Dinsdag 301-600 Flashcards
A user calls the IT department to report being unable to log in after locking the computer. The user resets the password, but later in the day the user is again unable to log in after locking the computer. Which of the following attacks against the user is MOST likely taking place?
A. Brute-force
B. On-path
C. Deauthentication
D. Phishing
Answer: A
Explanation:
A. Brute-force attack is most likely taking place. A brute-force attack is a method of guessing a password by trying a large number of possible combinations until the correct one is found. In this scenario, the user reset the password, but it is still being guessed by the attacker, causing the user to be unable to log in after locking the computer.
Which of the following is used to elect an STP root?
A. A bridge ID
B. A bridge protocol data unit
C. Interface port priority
D. A switch’s root port
Answer: A
Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?
A. MPLS
B. mGRE
C. EIGRP
D. VRRP
Answer: A
Explanation:
MPLS is a networking technology that allows data packets to be forwarded based on short path labels rather than long network addresses. This reduces the need for routing table lookups, as the packet forwarding decisions can be made independently of the network layer header.
A technician is deploying a new SSID for an industrial control system. The control devices require the network to use encryption that employs TKIP and a symmetrical password to connect. Which of the following should the technician configure to ensure compatibility with the control devices?
A.WPA2-Enterprise
B.WPA-Enterprise
C.WPA-PSK
D.WPA2-PSK
Answer: D
During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Choose two.)
A. 22
B. 23
C. 69
D. 443
E. 587
F. 8080
Answer: BC
A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?
A. RST
B. FIN
C. ICMP Time Exceeded
D. Redirect
Answer: A
Network users reported that a recent firmware upgrade to a firewall did not resolve the issue that prompted the upgrade. Which of the following should be performed NEXT?
A. Reopen the service ticket, request a new maintenance window, and roll back to the anterior firmware version.
B. Gather additional information to ensure users’ concerns are not been caused by a different issue with similar symptoms.
C. Employ a divide-and-conquer troubleshooting methodology by engaging the firewall vendor’s support.
D. Escalate the issue to the IT management team in order to negotiate a new SLA with the user’s manager.
Answer: B
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Changing the default passwords
D. Configuring an access control list
Answer: A
Classification using labels according to information sensitivity and impact in case of unauthorized access or leakage is a mandatory component of:
A. an acceptable use policy.
B. a memorandum of understanding.
C. data loss prevention.
D. a non-disclosure agreement.
Answer: C
Explanation:
This is basically saying the mandatory component of data loss prevention is classifying information sensitivity and impact of data leakage or unauthorized access using labels.
A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket:
- The server’s IP address can be pinged from the client PCs.
- Access to the web resource works correctly when on the server’s console.
- No clients can access the server’s data via URL.
- The server does not have a firewall configured.
- No ACLs are preventing connectivity from the client’s network.
- All services on the server are operating normally, which was confirmed by the server team.
Which of the following actions will resolve the issue?
A. Reset port security on the switchport connecting the server.
B. Adjust the web server’s NTP setting to match the client settings.
C. Configure A records for the web server.
D. Install the correct MIB on the web server.
Answer: C
Explanation:
C. Configure A records for the web server.
The problem is likely related to DNS resolution, as the clients are able to ping the server’s IP address but not access the web resource via URL. The other answers do not address this issue. Configuring A records for the web server will ensure that clients are able to access the web resource via its domain name
A technician is installing the Wi-Fi infrastructure for legacy industrial machinery at a warehouse. The equipment only supports 802.11a and 802.11b standards. Speed of transmission is the top business requirement. Which of the following is the correct maximum speed for this scenario?
A. 11Mbps
B. 54Mbps
C. 128Mbps
D. 144Mbps
Answer: B
Explanation:
b - 11 Mbps
a - 54 Mbps
54 is greater than 11, thus maximum.
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?
A. 80.87.78.0 - 80.87.78.14
B. 80.87.78.0 - 80.87.78.110
C. 80.87.78.1 - 80.87.78.62
D. 80.87.78.1 - 80.87.78.158
Answer: C
A Wi-Fi network was originally configured to be able to handle interference from a microwave oven. The microwave oven was recently removed from the office. Now the network administrator wants to optimize the system to maximize the range of the signal. The main sources of signal degradation are the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the following actions should the administrator take?
A. Implement CDMA.
B. Change from omni to directional.
C. Change the SSID.
D. Change the frequency.
Answer: B
Which of the following would be BEST suited for a long cable run with a 40Gbps bandwidth?
A. Cat 5e
B. Cat 6a
C. Cat 7
D. Cat 8
Answer: D
A network device needs to discover a server that can provide it with an IPv4 address. Which of the following does the device need to send the request to?
A. Default gateway
B. Broadcast address
C. Unicast address
D. Link local address
Answer: B
A network security engineer locates an unapproved wireless bridge connected to the corporate LAN that is broadcasting a hidden SSID, providing unauthenticated access to internal resources. Which of the following types of attacks BEST describes this finding?
A. Rogue access point
B. Evil twin
C. ARP spoofing
D. VLAN hopping
Answer: A
Which of the following documents is MOST likely to be associated with identifying and documenting critical applications?
A. Software development life-cycle policy
B. User acceptance testing plan
C. Change management policy
D. Business continuity plan
Answer: D
A help desk engineer needs to configure two servers to have the same public IP addresses. Which of the following technologies should the engineer use?
A. NAT
B. VIP
C. DNS caching
D. RFC 1918
E. SDWAN
Answer: B
A network administrator is investigating a performance issue on a dual-link connection — VPN and MPLS — to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected for the VPN connection. Which of the following will MOST likely point to the root cause of the issue?
A. Checking the routing tables on both sides to ensure there is no asymmetric routing
B. Checking on the partner network for a missing route pointing to the VPN connection
C. Running iPerf on both sides to confirm the delay that is measured is accurate
D. Checking for an incorrect VLAN assignment affecting the MPLS traffic
Answer: A
Which of the following bandwidth management techniques uses butters at the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic prioritization
Answer: A
Explanation:
The correct answer is A. Traffic shaping.
Traffic shaping is a bandwidth management technique that allows the administrator to control the flow of traffic from the network to the client. The technique uses buffers at the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate. Traffic shaping enables the administrator to prioritize traffic types and specify the maximum bandwidth that each traffic type can consume.
Which of the following is an advanced distance vector routing protocol that automates routing tables and also uses some features of link-state routing protocols?
A.OSPF
B.RIP
C.EIGRP
D.BGP
Answer: C
Explanation:
C. EIGRP (Enhanced Interior Gateway Routing Protocol) is an advanced distance vector routing protocol that automates routing tables and also uses some features of link-state routing protocols. It is a Cisco proprietary protocol used in larger networks that require fast convergence and scalability.
Which of the following record types would be used to define where SIP is found?
A.SRV
B.CNAME
C.A
D.MX
Answer: A
Explanation:
The correct answer is A. SRV.SRV (Service) record is used to define the location (hostname and port number) of servers for specified services. SIP (Session Initiation Protocol) is a signaling protocol used for controlling communication sessions such as voice and video calls over IP networks. Therefore, SRV record type is used to define where SIP is found by specifying the hostname and port number of the server that provides the SIP service.
A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user’s PC is connecting, but file downloads are very slow when compared to other users’ download speeds. The PC’s NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A.Releasing and renewing the PC’s IP address
B.Replacing the patch cable
C.Reseating the NIC inside the PC
D.Flushing the DNS cache
Answer: B
Explanation:
B. Replacing the patch cable is the most likely solution to fix the issue of slow download speeds when accessing files on the network server. A faulty or damaged patch cable can cause packet loss and reduce the overall speed of the network connection, even if the NIC is capable of Gigabit Ethernet. Releasing and renewing the PC’s IP address, reseating the NIC inside the PC, and flushing the DNS cache are unlikely to resolve the issue of slow download speeds on the network.
A company is designing a SAN and would like to use STP as its medium for communication. Which of the following protocols would BEST suit the company’s needs?
A.SFTP
B.Fibre Channel
C.iSCSI
D.FTP
Answer: C
Explanation:
STP = shielded twisted pair, an Ethernet cable sort. iSCSI works via Ethernet, answer is correct.