CIS 444 exam 2 (final) Flashcards

computer information systems

1
Q

The network administrator for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?
Between the Internet access router and the rest of the private internetwork
Anywhere on the private internetwork, as long as the Internet is accessible
At the ISP’s network site
Between the Internet access router and the Internet Service Provider’s (ISP’s) network

A

Between the Internet access router and the rest of the private internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?
Hubs
Domains
Bridges
Routers

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following statements about hubs and switches are true?
All of the devices connected to a hub are not part of a single collision domain.
Hubs operate at the physical layer, whereas switches operate at the network layer.
Switches create a separate broadcast domain for each connected device, whereas hubs create a single broadcast domain for all of the connected devices.
There are switches available with network layer functionality, but there are no hubs with that capability

A

There are switches available with network layer functionality, but there are no hubs with that capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a packet collision between two systems occurs on an Ethernet network, Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) causes the two systems to stop transmitting and generate a jam signal. After sending the jam signal, why do the two systems wait for a randomized backoff interval before retransmitting their packets?
They need to rebuffer the packet.
To recalculate the packets’ checksum values.
To prevent another collision from occurring.
They need time to reassemble the packets

A

To prevent another collision from occurring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ralph is a freelance network consultant installing a three-node small business network. The computers are all in the same room and use wired Ethernet to connect to the switched ports of a multifunction device. The device also functions as a Network Address Translation (NAT) router for a cable modem connection to the Internet. NAT provides a measure of security, but Ralph wants to be sure that the network is protected from unauthorized Internet traffic and attacks against open ports. Which of the following solutions would enable Ralph to accomplish this goal with the minimum cost to the client?
Install a hardware firewall between the multifunction device and the cable modem.
Install an Intrusion Prevention System (IPS) between the multifunction device and the cable modem.
Install a personal firewall on each of the computers.
Connect an Intrusion Detection System (IDS) to one of the switched ports in the multifunction device

A

Install a personal firewall on each of the computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Each of the following Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) events occurs on an Ethernet network when two stations transmit simultaneously, although not in the order listed. Which of the following events occurs immediately after the collision?
The two stations transmit a jam signal.
The two stations observe a random backoff interval.
The two stations begin retransmitting their frames.
The two stations stop transmitting

A

The two stations stop transmitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Address Translation (NAT) operates at which layer of the Open Systems Interconnection (OSI) model?
Data link
Transport
Network
Application

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms refers to methods by which network traffic is prioritized to prevent applications from suffering faults due to network congestion?
Dynamic routing
QoS
Port forwarding
VLANs

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The jumbo frame capability is associated with which networking protocol?
Transmission Control Protocol (TCP)
Internet Protocol (IP)
Point-to-Point Protocol (PPP)
Ethernet

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Control plane policing (CPP or CoPP) is a feature on some routers and switches that limits the rate of traffic on the device’s processor, to prevent Denial-of-Service (DoS) and reconnaissance attacks, using which of the following technologies?
IPSec
802.1X
RA Guard
QoS

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?
512
1024
1518
1500

A

1500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some networks are designed with a switching fabric that contains redundant paths, for fault tolerance purposes. However, in this type of design, it is possible for packets to circulate endlessly around the network, which is called a switching loop. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?
STP
RIP
VLAN
NAT

A

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following are terms for an area of an enterprise network, separated by firewalls, which contains servers that must be accessible both from the Internet and from the internal network?
EGP
Stateless network
DMZ
Intranet

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling?
FTP
Teredo
IPsec
ICMPv6

A

Teredo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following devices enable users on private networks to access the Internet by substituting a registered IP address for their private addresses?
UTM appliance
Switch
NAT router
RADIUS server

A

NAT router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ralph has been hired by a company to redesign its Local Area Network (LAN). Right now, it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected through 3 hubs. The users on the network must be able to share files with one another and also access the shared servers. The users are complaining that the network is too slow. Management states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?
Split the network into smaller segments with dedicated hubs as opposed to shared hubs.
Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.
Split the network into two routed LANs with 20 users each.
Replace the hubs with a layer 3 switch and define two Virtual LANs (VLANs) with 20 users each.

A

Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following best defines the concept of the dual stack?
A computer with connections to two different network segments
A computer with two network interface adapters
A computer with two sets of networking protocols
A computer with two installed operating systems

A

A computer with two sets of networking protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following terms is used to describe the method by which a firewall examines the port numbers in transport layer protocol headers?
IP address filtering
Service-dependent filtering
Deep Packet Inspection (DPI)
Next-Generation Firewall (NGFW)

A

Service-dependent filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following physical network devices can conceivably be implemented as software in a computer’s operating system?
Hub
Transceiver
Firewall
Switch

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is not a method of traffic shaping?
Rate limiting
Bandwidth throttling
Self-limiting
WAN optimization

A

WAN optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following Virtual Private Network (VPN) protocols does not provide encryption within the tunnel?
IPSec
PPTP
SSL
L2TP

A

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following is the best description of geofencing?
Somewhere you are
Something you have
Something you know
Something you do

A

Somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social engineering has become an increasingly serious problem on your company network. Which of the following is an effective method for preventing sensitive data from being compromised through social engineering?
Use IPSec to encrypt all network traffic.
Install an antivirus software product on all user workstations.
Install a firewall between the internal network and the Internet.
Implement a program of user education and corporate policies.

A

Implement a program of user education and corporate policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In which of the following ways is VLAN hopping a potential threat?
VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.
VLAN hopping enables an attacker to rename the default VLAN on a switch.
VLAN hopping enables an attacker to scramble a switch’s patch panel connections.
VLAN hopping enables an attacker to change the native VLAN on a switch.

A

VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?
DTLS
SSL
SSH
TLS

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following types of systems are frequently used to collect information from Intrusion Detection Systems (IDSs)?
NGFW
VoIP
RADIUS
SIEM

A

SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following network devices does not employ Access Control Lists (ACLs) to restrict access?
Hubs
Switches
Routers
Wireless Access Points (WAPs)

A

Hubs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A user swipes a smartcard through the reader connected to a laptop and then types a password to log on to the system. Which of the following actions is the user performing?
Auditing
Authorization
Authentication
Accounting

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

At which layer of the Open Systems Interconnection (OSI) reference model does Dynamic Host Configuration Protocol (DHCP) snooping operate?
Network
Transport
Data link
Application

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In the hacker subculture, which of the following statements best describes a zombie?
A program that attackers use to penetrate passwords using brute-force attacks
A user that has fallen victim to a phishing attack
A computer that is no longer functioning because it is the target of a Denial-of-Service (DoS) attack
A computer that is remotely controllable because it has been infected by malware

A

A computer that is remotely controllable because it has been infected by malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In a client-to-site Virtual Private Network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?
Two workstations
Two VPN concentrators
A workstation and a server
A workstation and a VPN concentrator

A

A workstation and a VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?
SSL
SSH
IPsec
RDP

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Dynamic ARP Inspection (DAI) is a feature in some network switches that prevents on-path (man-in-the-middle) attacks facilitated by Address Resolution Protocol (ARP) poisoning, the deliberate insertion of fraudulent information into the ARP cache. A switch with DAI inspects incoming ARP packets and rejects those that contain incorrect pairs of IP and Media Access Control (MAC) addresses. Which of the following is the means by which the switch compiles a table of the correct ARP information for comparison with the incoming packets?
Secure SNMP
DNS name resolution
DHCP snooping
NDP

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following types of network devices can provide authentication services for multiple remote access servers using the device’s own account database?
NGFW
Hub
IDS
NAS

A

NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?
Require the creation of unique passwords
Require the use of special characters
Specify a maximum password change interval
Specify a minimum password length

A

Require the creation of unique passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

You are working at a client site with a managed router that includes a console port for administrative access, which you can use to connect a laptop and run a terminal program to access the device’s interface. Which of the following is the best term for this type of access to the device?
BYOD
Client-to-site
In-band
Out-of-band

A

Out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following types of Virtual Private Network (VPN) connection is the best solution for allowing clients limited access to your corporate network?
Host-to-host
Extranet
Host-to-site
Site-to-site

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

When starting her new position as a network administrator, Alice was given two user accounts. One account is intended for standard user activities, and another has the additional permissions needed for Alice to perform administrative tasks. This is an example of which of the following security concepts?
Defense in depth
Multifactor authentication
Least privilege
Zero

A

Least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Combining elements like something you know, something you have, and something you are to provide access to a secured network resource is a definition of which of the following types of authentication?
Multifactor
Multimetric
Multisegment
Multifiltered

A

Multifactor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?
Passwords that do not duplicate the user’s account name, birth date, or other personal information
Passwords that contain mixed upper- and lowercase letters, numbers, and symbols
Passwords that exceed a specific length
Passwords that do not duplicate a specific number of the user’s previous passwords

A

Passwords that contain mixed upper- and lowercase letters, numbers, and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following Virtual Private Network (VPN) protocols is generally considered to be obsolete?
L2TP
IPSec
SSL/TLS
PPTP

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following terms refers to a Denial-of-Service (DoS) attack that involves zombies?
Permanent
Amplified
Reflective
Distributed

A

Distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following services are methods of tracking a user’s activities on a network?
Accounting
Authentication
Authorization
Access control

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?
HTTP://
TLS://
HTTPS://
HTLS://

A

HTTPS://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following statements best describes a ransomware attack?
A website is rendered inaccessible by a Denial-of-Service (DoS) attack until its owner agrees to pay a fee.
A message appears on a user’s screen, stating that system is locked and will only be released on payment of a fee.
A user’s access to a specific resource, such as a bank’s website, is blocked until the user pays a fee.
An application is supplied with limited usability until the user pays a license fee.

A

A message appears on a user’s screen, stating that system is locked and will only be released on payment of a fee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following technologies can maintain an account database that multiple remote access servers can employ to authenticate remote users?
RADIUS
NAS
NGFW
IDS

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

You have just received notification of a new software release for an application you are running on your servers. The release is intended to address a newly discovered security vulnerability. Which of the following is the correct term for a software release containing a fix designed to address one specific issue?
A service pack
An upgrade
An update
A patch

A

A patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

In a host-to-host Virtual Private Network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?
A workstation and a server
Two workstations
A workstation and a VPN concentrator
Two VPN concentrators

A

Two workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following terms refers to the process by which a system tracks a user’s network activity?
Authorization
Access control
Authentication
Accounting

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Ed receives an email through his personal account, warning him that his checking account has been locked due to excessive activity. To confirm that the activity is fraudulent, the email instructs Ed to click the enclosed hyperlink, log on to his account, and review the list of charges. Ed clicks the link and is taken to a web page that appears to be that of his bank. He then supplies his username and password to log on. Which of the following types of attacks is Ed likely to be experiencing?
Social engineering
Phishing
Spoofing
Logic bomb

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following are not considered to be Denial-of-Service (DoS) attacks?
An attacker connects a rogue access point to a company’s wireless network, using their Service Set Identifier (SSID) in the hope of attracting their users.
An attacker uses the
An intruder breaks into a company’s datacenter and smashes their web servers with a sledgehammer.
An attacker captures the packets transmitted only from a domain controller to obtain encrypted passwords.

A

An attacker connects a rogue access point to a company’s wireless network, using their Service Set Identifier (SSID) in the hope of attracting their users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following types of Virtual Private Network (VPN) connection is the best solution for connecting a home user to a corporate network?
Extranet
Host-to-site
Host-to-host
Site-to-site

A

Host-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

In most cases, a Denial-of-Service (DoS) attack refers to a deliberate attempt to overwhelm a server with incoming traffic. However, this is not always the case. Which of the following types of DoS attacks does not involve flooding a server with traffic?
Distributed
Amplified
Permanent
Reflective

A

Permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of the following standards defines a framework for the authentication process, but does not specify the actual authentication mechanism?
TLS
WPA
TKIP
EAP

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Regularly applying operating system updates and patches to network computers is an important mitigation procedure for which of the following security problems?
Port security
Denial-of-Service attacks
Social engineering
Malware

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

A server’s firewall is configured using a default policy that does not allow any users remote access to the server unless an administrator creates a rule granting them access. Which of the following terms describes this default policy?
Explicit deny
Explicit allow
Implicit deny
Implicit allow

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following is not a means of preventing physical security breaches to a network datacenter?
Badges
Tailgaters
Key fobs
Locks

A

Tailgaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

A multifactor authentication system consists of at least two different identifying criteria, typically falling into two of the following categories: something you have, something you do, something you know, and something you are. Which of the following authentication factors is an example of something you have?
A finger gesture
A smartcard
A password
A fingerprint

A

A smartcard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A senior IT administrator at your company was terminated two weeks ago. Today, Friday, you arrived at the office and found that all of the hosts in the web server farm had had their data deleted. There are no unauthorized entries to the datacenter recorded, but you suspect the terminated administrator is responsible for deleting the data. Which of the following attack types might the administrator have directed at the web server farm?
Social engineering
ARP poisoning
Logic bomb
Evil twin

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Many managed switches and routers include a console port for administrative access, to which you can connect a laptop and run a terminal program to access the device’s interface. Which of the following is the best term for this type of access to the device?
Out-of-band
BYOD
In-band
Client-to-site

A

Out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

When designing a wireless LAN installation, what is a valid reason to install a unidirectional antenna in an Access Point (AP), rather than an omnidirectional one?
A unidirectional antenna can be focused to a specific signal pattern width.
All of the above
There are many interior walls between the AP and the most distant workstation.
The AP will be located against an outside wall.

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Alice is attempting to deploy an IEEE 802.11b/g wireless LAN on the fifth floor of a 10-story office building that is surrounded on all sides by other office buildings, all of which seem to be running many wireless LANs. Scanning the 2.4 GHz band, she sees literally dozens of networks, spread across all of the available channels. As a result, her wireless devices have trouble connecting to their Access Point (AP), and when they do, they achieve only low speeds. Which task should Alice perform to enable the wireless clients to connect to the network more reliably?
Configure all of the network devices to use WPA2 encryption with AES.
Upgrade all of the network devices to the latest firmware.
Configure the AP to suppress SSID broadcasts.
Upgrade all of the wireless network devices to IEEE 802.11n.

A

Upgrade all of the wireless network devices to IEEE 802.11n.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following is the maximum theoretical download speed for a 5G cellular network?
150 megabits per second
42 megabits per second
1 gigabit per second
10 gigabits per second

A

10 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which of the following encryption protocols was introduced in the WiFi Protected Access (WPA) wireless security standard?
CCMP-AES
TACACS+
TKIP
EAP-TLS

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which of the following wireless LAN security protocols was rendered obsolete after it was found to be extremely easy to penetrate?
WEP
WPA
WPA2
EAP

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Ralph is having trouble providing satisfactory wireless network performance to some executive offices at the far end of the building. The wireless Access Point (AP) is based on the 802.11g standard. The offices have heavy doors and insulated walls for sound dampening, and the occupants typically leave their doors closed during work hours. Which of the following actions can Ralph take to provide the users in these offices with better wireless network performance?
Install an additional AP nearer to the offices.
Upgrade the AP to a model based on the 802.11n standard.
Modify the AP to use higher number channels.
Configure the AP to disable SSID broadcasting.

A

Install an additional AP nearer to the offices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

How does Media Access Control (MAC) address filtering increase the security of a Wireless Local Area Network (WLAN)?
By allowing traffic sent to or from specific MAC addresses through the Internet firewall
By substituting registered MAC addresses for unregistered ones in network packets
By permitting only devices with specified MAC addresses to connect to an access point
By preventing access points from broadcasting their presence

A

By permitting only devices with specified MAC addresses to connect to an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

CCMP-AES is an encryption protocol used with which of the following wireless network security standards?
WPA
WEP
EAP
WPA2

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Alice is a consultant working in your office, who has been given the Secure Set Identifier (SSID) and the passphrase for the company’s main wireless network, but she is unable to connect with her laptop. Which of the following security measures might be preventing her from connecting?
Disabling SSID broadcast
Geofencing
MAC filtering
Using WPA2

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A Wireless Access Point (WAP) enables computers equipped with wireless network interface adapters to function in which of the following topologies?
Ad hoc
Bus
Star
Infrastructure

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

At which layer of the Open Systems Interconnection (OSI) model do wireless range extenders operate?
Network
Physical
Transport
Data link

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following can be described as a wireless network hardening technique?
Encryption
Social engineering
Deauthentication
MAC addressing

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Ed has installed a separate 802.11n wireless network for guest users working in his company’s offices. The guest network is unsecured, and Ed has recently become aware that people outside the building are able to access it. It is not possible to move the Access Point (AP), and it must run at maximum power to reach the entire building. Which of the following is the most convenient way to prevent users outside the building from accessing the guest network while leaving it available to users inside the building?
Disable SSID broadcasting
Switch the network frequency
Change the passphrase daily
Implement MAC filtering

A

Disable SSID broadcasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Alice is trying to provide users in a warehouse with wireless network connectivity for their tablets. The warehouse is a huge concrete structure with many internal cinderblock walls. Which of the following types of signal interference are inhibiting Alice’s efforts?
Reflection
Refraction
Absorption
Diffraction

A

Absorption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following wireless security protocols was substantially weakened by its initialization vector?
WEP
WPA
PEAP
WPA2

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which of the following topologies enables wireless devices to access resources on a wired network?
Star
Ad hoc
Infrastructure
Bus

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

CCMP is based on which of the following encryption standards?
802.1X
RC4
TKIP
AES

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which of the following wireless LAN standards include the ability to use Multiple Input, Multiple Output (MIMO) antennae?
IEEE 802.11g
IEEE 802.11b
IEEE 802.11a
IEEE 802.11n

A

IEEE 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following components are required for two computers to communicate using an IEEE 802.11 wireless LAN in an ad hoc topology?
A router connected to the Internet
A Wireless Access Point (WAP)
An external antenna
None of the above

A

None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

You are deploying an 802.11n wireless network for a client that is asking for the best possible security you can provide without deploying additional servers. When setting up the Wireless Access Point (WAP), you disable Service Set Identifier (SSID) broadcasts, select WiFi Protected Access with Pre-Shared Keys (WPA-PSKs), and configure Media Access Control (MAC) address filtering. Which of the following statements about the security of this arrangement is true?
You should not use MAC address filtering since it exposes MAC addresses to possible attacks.
You should not disable SSID broadcasts since this prevents users from connecting to the network.
You should use WiFi Protected Access II (WPA2) instead of WPA, since it is more resistant to certain types of attacks.
The configuration is as secure as you can make it with the specified equipment

A

You should use WiFi Protected Access II (WPA2) instead of WPA, since it is more resistant to certain types of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following wireless security protocols uses CCMP-AES for encryption?
WPA2
WEP
WPA
TKIP

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Ralph is installing a wireless LAN that includes three Access Points (APs) to provide coverage for a large building. What must Ralph do to ensure that users are able to roam without interruption from one AP to another using their portable devices?
Configure each AP with the same IP address.
Configure each AP with the same security passphrase.
Configure each AP with different SSIDs.
Configure each AP to use different security protocols

A

Configure each AP with the same security passphrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which of the following is the fastest speed achievable by a wireless LAN using the currently ratified IEEE 802.11 standards?
600 Mbps
1.3 Gbps
2.6 Gbps
54 Mbps

A

1.3 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which form of the WiFi Protected Access (WPA) and WPA2 protocols require a RADIUS server?
WPA-Local
WPA-Personal
WPA-PSK
WPA-Enterprise

A

WPA-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following wireless networking standards is capable of supporting speeds of 54 Mbps and is also backward compatible with IEEE 802.11b?
Bluetooth
IEEE 802.11n
IEEE 802.11g
IEEE 802.11a

A

IEEE 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

On a wireless network, which of the following best describes an example of a captive portal?
A series of two doors with an intervening airlock through which people must pass before they can enter a secured space
A web page with which a user must interact before being granted access to a wireless network
A web page stating that the data on a user’s computer has been locked and will only be unlocked after payment of a fee
A dedicated switch port used to connect to other switches

A

A web page with which a user must interact before being granted access to a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Upgrading a wireless network from the Wired Equivalent Privacy (WEP) security protocol to WiFi Protected Access (WPA) enables it to use the Temporal Key Integrity Protocol (TKIP) for encryption, which generates a unique key for each packet. Which of the following types of attacks does this capability prevent?
Deauthentication attacks
Replay attacks
Brute-force attacks
Denial-of-Service (DoS) attacks

A

Replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which of the following is not a factor that weakens the security of the Wired Equivalent Privacy (WEP) protocol used on early IEEE 802.11 wireless LANs?
Open System Authentication
24-bit initialization vectors
Static shared secrets
40-bit encryption keys

A

Open System Authentication

89
Q

You are installing a wireless network in a site that has a great many 2.4 GHz wireless telephones. Which wireless networking technology can you use which will never experience interference from the telephones?
IEEE 802.11ac
IEEE 802.11b
IEEE 802.11n
IEEE 802.11g

A

IEEE 802.11ac

90
Q

You are a consultant with a client who wants to have you install a wireless network with the highest throughput currently available. What can you tell your client is the fastest speed achievable by a Wireless Local Area Network (WLAN) using the currently ratified IEEE 802.11 standards?
1.3 Gbps
2.6 Gbps
600 Mbps
54 Mbps

A

1.3 Gbps

91
Q

Which of the following was the first wireless LAN security protocol to come into common usage?
WPA2
WPA
WEP
TKIP

A

WEP

92
Q

A wireless network is configured to allow clients to authenticate only when the signal strength of their connections exceeds a specified level. Which of the following terms best describes this configuration?
Geofencing
Port security
Local authentication
Motion detection

A

Geofencing

93
Q

You have installed a new Wireless Access Point (WAP) on your network and configured it to use an SSID that is not broadcasted and WPA2 for security. Which of the following describes what you must do to configure your wireless clients?
Type the SSID manually and then select WPA2 from the security protocol options provided.
Type the SSID manually and allow the client to automatically detect the security protocol.
Select the SSID from a list and then select WPA2 from the security protocol options provided.
Select the SSID from a list and allow the client to automatically detect the security protocol

A

Type the SSID manually and then select WPA2 from the security protocol options provided.

94
Q

Which of the following is a power measurement of a specific transmitter and antenna combination, as used in a wireless access point?
MIMO
RSSI
SSID
EIRP

A

EIRP

95
Q

Which of the following IEEE wireless LAN standards provides the greatest possible throughput?
802.11ac
802.11n
802.11g
802.11b

A

802.11ac

96
Q

You are starting work at a new company, and on your first day, you ask about wireless access for your laptop. You are given a Service Set Identifier (SSID) and a WiFi Protected Access II (WPA2) passphrase. Later, in the lunchroom, when you try to connect your laptop to the network, you cannot see the SSID you were given in the list of available networks, although you can see other networks. What should you do next to try to resolve the problem?
Type the SSID in manually.
Type in the WPA2 passphrase.
Move closer to the Wireless Access Point (WAP).
Move away from the microwave in the lunchroom

A

Type the SSID in manually.

97
Q

EAP and 802.1X are components that help to provide which of the following areas of wireless network security?
Authorization
Authentication
Encryption
Accounting

A

Authentication

98
Q

Which of the following is a wireless topology that does not require the use of an access point?
Bus
Star
Infrastructure
Ad hoc

A

Ad hoc

99
Q

Which of the following did the second version of the WiFi Protected Access (WPA) protocol add to the standard?
CCMP-AES
MIMO
TKIP
WEP

A

CCMP-AES

100
Q

Some users are having a problem connecting to an application server on their local network. You go to their department and start to troubleshoot the problem by testing connectivity using the ping tool at one of the user workstations. You discover that you can ping the server successfully using its computer name, but pinging the computer’s fully qualified domain name (FQDN) fails. As a result of these tests, which of the following can you determine is the most likely source of the problem?
EMI
ACL
DHCP
DNS

A

DNS

101
Q

Which of the following Domain Name System (DNS) resource records is not used for forward name resolution?
MX
CNAME
PTR
AAAA

A

PTR

102
Q

Which IP address allocation method is not supported by Dynamic Host Configuration Protocol (DHCP)?
Stable
Dynamic
Manual
Automatic

A

Stable

103
Q

Dynamic Host Configuration Protocol (DHCP) clients rely on which of the following types of transmissions to locate and initiate contact with DHCP servers on the local network?
Multicast
Broadcast
Unicast
Anycast

A

Broadcast

104
Q

In the Domain Name System (DNS), a zone is a contiguous area of the DNS namespace for which authority is delegated to one or more DNS servers. Which of the following DNS resource record types specifies the IP addresses of the authoritative DNS servers for a particular zone?
NS
MX
PTR
SRV

A

NS

105
Q

Which of the following is the range of IPv4 addresses that Automatic Private IP Addressing (APIPA) assigns to DHCP clients that cannot access a DHCP server?
224.0.0.0 to 224.0.255.255
169.254.0.0 to 169.254.255.255
192.168.0.0 to 192.168.0.255
10.0.0.0 to 10.0.255.255

A

169.254.0.0 to 169.254.255.255

106
Q

Ralph is troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.4.0/24 network address. No one else on that network is reporting a problem. Ralph checks that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then runs
The Subnet Mask is incorrect.
The Default Gateway address is missing.
The DNS server addresses are incorrect.
The DHCPv4 scope is exhausted

A

The DHCPv4 scope is exhausted

107
Q

Which of the following DHCP address allocation methods enables the server to reclaim IP addresses when they are no longer in use by clients?
Dynamic
Manual
Automatic
Static

A

Dynamic

108
Q

Which of the following technologies enables the IP addresses assigned to clients by a Dynamic Host Configuration Protocol (DHCP) server to be automatically added to the DNS namespace?
Reverse name resolution
Automatic allocation
HOSTS
Dynamic DNS

A

Dynamic DNS

109
Q

Which of the following is a tool that integrates DHCP and DNS so that each is aware of the changes made by the other?
IPAM
DHCPv6
HOSTS
APIPA

A

IPAM

110
Q

In designing a network for a client, Ed has decided to use both internal and external DNS servers. Which of the following resources should Ed register with the external DNS server?
Company database servers
Internet web servers
Admin workstation
Domain controllers

A

Internet web servers

111
Q

Which of the following Domain Name System (DNS) resource records is used only for reverse name resolution?
PTR
AAAA
MX
CNAME

A

PTR

112
Q

Alice is troubleshooting a problem that some users are having connecting to an application server on the local network. While testing connectivity using the ping tool, she discovers that she can ping the server successfully using its computer name, but pinging the computer’s fully qualified domain name (FQDN) fails. Which of the following is most likely the source of the problem?
ACL
EMI
DNS
DHCP

A

DNS

113
Q

Which of the following protocols are responsible for assigning IP addresses to hosts?
Name Server(NS)
Dynamic Host Configuration Protocol (DHCP)
File Transfer Protocol (FTP)
Domain Name System (DNS)

A

Dynamic Host Configuration Protocol (DHCP)

114
Q

Which of the following mechanisms enables administrators to maintain current DNS database information on multiple name servers, for fault tolerance and load balancing purposes?
UDP forwarding
Zone transfer
Multi-master replication
Iterative query

A

Zone transfer

115
Q

In which of the following DNS transactions does the querying system generate a recursive query?
A client’s DNS server sends a request to the
A client’s DNS server sends a request to the com top-level domain server to find the authoritative server for the
A DNS client sends the server name
A client’s DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.

A

A client’s DNS server sends a request to a root domain server to find the authoritative server for the com top-level domain.

116
Q

Which of the following best describes what happens when a DNS server receives an iterative name resolution query?
The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by forwarding the name resolution request to another DNS server in a recursive query.
The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing that, with an error message stating that it could not resolve the requested name.
The DNS server attempts to resolve the requested name by checking its own resource records and cache, or failing that, by issuing its own iterative queries to other DNS servers.
The DNS server responds immediately if it is the authoritative server for the domain in which the requested name is located. Otherwise, it returns an error message stating that it could not resolve the requested name.

A

The DNS server responds immediately to the query with the best information it has in its resource records or in its cache, or failing that, with an error message stating that it could not resolve the requested name.

117
Q

Which of the following Dynamic Host Configuration Protocol (DHCP) options prevents the client from transmitting IP datagrams that circulate endlessly around the network?
ARP cache timeout
Interface MTU
Default IP TTL
TCP keepalive interval

A

Default IP TTL

118
Q

Which of the following is the IPv6 equivalent of Automatic Private IP Addressing (APIPA)?
EUI-64
DHCPv6
SLAAC
APIPAv6

A

SLAAC

119
Q

Ralph has configured a server called NE6 to function as a web server. He does not want to change the server’s existing name, but he wants it to also be accessible to clients using the name
Create an additional A resource record.
Create a new CNAME resource record.
Create a new PTR resource record.
Modify the existing A resource record

A

Create a new CNAME resource record.

120
Q

Your company has a seven-node failover cluster hosting databases on SQL Server. Each server has three network interface adapters installed in it. Two are standard Gigabit Ethernet adapters that provide the nodes with access to each other and clients with access to the cluster. One is a Fibre Channel adapter that provides the cluster nodes with access to a dedicated network that also hosts a large hard disk array. Which of the following terms describe the networks to which the cluster nodes are connected?
WAN
PAN
SAN
MAN

A

SAN

121
Q

Which of the following Storage Area Network (SAN) protocols are capable of sharing a network medium with standard Local Area Network (LAN) traffic?
Fibre Channel
FCoE
InfiniBand
InfiniChannel

A

FCoE

122
Q

In which of the following ways does a vSwitch (virtual switch) differ from a physical switch?
Virtual switches cannot forward traffic to the host server running them, whereas physical switches can forward traffic to all connected computers.
Physical switches always include layer 3 functionality, whereas virtual switches do not.
Virtual switches have an unlimited number of ports, whereas physical switches have a specific number.
Physical switches typically support the creation of VLANs, whereas virtual switches do not.

A

Virtual switches have an unlimited number of ports, whereas physical switches have a specific number.

123
Q

Ralph is designing a hybrid deployment for a corporate client that will require a connection between the client’s private network and a public cloud provider. The client is concerned about this connection becoming a speed bottleneck at times of heavy user traffic. Which of the following options can Ralph offer the client that will best address this potential problem?
Use a cloud direct connection for the hybrid link.
Use a leased line connection to the ISP
Use a different ISP for the cloud connection.
Use a VPN for the cloud connection

A

Use a cloud direct connection for the hybrid link.

124
Q

Which of the following protocols are included in an FCoE packet?
TCP
Ethernet
UDP
None of the above

A

Ethernet

125
Q

Which of the following layers in a Software-Defined Network (SDN) architecture consists of hardware devices?
Infrastructure
Core
Application
Control

A

Infrastructure

126
Q

Which of the following cloud service models provides the consumer with the least amount of control over the cloud resources?
SaaS
IaaS
PaaS
IaaS, PaaS, and SaaS all provide the same degree of control

A

SaaS

127
Q

Which of the following is the term for the client that accesses an iSCSI device on a storage area network?
Adapter
Controller
Target
Initiator

A

Initiator

128
Q

Which of the following is not one of the advantages of iSCSI over Fibre Channel?
iSCSI includes its own internal flow control mechanism, whereas Fibre Channel does not.
iSCSI is less expensive to implement than Fibre Channel.
iSCSI is routable, whereas Fibre Channel is not.
iSCSI can share the same network as standard local area network traffic, whereas Fibre Channel cannot.

A

iSCSI includes its own internal flow control mechanism, whereas Fibre Channel does not.

129
Q

Which of the following best describes the difference between east-west and north-south traffic in a datacenter?
East-west describes traffic between devices at the same layer of the OSI model, while north-south describes traffic between OSI model layers.
East-west traffic stays within the datacenter, while north-south traffic does not.
East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.
East-west is switch-to-switch traffic, while north-south is switch-to-router traffic

A

East-west traffic stays within the datacenter, while north-south traffic does not.

130
Q

Which of the following cloud service models enables you to perform a new installation of an operating system of your choice?
PaaS
IaaS
DaaS
SaaS

A

IaaS

131
Q

Which of the following is not the name of one of the layers in the three-tier datacenter architecture?
Access
Distribution
Core
Intermediate

A

Intermediate

132
Q

Which of the following protocols are included in a Fibre Channel packet?
UDP
IP
TCP
None of the above

A

None of the above

133
Q

In its primary functionality, a network attached storage (NAS) device is most closely associated with which of the following devices?
Failover cluster
JBOD
RAID
File server

A

File server

134
Q

On which of the following virtual networking components can you create VLANs?
Virtual firewall
Virtual switch
Virtual router
Virtual NIC

A

Virtual switch

135
Q

Ralph, the administrator of a 500-node private internetwork, is devising a plan to connect the network to the Internet. The primary objective of the project is to provide all of the network users with access to web and email services while keeping the client computers safe from unauthorized users on the Internet. The secondary objectives of the project are to avoid having to manually configure IP addresses on each one of the client computers individually and to provide a means of monitoring and regulating the users’ access to the Internet. Ralph submits a proposal calling for the use of private IP addresses on the client computers and a series of proxy servers with public, registered IP addresses, connected to the Internet using multiple T-1 lines. Which of the following statements about Ralph’s proposed Internet access solution is true?
The proposal satisfies the primary objective and one of the secondary objectives.
The proposal fails to satisfy both the primary and secondary objectives.
The proposal satisfies the primary objective and both of the secondary objectives.
The proposal satisfies the primary objective but neither of the secondary objectives

A

The proposal satisfies the primary objective and one of the secondary objectives.

136
Q

Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?
vSwitch (virtual switch)
Virtual server
Hypervisor
VPN concentrator

A

Hypervisor

137
Q

Top-of-rack switches most commonly form which layer of the datacenter topology?
Core
Spine
Leaf
Backbone

A

Leaf

138
Q

Which of the following statements about the differences between Network Attached Storage (NAS) and Storage Area Networks (SANs) are true?
NAS devices typically provide a filesystem, whereas SAN devices do not.
NAS devices typically contain integrated iSCSI targets.
SAN provides file-level storage access, whereas NAS provides block-level storage access.
SAN devices have an operating system, whereas NAS devices do not

A

NAS devices typically provide a filesystem, whereas SAN devices do not.

139
Q

Which of the following are examples of Virtual IP (VIP) addresses?
A public IP address substituted for a host’s own private IP address by a switch
An IP address assigned to a host workstation by a DHCP server
An IP address assigned to a host workstation by APIPA
An IP address assigned to a virtual NIC

A

An IP address assigned to a virtual NIC

140
Q

For a complete restore of a computer that failed at noon on Tuesday, how many jobs would be needed if you performed full backups to tape at 6:00 a.m. every Wednesday and Saturday and incremental backups to tape at 6:00 a.m. every other day?

Two

Four

Three

One

A

Four

141
Q

After using a tape backup solution for years, you have recently started backing up your server to an external hard disk drive. Your backup schedule calls for weekly full backups and daily incremental backups. In the past, performing a restore required multiple jobs, but now only a single job is needed. Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?

Because hard drives use a different block size than tape drives

Because hard drives hold more data than tape drives

Because hard drives can transfer data faster than tape drives.

Because hard drives are random access devices and tape drives are not

A

Because hard drives are random access devices and tape drives are not

142
Q

You are installing a new Windows server with two hard disk drives in it, and you want to use RAID to create a fault-tolerant storage system. Which of the following RAID levels can you configure the server to use?

RAID 10

RAID 0

RAID 5

RAID 1

A

RAID 1

143
Q

You are negotiating an agreement with a provider for your company’s email service. You have been told to require a 99.99 percent guaranteed rate of service reliability, but the provider is only willing to guarantee 99 percent. Eventually, you and the provider agree on a compromise of 99.9 percent. Which of the following documents will include the negotiated language on this particular point?

BYOD

AUP

SLA

NDA

A

SLA

144
Q

Which of the following is not a load balancing mechanism?

DNS round-robin

NIC teaming

RAID 1

Server clustering

A

RAID 1

145
Q

Which of the following indicators is typically not included in an operating system’s performance monitoring tool, such as the Windows Performance Monitor or the MacOS Activity Monitor?

Memory consumption

CPU/processor activity

Network utilization

Temperature

A

Temperature

146
Q

Which of the following syslog message severity levels indicates that a system is unusable?

3

1

0

2

A

0

147
Q

If you have a server with dual power supplies, one of which is plugged into a single Uninterruptible Power Supply (UPS) and the other into a wall socket with a surge protector, and the building’s power circuit is connected to a backup generator, which failure can the server survive and keep running indefinitely?

Failure of two NICS

Failure of one NIC

Failure of the building power circuit

Failure of one server power supply

A

Failure of one server power supply

148
Q

Disk mirroring and disk duplexing are both fault tolerance mechanisms for hard disk data storage. Which of the following statements about disk mirroring and disk duplexing is true?

Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.

Disk mirroring enables a server to survive the failure of a disk drive.

Disk duplexing enables a server to survive the failure of a disk controller.

Disk mirroring enables a server to survive a failure of a disk drive or a disk controller.

A

Disk duplexing enables a server to survive a failure of a disk drive or a disk controller.

149
Q

Which of the following is an element of high availability systems that enables them to automatically detect problems and react to them?

Backups

Failover

Snapshots

Cold sites

A

Failover

150
Q

You have just completed negotiating an annual contract with a provider to furnish your company with cloud services. As part of the contract, the provider has agreed to guarantee that the services will be available 99.9 percent of the time, around the clock, seven days per week. If the services are unavailable more than 0.1 percent of the time, your company is due a price adjustment. Which of the following terms describes this clause of the contract?

SLA

AUP

MTTR

MTBF

A

SLA

151
Q

Which of the following is the primary difference between the Power Distribution Units (PDUs) used in datacenters and the standard power strips used in offices and homes?

More outlets

Larger power output

All of the above

Larger power input

A

Larger power input

152
Q

Which of the following port numbers is assigned to a Unix logging services program?

514

636

389

993

A

514

153
Q

Which of the following is not one of the criteria typically used by load balancers to direct incoming traffic to one of a group of servers?

Which server has the fastest response time

Which server is next in an even rotation

Which server has the fastest processor

Which server has the lightest load

A

Which server has the fastest processor

154
Q

When you configure NIC teaming on a server with two network adapters in an active/passive configuration, which of the following services is provided?

Server clustering

Load balancing

Fault tolerance

Traffic shaping

A

Fault tolerance

155
Q

Which statement about backing up a firewall’s state and backing up its configuration is true?

A backup of a firewall’s state contains less data than a backup of its configuration.

A backup of a firewall’s state contains the exact same data as a backup of its configuration.

A backup of a firewall’s state includes its configuration.

A backup of a firewall’s configuration contains more data than a backup of its state.

A

A backup of a firewall’s state includes its configuration.

156
Q

You are the network administrator of your company’s network. Your company wants to perform a baseline analysis of network-related traffic and statistics. They want to track broadcasts, Cyclical Redundancy Check (CRC) errors, and collisions for all traffic traversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets these needs?

SNMP management

Protocol analyzer

Performance Monitor

Network traffic monitor

A

SNMP management

157
Q

Which of the following can be provided by clustering servers?

Load balancing

All of the above

Fault tolerance

Failover

A

All of the above

158
Q

Which RAID level provides fault tolerance with the smallest amount of usable disk space?

RAID 0

RAID 5

RAID 1+1

RAID 10

A

RAID 1+1

159
Q

Which of the following backup job types does not reset the archive bits of the files it backs up?

Differential

Full

Supplemental

Incremental

A

Differential

160
Q

You are a new hire at Adatum Corp., and this is your first day on the job. You are setting up your workstation, but you are unsure whether you are permitted to install your favorite software on the company’s computer. The Human Resources server has a large library of employee documents. Which of the following is a document that you might want to consult to determine whether personal software is allowed?

BYOD

AUP

SLA

NDA

A

AUP

161
Q

Which of the following best describes the difference between cold, warm, and hot backup sites?

The age of the most recent backup stored at the site

The time needed to get the site up and running

The cost of the hardware used at the site

Whether the backup site is owned, borrowed, or rented

A

The time needed to get the site up and running

162
Q

To build a network with redundant Internet connections that ensures full fault tolerance, it is necessary to use which of the following?

Different WAN connections

Different ISPS

Different routers

All of the above

A

All of the above

163
Q

Which network application is most likely to be affected by the wired network connectivity problem known as jitter?

Streaming video

Website access

Email

Instant messaging

A

Streaming video

164
Q

If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and incremental backups in the evening of the other days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Monday at noon?

Six

Two

One

Five

A

Five

165
Q

You are installing a new server that is equipped with two power supplies. The server’s firmware enables you to set the mode in which the power supplies will be used. In which of the following modes must the dual power supplies be running for the system to be fault tolerant?

Combined mode

Individual mode

Hot backup mode

Redundant mode

A

Redundant mode

166
Q

Redundant servers running in an active-active configuration provide what advantage that the same servers in an active-passive configuration do not?

Physical security

Increased performance

Data encapsulation

Fault tolerance

A

Increased performance

167
Q

Which RAID level provides fault tolerance by storing parity information on the disks, in addition to the data?

RAID 0

RAID 10

RAID 1

RAID 5

A

RAID 5

168
Q

If you back up your network by performing a full backup every Wednesday at 6:00 p.m. and differential backups in the evening on the other six days of the week, how many jobs would be needed to completely restore a computer with a hard drive that failed on a Tuesday at noon?

Seven

Six

Two

One

A

Two

169
Q

Which type of backup job is supported by the Windows Server Backup program?

Full

Differential

Tape

Supplemental

A

Full

170
Q

Delays in the transmission of data packets over a network can result in temporary service interruptions, dropouts, or even data loss. Which of the following terms is used to describe these delays?

Crosstalk

Attenuation

Electromagnetic interference (EMI)

Jitter

A

Jitter

171
Q

Which of the following terms best describes a connectivity problem on wired networks that is caused by individual packets that are delayed due to network congestion, different routing, or queuing problems?

Bottleneck

Jitter

Attenuation

Latency

A

Jitter

172
Q

Which of the following datacenter disaster recovery mechanisms is the least expensive to implement?

A cloud site

A warm site

A cold site

A hot site

A

A cloud site

173
Q

Which of the following disaster recovery mechanisms is the least expensive to implement?

All of the options cost the same.

A cold site

A warm site

A hot site

A

A cold site

174
Q

Parity is a fault tolerance technique used by disk storage arrays in which an additional parity bit is stored for a specified number of data bits. By using the parity information, the storage subsystem can calculate the values of bits that have been lost due to a disk failure, enabling the system to re-create the lost data. Redundant Array of Independent Disks (RAID) is a type of storage array that sometimes uses parity to provide fault tolerance. Which RAID level provides fault tolerance by using parity data?

RAID 0

RAID 1

RAID 5

RAID 10

A

RAID 5

175
Q

When you run a port scanner on a server, which of the following is the result?

A list of the computer’s hardware ports that are currently in use

A list of the servers currently running user processes

A list of open ports through which the system can be accessed

A list specifying the numbers of packets transmitted and received by each network adapter on the system

A

A list of open ports through which the system can be accessed

176
Q

Which of the following storage techniques prevents version skew from occurring during a system backup?

Incrementals

Iterations

Snapshots

Differentials

A

Snapshots

177
Q

Which of the following RAID levels uses disk striping with distributed parity?

RAID 10

RAID 0

RAID 1

RAID 5

A

RAID 5

178
Q

In a disaster recovery scenario, which of the following terms applies to devices that are not repairable?

MDT

MTBF

MTTR

MTTF

A

MTTF

179
Q

Which RAID level provides fault tolerance without using parity data?

RAID 1

RAID 11

RAID 0

RAID 5

A

RAID 1

180
Q

Alice receives a call from a user who cannot connect to the company’s 802.11n wireless network with a laptop that has an 802.11g network adapter. Other users working in the same area are able to connect to the network without difficuity. Which step should Alice take first to try to resolve the problem?

Check whether the wireless adapter in the user’s laptop is enabled

Provide the user with an 802.11n wireless network adapter

Change the channel used by the Wireless Access Point (WAP)

Check whether the user is connecting to the correct LAN

A

Check whether the wireless adapter in the user’s laptop is enabled

181
Q

You are installing an ADSL router for your company’s new branch office. The router has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN1. When you plug a laptop into one of the Ethernet ports, you can access the Internet with no difficulties. You now need to connect the ADSL router to the company network so that the Wireless Access Points (WAPs) on the network can provide users with Internet access through the ADSL router. However, when you plug the router into a network switch port that is assigned to VLAN4, the switch starts generating “Native VLAN mismatch detected” errors once every minute. Which step should be part of the solution you implement to stop the error messages from appearing?

Create a VLAN1 on the network switch.

Configure the router port connected to the network switch to use VLAN4.

Create a VLAN1 on the ADSL router’s switch module.

Configure the network switch port connected to the router to use VLAN1

A

Create a VLAN1 on the ADSL router’s switch module

182
Q

You are working your company’s IT help desk, where you are required to follow a specific troubleshooting protocol when handling calls from users. In which of the following troubleshooting steps would you create a trouble ticket?

Document findings, actions, and outcomes

Test the theory to determine the cause

Implement the solution or escalate as necessary

Identify the problem

A

Identify the problem

183
Q

You are working your company’s IT help desk, and you have had several calls from users who are reporting problems with their Voice over Internet Protocol (VoIP) and streaming video connections. In each case, the audio or video connection experiences frequent dropouts in sound or video, causing frustrating interruptions. Which of the following terms describes a connectivity problem on a wired network that could cause these symptoms?

Jitter

Attenuation

Bottleneck

Latency

A

Jitter

184
Q

Ralph is having trouble providing satisfactory wireless network performance to some executive offices at the far end of the building. The offices have heavy doors and insulated walls for sound dampening, and the occupants typically leave their doors closed during work hours. Which of the following types of radio signal interference is Ralph trying to overcome?

Absorption

Reflection

Diffraction

Refraction

A

Absorption

185
Q

You receive a call at the IT help desk from a user who has recently moved to a new office in the company building, down the hall from her old one. Since the move, she has only been able to access the company’s wireless network with her laptop intermittently. The network is based on 802.11n equipment, and it is using the 2.4 GHz frequency and the WPA2 security protocol. The user never had a problem in her previous office location. Which of the following could not possibly be the cause of her problem?

The user’s laptop is configured with the wrong WPA2 passphrase.

The user’s new office is farther from the access point than her old one.

The user’s laptop is connecting to the wrong SSID.

The user’s laptop is configured to use the 5 GHz frequency.

A

The user’s new office is farther from the access point than her old one

186
Q

You have constructed a network on which all of the computers are connected to a single switch. You then create Virtual Local Area Networks (VLANs) on the switch, corresponding to the company’s departments, and add the switch port for each user workstation and department server to the appropriate VLAN. Later, users report that while they can access their departmental servers and the workstations of other users in the same department, they cannot communicate with any of the other departments. What is the problem, and what must you do to correct it?

VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.

There is a faulty VLAN configuration on the switch. You must re-create all of the VLANs and configure each VLAN for routing

One of the VLANs is configured to filter all of the other VLAN traffic for security purposes. You must change the filter on this one VLAN.

The VLANS using different data link layer protocols. You must configure the VLANs to use the same data link layer protocol in order for them to communicate with each other.

A

VLANs are limited to data link layer communication only. To enable communication between the VLANs, you must install a router or a layer 3 switch on the network and configure it to route traffic between the VLANs.

187
Q

Clients of Ralph’s company are calling to complain that, when they try to access the company’s website, they see an error message stating that the website has an untrusted security certificate. They are afraid that they are connecting to an unprotected site or that the site has been taken over by hackers. What must Ralph do to address this problem?

Install a certification authority on one of the network servers

Configure the web servers to generate a self-signed certificate

Explain to the clients that it is safe to bypass the error message and proceed to the website

Obtain an SSL certificate from a trusted third-party company

A

Obtain an SSL certificate from a trusted third-party company

188
Q

Alice is having trouble with a new fiber-optic cable run that has just been installed between two buildings on her company’s campus. To confirm that there is a problem with the cables, Alice consults the wiring diagram provided by the cable installer and begins to calculate the optical power loss resulting from cable installation factors such as the type of cable used, the attenuation resulting from the length of the cable runs, and the number and type of splices. Which of the following terms describes the calculations that Alice is performing?

Optical link budget

Protocol analysis

Received Signal Strength Indication (RSSI)

Routing loop

A

Optical link budget

189
Q

A user, Ed, is reporting what appear to be intermittent traffic interruptions on his workstation. Sometimes he receives responses to his server requests, and sometimes not. It does not seem to be an Internet issue, because the problem also occurs with local server requests. While troubleshooting the problem, Ralph performs a series of packet captures and analyzes the network traffic. He discovers that all of the request messages generated by Ed’s workstation have responses on the network, but in some cases, the responses are going to a workstation other than Ed’s. Which of the following conditions could be causing this to happen?

Duplicate IP addresses

Incorrect host firewall settings

Blocked TCP/UDP ports

Duplicate MAC addresses

A

Duplicate MAC addresses

190
Q

Which of the following is not a general troubleshooting step?

Verify that the router is forwarding.

Implement the solution or escalate as necessary

Verify full system functionality and, if applicable, implement preventive measures

Document findings, actions, and outcomes

A

Verify that the router is forwarding.

191
Q

Ralph has begun to receive calls from users reporting that they cannot access the local network or the Internet. Ralph checks their computers and discovers that all of the users with a problem have IP addresses in the 169.254.0.0/16 network, which is not the address used on Ralph’s network. Which of the following might be the cause of the problem?

There is a rogue DHCP server somewhere on the network.

The users have tried to modify their IP configuration settings.

The IP address leases assigned by the DHCP server have expired.

The users’ workstations have been infected by a form of malware

A

The IP address leases assigned by the DHCP server have expired.

192
Q

Despite having imposed password policies on your network that compel users to change their passwords frequently, create passwords of a specific length, and use complex passwords, you have still had several reports of account penetrations. After investigating the incidents, you determine that the victims had all apparently shared a “tip” suggesting that users cycle through the names of their children, nephews, nieces, and other relatives when forced to create new passwords, changing letters to numbers as needed. Which of the following actions can you take to remedy the situation without creating a larger problem?

Assign the users long passwords consisting of random-generated characters and change them often.

Change the minimum password age policy to a larger value.

Modify the password policies to force users to change passwords more frequently.

Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.

A

Distribute a list of common passwords that are insecure, such as those based on names, birth dates, etc.

193
Q

Trixie has recently moved to a new office in her company’s building, down the hall from her old one. Since the move, she has only been able to access the wireless network with her laptop intermittently. She never had a problem in her previous location. Which of the following could possibly be the cause of her problem?

There are too many walls between Trixie’s new office and the AP

Trixie’s new office is too close to the Access Point (AP).

Her laptop is connecting to the wrong SSID.

The AP is using an omnidirectional antenna.

A

There are too many walls between Trixie’s new office and the AP

194
Q

Ralph is setting up a network connection for a new vice president, who is supplying his own laptop under the company’s Bring Your Own Device (BYOD) policy. He plugs the computer into the wall plate, and the link pulse Light-Emitting Diode (LED) lights up. Then, back in the datacenter. he uses a patch cable to connect the corresponding port in the patch panel to a port in the network switch. Later, the VP calls Ralph to report that data transfers between his laptop and the network servers are extremely slow. Which of the following could explain the problem?

The network adapter drivers on the laptop are outdated.

There is a duplex mismatch between the laptop and the network switch.

The switch port is disabled.

Ralph used a crossover cable to connect the laptop to the wall plate.

A

There is a duplex mismatch between the laptop and the network switch.

195
Q

A user calls Alice at the help desk to report that her mouse has stopped working, she cannot access the Internet, and all of her email has disappeared from her inbox. Which of the following would be the best course of action for Alice to take?

Create a separate trouble ticket for each problem

Have the caller’s computer replaced with a new one

Escalate the call to a senior technician

Send a technician to the user’s site to address all of the problems.

A

Create a separate trouble ticket for each problem

196
Q

Ralph has installed a new Category 5e (Cat 5e) cable run himself. He has attached keystone connectors to both ends of the cable, mounted the office-side connector to a wall plate, and mounted the datacenter connector into a patch panel. Then he took a patch cord and connected the patch panel port to an open port in one of the network switches. However, the Light-Emitting Diode (LED) on the switch port does not light. What should Ralph do?

Plug a computer into the wall plate

Repull the cable run using Category 6 cable

Make sure the switch port is not disabled

Check the cable run for wiring faults

A

Plug a computer into the wall plate

197
Q

Which of the following is considered a systemwide error?

A problem with a router that affects only one Local Area Network (LAN)

A fatal error that causes a single computer to fail

A problem with an order entry or customer service call center resource

A problem with an email server that affects all network users

A

A fatal error that causes a single computer to fail

198
Q

Ralph is the administrator of a small company’s wireless network. He has recently discovered evidence that users outside of the company’s office space have been accessing its wireless network. The office is located in a narrow space against the building’s outside wall. Ralph is concerned that the network’s Wireless Access Point (WAP) is extending coverage outside the building. Speaking with a consultant friend of his Ralph is advised to install a different type of antenna on his Access Point (AP). Which of the following antenna types would most likely help Ralph to alleviate the problem?

Unidirectional

Dipole

Yagi

Patch

A

Patch

199
Q

Which of the following network interface occurrences is considered to be a malfunction on a full-duplex Ethernet network but is not a malfunction on a half-duplex Ethernet network?

Giants

Late collisions

Runts

Collisions

A

Late collisions

200
Q

Which step of the troubleshooting model involves replacing components until a faulty hardware device is identified?

Test the theory to determine the cause

Document findings, actions, and outcomes

Verify full system functionality.

Establish a plan of action to resolve the problem

A

Test the theory to determine the cause

201
Q

Ed is a first-tier support technician. He receives the help calls listed here. His job is to prioritize them based on their severity. Which of the following should be the problem that receives the lowest priority?

A problem with a mission-critical backbone router that affects an entire network

A fatal error that causes a single computer to fail

A problem with an application server that affects a single LAN

A problem with an order entry or customer service call center resource that affects an entire department, with multiple Local Area Networks (LANs)

A

A fatal error that causes a single computer to fail

202
Q

Alice’s network has been experiencing intermittent service slowdowns and outages ever since the company moved into their new building. She has tried every troubleshooting procedure she can think of and has not been able to determine the cause. One particular user, hoping to be the squeaky wheel that gets the grease, has taken to calling Alice every time he experiences a problem. One day, as she is working in the datacenter, Alice notices that the user calls her every time she hears an additional humming noise begin. After examining the doors in the hallway, Alice realizes that the racks containing her switches are located right next to the building’s elevator machinery room. Which of the following conditions is probably causing the network communication problem?

EMI

Attenuation

NEXT

FEXT

A

EMI

203
Q

Ralph is working with an Asymmetric Digital Subscriber Line (ADSL) router that has a switch module containing four Ethernet ports, all of which are assigned to the default VLAN1. Ralph can plug a laptop into one of the router’s ports and access the Internet with no problems. Ralph now needs to connect the ADSL router to the company network, so that the wireless access points on the network can provide users with Internet access through the ADSL router. However, when Ralph plugs the router into a network switch port in VLAN4, the switch starts generating “Native VLAN mismatch detected” errors every minute. Which step should be part of the solution Ralph implements to stop the error messages?

Configure the network switch port connected to the router to use VLAN1

Create a VLAN1 on the network switch

Configure the router port connected to the network switch to use VLAN4

Create a VLANS on the network switch

A

Configure the router port connected to the network switch to use VLAN4

204
Q

Which statement about prioritizing help calls is true?

Departmental problems take precedence over networkwide problems.

Individual desktop problems take precedence over problems with shared resources.

Problems with shared resources take precedence over individual desktop problems.

Networkwide problems take precedence over security problems.

A

Problems with shared resources take precedence over individual desktop problems

205
Q

In which troubleshooting step is a trouble ticket created?

Test the theory to determine cause

Establish a plan of action to resolve the problem and identify potential effects

Document findings, actions, and outcomes

Identify the problem

A

Identify the problem

206
Q

A user calls you at the IT help desk and reports that she is having intermittent problems accessing both local servers and internet websites. Which of the following potential problems can you rule out immediately?

Duplicate Media Access Control (MAC) addresses

Malfunctioning Domain Name System (DNS) server

Malfunctioning router

Duplicate IP addresses

A

Duplicate IP addresses

207
Q

A user calls the company’s IT help desk to report that she has received an error message on her Windows workstation. The error states that her computer has an IP address that is duplicated on the network. Ralph is concerned that there might be a configuration problem with the DHCP servers on the network. He suspects that there are DHCP servers configured with scopes that overlap, resulting in two DHCP servers assigning the same IP addresses to different clients. He is worried that they are about to receive a flood of calls reporting the same problem. Alice reassures Ralph, telling him that it cannot be a DHCP problem, and that there must be two computers that are manually configured with the same IP address. How does Alice know this?

Because DHCP servers use DNS queries to check for duplicate IP addresses

Because Windows computers check the routing table before accepting an IP address from a DHCP server

Because it is only possible to have one DHCP server on a given subnet

Because DHCP clients use ARP broadcasts to check for duplicate IP addresses

A

Because DHCP clients use ARP broadcasts to check for duplicate IP addresses

208
Q

You are in the process of troubleshooting a user’s computer that is malfunctioning. Which step of the troubleshooting model involves replacing computer components until you have identified a faulty hardware device?

Test the theory to determine the cause

Verify full system functionality

Gather information.

Document findings, actions, and outcomes

A

Test the theory to determine the cause

209
Q

Alice receives a call in which a user reports that he is unable to send print jobs to the network-attached workgroup printer near his desk. Which of the following tasks should Alice perform first?

Reinstall the printer driver on the user’s workstation.

Check to see if there are printer firmware upgrades available.

Examine the switches to which the user’s workstation and the printer are connected.

Test network connectivity to the printer using the ping command.

A

Test network connectivity to the printer using the ping command.

210
Q

In the standard troubleshooting methodology, which of the following steps appears last, but must actually be practiced throughout the troubleshooting process?

Verify full system functionality and, if applicable, implement preventive measures

Establish a plan of action to resolve the problem and identify potential effects

Document findings, actions, and outcomes

Implement the solution or escalate as necessary

A

Document findings, actions, and outcomes

211
Q

Alice’s company is opening a new branch office, and Alice is responsible for building the domain controller for that office. She installs a new Windows server and configures it as a domain controller, and then ships it to the new office site. However, once it arrives and is connected to the home office network, the new domain controller fails to synchronize with the existing ones at the home office. Which of the following could be the cause of the problem?

Incorrect default gateway address

Server hardware failure

Duplicate IP addresses

Incorrect time

A

Incorrect time

212
Q

You are troubleshooting a workstation that cannot access the network. The workstation is plugged into a wall plate that should provide it with access to a DHCP-equipped network using the 192.168.4.0/24 network address. No one else on that network is reporting a problem. You check that the patch cable is properly plugged into the workstation and the wall plate, which they are, and then run

The DHCP scope is exhausted.

The DNS server addresses are incorrect.

The Default Gateway address is missing.

The Subnet Mask value is incorrect.

A

The DHCP scope is exhausted

213
Q

A user reports that she cannot connect to a server on her network. You want to identify the scope of the problem, so you try to reproduce the problem on the user’s computer. The problem persists. No other users are reporting the same problem. What is the next logical step that you should perform to identify the affected area?

Confirm that the switch the client is connected to is functioning

Perform the same task on another computer connected to the same segment.

Verify that the local router is forwarding traffic.

Examine the server’s configuration for the correct settings.

A

Perform the same task on another computer connected to the same segment

214
Q

Ralph is a first-tier technician working the help desk. After identifying a network problem submitted by multiple users, Ralph comes up with a theory specifying a possible source of the problem and sets about testing his theory. Unfortunately, testing indicates that Ralph’s theory is wrong; the source he suspected is not the cause of the problem. Which of the following should not be the next step in Ralph’s troubleshooting process?

Repeat the process of establishing a theory of probable cause

Begin replacing components that might contribute to the problem

Escalate the problem to a second-tier technician

Reinterview the users to gather more information about the problem

A

Begin replacing components that might contribute to the problem

215
Q

When troubleshooting, you begin by taking steps to identify the problem. After you do this, which of the following steps should you perform next?

Establish a plan of action

Verify full system functionality

Establish a theory of probable cause

Implement the solution

A

Establish a theory of probable cause

216
Q

Which step of the troubleshooting model involves identifying whether hardware or software has been recently installed or reconfigured?

Establish a plan of action to resolve the problem and identify potential effects

Determine if anything has changed.

Document findings, actions, and outcomes

Test the theory to determine cause

A

Determine if anything has changed.

217
Q

Ralph is experiencing long Access Point (AP) association times and generally poor performance on his home 802.11n wireless network. Ralph lives in a large apartment complex, and when he runs a WiFi analyzer, he sees many other nearby networks using the often-recommended channels 1, 6, and 11 on the 2.4 GHz frequency. Using the 5 GHz frequency is not an option for Ralph’s equipment. What should Ralph do to improve his network performance?

Configure his equipment to use channel 5

Configure his equipment to use channel 10

Configure his equipment to use channel 9

Configure his equipment to use channel 2

A

Configure his equipment to use channel 9

218
Q

Which of the following troubleshooting steps involves prioritizing trouble tickets based on the severity of the problem?

Establish a theory of probable cause

Identify symptoms of the problem

Establish a plan of action to resolve the problem and identify potential effects.

Test the theory to determine cause

A

Identify symptoms of the problem

219
Q

In which troubleshooting step do you create a record of your activities and inform the user of what happened and why?

Verify full system functionality and, if applicable, implement preventive measures

Document findings, actions, and outcomes

Establish a plan of action to resolve the problem and identify potential effects

Implement the solution or escalate as necessary

A

Document findings, actions, and outcomes