot reply. What should the specialist consider?

RA guard

Geofencing

MAC filtering

Antenna placement

A

Antenna placement

Site designs and surveys facilitate robust wireless coverage when all expected areas receive a strong signal. Power levels and channel selection should be tuned so that access points do not interfere with one another or broadcast a signal that stations can “hear” but cannot reply to.

With Router Advertisement Guard (RA Guard), switchport security feature to block router advertisement packets from unauthorized sources.

Geofencing can be used to ensure that the station is within a valid geographic area to access the network, such as ensuring the device is within a building rather than trying to access the WLAN from a car park or other external location.

As with a switch, an access point can be configured with an accept or deny list of known MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

The CEO of an organization informs IT that email is not working. Upon investigating the problem, an engineer discovers that the company’s domain name system records are missing on a company owned internal DNS server. Which record type does IT fix to solve the email issue?

TTL

PTR

MX

CNAME

A

MX

A mail exchanger (MX) record identifies an email server for the domain. In a typical network, multiple servers are defined to provide redundancy.

A canonical name (CNAME) record is a domain name system (DNS) record, which represents an alias for a host. Aliases give a host multiple names.

A pointer (PTR) is a domain name system (DNS) record that creates an Internet protocol (IP) address to hostname mapping that corresponds to the host (A) record stored in the forward lookup zone.

Time to Live (TTL) is a value a system can use to determine the life of a value. For example, in DNS a TTL value tells a system how long it should keep a record in cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What step of the CompTIA Network+ troubleshooting methodology involves confirming a theory and determining the next steps to resolve a problem?

3

7

2

5

A

3

The third step of the CompTIA Network+ troubleshooting methodology is to test the theory to determine the cause. It involves determining the next steps if the theory is confirmed.

The second step of the CompTIA Network+ troubleshooting methodology is establishing a theory of probable cause. This involves questioning the obvious and considering multiple approaches.

The fifth step of the CompTIA Network+ troubleshooting methodology is to implement a solution or escalate as necessary.

The seventh step of the CompTIA Network+ troubleshooting methodology is to document findings, actions, and outcomes. These should be saved and archived in order to help mitigate issues in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A company requires connectivity between two buildings. The buildings are over 750 meters apart. IT engineers suggest which type of fiber cabling?

Multimode

Single mode

Media conversion

Straight-through

A

Single mode

Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support high signaling speeds or long distances as single-mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs).

A media converter is a device that converts one media signaling type to another. A media convertor is not required in this case.

Straight-through refers to cabling such as twisted pair cabling where pins on one end of the cable match the pins on the opposite end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

A security engineer is setting up anomaly detection for suspiciously large file transfers. Which of the following ports should they set up their alert for?

5060

1433

161

445

A

445

SMB is more typically run directly over TCP port 445. SMB should be restricted to use only on local networks. It is also important that any traffic on the NetBIOS port ranges from 137 to 139.

Simple Network Management Protocol (SNMP) device queries take place over UDP port 161; traps are communicated over UDP port 162.

Microsoft SQL Server uses TCP/1433. SQL has been implemented in relational database management system (RDBMS) platforms by several different vendors.

SIP typically runs over UDP or TCP ports 5060 (unsecured) and 5061 (SIP-TLS). The Session Initiation Protocol (SIP) is one of the most widely used session control protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

An IT engineer works with desktop installation technicians who deploy new computers to users. The installation technicians report that users in one area of the building do not achieve network speeds above 100 Mbps. After evaluating the cabling choices, the IT engineer determines that the problem area uses which type of cabling?

Cat 5

Cat 3

Cat 6

Cat 5e

A

Cat 5

The American National Standards Institute (ANSI) and the Telecommunications Industry Association (TIA)/Electronic Industries Alliance (EIA) have created
categories and standards for twisted pair cabling. Cat 5 cabling supports a maximum speed of 100 Mbps.

Cat 3 cabling is the oldest cabling standard among the choices. This twisted pair cable type supports speeds up to 10 Mbps.

Cat 6 defines a modern implementation of twisted pair cabling that supports speeds up to 10 Gbps.

Cat 5e defines an improvement of Cat 5 cabling by improving speeds from 100 Mbps to 1 Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

A network architect is looking for topologies where each node is wired to its neighbor in a closed loop. Which of the following should they use when connecting and replacing a DSL modem with a layer 2 switch?

Star

Bus

Ring

Mesh

A

Star

In a star topology, each endpoint node is connected to a central forwarding node, such as a hub, switch, or router.

A mesh topology is commonly used in WANs. In theory, a mesh network requires that each device has a point-to-point link with every other device on the network (fully connected).

A physical bus topology with more than two nodes is a shared access topology, meaning that all nodes share the bandwidth of the media.

In a physical ring topology, each node is wired to its neighbor. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

A network technician wants to enable a rule that blocks all traffic that does not match the rule. What is the name of this rule?

Implicit deny

Role-based access

Explicit deny

Antenna placement

A

Implicit deny

The final default rule is typically to block any traffic that has not matched a rule. This is called an implicit deny.

If the firewall does not have a default implicit deny rule, an explicit deny-all rule can be added manually to the end of the ACL.

Site designs and surveys facilitate robust wireless coverage when all common areas receive a strong signal. Power levels and channel selection should be tuned so that access points do not interfere with one another or broadcast a signal that stations can “hear” but cannot reply to.

Role-based access means that a set of organizational roles are defined, and subjects are allocated to those roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

A network technician is looking at leaf layer access switches of a SDN. What are these implemented as?

SAWs

LER

FCoE

ToR

A

ToR

The leaf layer access switches are implemented as top-of-rack (ToR) switch models. These are switch models designed to provide high-speed connectivity to a rack of server appliances.

Fibre Channel over Ethernet (FCoE) is a means of delivering Fibre Channel packets over Ethernet cabling and switches.

A Label Edge Router (LER) inserts or “pushes” a label or “shim” header into each packet sent from routers below it, and then forwards it to an LSR to determine the Label Switched Path (LSP) for the packet.

SAWs are secure administrative workstations that are hardened and are used solely to manage servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

A working physical server is experiencing network connectivity issues after switching connections to another physical port on a basic layer 2 switch. Identify the most likely problem with the switch.

Blocked TCP ports

Incorrect cable type

Duplicate IP address

Hardware failure

A

Hardware failure

A bad physical port or a hardware failure is most likely the cause of the issue, as the connection to the previous physical switch port was working fine.

A basic layer 2 switch does not have the capability of blocking TCP ports. This would be appropriate for a network firewall appliance to handle.

A duplicate IP address is not the case because network connectivity works when returning the network cable to the previously used port.

The cable type is most likely compatible if it is connecting to the same switch. Even if a small form factor pluggable (SFP) module was used, the module can be switched out as well with the network cable into another physical port on that switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

A manager informs a support technician that users spend too much time using company computers for personal reasons. Which of the following can the technician implement to address the issue?

Proxy server

Smart jack

Content filter

Load Balancer

A

Content filter

A content filter is designed for corporate control over employees’ Internet use. It can be implemented as a standalone appliance or proxy server software. Content filters can be applied in a number of ways, such as by using categories (games, gambling, weapons, etc.).

A proxy server is used as a middle-man for network access, such as Internet access. A proxy can control what a system can or cannot connect to.

A load balancer distributes client requests across available systems such as server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.

A T1 line is usually terminated at a smart jack or network interface unit (NIU), which contains line testing facilities for the telco to use. This allows the service provider to test the line remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

A network admin gains remote access to a server with a beta application running. The admin realizes there are issues connecting the application with the internal web server and runs the netstat command. Justify why the admin might execute the netstat command for troubleshooting? (Select all that apply.)

SELECT ALL THAT APPLY

To show active TCP connections

To view the ARP cache

To show all active ports

To configure firewall rules

A

To show active TCP connections
To show all active ports

The netstat command allows an admin to check the state of ports on the local host, and check for service misconfigurations.

The output of netstat will show active TCP connections with IP address information and port numbers. This can help identify if the application is connecting to the correct web server on the right port.

The ARP cache contains entries that map IP addresses to MAC address. The windows arp command can be used to view the cache.

Firewall rules cannot be edited with the netstat command. The iptables command, however, is an example of a tool that can be used on a Linux system to edit rules enforced by the Linux kernel firewall.

130
Q

A network administrator needs to upgrade a switch firmware remotely. The firmware bits must be transferred over the local area network (LAN) with or without encryption. Which of the following options is connection-oriented and guarantees delivery in this manner? (Select all that apply.)

SELECT ALL THAT APPLY

TFTP

Telnet

FTP

SFTP

A

Telnet
FTP
SFTP

FTP (File Transfer Protocol) is a connection-oriented protocol. It uses Transmission Control Protocol (TCP) port 20 for data connection and TCP port 21 as a control port. TCP provides a connection-oriented, guaranteed method of communication.

SFTP or File Transfer Protocol over Secure Shell (SSH) provides a secure channel for transferring file. SSH also operates over TCP 22.

Telnet is terminal emulation software to support a remote connection to another computer. It uses TCP port 23.

TFTP (Trivial File Transfer Protocol) is a connectionless protocol that runs over UDP port 69. It is suitable for transferring small files.

131
Q

After setting up an evil twin, the attacker could sniff information about the authentication process. Users tried to reconnect to a wireless network and unknowingly connected to the rogue access point (AP). What type of attack did the hacker most likely use to get the user to connect to the rogue AP?

DNS poisoning

Deauthentication

Rogue DHCP

Shoulder surfing

A

Deauthentication

An evil twin may be coupled with a deauthentication attack. This sends a stream of spoofed management frames to disconnect clients from the legitimate AP and inadvertently connect back to the rogue AP. The attacker can then sniff information about the authentication process.

Shoulder surfing is when a threat actor can learn a password or PIN (or other secure information) by watching the user type it.

A rogue Dynamic Host Configuration Protocol (DHCP) attack involves an unauthorized server that can send out malicious IP addresses that configure systems to connect to a malicious subnet.

Domain Name System (DNS) poisoning compromises name resolution, replacing the valid IP address for a trusted website with the attacker’s IP address.

132
Q

A user is having trouble connecting to the company’s WiFi network. They have verified that the password is correct and the network is indeed available. What could be a potential issue with the device not connecting?

AAA server

Encryption protocol mismatch

TLS settings

Captive portal

A

Encryption protocol mismatch

An encryption protocol mismatch will cause the connection to fail, even if the correct credentials are supplied. Check OS drivers or verify authentication types/protocols on the device.

Transfer Layer Security (TLS) is a security protocol that uses certificates for authentication and encryption to protect web communications and other application protocols. This doesn’t apply to network authentication.

An AAA server is an authentication server positioned within the local network. There are two main types of AAA servers: RADIUS and TACACS. These would not be a part of the solution as an initial authentication connection is not taking place.

A captive portal is a web page or website to which a client is redirected before being granted full network access. This would not apply in this situation.

133
Q

A network architect needs to set up private links with guaranteed service levels. Which of the following should they use?

DMVPN

mGRE

SDWAN

MPLS

A

MPLS

Most WAN providers offer Multiprotocol Label Switching (MPLS) as a means of establishing private links with guaranteed service levels. MPLS can operate as an overlay network to configure point-to-point or point-to-multipoint links between nodes.

VPN solutions based on mGRE that use the public Internet as the transport network can suffer from unpredictable performance levels.

VPN solutions also based on DMVPN that use the public Internet as the transport network can suffer from unpredictable performance levels.

A software-defined WAN (SD-WAN) replaces hub and spoke type designs with more efficient, but still secure, connectivity to corporate clouds.

134
Q

An administrator is concerned that too many employees are using “password123” with their username to log in to the corporate network. What can the administrator enforce that will not allow users to use that password anymore?

Password policy

Acceptable use policy

Remote access policy

Security policy

A

Password policy

The administrator can enforce a password policy that instructs users on best practice in choosing and maintaining a network access credential and can enforce it as well.

Security policy establishes a duty for each employee to ensure the confidentiality, integrity, and availability of any data assets or processing systems that they use as part of their job.

An acceptable use policy (AUP) sets out the permitted uses of a product or service. It might also state explicitly prohibited uses.

Remote access policies are technical policy controls that govern the employees’ use of remote access privileges where employers assign the right for employees to connect to the corporate network from a remote location.

135
Q

Which type of approach is applied by looking at each layer of the OSI (Open Systems Interconnection) model, starting from Layer 1, to establish a theory of probable cause?

Top-to-bottom

Divide and conquer

Escalation

Bottom-to-top

A

Bottom-to-top

A bottom-to-top approach of the OSI (Open Systems Interconnection) model is a methodical validation of network components starting from the bottom or layer 1 (Physical) and going up.

Escalation occurs when you cannot prove the cause of the problem and support must be sent to the next tier level. Usually Tier 1 spends the less time resolving issues than tier 3.

Divide and conquer approach starts with the layer most likely to be causing the problem and then work either down or up depending on what your tests reveal.

A top-to-bottom approach of the OSI model is a methodical validation of network components starting from the top or layer 7 (Application) and going down.

136
Q

A security administrator is investigating anomalous activity from a particular host. They look in DNS and see the following address “1.100.51.198.in-addr.arpa”. What type of record is this?

PTR

MX

SRV

CNAME

A

PTR

A reverse DNS query returns the hostname associated with a given IP address. This information is stored in a reverse lookup zone as a pointer (PTR) record.

A Service (SRV) record is used to identify a record that is providing a network service or protocol. It is often used to locate Voice over Internet Protocol (VoIP) or media servers.

A Mail Exchange (MX) record is used to identify an email server for the domain. In a typical network, multiple servers are installed to provide redundancy.

A Canonical Name (CNAME) (or alias) record is used to configure an alias for an existing address record (A or AAAA).

137
Q

An administrator is planning for disaster recovery and the owner specified that if the systems were down for longer than 48 hours in any given situation the business would not be able to recover financially. What does this represent?

RPO

Configuration

RTO

State

A

RTO

This represents the Recovery Time Objective (RTO) which is the maximum amount of time following a disaster that an individual IT system may remain offline.

The Recovery Point Objective (RPO) is the amount of data loss that a system can sustain, measured in time units, and also represents the amount of data an organization is willing to lose.

A configuration is a backup mode which is a copy of the configuration data in a structured format, such as extensible markup language (XML).

A state is a backup mode which is a snapshot-type image of the whole system. This can be re-deployed to any device of the same make and model as a system restore.

138
Q

A network technician is looking at a networking device with RJ-11 plugs. Which of the following devices is it most likely?

Cable modem

Hub

DSL Modem

Firewall

A

DSL Modem

A DSL modem is installed as CPE, typically as a multifunction “wireless router,” that the RJ-11 WAN port connects to the provider’s phone jack over a short length of ribbon cable.

RG-6 is an 18 AWG cable with 75 ohm impedance typically used as drop cable for Cable Access TV (CATV) and broadband cable modems.

Typically, a network technician uses an RJ-45 with hubs. Hubs are a multiport repeater deployed as the central point of connection for nodes.

Networking firewalls also typically use RJ-45 or fiber connections, not RJ-11. Firewalls are important for traffic passing between networks because it filters them.

139
Q

A network contractor is looking at installing a Wi-Fi system in the building that uses a 5 GHz bandwidth. Which Wi-Fi system would the network contractor use?

Wi-Fi 5

3G, 4G, 5G

Wi-Fi 6

Wi-Fi 4

A

Wi-Fi 5

Wi-Fi 5 (802.11AC) works only in the 5 GHz band. The network engineer can use the 2.4 GHz band for legacy standards (802.11g/n) in mixed mode.

Wi-Fi 6 uses more complex modulation and signal encoding to improve the amount of data sent per packet by about 40%.

Wi-Fi standards are becoming renamed with simpler digit numbers. 802.11n is now officially designated as Wi-Fi 4.

3G is a digital communication generation that deployed various packet-switched technologies to mobile devices. 4G converged to a standard supported by GSM and CDMA network providers. 5G was a more complex system with expectations to provide fixed-wireless broadband solutions for homes and businesses.

140
Q

A network technician is reporting historical data about connectivity to the corporate office. The technician has used records of connectivity issues to request an upgrade to the router in the area. What data is the technician using to request an upgrade?

Syslog

Latency

Link state

Uptime/Downtime

A

Uptime/Downtime

Uptime/downtime is the time that passes as the link is either up or down. You may also want to track the uptime or downtime percentage so that you can assess a link’s reliability over time.

Link state measures whether an interface is working (up) or not (down). You should configure an alert if an interface goes down so that you can investigate immediately.

Latency is the time it takes for a transmission to reach the recipient, measured in milliseconds (ms).

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.

141
Q

A security admin is auditing a newly deployed web server on the local network. After gaining knowledge of the server’s (Internet Protocol) IP address, the admin runs the nmap utility. Which of the following objectives is the admin most likely to achieve when applying this utility? (Select all that apply.)

SELECT ALL THAT APPLY

Scan for unnecesary services.

Scan for MX records.

Scan for domain information.

Scan for open ports.

A

Scan for unnecesary services.
Scan for open ports.

The nmap utility is a versatile port scanner used for topology, host, service, and OS (Operating System) discovery and enumeration. Open ports are vulnerable to attacks and should be shut down if not used.

Unnecessary services are also considered a security risk. Multiple applications can run over the same port. Use the nmap utility to determine which services are running on each port and identify which should remain active.

The nslookup utility is a software tool for querying DNS server records. It can query various records, such as A, AAAA, and MX records.

The dig utility is used to query a DNS (Domain Name System) and return detailed information about a domain name.

previous
finish review

142
Q

Users report that the wireless signal is too weak in the lower levels of the building, causing issues connecting to the shared drive or internet. What may be the cause of their issue?

DNS issues

Device configuration

Access point speed

Access point distance

A

Access point distance

Distance to an access point will cause issues the further away you are. As the signal gets weaker, a device will spend more power trying to connect and slow data transfer.

Speed is important to a wireless network, but that may only be a symptom of the issue. Distance would be the cause of the speed issue.

Device configuration may be an issue, but only if a wireless access point were down. Not enough information is given to determine it is a device configuration issue.

DNS issues would prevent accessing websites by domain name but not cause speed issues necessarily.

143
Q

A company plans a network run to a warehouse behind its main office building. The distance is short and to save money, the IT engineer suggests using a specific type of fiber cabling. Which type does the engineer recommend implementing, based on the given criteria?

Cat7

Multimode

Single-mode

Cat8

A

Multimode

Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support long distances as single-mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs).

Single-mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Cat 7 cable is always of a screened/shielded type and is rated for 10GbE applications up to 100 m (328 feet).

Cat 8 is intended for use in datacenters only for short patch cable runs that make top-of-rack connections between adjacent appliances.

144
Q

An email administrator is setting up records for their new cluster of mail servers. What must each of their MX records point to?

CNAME

DKIM

A

Root MX record

A

A

The host identified in an MX record must have an associated A or AAAA record.

A Mail Exchange (MX) record is used to identify an email server for the domain. In a typical network, multiple servers are installed to provide redundancy, and each one will be represented with an MX record.

An MX record must not point to a CNAME record, even though CNAME is almost the same as an A record.

DKIM records are used to decide whether you should allow received emails from a given source, preventing spam and mail spoofing. DKIM can use encrypted signatures to prove that a message originated from the domain it claims.

145
Q

A network consultant is installing Ethernet to a hub in the control room. When Ethernet is wired with a hub, there needs to be a means of distinguishing the interface on an end system with the interface on an intermediate system. What is the name of the end system interface?

MDI-X

Port Tagging

Neighbor Discovery Protocol

Port Security

A

MDI-X

The end system interface is known as a medium-dependent interface (MDI); the interface on the hub is called an MDI crossover (MDI-X). This means that the transmit (Tx) wires on the host connect to receive (Rx) wires on the hub.

On a switch with VLANs configured, a port with an end station host connected operates in untagged mode (access port). A tagged port will normally be part of a trunk link.

Port security prevents a device attached to a switch port from communicating on the network unless it matches a given MAC address or other protection profile.

The Neighbor Discovery (ND) protocol performs some functions on an IPv6 network that ARP and ICMP perform under IPv4.

146
Q

A network technician is looking at various administrative distances to see which route would be selected first. Which of the following would have the lowest administrative distance?

OSPF

BGP

Unknown

EIGRP

A

BGP

BGP has an administrative distance of 20. An administrative distance (AD) value can express the relative trustworthiness of the protocol supplying the route.

EIGRP has an administrative distance of 90. Default AD values are coded into the router but can be adjusted by the administrator if necessary.

OSPF has an administrative distance of 110. Each routing protocol uses its metric to determine the least-cost path.

Unknown has an administrative distance of 255. As routing protocols use different methods to calculate the metric, a network technician cannot compare routes from other protocols in the overall IP routing table, so it uses AD values.

147
Q

A group of hackers used Trojan backdoor malware to compromise thousands of zombie agent-client computers with bot tools to create a botnet; This caused services on Internet hosts to fail and become unavailable to legitimate users. Which of the following describes this kind of attack?

Domain Name Service (DNS) poisoning

DDoS (Distributed Denial of Service)

Rogue Dynamic Host Configuration Protocol (DHCP)

Address Resolution Protocol (ARP) spoofing

A

DDoS (Distributed Denial of Service)

DDoS attack, attacks launch from multiple compromised computers (zombie agents) with DoS tools (bots) forming a botnet. The attacker installs backdoor applications that give them access to the PC.

DNS poisoning compromises name resolution, replacing the valid IP address for a trusted website with the attacker’s malicious IP address.

ARP spoofing, or ARP cache poisoning, is a common means of perpetrating an on-path attack. It works by broadcasting unsolicited ARP reply packets, also known as gratuitous ARP replies, with a spoofed source address.

DHCP communications cannot be authenticated, so a host will generally trust the first offer packet that it receives. A rogue DHCP server takes advantage of this process and can become the subnet’s DNS resolver.

148
Q

A system administrator needs to operate computers remotely but needs an alternative to Microsoft’s Remote Desktop Protocol (RDP). Which of the following can meet the system administrator’s needs?

In-band vs. out-of-band management

Split tunnel vs. full tunnel

Virtual network computing (VNC)

Remote desktop gateway

A

Virtual network computing (VNC)

Virtual network computing (VNC) is a popular alternative to Remote Desktop, similar to TeamViewer.

Split tunnel vs. full tunnel is incorrect; this answer indicates which traffic is routed via a VPN gateway.

In-band vs. out-of-band management is incorrect because it refers to managed and unmanaged network appliances.

The remote desktop gateway can be a means of implementing a clientless VPN and can also allow a user to access networked applications. A gateway can be used to connect a user to a virtual desktop, where a client operating system and applications software is provisioned as a virtual appliance.

149
Q

A user is connected to a remote desktop using the protocol WebSockets. What technology solution is the user using?

Remote desktop connection

Site-to-site VPN

Clientless VPN

Authentication and authorization considerations

A

Clientless VPN

Clientless VPN also referred to as HTML5 VPN, uses a WebSockets protocol, enabling bidirectional messages between the server and client without requiring the overhead of separate HTTP requests.

Site-to-site VPN establishes a secure connection when the VPN gateways at each site exchange security information.

Remote desktop connections allow users to operate a computer remotely but require a client app that implements the protocols and authentication methods supported by the remote desktop/VPN gateway.

Authentication and authorization considerations are important when granting remote access to machines, but by itself is not a technology solution.

150
Q

Before entering a data center, there are multiple security lines, but the last line of defense is a closed-circuit alarm on the door to a server rack. If the door is opened without proper authorization, an alarm will sound. What is the purpose of the closed-circuit alarm on the door of the server rack?

Motion detection

Tamper detection

Camera

Biometrics

A

Tamper detection

The purpose of the closed-circuit alarm on the door to the server rack is tamper detection. If an attacker were to try and break into the server racks to tamper with the hardware, the alarm would notify security.

Motion detection is a type of alarm but does not necessarily prevent tampering. A tripped motion detector merely indicates there is movement in an area being monitored.

A camera, like motion detection, does not detect tampering. A camera projects and possibly records what is happening onto a screen that someone can monitor.

Biometrics help prevent tampering by proving a person is who they say they are when trying to access resources.

151
Q

What step of the CompTIA Network+ troubleshooting methodology involves determining if anything has changed?

4

1

2

3

A

1

The first step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes approaching multiple problems individually and determining if anything has changed.

The fourth step of the CompTIA Network+ troubleshooting methodology is to establish a plan of action to resolve the problem and identify potential effects.

The third step of the CompTIA Network+ troubleshooting methodology is to test the theory to determine a cause.

The second step of the CompTIA Network+ troubleshooting methodology is establishing a theory of probable cause. This involves questioning the obvious and considering multiple approaches.

152
Q

A helpdesk technician is trying to see if a user is receiving an IPv6 link-local address. Which of the following is the system which performs this for IPv6?

APIPA

SLAAC

EUI-64

VIP

A

SLAAC

IPv6 uses a more flexible system of generating link-local addresses and address autoconfiguration than IPv4 called stateless address autoconfiguration (SLAAC).

A EUI-64 is a 64-bit hardware address. A translation mechanism allows a 48-bit MAC address to be converted to a EUI-64. EUI-64 addresses can be used with IPv6.

Automatic Private IP Addressing (APIPA) is the IPv4 methodology by which link-local addresses are distributed.

A VIP is a virtual IP and is commonly associated with load balancers.

153
Q

A traveling consultant has brought his old laptop to the help desk to trade it for an updated device. The consultant has customized a lot of the device’s settings and installed a lot of his favorite software on his old computer, but the help desk intends to recycle the old laptop for use by other employees. What does the help desk need to do to get rid of any custom configurations and software on the old laptop?

Sanitize devices for disposal

Asset tags

Employee training

Factory reset/wipe configuration

A

Factory reset/wipe configuration

Factory reset/wipe configuration is correct. Factory resetting a device, or doing a configuration wipe, is a feature built-in to devices that, when invoked, wipes any custom configuration settings or modifications.

Asset tags show the ID of a device or component and link it to an inventory management database.

Sanitizing devices for disposal is incorrect because the laptop is being recycled, not disposed of.

Employee training is incorrect. While employee training is another prevention-based security control, it is not appropriate to get the old laptop ready for a new user.

154
Q

A network administrator looks at a device that connects a fiber optic core network with coax links to CPE. What is this device associated with? (Select all that apply.)

SELECT ALL THAT APPLY

DOCSIS

CATV

HFC

PON

A

CATV
HFC

A cable Internet connection is usually available along with Cable Access TV (CATV).

These networks are sometimes described as Hybrid Fiber Coax (HFC) because they combine a fiber optic core network with coax links to CPE but are more simply just described as cable broadband.

DOCSIS refers to Data Over Cable Service Interface Specification. Based on the DOCSIS, cable supports downlink speeds of up to 38 Mbps (North America) or 50 Mbps (Europe) and uplinks of up to 27 Mbps.

Full fiber connections are also becoming provisioned to residential and small business customers. Rather than dedicated leased lines, these services deploy as a passive optical network (PON).

previous
finish review

155
Q

An engineer surveys an old building for a wiring project. Currently, the building uses outdated wiring with Cat 3 and RG-59 media. The engineer determines that for some short-term purposes the Cat 3 cabling is the best to use. Considering the different types of Ethernet media, which implementation is RG-59?

100BASE-TX

Coaxial

1000BASE-T

10BASE-T

A

Coaxial

Coaxial (or coax) cable is made of two conductors that share the same axis, hence the name (“co” and “ax”). The core conductor of the cable is made of copper wire (solid or stranded). Older implementations of coaxial cable use RG-59 while modern installations use RG-6.

Over copper wire, Gigabit Ethernet is specified as 1000BASE-T, working over Cat 5e or better.

Cat 3 cable is also known as 10Base-T. This cable has a maximum distance of 100m (328 ft) and a speed capacity of 10 Mbps.

100BASE-TX refers to Fast Ethernet working over Cat 5 (or better) twisted pair copper cable with a maximum supported link length of 100 meters (328 feet).

156
Q

Which technology offers a mode for simultaneous two-way communication?

Bidirectional

Crossover

Multimode

Duplex

A

Duplex

Duplex is a communication configuration. Full-duplex refers to a communication type such as network links that allow simultaneously sending and receiving. Most network links are full-duplex.

Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns.

Multimode fiber is inexpensive to deploy compared to single mode fiber. As such, it does not support long distances as single mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs).

A crossover cable is created by wiring the connectors at each end differently, so that the transmit on one connector goes directly to receive on the other connector and vice versa.

157
Q

A Windows Server 2016 has recently been remotely joined to the domain by a network admin, and is now known as IISMARKETING01.redwood.local. When pinging the server using its Fully Qualified Domain Name (FQDN) the reply fails. When trying to remote access the server using the sa FQDN the session does not connect. Applying a divide and conquer approach, where would a network admin most likely begin to resolve this issue?

Theorize a cable issue at Layer 1.

Theorize an MAC issue at Layer 2.

Theorize a port issue at Layer 4.

Theorize an IP issue at Layer 3.

A

Theorize an IP issue at Layer 3.

In a divide and conquer approach, you start with the layer most likely to be causing the problem. The DNS A record including the server’s IP address may not have been created yet. Ping the FQDN, if IP resolution fails, fix the A record.

A MAC (Media Access Control) address is not the immediate concern because the previous remote access assumes local LAN was accessible.

A port issue, like TCP port 3389 for RDP (Remote Desktop Protocol) is most likely not the case because remote access worked previously to join server to the domain.

A possible failure of a physical cable is most likely not the cause since the issue occurred after a change in software settings.

158
Q

A network architect is designing a new network with a three-tiered hierarchy. Which of the following is not part of the traditional hierarchy?

Access

Control

Core

Distribution

A

Control

A control layer is not part of the traditional hierarchy but is part of software-defined networking (SDN). The principal innovation of SDN is to insert a control layer between the application layer and the infrastructure layer.

The access or edge layer allows end-user devices, such as computers, printers, and smartphones to connect to the network.

The distribution or aggregation layer provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks.

The core layer provides a highly available network backbone. Devices such as client and server computers should not be attached directly to the core.

159
Q

A small business wants to make its website public. Two physical servers that host the website have load balancing configured. Each server has its own Internet Protocol (IP) address. Having only one public IP address from the Internet Service Provider (ISP), what may a network administrator set up so the company’s website can interface with public users?

Set up a static Network Address Translation (NAT).

Set up Port Address Translation (PAT).

Set up IPv6 tunneling.

Set up port forwarding.

A

Set up Port Address Translation (PAT).

Port Address Translation (PAT) is beneficial in cases where multiple private IP addresses are being mapped onto a single public address.

Network Address Translation (NAT) is useful in scenarios where a single inbound connection to a single host must be supported; it is a simple 1:1 mapping.

Port forwarding, also known as destination NAT, means that the router takes requests from the Internet for a specific application (HTTP/port 80) and changes the destination address to send them to a designated host and port on the LAN.

IPv6 tunneling can be used to deliver IPv6 packets across the IPv4 Internet. In this, a basic IP address was referenced for the servers and not an IPv6 address.

160
Q

A systems administrator is trying to convert a MAC address so that it can be addressed by IPv6. Which of the following should they use?

I/G

VIP

APIPA

EUI-64

A

EUI-64

A EUI-64 is a 64-bit hardware address. A translation mechanism allows a 48-bit MAC address to be converted to a EUI-64. EUI-64 addresses can be used with IPv6.

A VIP is a virtual IP and is commonly associated with load balancers.

Automatic Private IP Addressing (APIPA) is the IPv4 methodology by which link-local addresses are distributed.

The I/G bit of a MAC address determines whether the frame is addressed to an individual node (0) or a group (1). The latter is used for broadcast and multicast transmissions.

161
Q

What parameter can be used to calculate the optical link budget? (Select all that apply.)

SELECT ALL THAT APPLY

Splices

Attenuation

Connectors

Transmitter power

A

Splices
Attenuation
Connectors

Additional splices in the cable are budgeted at around 1 dB for mechanical and 0.3 dB for fusion.

Each connector in the path incurs a loss, usually assumed to be 0.75 dB.

Attenuation is the loss over the length of the cable, based on fiber type and the wavelength used. Single-mode has a loss of up to 0.4 dB/km, while multimode can be from 0.8 dB/km to 3 dB/km.

Transmitter power is used in calculating the power budget. The power budget is calculated from the transceiver to transmit (Tx) power and receiver (Rx) sensitivity.

162
Q

Engineers survey a newly acquired set of buildings as part of an organizational acquisition. The facilities are a few hundred yards from one another. On-site IT staff state a fiber connection between the buildings, but it has been very unreliable and often does not work. Evaluate the given options. What will the engineers conclude to be the problem?

Twinaxial

Multimode fiber

Single mode fiber

F-Type Connector

A

Multimode fiber

Multimode fiber is inexpensive to deploy compared to single mode fiber. As such, it does not support high signaling speeds or long distances as single mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs).

Single mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Twinaxial (or twinax) is similar to coax but contains two inner conductors. Twinax is used for datacenter 10 GbE.

Coaxial cables are usually terminated using F-type connectors, which are secured by screwing into place.

163
Q

An IT help desk technician troubleshoots a computer that will not connect to the network. The computer’s network adapter has the correct configuration. The technician checks the physical connection and discovers that the wall jack and network patch panel do not have a label. Which of the following tools should the technician use to locate the physical connection?

Tone generator

Packet sniffer

Spectrum analyzer

Cable tester

A

Tone generator

A network tone generator and probe are used to trace and identify a cable from one end to the other. This may be necessary when cables have not been labeled properly.

A cable tester provides detailed information on the physical and electrical properties of a cable.

Electromagnetic interference (EMI) from radio or electromagnetic sources working in the same frequency band as a Wi-Fi device can be detected with a spectrum analyzer.

A packet sniffer is a device or program that is used to monitor network communication and capture data.

164
Q

A network engineer wants all wireless clients to connect to use the same broadcast domain without connecting to another wireless network. What is this called?

Port security

Wireless client isolation

Captive portal

Guest network isolation

A

Wireless client isolation

Wireless client isolation means clients connected to a WLAN are normally within the same broadcast domain and can communicate with one another. An access point can be configured to prevent this so that stations can only communicate via their gateway. The AP drops peer-to-peer traffic.

Guest network isolation means a guest network can have separate security and forwarding policies than the network that permits access to the corporate LAN.

Port security refers to the IEEE 802.1X standard’s Port-Based Network Access Control (PNAC) mechanism. PNAC means that the switch performs some authentication of the attached device before activating the port.

Captive portal means a guest network might be configured to redirect stations to a secure web page to perform authentication.

165
Q

A security team is reviewing the authentication controls on the corporate network. Which of the following is an important reason for the team to implement role-based access and least privilege? (Select all that apply.)

SELECT ALL THAT APPLY

To establish checks and balances against insider threats.

To apply microsegmentation to systems.

To give rights to users implicitly.

To grant users sufficient rights to perform a job.

A

To give rights to users implicitly.
To grant users sufficient rights to perform a job.

Least privilege means that a user is granted sufficient rights to perform his or her job and no more. This mitigates risk if the account should be compromised and fall under the control of a threat actor.

Role-based access define organizational roles and subjects are allocated to those roles. Users gain rights implicitly (through being assigned to a role) rather than explicitly (being assigned the right directly).

Zero trust uses systems such as continuous authentication and conditional access to mitigate privilege escalation and account compromise. Another zero-trust technique is to apply microsegmentation.

Separation of duties is a means of establishing checks and balances against the possibility that critical systems or procedures can be compromised by insider threats.

166
Q

A data center architect is looking at access types and wants something that is cost-effective. They are a smaller company so they are willing to take some risks to have a lower cost. What would a good solution for them be?

Spine and leaf

On-prem

Colocation

Branch office

A

Colocation

Colocation is cost-effective but also associated with several risks. Colocation means that a company’s private servers and network appliances are installed in a data center that is shared by multiple tenants.

Branch offices may be limited in terms of low bandwidth, high latency links. This can mean having to install servers to branch locations and replicate data between them and the head office or corporate network.

An on-premises data center does not have any site redundancy and is also likely to suffer from poor performance when accessed by remote offices in different countries.

The spine and leaf is a topology that provides better support for east-west traffic and the use of SDN and overlay networks within data centers.

167
Q

A network engineer is evaluating the computer security of the system’s ability to store, transmit, and process data in a manner that is available for authorized parties to view it, that the integrity of the data is stored as intended, and that the information is handled under confidentiality. What is the name of the triad used to secure data?

Network access control

CIA

SIEM

802.1X

A

CIA

The (CIA) triad is one of the foundational principles of computer security. The systems used to store, transmit, and process data must demonstrate three confidentiality, integrity, and availability properties.

Security Information and Event Management (SIEM) is a security control designed to integrate vulnerability and threat assessment efforts through automated collection, aggregation, and log data analysis.

IEEE 802.1X Port-based Network Access Control (NAC) protocol provides the means of using an EAP method when a device connects to an Ethernet switch port, wireless access point, or VPN gateway.

Network Access Control (NAC) is a system for authenticating endpoints when they connect to the network.

168
Q

A user reports they cannot open the shared drives. After investigating the issue, the engineer found that the workstation had its network information misconfigured. The incorrect information was 255.255.255.255, instead of 255.255.255.0. What was most likely incorrectly set on the workstation?

DNS

IP address

Gateway

Subnet mask

A

Subnet mask

Subnet addressing refers to the division of a single IP network into two or more smaller broadcast domains by using longer netmasks within the boundaries of the network. Also called a subnet mask. This is usually signified by the numbering scheme 255.255.255.0 or similar.

An Internet Protocol address is used for two devices to communicate. Private network IP addresses could be 10.0.0.x or 192.168.1.x.

A Gateway address is what is used by a device to connect to a network and get traffic routed to its destination, typically the network’s primary router.

Domain Name Service is used to translate domain names (i.e. www.comptia.com) to its actual IP address.

169
Q

An Active Directory administrator is trying to identify the primary authoritative name server. What can they check to find this?

SOA

TTL

NS

TXT

A

SOA

The Start of Authority (SOA) record identifies the primary authoritative name server that maintains complete resource records for the zone.

There is only one SOA record. Other servers use NS records to identify the IP address of servers holding the domain’s resource records.

The Time to Live (TTL) is an IP header field, not a type of record. It is reduced by one every time a packet is forwarded by a router (referred to as a hop).

A TXT record is used to store any free-form text that may be needed to support other network services. A single domain name may have many TXT records.

170
Q

A company uses several Windows Servers for Active Directory, SQL Server, RADIUS, DHCP, and DNS. Management pushes to move to the cloud. IT suggests moving services in a staggered fashion as to not cause disruption. IT moves SQL server instances to the cloud as a start. IT migrates this specific function to which of the following service types?

PaaS

SaaS

Hybrid

IaaS

A

PaaS

Platform as a Service (PaaS) is a computing method that uses the cloud to provide any platform-type services. A SQL database is an example of PaaS.

Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. Office 365 is an example of SaaS.

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components.

Hybrid refers to a cloud computing solution that implements a combination of delivery models such as public, private, or a community solution.

171
Q

An attacker created a rogue access point (AP) with the same Service Set Identifier (SSID) as a legitimate one, and then used a Denial of Service (DoS) technique to overcome the legitimate AP. Users were forced to disconnect from the network and reassociate with the attacker’s AP. What is the goal of the attacker when setting up this kind of evil twin attack? (Select all that apply.)

SELECT ALL THAT APPLY

To deauthenticate client connections

To snoop on connections with web servers

To steal user network credentials

To create an encryption protocol mismatch

A

To snoop on connections with web servers
To steal user network credentials

An evil twin attack is when a threat actor stands up another access point (AP) that spoofs the legitimate AP. When users try to manually reconnect, the fake AP will be able to harvest users’ authentication information.

This evil twin may also act as a rogue AP if connected to legitimate local area network (LAN). This AP can then snoop on incoming connections to other servers and websites on the LAN.

An encryption protocol mismatch will cause wireless connections to fail, even if the correct credentials are supplied. Users are expected to connect in this case.

A deauthentication attack sends a stream of spoofed management frames to cause a client to disconnect. Users are expected to connect in this case.

172
Q

A new network device handles local printing traffic by analyzing media access control (MAC) addresses. Which device is the new device?

Hub

Switch

Router

Bridge

A

Switch

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address, which is also known as a Media Access Control (MAC) address.

A router is a hardware appliance or application that connects different networks/subnets for communication purposes, but keeps them as separate networks. A router is a layer 3 device.

A hub (also known as a dumb device) connects computers to a network in a star configuration. A hub lacks the features contained in a switch but can be used to connect devices in a local network.

A bridge is an appliance or application that connects different networks as if they were one network.

173
Q

A network administrator is designing a set of Internet Protocol (IP) addresses for a Class C network in order to lease it out to clients when booting. A set of printers will require the same IP address upon renewing the lease. Which of the following network components will support this design? (Select all that apply.)

SELECT ALL THAT APPLY

IP reservation

DHCP

DHCPv6

Virtual IP

A

IP reservation
DHCP

Dynamic Host Configuration Protocol (DHCP) provides an automatic method for allocating an IPv4 address, subnet mask, and default gateway.

IP reservation, or MAC reservation, is a mapping of the MAC address to a specific IP address within the DHCP server’s pool. The same IP address will be given to the registered MAC address of the requesting client.

DHCPv6 is DHCP for IPv6 addresses. Although similar to DHCP, DHCPv6 uses the multicast address ff:02::1:2 to discover a DHCP server.

A virtual IP is a shared IP address for the purpose of representing, for example, a group of physical routers using a Hot Standby Router Protocol (HSRP) or multiple servers configured for load balancing.

174
Q

The end-to-end or host-to-host layer is another name for which layer?

Transport

Data Link

Physical

Application

A

Transport

The Transport layer is also known as the end-to-end or host-to-host layer. It identifies each type of network application by assigning it a port number (e.g. HTTP identifies as port 80).

The Physical layer is responsible for the transmission and receipt of bits from one node to another node using some form of physical media (e.g. repeater).

The Data Link layer is responsible for transferring data between nodes on the same logical segment. A segment is one where all nodes can send traffic to one another using hardware addresses (e.g. MAC address).

The Application layer provides an interface for software programs on network hosts that have established a communications channel through the lower-level protocols to exchange data.

175
Q

When an ethernet cat-5 or cat-6 cable has individual wires crimped to the wrong spot, what is the term for this?

Cross over

Straight-through

Duplex

Incorrect pinout

A

Incorrect pinout

An incorrect pinout refers to when the individual wires within a cat-5 or cat-6 cable are not in the correct order. This can cause connections to fail unexpectedly if the issue is not known.

A straight-through cable is normally used in network connectivity that follows either the standard T568A on both ends or T568B on both ends.

A crossover cable is cabling where the transmit pair at one end is connected to the receive pair at the other.

Duplex refers to the ability of network equipment to transmit and receive data. Half-duplex means that it can send or receive one at a time, while full-duplex means it can transmit and receive simultaneously.

176
Q

A company recently set up a new wireless network for guests and vendors that does not require a network key. Users have reported that connecting to this new network fails when their device connects and automatically loads the captive portal web page. What two items should be verified in troubleshooting the captive portal setup? (Select all that apply.)

SELECT ALL THAT APPLY

VPN settings are correct

A trusted certificate is installed

Client disassociation settings

The captive portal page URL starts with https://

A

A trusted certificate is installed
The captive portal page URL starts with https://

The captive portal needs to be installed with a digital certificate issued by a certification authority (CA) trusted by the client browser.

The captive portal should use HTTPS. Most modern browsers will block redirection to sites that do not use TLS.

VPN would be a solution users may use after a successful captive portal authentication process is completed.

Disassociation is a management frame handling process by which a station is disconnected from an access point after the initial authentication process.

177
Q

A network consultant reviews and updates the policy that identifies controls and processes that enable the organization to maintain critical workflows in the face of some adverse event. What is the name of this policy/process?

Password Policy

Business Continuity Plan

Remote Access Policy

Security Policy

A

Business Continuity Plan

Business continuity planning (BCP) identifies controls and processes that enable an organization to maintain critical workflows in the face of some adverse event.

A password policy instructs users on best practices in choosing and maintaining a network access credential.

The remote access policy should then implement the measures identified through compiling the documentation.

Security policy establishes a duty for each employee to ensure the confidentiality, integrity, and availability of any data assets or processing systems that they use as part of their job. Numerous operational policies will supplement the overall security policy to govern specific areas of activity or configuration.

178
Q

A disgruntled employee used a shared login to access an organization’s customer relationship management system and delete customer information. How will the organization react?

Remote access policy

Incident response plan

Disaster recovery plan

Data loss prevention

A

Incident response plan

The company will react to the incident by following the incident response plan which sets out the procedures, tools, methods of communication, and guidelines for dealing with security incidents.

A disaster recovery plan (DRP) addresses large-scale incidents. These will typically be incidents that threaten the performance or security of a whole site.

Remote access policies are technical policy controls that govern the employees’ use of remote access privileges where employers assign the right for employees to connect to the corporate network from a remote location.

Data loss prevention (DLP) products scan content in structured formats (such as a database with a formal access control model) or unstructured formats, such as email or word processing documents.

179
Q

A network engineer performs maintenance of a collection of workstations that communicate together and provide a bridge to a cabled network segment. What type of set did they observe?

Basic Service

MIMO

Extended Service

Channel Bonding

A

Basic Service

The AP mediates communications between client devices and can also provide a bridge to a cabled network segment. In 802.11 documentation, this is referred to as an infrastructure Basic Service Set (BSS).

A network engineer can group more than one BSS in an Extended Service Set (ESS).

802.11n products can also use channels in the 2.4 GHz band or the 5 GHz band. 802.11n also allows two adjacent 20 MHz channels to be combined into a single 40 MHz channel, referred to as channel bonding.

The 802.11n standard increases bandwidth by multiplexing the signals from 2 to 4 separate antennas (a radio chain) using a collection of technologies generally referred to as Multiple Input Multiple Output (MIMO).

180
Q

Which of the following relates to a private cloud delivery model?

Utilization benefits

Multi-tenant use

Shared costs

Greater control

A

Greater control

A private cloud infrastructure is completely private to, and owned by, an organization. With private cloud computing, organizations can exercise greater control over the privacy and security of their services.

A hybrid cloud solution uses a mix of multiple cloud delivery models. One approach is to only utilize cloud services when it forecasts that private services will experience an increase in activity.

A public (or multi-tenant) cloud solution is hosted by a third-party and shared with other subscribers. There are risks regarding performance and security.

A community cloud solution is where several organizations share the costs of either a hosted private or fully private cloud.

181
Q

A user remotely connects to a company firewall to gain network access while traveling. What purpose does a RADIUS server provide for the connection?

Proxy

AAA

Client-to-site VPN

Load balancer

A

AAA

An authentication, authorization, and accounting (AAA) device provides object identification, relevant permissions, and then creates an audit trail. AAA can be deployed by using a RADIUS (Remote Authentication Dial-in User Service) server.

Client-to-site VPN connects the client over the public network to a VPN gateway (a VPN-enabled router) positioned on the edge of the local network (typically the VPN access server will be in a screened subnet). Client-to-site is the “telecommuter” model, allowing home-workers and employees working in the field to connect to the corporate network.

A load balancer distributes client requests across available systems, like server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.

A proxy server is used as a middle-man for network access, such as Internet access. A proxy can control what a system can or cannot connect to.

182
Q

An administrator is looking at a network diagram that shows the data path between a client and server. What kind of diagram is the administrator looking at? (Select all that apply.)

SELECT ALL THAT APPLY

Physical network diagram

Logical network diagram

IDF

Wiring diagram

A

Physical network diagram
Logical network diagram
Wiring diagram

A logical network diagram demonstrates the flow of data through a network and shows how devices communicate with each other.

A physical network diagram shows the physical arrangement and location of the components that make up the network and includes the hardware and cabling.

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

An Intermediate Distribution Frame (IDF) provides termination for access layer switches that serve a given area, such as a single office floor.

183
Q

A user states that phone calls external to the organization do not work. The engineer tests a phone and can only make internal calls. Which component needs troubleshooting?

Media converter

VoIP PBX

Voice gateway

VoIP gateway

A

VoIP gateway

A Voice over Internet Protocol (VoIP) gateway is a component in a VoIP phone system. This gateway, which can be software or hardware, is used to interface with a traditional analog phone system.

A Voice over Internet Protocol (VoIP) Private Branch Exchange (PBX) is the core switch that controls all functions found in a VoIP system.

Media converters are layer 1 devices and are used to convert one cable type to another. These components alter the characteristics of one type of cable to match those of another.

A voice gateway is a means of translating between a VoIP system and legacy voice equipment and networks, such as POTS lines.

184
Q

Using a Windows server, a network admin is trying to test a remote server’s network configuration and confirm the packet’s routing path. Apply the information given to determine which of the following actions will provide the appropriate information for this test. (Select all that apply.)

SELECT ALL THAT APPLY

Run a tracert command.

Run a ping command.

Run a traceroute command.

Run a netstat command.

A

Run a tracert command.
Run a ping command.

The ping command is used to perform a basic connectivity test on a remote host by sending ICMP (Internet Control Message Protocol) packets and receiving a reply message.

The tracert command is a Windows IP diagnostic utility used to trace the route taken by a packet as it hops to the destination host on a remote network.

The traceroute command is a Linux/UNIX IP diagnostic utility used to trace the route taken by a packet as it hops to the destination host on a remote network.

The netstat command is a utility to show network information on a machine running TCP/IP, notably active connections and the routing table.

185
Q

A security engineer is looking through packets to analyze possible malicious activity and is currently looking at a three-way handshake. What is the first step in that process?

Server opens connection

Client sends ACK

Server sends a SYN/ACK

TCP SYN to server

A

TCP SYN to server

The first step is for the client to send a segment with the TCP flag SYN set to the server with a randomly generated sequence number. The client enters the SYN-SENT state.

The server, currently in the LISTEN state (assuming it is online), responds with a SYN/ACK segment, containing its own randomly generated sequence number. The server enters the SYN-RECEIVED state.

The client responds with an ACK segment. The client assumes the connection is ESTABLISHED.

The server opens a connection with the client and enters the ESTABLISHED state.

186
Q

A security administrator is investigating recent logins to a server that has been compromised. Which log should the administrator audit?

Traffic logs

Syslog

Audit log

OIDs

A

Audit log

An audit log records the use of authentication and authorization privileges. It will generally record success/fail type events. An audit log might also be described as an access log or security log.

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.

Performance and traffic logs record statistics for computing, storage, and network resources over a defined period.

Object Identifiers (OIDs) are stored within a tree structure. Part of the tree is generic to SNMP, while the device vendor can define part of it as well.

187
Q

A data center technician needs to secure the cryptographic keys under lock and key to ensure that insider threats do not have access to take them from the building. What item is the most logical way to achieve this?

Locking racks

Access control vestibule (previously known as a mantrap)

Smart lockers

Locking cabinets

A

Locking cabinets

Locking cabinets can provide secure storage for individual items, such as cryptographic keys or shared password lists.

Locking racks can have whole pieces of equipment installed within them to protect against insider attacks and attacks that breakthrough perimeter security mechanisms.

Smart lockers are incorrect because their cryptographic keys need to be stored under lock and key. Smart lockers unlock via a smart card/badge or biometric.

Access control vestibule (previously known as a mantrap) is used to prevent unauthorized access to facilities by using a gateway that leads to an enclosed space protected by another barrier.

188
Q

A network admin must terminate phone lines onto a 66 block. Which tool would complete this task?

Wire stripper

Crimper

Punch down tool

Krone

A

Punch down tool

A punch down tool terminates fixed cables like a telephone cable into an IDC (insulation displacement connector). Different IDC formats include a 66 block and 110 block.

A cable crimper is used to create network cables with terminated ends such as a patch cable. Different types of crimpers are specific to the type of connector and cable.

Krone is another IDC format used to terminate twisted pair cables like a 110 block. A Krone punch down tool is specific to a Krone and cannot be used on a 110 block, and vice versa.

A wire stripper tool strips the cable jacket. They have the correct diameter to score a cable jacket without damaging the insulation wires.

189
Q

A wired layer 3 network device is not functioning properly and is experiencing intermitten packet drops. IT engineers monitor the device for anomalies. Of the possible troubleshooting approaches, the engineers should configure and use which of the following options together? (Select all that apply.)

SELECT ALL THAT APPLY

Bandwidth speed tester

Spectrum analyzer

Packet sniffer

Protocol analyzer

A

Packet sniffer
Protocol analyzer

A protocol analyzer works in conjunction with a packet sniffer. Protocol analyzers can decode a captured frame to reveal its contents in a readable format.

A packet sniffer is a device or program that is used to monitor network communication and capture data.

Electromagnetic Interference (EMI) from radio or electromagnetic sources working in the same frequency band as a Wi-Fi device can be detected with a spectrum analyzer, but is not relevant to wired devices.

While packet drops can result in bandwidth drops, a bandwidth speed tester will not be useful in identifying the cause of the packet loss.

190
Q

A network consultant wants to install software to protect the company infrastructure from outside influence. What can the consultant use to block unwanted/unauthorized access?

Firewalls

Configuration

Switches

Load Balancing

A

Firewalls

The primary function of a firewall is traffic filtering. The firewall processes traffic according to rules; traffic that does not conform to a rule that allows it access is blocked.

Switches implement the addressing and forwarding functions of the data payload. Load balancing distributes traffic between independent processing nodes.

Load balancing is a technique where servers are configured as a unit and work together to provide network services.

Configuration is the display or setup method selected to support a particular application role (web server, mail server, file/print server, and so on.)

191
Q

An administrator is installing patches on production systems and is following a detailed plan that outlines, among other things, exactly when the administrator can install the patches, how the administrator must deploy them, who approved the deployment into the production environment, and who the administrator must notify about the deployment. What is the administrator following?

Standard operating procedure

Baseline configuration

Business continuity

Change management

A

Standard operating procedure

The administrator is following a standard operating procedure (SOP) which may contain detailed steps for performing a task and identifies lines of responsibility and authorization for performing it.

A documented change management process dictates the process for approving, preparing, supporting, and managing new or updated business processes or technologies.

A baseline configuration baseline is a fixed point to which the system is set to standard. It can be the access control list applied to a firewall, for instance, or a performance baseline such as the throughput achieved by the firewall.

A business continuity plan (BCP) is a collection of processes and resources that enable an organization to maintain normal business operations in the face of some adverse event.

192
Q

An organization’s Chief Information Officer and the Chief Security Officer are assisting the legal department with writing standards that dictate the authorized use of the organization’s technology by employees, customers, and third-party vendors. What document is the organization writing?

Acceptable use policy

Bring your own device policy

Service level agreement

Business continuity plan

A

Acceptable use policy

The organization is writing an acceptable use policy (AUP) which sets out the permitted uses of a product or service. It might also state explicitly prohibited uses.

A bring your own device (BYOD) policy means that employees can use their own personal devices on the corporate network so long as it meets a minimum specification required by the company.

A business continuity plan (BCP) is a collection of processes and resources that enable an organization to maintain normal business operations in the face of some adverse event.

A service level agreement (SLA) is a contractual agreement setting out the detailed terms under which a service provider provides an ongoing service.

193
Q

A network architect reviews the statistics associated with a device in the Management Information Base and reviews each of the stored parameters. What are the individual numeric parameters named?

OIDs

Encapsulation Errors

Link State

Memory

A

OIDs

This agent maintains a database called a Management Information Base (MIB) that holds statistics relating to the device’s activity, such as the number of frames per second handled by a switch. Each parameter stored in a MIB is referred to by a numeric Object Identifier (OID). Tree structures store OIDs. Encapsulation is the frame format expected on the interface.

Encapsulation errors will prevent transmission and reception.

Most algorithms are classed as either distance vector or as link state, categorized according to the topology and metrics used to build and update a routing information base and prioritize optimal (or least-cost) paths.

Memory is considered the component of computers that temporarily stores actively used data.

194
Q

A network engineer needs to purchase a cost-effective solution for data storage that allows for sustained hot site redundancy. What would be the best site for this requirement?

NIC teaming

Cloud Site

FHRP

RTO

A

Cloud Site

For many companies, the most cost-effective solution is to move processing and data storage to a cloud site. A cloud site allows sustained hot site redundancy, which enables versatile use of a network without maintaining a series of physical servers.

Recovery time objective (RTO) is the period following a disaster when an individual IT system remains offline. This represents the maximum amount of time allowed to identify a problem and then perform recovery.

First hop redundancy protocol (FHRP) is the provisioning of failover routers to serve as the default gateway.

Link aggregation means combining separate cabled links between a host and a switch into a single logical channel. From the host end, this can also be NIC teaming.

195
Q

An employee in a branch office is accessing resources in a building at the headquarters location over a virtual private network (VPN). The gateway at the branch office establishes a VPN connection with the gateway at the headquarters office. What term correctly identifies the deployment of this VPN?

Site-to-site VPN

Virtual desktop

Split tunnel vs. full tunnel

Clientless VPN

A

Site-to-site VPN

Site-to-site VPNs are designed to work automatically so that hosts at each site do not need to be configured with PN information. The gateways exchange security information using whichever protocol the VPN is based on. This establishes a trust relationship between the gateways and sets up a secure connection to tunnel data.

Split tunnel vs. full tunnel refers to private network traffic or all network traffic routed via the VPN gateway.

Clientless VPN connections use web browsers to implement remote desktop/VPN connections.

Virtual desktop is not a type of VPN deployment model.

196
Q

Starting with Pin 1, what order of colored wires of a standard CAT6 network cable would make it comply with the T568B standard?

Orange/White, Orange, Green/White, Blue, BlueWhite, Green, Brown/White, Brown

Green/White, Green, Orange/White, Orange, Blue, BlueWhite, Brown/White, Brown

Green/White, Green, Orange/White, Blue, BlueWhite, Orange, Brown/White, Brown

Orange/White, Orange, Green/White, Green, Blue, BlueWhite, Brown/White, Brown

A

Orange/White, Orange, Green/White, Blue, BlueWhite, Green, Brown/White, Brown

The T568B standard is Orange/White, Orange, Green/White, Blue, BlueWhite, Green, Brown/White, Brown.

The T568A standard is Green/White, Green, Orange/White, Blue, BlueWhite, Orange, Brown/White, Brown.

Orange/White, Orange, Green/White, Green, Blue, BlueWhite, Brown/White, Brown can be used but is not the T568B standard.

Green/White, Green, Orange/White, Orange, Blue, BlueWhite, Brown/White, Brown can be used but is not the T568B standard.

197
Q

An administrator is looking at a plan that shows channel utilization and the wireless signal strength in each area of the building. What kind of document is this?

Floor plan

Site survey report

Port location diagram

Wiring diagram

A

Site survey report

A wireless site survey report overlays a floor plan with graphics showing signal strength and channel utilization at different points in the building.

A floor plan is a detailed diagram of wiring and port locations. Physically accurate floor plans are hard to design and are likely to require the help of an architect or graphics professional.

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A port location diagram identifies how wall ports located in work areas connect back to ports in a distribution frame or patch panel and then from the patch panel ports to the switch ports.

198
Q

Employees of a company need remote access to the corporate network by connecting to a virtual private network (VPN). To validate credentials, the network administrator suggests installing an authentication, authorization, and accounting (AAA) server. If the server and client configure the same shared secret, what protocol should be used in this scenario?

Lightweight Directory Access Protocol (LDAP)

Remote Authentication Dial-in User Service (RADIUS)

TACACS+ (Terminal Access Controller Access Control System Plus)

Directory services

A

Remote Authentication Dial-in User Service (RADIUS)

RADIUS is a way of implementing an AAA server. Remote access devices—such as VPN servers—function as client devices of the RADIUS server.

Most directory services are implementations of the Lightweight Directory Access Protocol (LDAP). LDAP is not a directory standard, but a protocol used to query and update an x.500 standard directory. LDAP is supported in current directory products such as Windows Active Directory.

TACACS+ is used in authenticating administrative access to routers and switches. TACACS+ uses reliable delivery offered by TCP making it easier to detect when a server is down.

Directory services is a network service that stores identity information about all the objects in a network, including users, groups, servers, client computers, and printers.

199
Q

To ensure that all network devices are able to synchronize the time, what protocol and port needs to be open in any security appliances or firewalls?

UDP 389

TCP 21

TCP 443

UDP 123

A

UDP 123

Time synchronization is usually accomplished via the Network Time Protocol (NTP). Clients must be able to access a time source over port UDP 123.

HTTPS uses TCP 443, better known as Secure Socket Layer (SSL), to make a secure connection.

Lightweight Directory Access Protocol (LDAP) is a protocol used to query and update an X.500-like directory. LDAP messaging uses TCP and UDP port 389 by default.

A File Transfer Protocol (FTP) client connects to TCP port 21 on an FTP server to send and retrieve file data.

200
Q

A host uses Internet Protocol version 6 (IPv6). The host sends a packet over the Internet using router advertisement. The IPv6 packets insert into Internet Protocol version 4 (IPv4) packets. The packets route over the IPv4 network to their destination. What is providing this function?

Dual-stack

Tunneling

Multicast addressing

Unique Local Addressing (ULA)

A

Tunneling

Tunneling is an alternative to dual-stack routing. Tunneling can be used to deliver Internet Protocol version 6 (IPv6) packets across the Internet Protocol version 4 (IPv4) Internet. The IPv6 packets are inserted into IPv4 packets and routed over the IPv4 network to their destination.

Dual-stack hosts can run both IPv4 and IPv6 simultaneously and communicate with devices configured with either type of address.

A multicast address identifies multiple network interfaces. Unlike IPv4, IPv6 routers must support multicast.

Unique Local Addressing (ULA) assigns addresses that are only routable within a site.

201
Q

A technician is looking at signals on the 2.4 GHz spectrum using OFDM. The technician was looking at which of the following standards?

802.11b

802.11a

802.11g

802.11n

A

802.11g

The 802.11b standard used the 2.4 GHz frequency band and was released parallel with 802.11a. It standardized the use of the carrier method Direct Sequence Spread Spectrum (DSSS).

The IEEE 802.11a standard specifies the use of the 5 GHz frequency band and a multiplexed carrier scheme called Orthogonal Frequency Division Multiplexing (OFDM). 802.11a has a nominal data rate of 54 Mbps.

Like 802.11a, 802.11g uses OFDM, but the 2.4 GHz band used 802.11b and with the same channel layout.

802.11n products can also use channels in the 2.4 GHz band or the 5 GHz band.

202
Q

What tool can be used to test ethernet cabling?

Roll over

Spectrum analyzer

Wire map

Snip

A

Wire map

Wire map testers can identify continuity, short, incorrect pin-out/incorrect termination/mismatched standards.

Snips are electrician’s sturdy scissors to cut the wire and are notched to assist with stripping insulation from the wire.

A rollover cable or console cable connects a PC or laptop to the command line terminal of a switch or router. The console port connection on the appliance is a standard RJ-45 jack (but wired differently to Ethernet).

In fiber optic cabling, an optical spectrum analyzer (OSA) is typically used with wavelength division multiplexing (WDM) to ensure that each channel has sufficient power.

203
Q

A network engineer is developing a system for prioritizing events from immediate response to long-term response. The elements are numbers from most emergent to routine. When creating these levels, what is the engineering building?

Send/Receive Traffic

Protocol Packets / Byte Count

MIBs

Logging Levels

A

Logging Levels

The logging level configured on each host determines the maximum level at which events are recorded or forwarded.

The agent is a process (software or firmware) running on a switch, router, server, or other SNMP-compatible network devices. This agent maintains a database called a Management Information Base (MIB) that holds statistics relating to the device’s activity, such as the number of frames per second handled by a switch.

Packet or byte counts are useful to monitor both packet counts and bandwidth consumption. High packet counts will incur processing load on the appliance’s CPU and system memory resources, even if the size of each packet is quite small.

Sending and receiving traffic involves the movement of information within a system.

204
Q

A network technician is NAT’ing and supernetting a Class B private address for their network. Which range should they use?

10.0.0.0 to 10.255.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

169.254.1.1 to 169.254.254.254.

A

172.16.0.0 to 172.31.255.255

172.16.0.0 to 172.31.255.255 is the Class B private address range. Private IP addresses can be drawn from one of the pools of addresses defined in RFC 1918 as non-routable over the Internet.

10.0.0.0 to 10.255.255.255 is the Class A private address range. Any organization can use private addresses on its networks without applying to a registry or ISP, and multiple organizations can use these ranges simultaneously.

If a Windows host does not receive a response from a DHCP server within a given time frame, it selects an address at random from the range 169.254.1.1 to 169.254.254.254.

192.168.0.0 to 192.168.255.255 is the Class C private address range.

205
Q

A criminal enacts a phishing scheme to trick a user into clicking a malicious link. As a result, the user is no longer able to access their work files. A popup message on the computer states that without paying a fee, the files are lost forever. Which attack type has the criminal executed on the user’s files? (Select all that apply.)

SELECT ALL THAT APPLY

Ransomware

Spyware

Pharming

Crypto-malware

A

Ransomware
Crypto-malware

Ransomware is a type of malware that tries to extort money from the victim; for instance, by appearing to lock the victim’s computer or by encrypting their files.

Crypto-malware is ransomware that encrypts data files, and the user is unable to access files without obtaining the private encryption key. This attack is difficult to mitigate unless the user has backups of the encrypted files.

Pharming redirects users from a legitimate website to a malicious one. Pharming corrupts the way the computer performs Internet name resolution.

Spyware is a type of malware that is often installed on a system without consent. This software has the capability of monitoring and capturing data for malicious purposes.

206
Q

A network administrator purchased new network switches from a vendor. Upon receiving and installing them, what should the admin do to harden the device to ensure secure device configuration of the switches? (Select all that apply.)

SELECT ALL THAT APPLY

Disable unsecure protocols.

Implement a common prevalent password.

Disable unneeded switchports.

Change default usernames and passwords.

A

Disable unsecure protocols.
Disable unneeded switchports.
Change default usernames and passwords.

Devices such as wireless access points, switches, and routers sometimes ship with a default management password. These should be changed immediately during installation.

Use secure protocols such as Simple Network Management Protocol (SNMP) version 3 (that uses encryption) rather than SNMPv1 or v2 that does not use encryption.

Disable switch ports to prevent the attachment of unauthorized client devices. You can also isolate unneeded ports to a black hole Virtual LAN (VLAN) that has not route to the network.

Users should avoid common passwords. Password database dumps give attackers a useful dictionary to work with when trying to crack credentials. Any password that could be matched to a dictionary term is completely unsecure and must not be used.

207
Q

An online company is seeing a quick customer growth in the utilization of custom online services. The company has forecasted a 300% increase of customer usage during the summer and currently cannot support this. What cloud solutions should the company consider when providing ongoing services to its customers? (Select all that apply.)

SELECT ALL THAT APPLY

SaaS

IaaS

Private model

Hybrid model

A

IaaS
Hybrid model

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components quickly. Company virtual machines can easily be moved to the cloud infrastructure during the peak season.

A hybrid cloud model provides the ability for the company to elastically move service from private to cloud infrastructure, and vice versa. This makes on-demand services cost effective.

A Software as a Service (SaaS) model would provide the provisioning of commercial software using an on-demand service such as Microsoft Office 365.

A private cloud model is built, managed, and owned by the company. The company must add physical resources at their own expense to support more customer demand.

208
Q

What are two parts of the first step of the CompTIA Network+ troubleshooting methodology? (Select all that apply.)

SELECT ALL THAT APPLY

Identify symptoms

Document findings

Escalate as necessary

Gather information

A

Identify symptoms
Gather information

The first step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes gathering information.

The first step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes identifying symptoms.

The seventh step of the CompTIA Network+ troubleshooting methodology is to document findings, actions, and outcomes. These should be saved and archived in order to help mitigate issues in the future.

The fifth step of the CompTIA Network+ troubleshooting methodology is to implement a solution or escalate as necessary. One person can not solve all issues. It sometimes takes multiple people to resolve an issue.

209
Q

A user is having trouble downloading a file from a file server. A network technician checks the connection and that ping commands are receiving replies. The technician can also browse correctly to the file server using the Windows Explorer. What should the technician begin to troubleshoot and why? (Select all that apply.)

SELECT ALL THAT APPLY

If the file application is misconfigured

Any TCP flags

The application layer

The Payload

A

If the file application is misconfigured
The application layer

The application layer is where the technician should begin to troubleshoot because the lower levels are verified to be working.

The file transfer service is a widely used service at the Application layer. The file was not downloadable, despite the technician navigating to the file using Windows Explorer. The file server application may not be configured properly for download.

Ethernet encapsulates the payload in a transimission from higher layer protocols within a protocol data unit (PDU) called a frame. This is not relevant to the solution.

Multiple TCP connections are managed using handshake transactions, which make use of a number of TCP flags.

210
Q

An engineer uses a type of network adapter to connect a fiber link to a router. The transceiver fits into an optical interface on a layer 3 Ethernet router. Of the choices, which layer 1 implementation does the engineer utilize?

Switch

Bridge

VoIP endpoint

Media converter

A

Media converter

Media converters are layer 1 devices and are used to convert one cable type to another. These components alter the characteristics of one type of cable to match those of another.

A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address which is also known as a Media Access Control (MAC) address.

A bridge is a layer 2 appliance or application that connects different networks as if they were one network.

A VoIP (Voice over Internet Protocol) endpoint is a phone system component that can be implemented as software running on a computer or smartphone, or as a dedicated traditional handset.

211
Q

The tech office is requisitioning new phones and wants to explore their options with extended service areas. When a phone travels outside of its network, what is the phone doing?

Roaming

Extended Service Set

Channel Bonding

MIMO

A

Roaming

Clients can roam within an extended service area (ESA). An ESA is created by installing APs with the same SSID and security configuration connected by a wired network or Distribution System (DS).

802.11n products can also use channels in the 2.4 GHz band or the 5 GHz band. 802.11n also allows two adjacent 20 MHz channels to be combined into a single 40 MHz channel, referred to as channel bonding.

The 802.11n standard increases bandwidth by multiplexing the signals from 2 to 4 separate antennas (a radio chain) using a collection of technologies generally referred to as Multiple Input Multiple Output (MIMO).

An Extended Service Set (ESS) groups more than one Basic Service Set (BSS) together.

212
Q

At the request of management, a senior server engineer deploys a proxy server for all users in the organization. The proxy provides many benefits for a uniform user experience and for IT management. Of the choices, which statements describe features the proxy provides? (Select all that apply.)

SELECT ALL THAT APPLY

Caching of web content

VPN access

Content filtering

Load balancing

A

Caching of web content
Content filtering

Most web proxy servers provide caching engines, which retain frequently requested web pages, negating the need to re-fetch those pages for subsequent requests.

Web proxies, act as a web security gateway. Their primary functions prevent viruses or Trojans from infecting computers from the Internet, block spam, and restrict web use to authorized sites, thereby acting as a content filter.

A load balancer distributes client requests across available systems, like server nodes in a farm or pool. Clients use the single name/IP address of the load balancer to connect to the servers in the farm.

When the functionality for supporting a Virtual Private Network (VPN) is part of a router or dedicated security appliance, it is a VPN concentrator.

213
Q

A user in the Human Resources (HR) department has opened an e-mail, and now the user’s computer is mostly unresponsive. The user has requested assistance from the IT department. A network technician has checked the network to verify that there is nothing abnormal about the network’s bandwidth. Since the network is not acting abnormally, what resources are likely being attacked on the user’s computer? (Select all that apply.)

SELECT ALL THAT APPLY

CPU usage

Jitter

Latency

Memory

A

CPU usage
Memory

High CPU utilization can indicate a problem with network traffic, or there may be a need for an upgrade.

Devices such as switches and routers perform much processing. If system memory utilization is very high, an upgrade might be required, or a network issue may be present.

Jitter is a variation in the delay. Jitter manifests itself as an inconsistent rate of packet delivery. Jitter is also measured in milliseconds (ms), using an algorithm to calculate a sample of transit times value.

Latency is the time it takes for a transmission to reach the recipient, measured in milliseconds (ms).

214
Q

A network specialist wants to use a widely accepted dial-in user service that allows access over switches, wireless networks, and virtual private networks. What dial-in user service would meet the needs of the specialist and organization?

EAP

RADIUS

CVE

TACACS+

A

RADIUS

Remote Authentication Dial-in User Service (RADIUS) is widely used for client device access over switches, wireless networks, and VPNs.

Terminal Access Controller Access Control System (TACACS+) is a similar protocol to RADIUS but designed to be more flexible and reliable.

TACACS+ was developed by Cisco but supported many of the other third-party and open-source RADIUS server implementations.

Extensible Authentication Protocol (EAP) provides a framework for deploying multiple types of authentication protocols and technologies.

215
Q

A technician is setting up an IP camera that is operating off the 802.3at standard. Which of the following should they set up for the camera?

Jumbo frame

LACP

PoE+

802.1Q

A

PoE+

803.802.3at is PoE+ which allows powered devices to draw up to about 25 W, with a maximum current of 600 mA.

The IEEE 802.1Q standard normally defines vIDs. Under 802.1Q, per-VLAN traffic is identified by a tag inserted between the Source Address and EtherType fields in the Ethernet frame.

A jumbo frame supports a data payload of up to around 9,000 bytes. This reduces the number of frames that need to be transmitted.

Link Aggregation Control Protocol (LACP) can auto-negotiate the bonded link between the switch ports and the end system.

216
Q

After troubleshooting intermittent network connectivity issues with a user, the results of an ipconfig show different network settings that the enterprise uses. What could be the cause of this result?

DHCP server is offline

A rogue DHCP server

DHCP scope exhaustion

APIPA malfunction

A

A rogue DHCP server

If two DHCP servers are running on the same subnet, clients could have an incorrect IP configuration because they have obtained a lease from a rogue server.

DHCP scope exhaustion occurs when there are no more addresses available for DHCP to distribute. In this case, the client has an address.

If DHCP servers go offline, users will continue to connect to the network for a period and, after that, start to lose contact with network services and servers as they come to try to renew a lease.

The automatic Private IP Addressing (APIPA) range of 169.254.0.0/16 is typically assigned without issue, and almost no network connectivity would happen in this case.

217
Q

An office workstation receives an Internet Protocol version 4 (IPv4) address from a Dynamic Host Configuration Protocol (DHCP) server. The IP lease includes the default gateway address which is the address of the office’s layer 3 switch. A network administrator confirmed network connectivity by pinging the gateway. At what layer of the Open Systems Interconnection (OSI) are these two devices communicating with each other when using the ping command?

Layer 2 - Data Link

Layer 3 - Network

Layer 7 - Application

Layer 6 - Presentation

A

Layer 3 - Network

Layer 3 is the network layer. Information is sent using logical network addresses (e.g. IP address). The ping command in this case uses the IP address of the remote host to communicate and test network connectivity.

Layer 2 is the data link layer. It is responsible for transferring data between nodes on the same logical segment using local or hardware addresses such as a Media Access Control (MAC) address.

Layer 6 is the presentation layer. It transforms data between the format required for the network and the format required for the application.

Layer 7 is the application layer. It provides an interface for software that has established communications through lower-level protocols to exchange data.

218
Q

An attacker spoofed a banking website and then emailed users of the genuine website, informing them that users must update their password. Users then authenticated to the spoofed site, and the attacker captured the user’s logon credentials and installed malicious software on their computers. The attacker created a peer-to-peer botnet control network from this malicious activity, where the software and control mechanisms update to evade detection and removal. Which type of attack did the users fall victim to?

Distributed denial of service

Phishing

On-path

VLAN hopping

A

Phishing

A phishing campaign can include an attacker that use a spoof website to imitate a bank site and emails users to log in and update their bank information on the fake website with a link. The fake website will then capture logon credentials.

Distributed Denial of service (DDoS) happened after the users fell victim to phishing attacks. DDoS is launched simultaneously by multiple hosts that aim to consume network bandwidth to deny access.

An on-path attack is where a threat actor compromises the connection between two hosts and transparently intercepts and relays all communications between them.

Virtual LAN (VLAN) hopping is an attack designed to send traffic to a VLAN other than the one the host system is in.

219
Q

In a Cisco switch, what would be the command to show what the device’s settings are?

show route

show interface

show config

nmap

A

show config

Show config displays the switch’s configuration. The startup configuration (show startup-config) could be different from the running configuration (show running-config).

Show interface lists the state of all interfaces or the specified interface. Interfaces are identified by type, slot, and port number. For example, GigabitEthernet 0/2 (or G0/2) is port #2 on the first 10/100/1000 slot (or only slot). An interface has a line status and a protocol status.

The show route, show ip route, show ipv6 route or similar command will output the active routing table.

The Nmap Security Scanner is widely used for IP scanning, both auditing and penetration testing tools.

220
Q

What type of Domain Name System (DNS) record holds information such as 2001:4860:4860:8888?

MX

A

SRV

AAAA

A

AAAA

An AAAA record performs the same function as an A record, but for resolving a host name to an IPv6 address.

An A record is used to resolve a host name to an IPv4 address. This is the most common type of record in a Domain Name System (DNS) zone.

A Service (SRV) record is used to identify a record that is providing a network service or protocol. It is often used to locate Voice over Internet Protocol (VoIP) or media servers.

A Mail Exchanger (MX) record is used to identify an email server for the domain. In a typical network, multiple servers are installed to provide redundancy, and each one will be represented with an MX record.

221
Q

A network technician needs to set up the ability to auto-negotiate a bonded link between the switch ports and the end system. Which of the following should they set up?

Port Mirroring

Spanning Tree

MDI-X

LACP

A

LACP

Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.

Port mirroring copies all packets sent to one or more source ports to a mirror (or destination) port.

The Spanning Tree Protocol (STP) is a means for the bridges or switches to organize themselves into a hierarchy. The switch at the top of the hierarchy is the root.

When Ethernet is wired with a hub, there must be a means of distinguishing the interface on an end system versus an intermediate system. The interface on the hub is called an MDI crossover (MDI-X).

222
Q

Network administrators are concerned that social engineering tactics may allow external threat actors to retrieve confidential user information to access the network. When combined with spoofing techniques, what type of attack can persuade or trick users into interacting with a malicious resource disguised as a trusted one?

Tailgating

Piggybacking

Phishing

Shoulder surfing

A

Phishing

Phishing is a combination of social engineering and spoofing. It persuades or tricks the target into interacting with a malicious resource disguised as a trusted one, traditionally using email as the vector.

Tailgating is a means of entering a secure area without authorization by following closely behind the person that has been allowed to open the door or checkpoint.

Piggybacking is when an attacker enters a secure area with an employee’s permission. For instance, an attacker might impersonate a member of the cleaning crew and request that an employee hold the door open.

Shoulder surfing is when a threat actor can learn a password or PIN (or other secure information) by watching the user type it.

223
Q

A security specialist wants to enhance a company’s physical security because of some failing detection-based security controls. If the network infrastructure is already in place, what is a relatively inexpensive detection-based control and effective deterrent that can improve the resilience of the perimeter gateway?

Video surveillance

Iris scanner

Fingerprint scanner

Smart badge reader

A

Video surveillance

Camera-based surveillance is a cheaper means of monitoring than maintaining separate guards at each perimeter gateway or zone. These cameras can be easily connected to already available IP-based network.

A smart badge comes with an integrated chip and data interface that stores the user’s key pair and digital certificate. This type of security system requires additional resources to implement that will increase cost.

A biometric device is activated by human physical features, such as a fingerprint. Each user’s biometric is recorded as a template and stored on an authentication server, which requires additional resources.

A biometric device includes iris scanners. This requires additional resources.

224
Q

The marketing office reported issues regarding slow network connectivity to the Internet and inability to access the company’s SharePoint site. All marketing users on the 7th floor offices are getting an “HTTP 404” warning. What is the best way the network admin can approach this incident to identify the problem?

Make a plan of action to resolve the issue.

Begin at Layer 3 of the OSI model and go down.

Question all users on the 7th floor.

Work on the slow Internet connection first.

A

Work on the slow Internet connection first.

The network admin must approach multiple problems individually. Although issues with the slow Internet and the “HTTP 404” error may seem the same, both may be caused by different factors. Treat each issue separately.

Questioning users will help with identifying the problem. However, questioning all users on the 7th floor is not an efficient use of time.

A divide and conquer approach to an issue occurs when establishing a theory of the probable cause. Start with the layer of the OSI (open systems interconnection) model where the problem most likely resides, then go down or up the layers. This may be time-consuming.

A plan of action would only occur after the cause of the issue has been confirmed through test(s).

previous
finish review

225
Q

Which of the following statements associated with audit logs are true? (Select all that apply.)

SELECT ALL THAT APPLY

Logs only provide for successful login attempts.

Logging provides evidence of accountability.

Logging provides for non-repudiation.

Logging cannot identify an attacker.

A

Logging provides evidence of accountability.
Logging provides for non-repudiation.
Logging cannot identify an attacker.

The accounting function in authentication, authorization, and accounting (AAA) is generally performed by logging subject and object activity. Network operating system (NOS) and other applications and services can configure to log events. The main decision is which events to record.

Logging is part of the accounting function in AAA. Accounting provides for non-repudiation (that is, a user cannot deny that they accessed or made a change to a file).

Audit logs typically associate an action with a particular user. This is one of the reasons that it is critical that users not share logon details. If a user account is compromised, there is no means of tying events in the log to the actual attacker.

Logs can detect intrusions and records failure-type events which are likely to be useful. Success type events can also be revealing if they show unusual access patterns.

226
Q

On the multi-floor office, the staff is deploying multiple switches and there must be multiple broadcast domains. The Layer 2 switch with a single broadcast domain requires more bandwidth as more hosts are connecting to it. How can these switches be set up to accommodate the network architecture?

Configure multiple VLANs.

Setup port mirroring.

Setup each port as a trunk port.

Setup Spanning Tree Protocol.

A

Configure multiple VLANs.

VLAN can reduce broadcast traffic when a network has expanded beyond a certain number of hosts or users. From a security point of view, each VLAN can represent a separate zone.

The interconnections between switches are referred to as trunks. A basic setup will use one of the ports on each switch as a trunk port. Multiple VLANs can pass through these trunk ports by tagging each packet with the appropriate VLAN tag or ID.

Port mirroring copies ingress and/or egress communications from one or more switch ports to another. This is used for monitoring purposes.

Spanning Tree Protocol (STP) is switching protocol that prevents network loops.

227
Q

Two Windows hosts connected to a switch are contending to respond to ARP (Address Resolution Protocol) queries. Only one of the hosts is receiving network traffic. Determine the most likely cause of this issue.

Duplicate IP address

Incorrect gateway

Expired IP address

Duplicate MAC address

A

Duplicate MAC address

A duplicate Media Access Control (MAC) address will cause both hosts to contend with each other when responding to Address Resolution Protocols (ARP) queries. As a result, communications could be split between them or reach only one of the hosts.

If Windows detects a duplicate IP (Internet Protocol) address it will display a warning and disable IP traffic. In this case, network traffic is still occurring.

An expired IP addresses forces a client to renew its IP lease with any available DHCP (Dynamic Host Configuration Protocol) server. This does not apply to ARP requests.

A default gateway setting is meant to provide a path for the client to communicate outside of its subnet. The current issue resides at Layer 2 of the Open Systems Interconnection (OSI) model.

228
Q

Simulate the use of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA).

Nodes share the same broadcast address.

Multiple layer 2 broadcast domains are on the same switch.

Two nodes send communications on the same media and the node sends a jam signal.

A node waits until media is clear before transmitting packets.

A

A node waits until media is clear before transmitting packets.

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol uses schemes such as “request to send” to gain access to the media. Nodes listen to the media before transmitting, and transmit when the media is clear. A node wanting to transmit, but detecting activity, must wait and try later.

CSMA with Collision Detection (CSMA/CD) protocol defines methods for detecting a collision. When a signal is present on the interface transmit and receive lines simultaneously, the node broadcasts a jam signal.

Virtual Local Area Network (VLAN) is a means of creating separate layer 2 broadcast domains on the same switch or configuring separate broadcast domains across distributed switches.

Nodes that share the same broadcast address are within the same broadcast domain.

229
Q

An engineer is working on upgrading an aging network within the office. Most of the network cabling was installed nearly 20 years ago. The network runs into issues where users cannot efficiently access their emails, shared drives, and the internet. What is the aging network contributing to?

Multicast flooding

Routing loops

Network performance issues

Network performance baselines

A

Network performance issues

Network performance issues can cause connectivity to seem sluggish, preventing users from accessing local resources and the internet.

A network performance baseline is a report showing the base performance of a given network before it is used. This can help in troubleshooting issues on the network in the future.

A routing loop occurs when two routers use one another as the path to a network. Packets are caught in a routing loop circle around until the TTL expires. One symptom of a potential routing loop is for routers to generate ICMP Time Exceeded error messages.

At layer 2, if a switch is not multicast-aware, it will treat multicast transmissions as broadcasts and flood them across all ports in the broadcast domain.

230
Q

What step of the CompTIA Network+ troubleshooting methodology involves approaching multiple problems individually?

5

2

4

1

A

1

The first step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes approaching multiple problems individually and determining if anything has changed.

The second step of the CompTIA Network+ troubleshooting methodology is establishing a theory of probable cause. This involves questioning the obvious and considering multiple approaches.

The fourth step of the CompTIA Network+ troubleshooting methodology is to establish a plan of action to resolve the problem and identify potential effects.

The fifth step of the CompTIA Network+ troubleshooting methodology is to implement a solution or escalate as necessary.

231
Q

An engineer suggests running fiber cable for a project. Which type allows for a longer distance?

Single-mode

CWDM

DWDM

BWDM

A

Single-mode

Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Bidirectional (BiDi) transceivers support transmit and receive signals over the same strand of fiber. This uses WDM (Wavelength Division Multiplexing).

Dense Wavelength Division Multiplexing (DWDM) provisions greater numbers of channels than CWDM (20, 40, 80, or 160).

Coarse Wavelength Division Multiplexing (CWDM) supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over a single fiber strand.

232
Q

A system has a network of ASICs (Application-Specific Integrated Circuits) computing nodes organized into a cluster for training Artifical Intelligence (AI) models. There are 64 devices running non-stop. In a period of 48 hours, two of the devices failed. Calculate the Mean Time Between Failures (MTBF) for the Service Level Agreement (SLA).

(48*64)/2=1536

(2*48)+64=160

(64-48)*2=32

(64+48)/2=56

A

(48*64)/2=1536

The MTBF (Mean Time Between Failures) is the total time divided by the number of failures. Therefore, 64 devices times 48 hours divided by two failures equals 1,536 hours, or 64 days. This indicates that on average, when following an individual device, it will fail in about 1536 hours or 64 days.

Multiplying the number of failures by the number of hours, and then adding the number of devices, does not give a meaningful result.

Subtracting the number of hours from the number of devices, and then multiplying by the number of failures, does not give a meaningful result.

Adding the number of devices to the number of hours, and then adding the dividing by the number of failures, does not give a meaningful result.

233
Q

A network specialist received a port failure notification on UDP port 162. What agent is detecting the notable event?

Syslog

Traps

CPU

OIDs

A

Traps

A Trap is an agent that informs the monitor of a notable event (port failure, for instance). The threshold for triggering traps can be set for each value. Device queries take place over UDP port 161; traps are communicated over UDP port 162.

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.

The Central Processing Unit (CPU) refers to the component in a device that executes commands given to it by a program or operating system.

Each parameter stored in a MIB is referred to by a numeric Object Identifier (OID). A tree structure stores OIDs.

234
Q

A systems administrator is attempting to set up a framework for deploying multiple types of authentication protocols and technologies. Which of the following should they use?

Kerberos

TACACS+

EAP

SSO

A

EAP

Extensible Authentication Protocol (EAP) provides a framework for deploying multiple types of authentication protocols and technologies.

Kerberos provides SSO authentication to Active Directory®, as well as compatibility with other, non-Windows operating systems.

A single sign-on (SSO) system allows the user to authenticate once to a local device and be authorized to access compatible application servers without having to enter credentials again.

TACACS+ is used in authenticating administrative access to routers and switches.

235
Q

A network technician is troubleshooting network issues between a workstation and a virtual server running a beta application. Network performance is lacking and there seems to be issues in between the source and destination. Which command will provide the technician with the best information regarding other nodes between the workstation and the remote host?

pathping

arp

dig

route

A

pathping

The pathping command performs a trace route, then it pings each hop router a given number of times for a given period to determine the Round Trip Time (RTT) and measure link latency more accurately. The output also shows packet loss at each hop.

The route command is a command utility to configure and manage the routing table on a Windows or Linux host.

The arp command performs the task of resolving an Internet Protocol (IP) address to a hardware address. It can also be used to troubleshoot the arp table cache to diagnose local addressing issues.

The dig command is a command-line tool like nslookup that queries Domain Name System (DNS) servers and provides detailed information about record lookups.

236
Q

A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator implement on the servers to validate the server’s identity and establish a secure transmission channel?

Single Sign-On (SSO)

Certificates

Local authentication

Kerberos

A

Certificates

Digital certificates authenticate server machines when using Transport Layer Security (TLS). An administrator installs the certificates on a web or email server to validate its identity and establish a secure transmission channel.

With Kerberos, clients request services from a server, which rely on an intermediary—a Key Distribution Center (KDC)—to vouch for their identity. Also, Kerberos does not use Transport Layer Security (TLS).

Local authentication methods typically require username and password credentials to log on locally to a network or host.

Single Sign-On (SSO) means that a user only has to authenticate to a system once to gain access to all its resources (that is, all the resources to which the user has been granted rights).

previous

237
Q

Which cable type can be rated fire-retardant and is appropriate for building crawl spaces?

F-type

PVC

Plenum

Coaxial

A

Plenum

A plenum is a space above false ceilings in an office used by HVAC systems and wiring. Plenum-rated cable is fire retardant. Plenum-rated cable uses treated polyvinyl chloride (PVC) or fluorinated ethylene polymer.

General-purpose cabling, such as non-plenum, uses polyvinyl chloride (PVC) jackets and insulation.

Some coax installations use F-type connectors. For example, a broadband cable internet access service is likely to use this connector. F-connectors come in a secure screw-on form or as a non-threaded slip-on connector.

Coaxial, or coax, the cable is made of two conductors that share the same axis, hence the name (“co” and “ax”). The core conductor of the cable is made of copper wire (solid or stranded) and is enclosed by plastic insulation (dielectric).

238
Q

A user is trying to gain access to a company’s open wireless and had received a temporary username and password to use. However, the user can’t reach the portal to input the credentials. What is the most likely cause of the issue?

The portal is not using a trusted certificate

Guest network isolation

MAC filtering

IoT access issues

A

The portal is not using a trusted certificate

Most modern browsers will block redirection to sites that do not use TLS. This means that the captive portal also needs to be installed with a digital certificate issued by a certification authority (CA) that is trusted by the client browser.

Typically, a guest network is permitted access to the Internet but not to local servers. Most SOHO routers come with a preconfigured guest network.

Internet of Things typically refers to embedded systems and is used within many sectors of industry, including energy generation and distribution, mining, etc.

MAC filtering is not typically applied to a guest network, that would defeat the purpose of having a guest network.

239
Q

A network consultant reverting a system to a known exemplary configuration realizes that a change in the network environment is required. Which plan/procedure will the consultant follow?

BYOD Policy

Disaster Recovery Plan

Change Management

Incident Response Plan

A

Change Management

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way. If reverting to a known good configuration, then implement a solution directly. If the solution requires changes to the system or network environment, it will likely follow a change management plan.

A disaster recovery plan (DRP) addresses large-scale incidents. These will typically be incidents that threaten the performance or security of a whole site.

An incident response plan sets out the procedures, tools, methods of communication, and guidelines for dealing with security incidents.

BYOD policies allow employee phones to be used on the corporate network if they meet the company’s minimum specification (in OS version and functionality).

240
Q

Upon reviewing the protocols designed for real-time services, a network specialist reviews the system to ensure voice and video communications are free from problems, dropped packets, delays, and jitter. What is the specialist reviewing?

Administrative Distance

RIP

QoS

Default Route

A

QoS

Quality of Service (QoS) provides information about the connection to a QoS system, which in turn ensures that voice or video communications are free from problems, such as dropped packets, delay, or jitter.

Routing information protocol (RIP) is a distance vector-based routing protocol that uses a hop count to determine the least-cost path to a destination network.

Administrative distance (AD) is a metric determining the trustworthiness of routes derived from different routing protocols.

A default route is an entry in the routing table to represent the forwarding path used if no other entries match another routing table entry.

241
Q

A network consultant implements a switch port security feature that will block router advertisement packets from unauthorized sources. What is the name of this feature?

RA guard

Captive portal

MAC filtering

Port security

A

RA guard

With Router Advertisement Guard (RA Guard), switchport security feature blocks router advertisement packets from unauthorized sources.

As with a switch, an access point can be configured with an accept or deny list of known MAC addresses.

Port security refers to the IEEE 802.1X standard’s Port-Based Network Access Control (PNAC) mechanism. PNAC means that the switch performs some authentication of the attached device before activating the port.

Captive portal means a guest network might be configured to redirect stations to a secure web page to perform authentication.

242
Q

A network administrator is upgrading systems. He wants to ensure the system is as secure as possible against attacks resulting from flaws in software. Anaylze and determine which procedures the admin should implement to best manage the installation of updates such as hardware, firmware and software.

Installing a hotfix

Using a file hash

Use secure protocols

Implementing patch management

A

Implementing patch management

Patch management refers to the procedures put in place to manage the installation of updates for hardware (firmware) and software.

A secure hash algorithm is a means of fingerprinting a file to prove the integrity of a downloaded file. If the hashes do not match what the developer published, one should not trust the file.

A hotfix is an update designed for and released to certain customers only, though they may be included in later service packs.

When using a secure channel, such as Secure Shell (SSH) or HTTP, over SSL/TLS, the communications are protected by the host’s private key.

243
Q

An attacker used a malicious host with a spoofed physical address to perform cache poisoning and perpetuate an on-path attack. Which of the following can prevent these types of attacks? (Select all that apply.)

SELECT ALL THAT APPLY

Media Access Control (MAC) filtering

Dynamic Host Configuration Protocol (DHCP) snooping

Port-based Network Access Control (PNAC)

Address Resolution Protocol (ARP) inspection

A

Dynamic Host Configuration Protocol (DHCP) snooping
Address Resolution Protocol (ARP) inspection

ARP inspection prevents a host attached to an untrusted port from flooding the segment with gratuitous ARP replies. ARP inspection maintains a trusted database of IP:ARP mappings.

DHCP snooping is a type of switch port security setting that inspects DHCP traffic arriving on access ports to ensure that a host is not trying to spoof its MAC address.

MAC filtering on a switch means defining which MAC addresses are permitted to connect to a port, and helps protect against eavesdropping and guards against MAC flooding attacks.

PNAC ensures only valid hosts are connecting to the network, and that the switch (or router) performs some sort of authentication of the attached device before activating the port.

244
Q

Upon reviewing the inclement weather plan for Company A, the network engineer wants to purchase standby power supplies that can run on diesel or propane. What could the engineer purchase to fulfill this requirement?

Multipathing

HVAC

Fire Suppression

Generator

A

Generator

A generator is a standby power supply fueled by diesel or propane. A UPS must provide transitionary power in a power outage, as a network engineer cannot cut in a backup generator fast enough. Also called a backup generator.

Heating, ventilation, air conditioning (HVAC) are control systems that maintain an optimum heating, cooling, and humidity level working environment for different parts of the building.

Multipathing means that a network node has more than one physical link to another node.

Fire suppression systems work based on the fire triangle. The fire triangle works based on the principle that fire requires heat, oxygen, and fuel to ignite and burn.

245
Q

A network administrator has identified a network misconfiguration on a host and has prepared a plan to resolve it. After implementing the solution, what course of action should the administrator execute next?

Document outcomes.

Check sysem functionality.

Escalate the problem.

Duplicate the problem.

A

Check sysem functionality.

After applying a solution, validate that it fixes the reported problem and that the system continues to function normally. Identify the results and effects of the solution.

Documentation happens at the close of the support when all normal system functionality has been verified. Documenting findings, actions, and outcomes can help find and solve issues faster in the future.

Escalating the problem occurs when you cannot prove the cause of the problem and support must be sent to the next tier level. An escalated issue is an unresolved issue.

Duplicating a problem is a course of action commonly used when trying to identify the problem. A successful duplication usually provides a way forward to resolution.

246
Q

A network technician is implementing a software-defined network. Which of the following layers would apply business logic to make decisions about how traffic should be prioritized?

Application

Access

Management

Infrastructure

A

Application

The application layer applies the business logic to make decisions about how traffic should be prioritized and secured and where it should be switched.

A management plane sits at the same level as the control plane to interface with the operational plane.

The infrastructure layer is devices that handle the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security.

The access or edge layer allows end-user devices, such as computers, printers, and smartphones to connect to the network.

247
Q

An engineer installs fiber cable between two buildings on a large company campus. Which type of fiber optic cable does the engineer use?

F-type

Multimode

Single-mode

UPC or QSFP+

A

Single-mode

Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support high signaling speeds or long distances as single-mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs).

A broadband cable Internet access service is likely to use this connector. F-connectors come in a secure screw-on form or as a non-threaded slip-on connector and are used with RG-59 and RG6 coaxial cable.

UltraPhysical Contact (UPC) means that the cable and connector are polished to a high standard. Quad small form-factor pluggable (QSFP) is a transceiver form factor that supports 4 x 1 Gbps links.

248
Q

A network consultant is doing IT contingency planning and is trying to identify likely points of failure for the network. Which of the following would the consultant identify as Single Points of Failure in need of upgrades for added redundancy? (Select all that apply.)

SELECT ALL THAT APPLY

There is a single power supply for a critical server.

There is a lack of a load balancing device.

The main server is set up for full backup operations.

A backup power generator is available on-site.

A

There is a single power supply for a critical server.
There is a lack of a load balancing device.

Any critical servers, nodes or other critical network components should have redundant power supplies. A single power supply to a critical component is a single point of failure, which should be avoided.

Load balancing devices should be used in any critical network.

Backup generators are a good way to implement redundancy. If one is available, then this is good and does not need to be addressed by the consultant.

All critical servers or file hosts should have some regular backup protocol implemented. If the main server is set up for full backup operations, then backup operations do not need to be addressed by the consultant.

249
Q

A safety specialist reviews and updates the plan that addresses large-scale incidents that threaten the performance or security of the whole site. What is the name of this plan?

SLA

Disaster Recovery

SOP

Site Survey

A

Disaster Recovery

A disaster recovery plan (DRP) addresses large-scale incidents. These will typically be incidents that threaten the performance or security of a whole site.

A service level agreement (SLA) is a contractual agreement setting out the detailed terms of an ongoing provided service.

A wireless site survey report overlays a floor plan with graphics showing signal strength and channel utilization at different points in the building.

A standard operating procedure (SOP) in a fully documented environment will govern each task. An SOP sets out the principal goals and considerations, such as budget, security, or customer contact standards, for performing a task and identifies lines of responsibility and authorization for performing it.

250
Q

A system administrator does not have time to walk from user to user location throughout the campus, helping them troubleshoot their computer problems. All users on the campus are connected to the same WAN. What technology can the system administrator leverage to troubleshoot remote systems from their desk?

Site-to-site VPN

Remote desktop connection

Split tunnel vs. full tunnel

In-band vs. out-of-band management

A

Remote desktop connection

Remote desktop connections allow an administrator to configure a server or a user to operate a computer remotely.

Site-to-site VPN is incorrect because VPNs alone provide secured communications between WANs and do not enable remote systems control.

Split tunnel vs. full tunnel is incorrect; this answer indicates which traffic is routed via a VPN gateway.

In-band vs. out-of-band management is incorrect because it refers to managed and unmanaged network appliances. An appliance that is managed can be managed via a console port, aux port, or management port. Device management can be done in-band, over a link that shares traffic with other communications on the network, or out-of-band over a console cable.

251
Q

A company uses an ad-hoc topology where the wireless adapter allows connections to and from other devices. What is the name of this ad-hoc topology?

Independent Basic Service Set (Ad-Hoc)

LTE

CDMA

Omni

A

Independent Basic Service Set (Ad-Hoc)

In an ad hoc topology, the wireless adapter allows connections to and from other devices. In 802.11 documentation, this is called an Independent Basic Service Set (IBSS).

Code Division Multiple Access (CDMA) means that each subscriber uses a code to key the modulation of their signal and this “key” is used by the receiver to extract the subscriber’s traffic from the radio channel.

The antenna type determines the propagation pattern or shape of the radio waves transmitted. Most wireless devices have simple omnidirectional vertical rod-type antennas, which receive and send signals in all directions more-or-less equally.

Long Term Evolution (LTE) is a converged 4G standard supported by GSM and CDMA network providers.

252
Q

An IT engineer uses the Nmap utility to document a network. The documentation will then help the engineer plan network improvements. Which of the following describes the use of Nmap for this purpose?

Route discovery

Systems hardening

Packet capturing

Logical to physical address mapping

A

Systems hardening

The Nmap Security Scanner is widely used for scanning remote hosts and networks, both as an auditing and a penetration testing tool. Results can be used to harden systems.

The pathping utility can be used to perform a trace route, then ping each hop router a given number of times for a given period to determine the Round Trip Time (RTT) for the path.

The Address Resolution Protocol (ARP) command is used to perform the task of resolving a logical Internet Protocol (IP) address to a physical hardware address.

The command-line packet sniffing utility tcpdump can be used to sniff packets on a network for troubleshooting or security purposes.

253
Q

A security professional is looking at activity from a device on 190.168.155.144. What class does this IP belong to?

C

B

D

Private

A

B

The first octet for Class B falls from 128 – 191 and the netmask is 255.255.0.0 (/16). There are 16,000 Class B networks, each containing up to about 65,000 hosts.

The first octet for Class C falls from 192 – 223 and the netmask is 255.255.255.0 (/24). Class C networks support only 254 hosts each.

Class D addresses (224.0.0.0 through 239.255.255.255) are used for multicasting.

Private ranges are from 10.0.0.0 to 10.255.255.255 (Class A), 172.16.0.0 to 172.31.255.255 (Class B), and 192.168.0.0 to 192.168.255.255 (Class C). Private addresses are defined in RFC 1918 as non-routable over the Internet.

254
Q

A network architect is architecting a software-defined network and is currently working on the area which interfaces with implementing device states, such as CPU and memory utilization. Which layer or plane is this?

Management

Data

Control

Operational

A

Operational

A management plane sits at the same level as the control plane to interface with the operational plane. This is used to implement monitoring of traffic conditions and network status.

The operational plane implements device states, such as CPU and memory utilization.

The infrastructure layer is devices that handle the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security.

The distribution or aggregation layer provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks.

255
Q

A company has recently decided to allow employees to use their smartphones for work-related matters. A network specialist creates and disseminates a policy surrounding this decision. What is the name of this policy?

BYOD policy

Rack Diagram

System Life Cycle

Wiring Diagram

A

BYOD policy

Some companies operate on a bring your own device (BYOD) policy. BYOD means that the employee owns the mobile device and can be used on the corporate network so long as it meets a minimum specification required by the company (in terms of OS version and functionality).

A system life cycle roadmap refers to the controlled acquisition, deployment, use, and decommissioning of assets.

A wiring diagram (or pin-out) shows detailed information about the termination of twisted pairs in an RJ-45 or RJ-48C jack or Insulation Displacement Connector (IDC).

A rack diagram records the position of each appliance in the rack.

256
Q

When an internet customer wants to set up a small office/home office (SOHO) network, what are the main concerns with using a Pre-Shared Key (PSK) wireless local area network (WLAN) authentication to encrypt communications? (Select all that apply.)

SELECT ALL THAT APPLY

Distribution of the key or passphrase cannot be secured.

Periodically changing the key is difficult.

A Pre-Shared Key (PSK) fails to provide accounting.

A Pre-Shared Key (PSK) is difficult to set up in general.

A

Distribution of the key or passphrase cannot be secured.
Periodically changing the key is difficult.
A Pre-Shared Key (PSK) fails to provide accounting.

A pre-shared key (PSK) means using a passphrase to generate the key that encrypts communications. However, with PSK, distribution of the key or passphrase cannot secure properly, and users may choose unsecure phrases.

A pre-shared key (PSK) is also referred to as group authentication because a group of users shares the same secret. Therefore, PSK fails to provide accounting, as all users share the same key.

With a pre-shared key (PSK) users may choose unsecure phrases. However, changing the key periodically, as would be good security practice, is difficult.

The advantage of a pre-shared key (PSK) is that it is simple to set up. A PSK is generated from a passphrase, which is like a long password.

257
Q

An attacker plants a device in a native subnet and sends traffic to a computer on an external subnet to perform a denial of service (DoS) attack against the host in the external subnet. What type of attack is this?

On-path

VLAN hopping

Deauthentication

Brute-force

A

VLAN hopping

VLAN hopping is designed to send traffic to a VLAN other than the one the host system is on. Such an attack can only send packets one way but could be used to perform a DoS attack against a host on a different VLAN.

A brute force attack is a password attack where an attacker uses an application to try every alphanumeric combination to crack encrypted passwords.

An on-path attack is where a threat actor compromises the connection between two hosts and transparently intercepts and relays all communications between them.

A deauthentication attack sends a stream of spoofed deauth frames to cause a client to deauthenticate from an access point. This allows an attacker to sniff information.

258
Q

A network technician is setting up a router in a central office that connects multiple tunneled remote sites. What type of device is this?

Proxy server

Load balancer

DSL Modem

VPN headend

A

VPN headend

A network technician installed a VPN headend in the central office or hub. It needs to be a powerful machine capable of aggregating high traffic volumes.

A load balancer can be deployed as a hardware appliance or software instance to distribute client requests across server nodes in a farm or pool.

A proxy server fulfills requests for Internet resources on behalf of clients. The network technician must configure the proxy server itself with a public IP address on the external-facing interface.

A DSL modem is installed as CPE, typically as a multifunction “wireless router.” The RJ-11 WAN port connects to the provider’s phone jack over a short length of ribbon cable.

259
Q

A computer uses a dictionary of vulnerabilities in published operations and application software (cve.mitre.org). What is the name of this dictionary?

External

Internal

Honeypot

CVE

A

CVE

Common Vulnerabilities and Exposures (CVE) is a dictionary of vulnerabilities in published operating systems and applications software (cve.mitre.org). Automated vulnerability scanning software makes use of this dictionary to develop tests to discover vulnerabilities on live systems.

External is anything that is outside of the environment, such as a network or system. It can also be associated with external attackers to the organization’s network or system.

A honeypot is a computer system set up to attract attackers, intending to analyze attack strategies and tools, provide early warning of attack attempts, or possibly as a decoy to divert attention from actual computer systems.

Internal is anything that is inside the environment, such as a network or host.

260
Q

Which of the following options are reasons to NOT use Wi-Fi Protected Access 2 (WPA2)? (Select all that apply.)

SELECT ALL THAT APPLY

WPA2 is not supported by some adapters.

WPA2 is not supported by some access points (APs).

WPA2 is not supported by some operating systems.

WPA2 devices cannot be upgraded.

A

WPA2 is not supported by some adapters.
WPA2 is not supported by some access points (APs).
WPA2 is not supported by some operating systems.

WPA2 is fully compliant with the 802.11i WLAN security standard. One of the only reasons not to use WPA2 is if it is not supported by adapters.

WPA2 is fully compliant with the 802.11i WLAN security standard. One of the only reasons not to use WPA2 is if it is not supported by access points (APs).

WPA2 is fully compliant with the 802.11i WLAN security standard. One of the only reasons not to use WPA2 is if it is not supported by operating systems on the network.

The only reason not to use WPA2 is if it is not supported by adapters, APs, or operating systems on the network. Often, devices will be compatible with a firmware or driver upgrade.

261
Q

An attacker drives around town with a wireless laptop, scanning for unsecure wireless local area networks (WLANs). Which of the following is an encryption scheme that is least vulnerable to this type of war driving?

Wi-Fi Protected Access (WPA)

Wired Equivalent Privacy (WEP)

Wi-Fi Protected Access 2 (WPA2)

Wi-Fi Protected Access (WPA) IEEE 802.1X

A

Wi-Fi Protected Access 2 (WPA2)

War driving means driving around with a wireless-enabled laptop scanning for unsecure WLANs. Wi-Fi Protected Access 2 (WPA2) is fully compliant with the 802.11i WLAN security standard, and is currently the most secure.

Wi-Fi Protected Access (WPA) is designed to fix the security problems with Wired Equivalent Privacy (WEP), and uses Temporal Key Integrity Protocol (TKIP) to make it stronger, but is not as secure as WPA2.

Wired Equivalent Privacy (WEP) is Wi-Fi’s original security mechanism, and the encryption system (based on the RC4 encryption cipher) is flawed. The flaws in WEP allow attackers using WEP cracking tools.

WPA can implement 802.1x and uses Extensible Authentication Protocol (EAP) which is a wireless authentication framework, not an encryption scheme, to relay user credentials between a client and server.

262
Q

IT support places a server that acts as a Client-to-site virtual private network (VPN). The technicians place it on the network’s edge in a screened subnet topology. Which appliance does support use to implement this solution?

Firewall

Switch

Bridge

Router

A

Firewall

A firewall is a hardware device or application that is used to protect a network from another. Systems can be placed on a network’s edge by utilizing a demilitarized zone (DMZ) configuration.

A router is a hardware appliance or application that connects different networks for communication purposes but keeps them separate. A router is a layer 3 device and communication between networks is done with routing tables.

A network switch in its simplest form is a layer 2 network device. Switches can handle and control traffic based on a node’s physical address which is also known as a hardware address or media access control (MAC) address.

A bridge is an appliance or application that connects different networks as if they were one. In modern implementations, switches and routers are commonly used rather than a bridge.

263
Q

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) both utilize which of the following encryption ciphers?

Temporal Key Integrity Protocol (TKIP)

RC4

Advanced Encryption Standard (AES)

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A

RC4

WEP’s encryption system (based on the RC4 encryption cipher) is flawed. Version 1 of WPA still uses the RC4 cipher, but it adds a mechanism called the Temporal Key Integrity Protocol (TKIP) to make it stronger. AES replaced RC4.

TKIP is a mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

CCMP is an encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.

AES is a symmetric 128-, 192-, or 256-bit block cipher based on the Rijndael algorithm developed by Belgian cryptographers Joan Daemen and Vincent Rijmen and adopted by the U.S. government as its encryption standard to replace DES.

264
Q

A systems administrator is setting up communications for sending content to other hosts that have identified themselves as interested in receiving the originating host’s content. Which of the following should they use?

Anycast

Multicast

Unicast

Broadcast

A

Multicast

IPv4 multicasting allows one host on the Internet (or private IP network) to send content to other hosts that have identified themselves as interested in receiving the originating host’s content.

Anycast means that a group of hosts is configured with the same IP address. It allows for load balancing and failover between the server hosts sharing the IP address.

When an IPv4 host wants to send a packet to a single recipient, it uses a unicast packet, addressed to the IP address of the destination host.

A broadcast can be performed by sending a packet to the network or subnet’s broadcast address.

265
Q

A network contractor is conducting maintenance on the switches in the server room. To expedite time, the contractor copies ingress and egress communications from two switch ports to other ports. What is this considered?

Flow Control

Port Mirroring

Port Tagging

Port Security

A

Port Mirroring

Port mirroring copies ingress and egress communications from one or more switch ports to another port. This monitors communications passing over the switch and is also called a switched port analyzer (SPAN).

On a switch with VLANs configured, a port with an end station host connected operates in untagged mode (access port). A tagged port will be part of a trunk link.

Port security prevents a device attached to a switch port from communicating on the network unless it matches a given MAC address or other protection profile.

Flow control allows a server to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. This is also called 802.3x.

266
Q

An administrator is installing an inventory system that will keep track of when the organization procures and implements hardware and software, upgrades or modifies it, and decommissions it. What is the inventory system tracking?

System lifecycle

Change management

Data loss prevention

Assessment report

A

System lifecycle

The inventory system is tracking the system lifecycle which is a method to track the life cycle phases of one or more hardware, service, or software systems in your organization.

An assessment report evaluates the configuration and deployment assets, such as deviation from baseline configuration or performance, and makes recommendations where the network is not meeting goals for performance or security.

A documented change management process dictates the process for approving, preparing, supporting, and managing new or updated business processes or technologies.

Data loss prevention (DLP) products scan content in structured formats (such as a database with a formal access control model) or unstructured formats, such as email or word processing documents.

267
Q

Which of the following tools would a network admin use to make new network cables for the communications closet?

Crimper

OTDR

Punch down tool

Cable tester

A

Crimper

A cable crimper is used to create network cables with terminated ends such as a patch cable. Different types of crimpers are specific to the type of connector and cable.

A cable tester provides detailed information on the physical and electrical properties of the cable. For example, they test and report on cable conditions, crosstalk, attenuation, noise, resistance, and other characteristics of a cable run.

A punch down tool terminates fixed cables into an IDC (insulation displacement connector) such as a 66 block and 110 block.

An OTDR (optical time domain reflector) is a fiber optic testing tool. it tests for attenuation using an optical source and optical power meter (or light meter).

268
Q

A network technician is probing the organization’s network, procedure, and firewalls for areas of weakness. What will a threat actor do if the weakness is discovered?

Network access control

Exploits

LDAP

Kerberos

A

Exploits

Exploits are either developed by threat actors or exposed by unintentional weaknesses in procedures. Threat assessment is the process of identifying threat sources and profiling the types and capabilities of threat actors.

The client submits the Kerberos credentials (a Ticket Granting Ticket) obtained when the user logged onto the workstation to the server using the Generic Security Services Application Program Interface (GSSAPI).

Lightweight Directory Access Protocol (LDAP) is not a directory standard but a protocol used to query and update an X.500-like directory.

Network Access Control (NAC) is a system for authenticating endpoints when they connect to the network.

269
Q

A sysadmin is investigating alerts that say “ICMP Time Exceeded error messages.” What should the sysadmin investigate first?

Routing loops

Switching loops

Incorrect VLAN

Asymmetrical routing

A

Routing loops

A routing loop occurs when two routers use one another as the path to a network. Packets are caught in a routing loop circle around until the TTL expires. One symptom of a potential routing loop is for routers to generate ICMP Time Exceeded error messages.

A switching loop is where flooded frames circulate the network perpetually.

Asymmetrical routing refers to a topology where the return path is different from the forward path.

Another issue is that a host has been placed in an incorrect VLAN. VLAN assignments can be configured manually, and the administrator may have made a mistake, so check the interface configuration for the switch port.

270
Q

When testing the network configuration of a remote server, a network admin uses the ping and tracert command. Which of the following justify the admin’s choice of network utilities? (Select all that apply.)

SELECT ALL THAT APPLY

To confirm the routing path from a Windows server.

To confirm the routing path from a Linux server.

To test the network connectivity of the remote host.

To verify active connections from a Windows server.

A

To confirm the routing path from a Windows server.
To test the network connectivity of the remote host.

The ping command is used to perform a basic connectivity test on a remote host by sending ICMP (Internet Control Message Protocol) packets and receiving a reply message.

The tracert command is a Windows IP diagnostic utility used to trace the route taken by a packet as it hops to the destination host on a remote network.

The traceroute command is a Linux/UNIX IP diagnostic utility used to trace the route taken by a packet as it hops to the destination host on a remote network.

The netstat command is a utility to show network information on a machine running TCP/IP, notably active connections and the routing table.

271
Q

The physical security department of a bank wants to require employees to authenticate through a locked barrier before accessing the sensitive areas of the building, such as the IT department. If implemented, which of the following will best help regulate such physical access? (Select all that apply.)

SELECT ALL THAT APPLY

Radio Frequency Identification (RFID)

Cameras

Smart Badge

Biometric Device

A

Smart Badge
Biometric Device

A smart badge comes with an integrated chip and data interface that stores the user’s key pair and digital certificate. The user presents the card and enters a PIN and then the card uses its cryptographic keys to authenticate securely via the entry point’s badge reader.

A biometric device is activated by human physical features, such as a fingerprint, voice, retina, or signature.

Detection-based controls provide an important additional layer of defense in the event that prevention-based controls, such as key fob security, fail to work.

Radio Frequency Identification (RFID) is a means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.

272
Q

Which twisted cable type uses a foil screen in an effort to reduce crosstalk?

Single mode

STP

UTP

Coaxial

A

STP

Shielded twisted pair cabling is a type of twisted pair cable that is less susceptible to interference and crosstalk because each pair is surrounded by a braided shield.

Ethernet can use Unshielded Twisted Pair (UTP) rated to a particular Cat standard. UTP is made of twisted pair wires that do not use shielding to prevent interference.

Coaxial (or coax) cable is made of two conductors that share the same axis, hence the name (“co” and “ax”). The core conductor of the cable is made of copper wire (solid or stranded) and is enclosed by plastic insulation (dielectric).

Single mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

273
Q

A wireless AP (access point) located on a table in the middle of a small office area is not producing a strong enough signal for users on the outer perimeter for higher data rates. Determine which of the following options is the most likely reason for this issue.

Wrong frequency

Wrong placement

Wrong SSID

Wrong antenna type

A

Wrong antenna type

Antennas transmit signals in different ways. For example, an access point (AP) designed for ceiling mounting may produce a stronger signal in a cone directed downwards. The office should install an AP with an outward omnidirectional path with a stronger signal.

An SSID (Service Set Identifier) is the name of the wireless AP. This has no relevance on the power of the signal.

A frequency mismatch such as an AP operating at 5 GHz and clients using the 2.4 GHz band, will affect the connection. Frequency type was not mentioned in this case.

Placing the antenna in the middle of the office is the ideal placement. However, the antenna’s signal transmission and path were not optimized for its location.

274
Q

A systems administrator installs new software on a client workstation that communicates with an internal Internet Information Services (IIS) server. The application is unable to establish a connection with the IIS using an Internet Protocol (IP) address. Pinging the IIS and establishing a telnet connection works as expected. Examine the following examples to determine possible causes for this network issue. (Select all that apply.)

SELECT ALL THAT APPLY

IIS service is not running.

The SSL (Secure Sockets Layer) certificate is not trusted.

The client cannot resolve server’s name.

TCP (Transmission Control Protocol) ports are blocked.

A

IIS service is not running.
TCP (Transmission Control Protocol) ports are blocked.

The application on the client workstation may be communicating over a blocked Transmission Control Protocol (TCP) port. The workstation can communicate using Telnet via TCP port 23; ports may need to be manually allowed in and out.

The IIS service may not be working, causing the client application not to connect as well. Services on a Windows computer is viewable using the Services management console (services.msc).

The client application was trying to communicate with the Internet Information Services (IIS) server using an IP (Internet Protocol) address. A Fully Qualified Domain Name (FQDN) was not referenced.

The client was not accessing the IIS server using a web browser, which indicates if a server certificate was installed or trusted.

275
Q

A helpdesk operator is attempting to release a client’s IP as part of their troubleshooting steps. Which of the following tools can they use to accomplish this? (Select all that apply.)

SELECT ALL THAT APPLY

Zone transfer

NetworkManager

ipconfig

dhclient

A

NetworkManager
ipconfig
dhclient

A Windows client can be forced to release a lease with a command such as ipconfig. A Windows host that fails to obtain a lease will revert to an automatic IP address (APIPA) and select an address in the 169.254.0.0/16 range.

In Linux, the utility dhclient is often used. Linux might use link-local addressing, set the address to unknown (0.0.0.0), or leave the interface unconfigured.

Modern Linux distributions might use NetworkManager or systemd-networkd. The client can renew the lease when at least half the lease’s period has elapsed (T1 timer).

A secondary DNS server holds a read-only copy of the zone. This is maintained through a process of replication known as a zone transfer from a primary name server.

276
Q

A network analyst is concerned with security in Linux. What interest does the analyst have in the /etc/passwd file?

/etc/passwd allows clients to perform name resolution

/etc/passwd stores interactive login settings

/etc/passwd stores user settings

/etc/passwd stores the encrypted hash password files

A

/etc/passwd stores user settings

Linux supports multiple users with multiple user accounts. User settings are stored in the /etc/passwd file which determines many aspects of security in Linux.

The user password is typically stored as an encrypted hash in the /etc/shadow file along with other password settings, such as age and expiration date.

In Linux, local user account names are stored in /etc/passwd. There is no interactive login information saved in this file. Interactive login over a network is typically accomplished using Secure Shell (SSH).

In Linux, Domain Name Sustem (DNS) server names are specified in the /etc/resolv.conf file.

277
Q

A server technician has removed a server blade from its rack for cleaning. The technician sees corrosion on one of the circuit boards and notices some water on the bottom of the casing. What hazards could have affected this server? (Select all that apply.)

SELECT ALL THAT APPLY

Humidity

Flooding

Electrical

Temperature

A

Humidity
Flooding

There may be natural or person-made flood risks from nearby water sources and reservoirs or leaking plumbing or fire suppression systems. Electrical systems need to be shut down immediately in the presence of any significant amount of water.

More water vapor in the air (humidity) risks condensation forming within a device chassis, leading to corrosion and short circuit faults.

Computer systems need a stable power supply, free from outages (blackouts), voltage dips (brownouts), and voltage spikes and surges.

High temperatures will make it difficult for device and rack cooling systems to dissipate heat effectively. High temperatures increase the risk of overheating components within the device chassis and consequent faults.

277
Q

A company wants to leverage block level storage with jumbo frame packets. The storage must be accessible remotely and isolated only to the servers. Which type of network topology is most appropriate for this setup?

CAN

MAN

WAN

SAN

A

SAN

Storage Area Network (SAN) is one that interconnects storage devices such as Redundant Array of Independent Disks (RAID) arrays or tape drives to make “pools” of shared storage capacity available to servers. It uses jumbo frame packets and network Maximum Transmission Unit (MTU) settings at about 900.

Metropolitan Area Network (MAN) is a term used to describe a network smaller than a WAN such as a city-wide network encompassing multiple buildings.

Campus Area Network (CAN) is sometimes used for a LAN that spans multiple nearby buildings such as a college campus.

Wide Area Network (WAN) is a network of networks, connected by long-distance links. A typical enterprise WAN would connect multiple sites, possibly in different countries.

278
Q

A company wants to provide software applications to its employees as quickly as possible. They want the applications to update regularly and be accessible via the cloud. Employees should not have to install anything new on their workstations. Which of the following cloud models will provide the best solution?

PaaS

IaaS

SaaS

Private

A

SaaS

Software as a Service (SaaS) is a computing method that uses the cloud to provide application services to users. An example is Google G Suite. It is regularly updated online and users do not need to install anything extra. The services are accessible online.

Infrastructure as a Service (IaaS) is a means of provisioning IT resources such as servers, load balancers, and storage area network (SAN) components quickly.

Platform as a Service (PaaS) provides resources between SaaS and IaaS. It includes servers and storage network infrastructure with a multi-tier web application on top.

The term private refers to a cloud service owned and serviced entirely by the company and not an external entity. This is time-consuming to build out.

279
Q

A security administrator implements a device that operates at layer 3 to enforce an access control list (ACL). What is this called?

Firewall

Media Converter

Load Balancer

IPS

A

Firewall

It is usually important for traffic passing between networks to be filtered. A basic firewall operates at layer 3 to enforce an access control list (ACL).

An intrusion prevention system (IPS) can provide an active response to any network threats that it matches. One typical preventive measure is to end the session by sending a TCP reset packet to the attacking host.

A load balancer can switch client traffic to alternative processing nodes, reducing bottlenecks and allowing for failover services in the event of a host or network route going down.

A media converter is a device that converts one media signaling type to another.

280
Q

A network administrator wants to protect the hosts and network infrastructure against attacks through an in-depth defensive strategy. Which of the following deploys systems in a secure configuration to harden the devices on the network and reduce the attack surface of service vulnerabilities that an attacker could exploit? (Select all that apply.)

SELECT ALL THAT APPLY

Setup geofencing and the default VLAN.

Disable unnecessary network protocols.

Reduce device power levels.

Change default system credentials.

A

Disable unnecessary network protocols.
Change default system credentials.

Use secure protocols such as Simple Network Management Protocol (SNMP) version 3 (that uses encryption) rather than SNMPv1 or v2 that does not use encryption.

Devices such as wireless access points, switches, and routers sometimes ship with a default management password and should be changed during installation.

The wireless antenna power levels can be tuned to reduce the wireless coverage so that the wireless reception is only retrievable from the lobby rather than from the parking lot or other external areas.

Geofencing is used with wireless networking to ensure a station is within a geographic area to access the network while a VLAN creates a separate broadcast domain. Neither apply as a solution.

281
Q

A network administrator wants to prevent the signal of a wireless access point (AP) from extending over to other work areas and businesses. Analyze the scenario and determine what the admin can adjust on the AP to accommodate this requirement.

The wireless channel

The security type

The 802.11 standard

The power level

A

The power level

Changing the power level of the access point (AP) will effectively reduce the range of the wireless signal. Using the maximum available power of an AP can result in the signal extending to neighboring businesses or offices.

Changing the wireless channel is appropriate if there was a channel overlap with another AP in the area using the same frequency.

Changing the 802.11 standard to, for example, g to n can cause compatibility issues with current wireless clients. This is most justified when the organization is ready to upgrade.

Changing the security type will reduce signal range. This is most appropriate if a higher level of security is required such as Wi-Fi Protected Access version 2, Enterprise (WPA2-Enteprise).

282
Q

A network technician is looking at a switch that temporarily pauses traffic to avoid overwhelming its buffer and causing it to drop frames. What is this most likely?

Flow Control

Jumbo Frames

Port Security

NDP

A

Flow Control

IEEE 802.3x flow control allows a server to instruct the switch to pause traffic temporarily. This traffic pause helps avoid overwhelming its buffer and causing it to drop frames.

A jumbo frame supports a data payload of up to around 9,000 bytes. This support reduces the number of frames that need to be transmitted.

The Neighbor Discovery (ND) protocol performs some functions on an IPv6 network that ARP and ICMP perform under IPv4.

A port security configuration validates the MAC address of end systems that connect to a switch port.

283
Q

What could possibly cause a client application to show a certificate warning to a user?

The device is on the wrong VLAN

The client is not connected to the Internet

The certificate’s subject name does not match the URL

The client is experiencing DNS issues

A

The certificate’s subject name does not match the URL

This is usually a configuration error on the webserver manager, but it could indicate malicious activity, confirm the certificate’s common name and access the website using that URL.

Internet connectivity is not needed for certificate trust. The certificate needs to be already installed on the device and trusted.

A virtual LAN (VLAN) is a feature of managed Ethernet switches. This is for network segmentation and would not interfere with certificate trust.

The Domain Name System (DNS) is a global hierarchy of distributed name server databases that contain information on domains and hosts within those domains. This would not necessarily cause any certificate problems.

284
Q

A cyber security technician is observing a DOS attack on the organization’s network. The technician can not determine anything surrounding the attacker’s identity but does notice that no data traffic is being returned to the attacker. What type of attack is this?

MAC spoofing

IP spoofing

Malware

Botnet

A

IP spoofing

IP spoofing is also used in most denial of service (DoS) attacks to mask the attack’s origin and make it harder for the target system to block packets from the attacking system. In this type of spoofing, the threat actor does not care about not receiving return traffic.

A botnet is a group of compromised hosts that can be used to launch DDoS and DRDoS attacks. A threat actor will first compromise one or two machines to use as handlers or herders.

With MAC spoofing, a host can arbitrarily select any MAC and IP address and attempt to use it on the network. A threat actor might exploit this to spoof the value of a valid MAC or IP address to circumvent an access control list or impersonate a legitimate server.

285
Q

An attacker successfully connected to a corporate network’s Wireless Local Area Network (WLAN) and sniffed tracking communication between hosts. The attacker then modified the traffic before relaying it elsewhere. Which of the following describes this type of attack?

On-path attack

DNS poisoning

Rogue AP

Phishing

A

On-path attack

An on-path attack is a specific type of spoofing attack where a threat actor compromises the connection between two hosts and transparently intercepts and relays all communications between them.

A rogue access point (AP) is when a wireless AP has been installed on the network without authorization, whether with malicious intent or not.

Domain Name System (DNS) poisoning compromises name resolution, replacing the valid IP address for a trusted website with the attacker’s malicious IP address.

Phishing is an email-based social engineering attack, where the attacker sends email from a supposedly reputable source to try to elicit private information from the victim.

286
Q

After a site survey, the network technician found the single wireless 2.4 gigahertz (Ghz) access point (AP) in a large office floor space does not have a strong enough signal, and is contending a significant amount of background noise and interference. What will these findings most likely limit on the AP’s wireless signal?

They will cause connections to go over capacity.

They will cause an overlap in channels.

They will limit the signal’s range.

They will cause an absorption of the signal.

A

They will limit the signal’s range.

A low-powered access point (AP) and background interference, such as other wireless signals in the same frequency band, will greatly reduce the distance, or reach, of the AP to other clients.

Overcapacity of the AP is when there are large amounts of connections that reduce network bandwidth. This will not be the case if the AP cannot reach other clients.

A secondary AP with a signal in the same channel will mostly cause interference rather than limit distance. However, no other AP is mentioned in this case.

Signal absorption is caused by types of walls and even windows, not because of lower signal strength or interference. Concrete walls are the most absorbant.

287
Q

An IT engineer installs equipment in a new network closet. While establishing all of the connections, the engineer utilizes a punch down tool. Considering the possible uses, which of the following does the engineer use the tool for?

Checking faulty ports

Determining voltage and continuity

Discovering ports

Fixing conductor connections

A

Fixing conductor connections

Fixed cable is terminated using a punch down tool. This tool is used to fix cable conductors into a patch panel Insulation Displacement Connector (IDC).

A multimeter can be used to check physical connectivity. The primary purpose of a multimeter is for testing electrical circuits, but they can test for the continuity of any sort of copper wire.

A loopback adapter is used by a Network Interface Card (NIC) to send and receive to itself. This is used to test for faulty ports and network cards.

Software port discovery can be achieved by using a utility such as the netstat command which allows for checking the state of ports on a local host.

288
Q

A network specialist installs a feature that presents a host from an untrusted port from flooding the segment with gratuitous replies. What is the name of this feature?

Guest network isolation

Role-based access

Dynamic ARP inspection

MAC filtering

A

Dynamic ARP inspection

A switch port security feature such as dynamic ARP inspection (DAI) prevents a host attached to an untrusted port from flooding the segment with gratuitous ARP replies.

Role-based access means that a set of organizational roles are defined, and subjects are allocated to those roles.

With guest network isolation, a guest network can have separate security and forwarding policies than the network that permits access to the corporate LAN.

As with a switch, an access point can be configured with an accept or deny list of known MAC addresses.

289
Q

This protocol is now deprecated by the more secure protocol, Transport Layer Security (TLS), which was developed by Netscape in the 1990s.

Secure Socket Layer (SSL)

Secure File Transfer Protocol (SFTP)

Secure Shell (SSH)

Hypertext Transfer Protocol (HTTP)

A

Secure Socket Layer (SSL)

Transport Layer Security (TLS) was developed from SSL and ratified as a standard by the IETF.

HTTP enables clients (typically web browsers) to request resources from an HTTP server.

Secure Shell (SSH) is the principal means of obtaining secure remote access to UNIX and Linux servers and most types of network appliances (switches, routers, and firewalls).

Secure FTP (SFTP) addresses the privacy and integrity issues of FTP by encrypting the authentication and data transfer between client and server.

290
Q

A network engineer is configuring cellular phones for new employees. What communication-based phones use Time Division Multiple Access to declare time slots?

LTE

Independent Basic Service Set (Ad-Hoc)

n (wifi 4)

GSM

A

GSM

Global System for Mobile Communication (GSM)-based phones are a 2G format that uses TDMA. With TDMA, each subscriber gets access to the radio channel by being allocated a time slot. GSM allows subscribers to use a subscriber identity module (SIM) card to use an unlocked handset with their chosen network provider.

In 802.11 documentation, this is called an Independent Basic Service Set (IBSS). This topology does not require an access point.

Long Term Evolution (LTE) is a converged 4G standard supported by GSM and CDMA network providers.

A network engineer has renamed Wi-Fi standards with simpler digit numbers. 802.11n is now officially designated as Wi-Fi 4.

291
Q

A network link offers simultaneous communications in each direction. Of the following choices, which defines this functionality?

Straight-through

Bidirectional

Multimode

Duplex

A

Duplex

Duplex is a communication configuration. Full-duplex refers to a communication type, such as network links, that allow simultaneously sending and receiving. Most network links are full-duplex.

Straight-through refers to cabling, such as twisted pair cabling, where pins on one end of the cable match the pins on the opposite end.

Multimode fiber is inexpensive to deploy compared to single mode fiber. As such, it does not support long distances as single mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs).

Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns.

292
Q

Organizations must have mechanisms to detect and suppress fires. Which of the following are fire suppression systems an organization may need to implement? (Select all that apply.)

SELECT ALL THAT APPLY

Fire extinguishers

Generator

Cold site

Sprinkler systems

A

Fire extinguishers
Sprinkler systems

An organization may need to implement fire extinguishers which come in several different types, where each type is suitable for fighting a particular class of fire.

An organization may need to implement an overhead sprinkler system. Wet-pipe sprinklers work automatically and discharge water but there are several alternatives that can minimize damage caused by water.

A cold site is an empty building with a lease agreement in place to install required equipment in the face of a disaster.

A backup power generator can provide power to the whole building, often for several days but cannot come online fast enough to respond to a power failure.

293
Q

An engineer connects two network devices together that do not have the Auto-MDI/MDIX enabled by default. The devices each have a medium dependent interface (MDI) port. For the devices to properly communicate with one another, the engineer uses which type of cable?

Duplex

Bidirectional

Crossover

Straight-through

A

Crossover

Most switch interfaces use auto-MDI/MDIX by default, based on current configurations. However, they can be disabled or enabled. If the auto-MDI/MDIX is not enabled, then connecting two MDI ports requires a crossover cable. Bidirectional refers to two-way communication.

Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns.

Duplex is a communication configuration. Full-duplex refers to a communication type, such as network links, that allow simultaneously sending and receiving.

Straight-through refers to cabling, such as twisted pair cabling, where pins on one end of the cable match the pins on the opposite end.

294
Q

To allow users to access their Windows workstations remotely using the native Windows Remote Desktop Connection, what port should be opened up in any security appliance?

389 (LDAP)

23 (Telnet)

3389 (RDP)

5900 (VNC)

A

3389 (RDP)

Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote GUI connections to a Windows machine. RDP uses TCP port 3389.

Virtual Network Computing (VNC) is a remote access tool and protocol. VNC is the basis of macOS screen sharing but is used by many vendors and typically uses port 5900 by default.

Telnet is a protocol supporting unsecure terminal emulation for remote host management. Telnet runs over TCP port 23.

LDAP is not a directory standard, but a protocol used to query and update an X.500-like directory that uses UDP port 389.

295
Q

A network technician is tasked with ensuring critical infrastructure is protected. Part of the assessment involves identifying critical systems and assets that support these functions. What is the name of this assessment?

Local authentication

Process assessment

Multifactor

SIEM

A

Process assessment

Process assessment involves identifying critical systems and assets that support these functions.

Security Information and Event Management (SIEM) is a security control designed to integrate vulnerability and threat assessment efforts through automated collection, aggregation, and log data analysis.

The local authentication provider is the software architecture and code that underpins the mechanism by which the user is authenticated before starting a shell.

An authentication technology or mechanism is considered strong if it combines more than one authentication data type (multifactor).

296
Q

A Windows server is being configured to go live again on a LAN (Local Area Network) that has a DHCP (Dynamic Host Configuration Protocol) server with a new pool of addresses. The change must be verified upon completion. Which of the following commands would be most appropriate to apply to this scenario? (Select all that apply.)

SELECT ALL THAT APPLY

ipconfig /flushdns

ipconfig /release

ipconfig /renew

ipconfig /all

A

ipconfig /release
ipconfig /renew
ipconfig /all

The ipconfig utility is used to verify the IP configuration on Windows-based systems. The /release option releases the IP address obtained from a DHCP Server.

The ipconfig /renew command, when run after the /release option will force the server to renew or retrieve a new lease on a new IP address.

The ipconfig /all command is used to verify IP configurations in detail. It can be used to also verify any immediate changes on the network adapter.

The ipconfig /flushdns command is used to clear the DNS (Domain Name System) resolver cache. This is not necessary in this case.

297
Q

A network technician looks at an algorithm that uses the number of hops to the destination as the route path metric. Which of the following are they looking at?

Distance vector

Link state

Hybrid

Convergence

A

Distance vector

Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least-cost path and, as such, is the used path.

In link states, each node independently calculates the next best logical path to all network destinations. For each protocol that it runs, the router maintains a routing information base of routes discovered by that protocol.

Some protocols use a hybrid of different distance vectors, link states, and other methods to perform path selection more efficiently.

Convergence is the process whereby routers running dynamic routing algorithms agree on the network topology. Routers must be capable of adapting to changes.

298
Q

A sysadmin set up a new office with wireless access points. The area showed that most wireless connections were using channel 7, so the sysadmin chose channel 1. What was the sysadmin trying to prevent?

DNS issues

Insufficient wireless coverage

Overlap

RF attenuation

A

Overlap

Channel overlap is important to minimize as it will help prevent interference with connections and data transfer over a wireless network.

Radiofrequency attenuation (RF attenuation) is the loss of signal strength due to distance and environmental factors. Also referred to as free space path loss.

Ensuring the channels do not overlap in wireless access point setup does not relate to DNS issues. If someone were unable to browse specific websites, that might be a DNS issue.

A site survey would help with insufficient wireless coverage. However, it would not prevent channel overlap issues.

299
Q

A network admin is working with a beta application at an office workstation and is unsure if the app is connecting properly to the internal web server. The ipconfig utility shows the workstation has a valid Internet Protocol (IP) address and a default gateway. Determine which command-line tool the admin can apply in this situation to show active connections and execute further troubleshooting actions.

The tracert command

The netstat command

The traceroute command

The route utility

A

The netstat command

The netstat command allows an admin to check the state of ports on the local host and check for service misconfigurations. This can help identify if the application is connecting to the correct web server on the correct port. It will also list all active connections.

The tracert command is used to trace the route taken by a packet as it hops to the destination host on a remote network. This is best used to figure routing issues in between the source and destination.

The route command can be used to view and modify the routing table of a Windows or Linux system.

The traceroute command functions similarly to the tracert command, but used on Linux systems.

300
Q

A helpdesk technician is looking at a network where only one node can be active on a copper broadband connection at a time. What type of topology is this?

Mesh

Ring

Bus

Star

A

Bus

A physical bus topology with more than two nodes is a shared access topology, meaning that all nodes share the bandwidth of the media.

In a physical ring topology, each node is wired to its neighbor. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor.

In a star topology, each endpoint node is connected to a central forwarding node, such as a hub, switch, or router.

A mesh topology is commonly used in WANs. In theory, a mesh network requires that each device has a point-to-point link with every other device on the network (fully connected).

301
Q

A systems architect is setting up traffic between an SDN controller and infrastructure devices through automation by scripts that call functions. What direction of traffic is this considered to be?

North

East

South

West

A

South

The SDN controller and infrastructure device traffic are the “southbound” API calls. The principal innovation of SDN is to insert a control layer between the application layer and the infrastructure layer.

The interface between SDN applications and the SDN controller is described as the service interface or as the “northbound” API.

In data centers that support cloud and other Internet services, most traffic is actually between servers within the datacenter. This is referred to as east-west traffic.

There is no distinction between east and west when referring to server-to-server communications.

302
Q

What tool can be used to cut ethernet cabling?

Roll over

Cable tester

Wire map

Snip

A

Snip

Snips are electrician’s sturdy scissors to cut the wire and are notched to assist with stripping insulation from the wire.

Wire map testers can identify continuity, short, incorrect pin-out/incorrect termination/mismatched standards.

A rollover cable or console cable connects a PC or laptop to the command line terminal of a switch or router. The console port connection on the appliance is a standard RJ-45 jack (but wired differently to Ethernet).

A cable tester reports detailed information on the physical and electrical properties of the cable.

303
Q

Upon reviewing legislation, a network engineer must look for methods of detecting and suppressing fires. As part of the policy, the engineers add what system to the organization’s safety plan to cover this federal mandate?

ISP

Cold Site

Fire Suppression

State

A

Fire Suppression

Fire suppression systems work based on the fire triangle. The fire triangle works based on the principle that fire requires heat, oxygen, and fuel to ignite and burn.

The state is the measure or the condition of an item.

A type of modem (typically cable or digital subscriber line) connects to the Internet Service Provider’s (ISP’s) network.

A cold site takes longer to set up than other options. A cold site may be an empty building with a lease agreement to install any required equipment when necessary to set up the site.

304
Q

A network architect is looking for topologies commonly used in a variety of wide area networks (WANs) Implementations that use satellite and wired links. Which of the following should they use?

Mesh

Star

Ring

Bus

A

Mesh

A mesh topology is commonly used in WANs. In theory, a mesh network requires that each device has a point-to-point link with every other device on the network (fully connected).

In a physical ring topology, each node is wired to its neighbor. A node receives a transmission from its upstream neighbor and passes it to its downstream neighbor.

In a star topology, each endpoint node is connected to a central forwarding node, such as a hub, switch, or router.

A physical bus topology with more than two nodes is a shared access topology, meaning that all nodes share the bandwidth of the media.

305
Q

A network engineer is installing sensors to measure environmental conditions in a server room. A sensor installed monitors the water vapor in the air. What will this sensor detect?

Flooding

Humidity

Temperature

Electrical

A

Humidity

Regarding humidity, more water vapor in the air risks condensation forming within a device chassis, leading to corrosion and short circuit faults. Conversely, very low humidity increases the risks of static charges building up and damaging components.

Regarding electricity, computer systems need a stable power supply, free from outages (blackouts), voltage dips (brownouts), and voltage spikes and surges.

The high temperature will make it difficult for device and rack cooling systems to dissipate heat effectively.

Regarding flooding, there may be natural or person-made flood risks from nearby watercourses and reservoirs or leaking plumbing or fire suppression systems.

306
Q

A user reported a performance issue on the network the department’s web server is communicating on. After questioning a few other users, and notating some recent changes on the server and its symptoms, what other actions will a network admin most likely take to better identify the problem?

Question the obvious.

Consider multiple approaches.

Try and duplicate the problem.

Approach multiple problems individually.

A

Try and duplicate the problem.

Duplicating the issue on another server in a lab environment is the best approach. The network admin has notated recent changes on the server and its symptoms, which can lead to a theory of probable cause.

Only one performance issue has been reported by the user. This may include latency or packet loss, which is why notating symptoms are important.

Questioning the obvious occurs when theorizing a probable cause, not while still trying to identify the problem.

Considering multiple approaches occurs when trying to establish a theory of probable cause. This may include a top-to-bottom/bottom-to-top OSI (Open Systems Interconnection) model approach or to divide and conquer.

307
Q

A network engineer needs to procure a product that scans content using a dictionary database/algorithm that looks for confidential and sensitive company information. What type of product would the engineer purchase?

Data Loss Prevention

Logical Network Diagram

Change Management

Floor Plan

A

Data Loss Prevention

Data loss prevention (DLP) products scan content in structured formats. This includes a database with a formal access control model and unstructured formats, such as email or word processing documents. DLP products use some dictionary database or algorithm (regular expression matching) to identify confidential or personal/sensitive data.

A logical network diagram provides a graphical representation of a network in a hierarchical fashion that doesn’t require a physical location but does exist.

A floor plan is a detailed diagram of wiring and port locations.

A documented change management process minimizes the risk of unscheduled downtime by implementing changes in a planned and controlled way.

308
Q

A vendor visits an organization to demo a network management device. As part of the hands-on demonstration, an IT engineer can see and manage an extended service set (ESS) on the network. Based on the engineer’s experience with the device, what is the vendor demonstrating?

VOIP PBX

Wireless controller

RADIUS server

Multilayer switch

A

Wireless controller

A wireless controller is a hardware device or software application which can centralize the management function of a wireless network. An extended service set is defined in a wireless network.

A multilayer switch routes based on the contents of packets at layers 3 and up and more effectively in a VLAN environment. A multilayer switch is an appropriate solution for this scenario.

A Voice over Internet Protocol (VoIP) Private Branch Exchange (PBX) is the core switch that controls all function found in a VoIP system.

Remote Authentication Dial-in User Service (RADIUS) is a standard protocol used to manage remote and wireless authentication infrastructures.

309
Q

Which of the following describes the default port number(s) and purpose of Dynamic Host Configuration Protocol (DHCP)?

TCP port 3389; a protocol for operating remote GUI connections to a Windows machine

TCP port 23; a terminal emulation software to support a remote connection

UDP ports 67 and 68; a protocol for automatically assigning IP address information

UDP and TCP port 53; a service that maps names to IP addresses on most TCP/IP networks1

A

UDP ports 67 and 68; a protocol for automatically assigning IP address information

Dynamic Host Configuration Protocol (DHCP) is a protocol used to automatically assign IP addressing information to IP network computers. It uses UDP ports 67 and 68.

Domain Name System (DNS) is a service that maps names to IP addresses on most TCP/IP networks, including the Internet. It uses UDP and TCP port 53.

Telnet is terminal emulation software to support a remote connection to another computer. It uses TCP port 23.

Remote Desktop Protocol (RDP) is Microsoft’s protocol for operating remote GUI connections to a Windows machine. It uses TCP port 3389.

310
Q

A penetration tester is looking at IoT devices on a network. Which of the following would act as the control system?

Refrigerator

Doorbell

Thermostat

Speaker

A

Speaker

The penetration tester could implement a headless hub as a smart speaker operated by voice control or smartphone/PC app for configuration.

IoT endpoints implement the function, such as a thermostat or heating control that you can operate remotely. Because they’re effectively running mini-computers, smart devices are vulnerable to some of the standard attacks associated with web applications and network functions.

These devices, such as doorbells, are capable of computing, storage, and network functions potentially vulnerable to exploits.

Refrigerators are another type of IoT device. Most smart devices use a Linux or Android kernel, refrigerators included.

311
Q

The network security team of a company wants to reduce the attack surface of network devices by limiting the ways an attacker can physically connect to the network. Recommend some protocols or security settings that can support this requirement? (Select all that apply.)

SELECT ALL THAT APPLY

Close unused device ports

Use the telnet protocol

Configure port security

Configure SNMPv2

A

Close unused device ports
Configure port security

Port security refers to the IEEE 802.1X standard’s Port-Based Network Access Control (PNAC) mechanism. PNAC means that the switch performs some sort of authentication of the attached device before activating the port.

Physical access may allow an attacker to use hardware ports such as USB or a router’s console port to gain access. Unused device ports should be disabled or be segmented to a black hole virtual LAN (VLAN).

Telnet is considered a vulnerable protocol because all communications can be sniffed and read in cleartext. Use secure shell (SSH) instead to remotely manage devices securely.

Simple Network Management Protocol (SNMP) version 1 and SNMPv2, are unencrypted. Use SNMPv3 to take advantage of encrypted communication features.

311
Q

A system has a network of Graphic Processing Units (GPUs) computing nodes organized into a cluster for statistical analysis. During installation, the service providers installing the nodes are negotiating a Service Level Agreement (SLA) with management. The team establishes baselines and calculates Key Performance Metrics (KPI) by using the calculation (48 hours * 64 nodes)/2 failures, to determine one of the metrics. Select which KPI the service providers calculated.

MTBF

Latency

MTD

MTTR

A

MTBF

Mean Time Between Failures (MTBF) is a measurement that represents the expected lifetime of a particular product or network asset.

The Mean Time To Repair (MTTR) is a measure of the expected time expense required to correct a fault to restore the system to full operations.

Maximum Tolerable Downtime (MTD) is the upper limit of time that a given business process can be inoperative before the organization’s survival is at risk.

Latency is the amount of time it takes for data to get from one designated point to another. This can be measured in various ways with different software applications.

312
Q

A systems administrator is planning a change to a resource record. Which value should they modify prior to the change in order to speed up caching replacement?

A

TTL

Stratum

PTR

A

TTL

Each resource record can be configured with a default time to live (TTL) value, measured in seconds. If there is a change to a resource record, server and client caching means that the updated record can be relatively slow to propagate.

An A record is used to resolve a hostname to an IPv4 address. This is the most common type of record in a Domain Name System (DNS) zone.

A PTR (pointer) record is found in reverse lookup zones and is used to resolve an IP address to a hostname.

Top-level NTP servers (stratum 1) obtain the Coordinated Universal Time (UTC) via a direct physical link to an accurate clock source.

313
Q

There are two ways a network administrator can manage network appliances on the network. One of the options is more secure and requires him to physically go to the device and connect to it with a console cable. The second option allows him to manage the appliance remotely but is less secure and will only work if the network is up. What are the two management options described here?

Authentication and authorization considerations

In-band vs. out-of-band management

Split tunnel vs. full tunnel

SSH

A

In-band vs. out-of-band management

In-band vs. out-of-band management is incorrect because it refers to managed and unmanaged network appliances. An appliance that is managed can be managed via a console port, aux port, or management port. Device management can be done in-band, over a link that shares traffic with other communications on the network, or out-of-band over a console cable.

SSH (secure shell) is a secure way to connect remotely to a network appliance for in-band management.

Split tunnel vs. full tunnel refers to private network traffic or all network traffic routed via the VPN gateway.

Authentication and authorization considerations are important when giving privileges to network administrators but are not methods of network appliance management.

314
Q

A large university campus experiences communication problems between two buildings over a fiber connection. A cabling engineer uses a optical time domain reflectometer to troubleshoot the problem. For which purpose does the engineer use this piece of equipment?

Location of a line break

Line voltage and continuity check

Detection of a line break

Electromagnetic interference detection

A

Location of a line break

An optical time domain reflectometer transmits light-based signals of different wavelengths over fiber to find the distance of a line break.

A light meter is used with fiber cable to determine if a line break exists by testing attenuation.

A multimeter can be used to check physical connectivity. The primary purpose of a multimeter is for testing electrical circuits, but they can test for the continuity of any sort of copper wire.

Electromagnetic Interference (EMI) from radio or electromagnetic sources working in the same frequency band as a Wi-Fi device can be detected with a spectrum analyzer.

315
Q

A technician recently installed a Voice over Internet Protocol (VoIP) phone at a user’s desk. The workstation is not able to browse the Internet. The VoIP phone connects directly to the Local Area Network (LAN), and the workstation connects to the phone in a daisy-chain fashion. Other devices can connect successfully to the phone. At which layer of the Open Systems Interconnection (OSI) model would a network technician most likely continue troubleshooting?

Physical

Network

Application

Session

A

Network

Layer 3, or the Network layer, is responsible for moving data around a network and routing data packets with IP addresses.

Layer 1, or the Physical layer, is responsible for the transmission and receipt of bits using some form of transmission or physical device. This layer can test other devices, provided that network cables are working fine.

Layer 7, or the Application layer, provides an interface for software that has established communications through lower-level protocols to exchange data. The other test devices did not require this.

Layer 5, or the Session layer, represents the dialog control functions to exchange messages between the client and server. The other tested devices did not need to establish a session.

316
Q

A network administrator is researching network virtualization and is trying to find a standard architecture for appliances to be developed against. Which of these should the administrator look at for a standard?

NFV

Hypervisor

MPLS

vswitch

A

NFV

Virtual appliances might be developed against a standard architecture, such as ETSI’s Network Function Virtualization (NFV). NFV divides provisioning into three domains.

Typically, a hypervisor will implement network connectivity by means of one or more virtual switches (or vSwitch in VMware’s terminology). These perform the same function as Layer 2 physical switches.

In a virtualization host, the hypervisor manages the virtual environment (such as virtual NICs) and facilitates interaction with the computer hardware and network.

Multiprotocol Label Switching (MPLS) is a means of establishing private links with guaranteed service levels. MPLS can operate as an overlay network to configure point-to-point or point-to-multipoint links.

317
Q

What occurs when multiple access points use the same channel and opportunities for wireless devices to transmit are reduced?

Antenna cable attenuation

Overcapacity

Co-channel interference

Adjacent channel interference

A

Co-channel interference

Co-channel interference (CCI) can be more accurately described as contention. When multiple access points overlap and use the same channel, opportunities to transmit are reduced.

Adjacent channel interference (ACI) occurs when access points are configured to use different but overlapping channels, such as 1 and 3 in the 2.4 GHz band.

Overcapacity (or device saturation) occurs when too many client devices connect to the same AP.

Antenna cable attenuation is signal loss caused by an external antenna connected to an access point over cabling.

previous
finish review
next

318
Q

A server administrator has created a new virtual client to host printers on the network. When adding new printers to the server, the administrator notices that the print queue is freezing the operating system when a new job comes to the server. What could the administrator upgrade on the virtual server to help with the print queue load?

CRC errors

Memory

CPU usage

Link state

A

Memory

If system memory utilization is very high, an upgrade might be required, or a network issue may be present. Jobs stored in memory can cause problems with system processes if there is not enough memory to store open jobs.

CRC errors are caused by interference. This interference might be due to poor quality cable or termination, attenuation, mismatches between optical transceivers or cable types, or some external factor.

Link state measures whether an interface is working (up) or not (down). You may also want to track the uptime or downtime percentage so that you can assess a link’s reliability over time.

High CPU utilization can indicate a problem with network traffic, or there may be a need for an upgrade.

319
Q

A security auditor has gathered many logs from the core router and sees many dropped packets at random intervals. The auditor has collected enough data to report an ongoing security breach attempt. What type of malformed packets are likely being dropped but not alerting the network team? (Select all that apply.)

SELECT ALL THAT APPLY

Runts

Giants

Duplex/speed

Syslog

A

Runts
Giants

Runts are packets that are too small and will likely be discarded or dropped.

Giants are packets that are too large and will likely be discarded or dropped.

Most Ethernet interfaces operate in full-duplex mode. If an interface is operating in half-duplex mode, there is likely to be a problem unless you support a legacy device. Speed is the rated speed of the interface, measured in Mbps or Gbps.

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become a de-facto standard for logging events from distributed systems.

320
Q

Which layer of the Open System Interconnect (OSI) model specifies the physical layer of a network?

ANSWER
unselected
Layer 3

unselected
Layer 5

correct
THE CORRECT ANSWER

Layer 1

unselected
Layer 2

A

Layer 1 of the Open System Interconnect (OSI) model is the Physical layer. It specifies the physical topology and physical interface. It is responsible for the transmission and receipt of bits from one node to another node.

Layer 2 of the OSI model is the Data Link layer. It is responsible for transferring data between nodes on the same logical segment using local or hardware addresses (e.g. MAC address).

Layer 3 of the OSI model is the Network layer. Information is sent using logical network addresses (e.g. IP address).

Layer 5 of the OSI model is the Session layer. It represents the dialog control functions that administer the process of establishing the dialog, managing data transfer, and then ending (or tearing down) the session.

321
Q
A