Jason Dion NET+ 008 Practice Exam #1 Flashcards
** Dion Training is adding a new screen Subnet that will host a large number of VDIs and wants to assign them a small portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. There will be a total of 105 VDI clients that will each need an IP address assigned. What is the correct CIDR notation for the new Subnet in order to accommodate the 105 VDI clients while allocating the minimum number of addresses?
/27
/28
/25
/26
/25
Explanation:
To answer this question you must perform basic Subnetting Calculation (Or, remember your /CIDR to Hosts numbers.
105 Clients are needed in this Scenario, but you’ll also need an address for the Network and the Broadcast too.
This means you need 107 IP Addresses Total.
IP Addresses are assigned in multiples of 2.
1, 2, 4, 8, 16, 32, 64, 128, 256.
To symbolize a CIDR block with 128 IP Addresses, we would use 2 to the 7th which equals 128 or /25.
** Which of the following is a Security concern with using a Cloud Service Provider and could result in a data breach casued by data remnants?
On-Demand
Rapid Elasticity
Resouce Pooling
Metered Services
Rapid Elasticity
Explanation:
Rapid Elasticity can be a security threat to your org’s data due to data remanences. Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase it. When a cloud resource is deprovisioned and returned to the cloud service provider, it can be issued to another organization for use. If the data was not properly erased from the underlying storage, it could be exposed to the other org. For this reason, all cloud-based storage drives should be encrypted by default to prevent data remanence from being read by others.
Metered Services are Pre-Paid, A-La-Carte, Pay-Per-Use, or committed offerings.
Resource Pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use.
On-Demand refers to the fact that a consume can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.
** Which of the following describes the ID of a specific native VLAN when traffic passes over a Trunk?
It becomes the priority ID for all the VLAN traffic accross the device.
It becomes the gateway of the last resort for the Switch or Router.
It becomes the default gateway for the port or ports.
It becomes the default VLAN for untagged frames.
It becomes the default VLAN for untagged frames.
Explanation:
Trunk ports carry all traffic, regardless of VLAN number, between all Switches in a LAN. The VLAN designation for a Trunk port is its native or default VLAN. If the Trunk port has a native VLAN that differs from the tag placed on the frame as it entered the access port, the Switch leaves the tag on the frame and sends the tagged frame along to the next Switch or Switches. If the Trunk port’s native VLAN is the same as the access ports VLAN, then the Switch drops the tag and sends the untagged frame out of the Trunk port.
** A network technician wants to centrally manage the switches and segment the switches into separate broadcast domains. The Dion Training network is currently using VLAN 1 for all of its devices and uses a single private IP address range with a 24-bit mask. Their supervisor wants VLAN 100 to be the management subnet and all of the switches must share VLAN information. Which of the following should the technician configure to meet these requirements? (Choose Two)
Configure VTP and 802.1x on all inter-Swtich connections with Native VLAN 100
Configure VTP and 802.1q on the inter-Switch connections with Native VLAN 100
Configure STP and 802.1q on the inter-Switch connections with Native VLAN 100
Configure STP and 802.1w on the inter-Switch connections with Native VLAN 100
Configure VLSM for the IP Address range.
Configure VTP and 802.1q on the inter-Switch connections with Native VLAN 100
Configure VLSM for the IP Address range.
Explanation:
The 801.q standard is used to define VLAN Tagging (or Port Tagging) for Ethernet frames and the accompanying procedures to be used by Bridges and Switches in handling such frames. Traffic should be properly tagged when combined over a single trunk port to ensure they are not sent to the wrong VLAN by mistake. If VLAN Tagging is not enabled, all of the VLAN traffic will be sent to the native or default VLAN, VLAN 1. By default, VLAN 1 is enabled and all unused ports are assigned to it.
VLSM stands for Variable Length Subnet Mask where the subnet design uses more than one mask in the same network which means more than one mask is used for different subnets of a single class A, B, or C network.
Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks to prevent bridge loops and the broadcast storms that result from them. STP is defined in the IEEE 802.1d standard and
Rapid Reconfiguration of Spanning Tree is defined in the IEEE 802.1w standard.
The IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network. This defines port security. The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server.
** A company has just installed a VoIP system on its Network. Before the installation, all of the Switches were placed with Layer 3 Multilayer Switches to allow for the VoIP devices to be placed on separate VLANs and have the packets routed accurately between them. What type of Network segmentation technique is this an example of?
Separate Public/Private Networking
Compliance Enforcement
Honeynet Implementation
Performance Optimization
Performance Optimization
Explanation:
Performance Optimization can help a business improve the quality of its video and audio communications over the Internet by decreasing the size of the broadcast domain through the creation of VLANs. Each VLAN can contain the VoIP devices for a single department or business unit, and traffic is routed between the VLANs using Layer 3 Multilayer Switches to increase the performance of the voice communications systems.
Compliance Enforcement involves dividing up one Network into smaller sections to better control the flow of traffic across the Network and to restrict confidential data to a specific Network segment based on a specific regulation or contractual requirement, such as PCI DSS segmentation requirements.
Honeynet is an intentionally vulnerable Network segment that is used to observe and investigate the attack techniques of a hacker or adversary.
Separate Public/Private Networking involves segmenting the Network into two portions, public and private. This is often used in cloud architectures to protect private data.
** What is the Network ID associated with the Host located at 205.12.35.26/27?
- 12.35.48
- 12.35.16
- 12.35.0
- 12.35.32
205.12.35.0
Explanation:
In Classless Subnets, using variable length Subnet Mask (VLSM), the Network ID is the first IP address associated within an assigned range.
In this example, the CIDR Notation is /27, so each Subnet will contain 32 IP Addresses. This means that there are eight Networks in this Class C Range -
- 12.35.0
- 12.35.32
- 12.35.64
- 12.35.96
- 12.35.128
- 12.35.160
- 12.35.192
- 12.35.224
Since the IP address provided is 205.12.35.26, it will be in the 205.12.35.0/27 Network.
** A Network admin has determined that the ingress an egress traffic of a Router’s interface are not corectly reported to the monitoring Server. Which of the following can be used to determine if the Router interface uses 64 bit VS 32 bit counters?
Port Scanner
Packet Analyzer
Syslog Server
SNMP Walk
SNMP Walk
Explanation:
SNMP Walk can be used to determine if the counter is using 32 bits or 64 bits by querying the OID of the endpoint (Router Interface).
** You have recently been hired as a security analyst at Dion Training. On your First Day, your supervisor begins to explain the way their Network is configured, showing you the phyiscal and logical placement of each Firewall, IDS sensor, Host-Based IPS installations, the Networked Spam Filter, and the DMZ. What best describes how these various devices are placed into the Network for the highest level of security?
UTM
Network Segmentation
Load Balancer
Defense in Depth
Defense in Depth
Explanation:
Defense in Depth is the concept of layering various Network appliances and configurations to create a more secure and defensible architecture. In this scenario Dion Training appears to be using various Host-Based and Network-Based devices to ensure there are multiple security layers in the Network.
** Jason wants to use his personal cell phone for Work-Related Purposes. Because of his position, Jason has access to sensitive company data, which might be stored on his cell phone during its usage. The company is concerned about this but believes that it might be acceptable with the proper security controls in place. Which of the following should be done to protect both the company and Jason if they allow him to use his personal cell phone for work-related purposes?
Establish consent to monitoring policy so that the company can audit Jason’s cell phone usage.
Establish an AUP that allows a personal phone to be used for Work-Related purposes.
Establish an NDA that states Jason cannot share confidential data with others.
Conduct Real-Time monitoring of the phone’s activity and usage.
Conduct Real-Time monitoring of the phone’s activity and usage.
Explanation:
All four options are good, the BEST solution is to conduct real-time monitoring of the phone’s activity since it is a technical control that could quickly identify an issue. The other options are all administrative controls (Policies), which are useful but would not actually identify if the sensitive data was leaked from Jason’s phone.
** Which of the following provides a standard nomenclature for describing Security related software flaws?
VPC
SOX
SIEM
CVE
CVE
Explanation:
Common Vulnerabilities and Exposures (CVE) is an element of the Security Content Automation Protocol (SCAP) that provides a standard nomenclature for describing security flaws or vulnerabilities.
SIEM is a solution that provides a Real-Time or near-real-time analysis of Security alerts generated by Network hardware and applications.
VPC is a private Network segment made available to a single cloud consume on a public cloud.
Sarbanes-Oxley Act (SOX) dictates requirements for storing and retaining documents relating to an organizations financial and business operations, including the type of ducments stored and their retention periods.
** What is considered a Classless Routing Protocol?
STP
OSPF
RIPv1
IGRP
OSPF
Explanation:
OSPF (Open Shortest Path First) is known as a Classless Protocol. Classless Routing Protocols are those protocols that include the Subnet Mask information when the Routing Tables or updates are exchanged.
Other Classless Routing Protocols include:
- EIGRP (Enhanced Interior Gateway Routing Protocol)
- RIPv2 or newer (Routing Internet Protocol)
- IS-IS (Intermediate System to Intermediate System)
RIPv1 & IGRP (Interior Gateway Routing Protocol) are NOT Classless.
STP (Spanning Tree Protocol) is NOT a Routing Protocol, this is used to prevent Swtiching Loops in Bridges and Switches.
** Which encryption type MOST likely is used for securing the key exchange during a Client-to-Server VPN connection?
Kerberos
AES
TKIP
ISAKMP
ISAKMP
Explanation:
ISAKMP is used in IPSec, which is commonly used in securing the Key Exchange during the establishment of a client-to-server VPN Connection.
TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for Wireless LANs (WLAN).
Kerberos is a computer Network Authentication protocol that works based on Tickets to allow Nodes communicating over a non-secure Network to prove their identiy to one another in a secure manner.
AES (Advanced Encryption Standard) is a symmetric Key Encryption and is not used for Key Exchanges.
- You have been asked to select the BEST WAN connection for a new Network at Dion Training. The company has stated that they must have guaranteed throughput rate on their Internet connection at all times. Based on this requirement, what type of WAN connection should you recommend?
Dial-Up
DSL
T-1
Cable Broadband
T-1
Explanation:
T-1 connection provides guaranteed 1.544 Mbps of throughput.
Dial-Up, DSL, and Cable Broadband do NOT provide a guaranteed throughput rate. Instead, these services provide a variable throughput rate based on Network conditions and demand in the area of your business.
- You need to connect your laptop to a Router in order to add a static route. What type of cable would you use to connect to the Router’s Console port?
RG-6
Crossover
Rollover
Straight-Through
Rollover
Explanation:
Typically a Router or Switch’s Console Port is connected using a Rollover Cable, which has an RS-232 or DB-9 Port on one side of an RJ-45 on the other side.
RG-6 cable is a Coaxial Cable used to connect to a cable Modem or Television.
Ethernet Crossover Cable is a Network Cable used to connect two Ethernet Network devices directly.
Straight-Through is a type of twisted pair cable that is used in LAN to connect a computer to a Network Switch.
- A technician is setting up a new Network and wants to create redundant paths through the Network. Which of the following should be implemented to prevent performance degredation within the Network?
ARP inspection
Spanning Tree
Port Mirroring
VLAN
Spanning Tree
Explanation:
Question Key Word: “…redundant paths”
STP (Spanning Tree Protocol) is a Network Protocol that builds a logical loop-free Topology for Ethernet Networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. If you have REDUNDANT links set up, it is important to utilize STP to prevent loops within the Network. If a loop occurs, the performance of the entire Network can be degraded due to Broadcast Storms.
Port Mirroing is used on a Network Switch to send a copy of Network packets seen on one Switch port to a Networking monitoring connection on another Switch port.
ARP Inspection or Dynamic ARP Inspection (DAI) is a security feature that validates Address Resolution Protocol (ARP) packets in a Network. DAI allows a Network admin to intercept, log, and discard ARP packets with invalid MAC address to IP Address bindings.
VLAN (Virtual Local Area Network) is any Broadcast Domain that is partitioned and isolated in a computer Network at the Data Link Layer (OSI Layer 2).
Port Mirroring, ARP Inspection, and VLANs do NOT add any REDUNDANCY to the Network.
- John is investigating a performance issue on a Server and has begun by gathering its utilization statistics. John notices that the statistics are outside of the normal, acceptable ranges. What should John do next?
Conduct a Baseline Review
Conduct a Port Scan
Archive the Logs
Conduct a Vulnerability Scan
Conduct a Baseline Review
Explanation:
Question Verbiage: I interpreted the question as if he already is using a Baseline and conducting a Baseline Review. But I think they key to the question is implying that he’s looking at the CURRENT baseline and needs to review it with previous Baselines based on the Explanation.
John should conduct a Baseline Review to compare the statistics he collected against the previous baseline. He can then use this information further to investigate the drop in the Server’s performance. A Baseline is a process for styding the Network at regular intervals to ensure that the Network is working as designed.
- You are working as part of a network installation team. Your team has been asked to install Cat 5e cabling to some new offices on the building’s second floor. Currently, the office only has one network closet, which is located on the first floor. Your team spent the morning running 24 new CAT 5e cables from a patch panel in the networking closet on the first floor to a new networking closet you are outfitting on the second floor. Your team terminated these cables in a new patch panel in the 2nd-floor closet. You measured the distance from the switch in the 1st-floor closet to the new 2nd-floor patch panel and determined it was 80 meters. The team then ran cables from this patch panel to each of the new offices. Some of the offices are working properly, but others are not. You suspect that some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What is the BEST solution to this problem?
Install a Hub in the second-floor Networking closet to increase the Signal.
Install a Repeater between the Patch Panel and each office.
Install a small Switch in each office to increase the Signal.
Install a Switch in the second-floor Networking closet to increase the Signal.
Install a Switch in the second-floor Networking closet to increase the Signal.
Explanation:
While a Repeater may be a good option here, a Swtich is more effective in this case since there are so many cables, and Repeaters usually only work for an individual cable.
A Hub would similarly work but would introduce a signal collision domain for all 24 computers. This would drastically decrease the perfomance of the Network.
We wouldn’t want to introduce a Switch in each office, as this is a bad security practice and an inefficient use of resources. Easier to manage and administer a single, centralized Switch in the Network Closet.
- Which of the following protocols must be implemented for two Switches to share VLAN information?
MPLS
PPTP
STP
VTP
VTP
Explanation:
VTP (VLAN Trunking Protocol) allows a VLAN created on one Switch to be propagated to other Switches in a group of Switches in a VTP domain.
STP (Spanning Tree Protocol) is a Layer 2 protocol that runs on Bridges and Switches to ensure that you do not create loops when you have redundant paths in your Network.
MPLS (MultiProtocol Label Switching) is a routing technique in telecommunications Networks that directs data from one node to the next based on short path labels rather than long Network Addresses, thus avoiding complex lookups in a Routing Table and speeding traffic flows.
PPTP (Point-to-Point Tunneling Protocol) is an obsolete method for implenting Virtual Private Networks (VPN).
MPLS, STP, PPTP are NOT used to share VLAN information like VTP and the 802.1q standards do.
- A tech is attempting to resolve an issue with users on the Network who cannot access websites like DionTraining.com and Google.com. The tech can ping their Default Gateway, DNS Servers, and the website using its IP Address successfully. The tech tries to use the command “ping diontraining.com” and receives an error message stating “Ping result could not find host diontraining.com.” Which of the following actions should the tech attempt NEXT to resolve this issue?
Use NSLOOKUP to resolve the URLs manually.
Ensure PORT 53 is enabled on the Firewall.
Ensure ICMP messages transit through the Firewall.
Update the HOST file with the URL and IP for the websites.
Ensure PORT 53 is enabled on the Firewall.
Explanation:
Domain Name System (DNS) uses port 53 and is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. When a client wants to access a website, it will make a request to the DNS server over port 53 to translate the domain name to its corresponding IP address. Since the technician is only able to access the servers using their IP addresses, this validates that the connectivity is functioning correctly but the DNS process is failing. The most likely reason for this is that port 53 is blocked at the firewall and is preventing the client from sending their requests to the DNS server.
NSLOOKUP command is used to query the domain name system (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information. The nslookup command has an interactive and non-interactive mode. The nslookup command will still need to communicate with a DNS server over port 53, though, to perform these lookups.
The ping command is used to test whether a given target is reachable across an IP network by sending an ICMP Echo Request packet and receiving an ICMP Echo Reply. Since the technician successfully used ping to communicate with the server using their IP addresses, this indicates that ICMP is not blocked by the firewall.
The HOST file is a text file containing domain names and IP addresses. The HOST file works like a local DNS lookup, but the technician would have to enter the domain name and IP for every website a user might want to access, making this an unacceptable option to solve this issue for the long term.
- You have just finished installing a small Network consisting of a Router, a Firewall, and a single Computer. The computer is connected to the Firewall and the Firewall is connected to the Router. What type of physical Network topology have you created in this scenario?
Mesh
Bus
Ring
Star
Bus
Explanation:
This network would resemble a physical BUS Network Topology because the Router connects directly to the Firewall, and the Firewall connects directly to the Computer. This would form a single line (or BUS) from one device to the next. A BUS topology uses a single cable that connects all the included nodes and the main cable acts as the backbone for the entire Network.
Ring topology connects every device to exactly two other neighboring devices to form a “circle”. Messages in a Ring topology travel in one direction and usually rely on a token to control the flow of information.
Star topology connects all of the other nodes to a central node, usually a Switch or a Hub. Star topology is the most popular Network topology in use on LANs.
Mesh topology connects every node directly to every other node. This creates a highly efficient and redundant Network, but it is expensive to build and maintain.
- There are two Switches connected using both a CAT 6 cable and a CAT5e cable. Which type of problem might occur with this setup?
Auto-sensing Ports
Switching Loop
Missing Route
Improper Cable Types
Switching Loop
Explanation:
Switching Loop is when there is more than one Layer 2 path exists between two endpoints. This can be prevented by using the STP (Spanning Tree Protocol = 802.1D).
CAT 6 and CAT5e are compatible with each other and can both operate at speeds up to 1000 Mbps (1 Gbps), so it is not an improper cable type issue.
Auto-Sensing Ports refers to a feature found in Network Adapters that allows them to automatically recognize the current local Network’s speed and adjust its own setting accordingly. This would not be an issue since the Switch can detect the appropriate speed to use with the CAT 6 and CAT5e cables.
Routes are used at Layer 3, but Switches are Layer 2 Devices. Therefore, Swtiches do not need to use a Route to pass traffic between each other.
- A Network tech at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan and concurrently upload large images of items to a centralized server. Which of the following technologies should they utilize to meet these requirements?
RFID
WIFI
NFC
Bluetooth
WIFI
Explanation:
Question Key Words = “…upload large images of items to a centralized server”
802.11ac WIFI is a very fast high-speed WIFI Network capable of 1 Gbps speeds over 5 GHz spectrum and is perfect for uploading large image files quickly over a Wireless Local Area Network.
RFID (Radio Frequency Identification) uses electromagnetic fields to automatically identify and track tags attached to objects. The warehouse might want to also use RFID to allow for the accurate scanning of items using RFID Tags, RFID can’t upload large images of the items to a centralized server since it is limited to 2 KB of data per RFID tag.
Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances using UHF radio waves.
NFC (Near Field Communication) is a set of communication protocols for communication between two electric devices over a distance of 4 cm or less.
- Which of the following policies or plans would dictate how an organization would respond to an unplanned outage of their primary internet connection?
Business Continuity Plan
Disaster Recovery Plan
Incident Response Plan
System Life Cycle Plan
Business Continuity Plan
Explanation:
Business Continuity Plan is a document that outlines how a business will continue operating during an unplanned service disuption. It is more comprehensive than a disaster recovery plan and contains contingencies for business processes, assets, human capital and business partners, and essentially every other aspect of the business that might be affected.
Disaster Recovery plan is a document, structured approach that documents how an organization can quickly resume work after an unplanned incident. These unplanned incidents include things like Natural Disasters, Power Outages, Cyber Attacks, and other disruptive events.
Incident Response Plan contains a set of instructions to help our Network and System admins detect, respond to, and recover from Network Security incidents. These types of plans address issues like Cybercrime, data loss, and Service Outtages that threaten daily work.
- Which of the following features is supported by Kerberos but not by RADIUS?
Services for Authentication
XML for cross-platform interoperability
Single Sign-On Capability
Tickets used to identify Authenticated Users
Tickets used to identify Authenticated Users
Explanation:
Kerberos is ALL ABOUT Tickets. Kerberos uses a system of Tickets to allow nodes to communicate over a non-secure Network and securely prove their identity. Kerberos is a computer Network Authentication protocol that works based on Tickets to allow nodes communicating over a non-secure Network to prove their identity to one another in a secure mananger. Kerberos is used in Windows Active Directory domains for authentication.
RADIUS (Remote Authentication Dial-In User Service) is used to manage remote and wireless Authentication Infrstructure. Users supply Authentication information to RADIUS Client devices, such as a Wireless Access Point. The Client device then passes the Authentication data to an AAA (Authentication, Authorization, and Accounting) server that processes the Request. – DOES NOT USE TICKETS.
- Which of the following Network performance metrics is used to represent variable delay experienced by a client when receiving packets from a sender?
Latency
Bandwidth
Jitter
Throughput
Jitter
Explanation:
Jitter = is a Network condition that occurs when a time delay in the sending of data packets over a Network connection occurs. Jitter is a big problem for any real-time applications you may be supporting on your Networks, like video conferences, voice-over IP, and virtual desktop infrastructure clients.
Latency = is the measure of time that it takes for data to reach its destination across a Network. Usually, we measure Network Latency as the round-trip time from a workstation to the distant end and back.
Throughput = is an actual measure of how much data is successfully transferred across a given Network.
Bandwidth = is the max rate of data transfer across a given Network.
- Last night, your company’s system administrators conducted a Server upgrade. This morning, several users are having issues accessing the company’s shared drive on the Network. You have been asked to troubleshoot the problem. What document should you look at FIRST to create a probable theory for the cause of the issue?
Release Notes from the Server Software
Physical Network Diagram
Change Management Documentation
Cable Management Plan
Change Management Documentation
Explanation:
Since everything worked before the Server Upgrade and doesn’t now, it would be a good idea to FIRST look at the CHange Management Documentation that authorized the Change/Upgrade. This should include the specific details of what was changed and what things may have been affected by the change. This is the best place to start when determining what changed since yesterday. Change Management is a systemic approach to dealing with the transition or transformation of an organization’s goals, processes, or technologies.
- A network administrator is tasked with building a wireless network in a new building located next door to your company’s office building. The wireless clients should not be able to communicate with other wireless clients but should be able to communicate with any wired users on the network. The users must be able to seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should the administrator configure the new wireless network in this new building?
Use different SSIDs on the same channels with VLANs.
Use the same SSIDs on different channels and AP isolation.
Use different SSIDs on different channels and VLANs.
Use the same SSIDs on the same channels with AP isolation.
Use the same SSIDs on different channels with AP isolation.
Explanation:
For users to be able to seamlessly migrate between the two bulidings, both Access Points (AP) must use the same SSIDs.
To prevent frequency interference though, each device needs to select a different and non-overlapping channel to utilize.
Finally, the AP isolation should be enabled. AP isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.
- Which of the following levels would an alert condition generate?
2
0
3
1
1
Explanation:
The severity levels range from 0 to 7, with 0 being the most severe and seven being the least severe.
Level 0 is used for an Emergency and is considered the most sever condition because the system has become unstable.
Level 1 is used for an Alert Condition and means that there is a condition that should be corrected immediately.
Level 2 is used for a Critical Condition, and it means that there is a failure in the system’s primary application and it requires immediate attention.
Level 3 is used for an Error Condition, and means that something is happening to the system that is preventing the proper function.
Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon.
Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions.
Level 6 is used for information conditions and it is a normal operating message that requires NO ACTION.
Level 7 is used for debugging conditions and is just information that is useful to devs as they are debugging their Networks and Apps.
- Your physical security manager, Janice, wants to ensure that she can detect any unauthorized access to the data center. Which technology should be used to meet her requirement?
Biometric Access
Access Badge Reader
Smart Card
Video Surveillance
Video Surveillance
Explanation:
If she were trying to prevent access from occuring, the other three options would provide that. Still, they cannot detect unauthorized access in the event that an attacker stole a valid Smart Card or Access Badge.
A Biometric Lock is any lock that can be activated by biometric features, such as fingerprint, voiceprint, or retina scan. Biometric locks make it more difficult for someone to counterfeit the key used to open the lock or a user’s account.
Smart Card, Chip Card, PIV Card, or Integrated Circuit Card is a physical, electronic authorization device used to control access to a resource. It is typically a plastic credit card sized card with an embedded integrated circuit chip.
- Nathan has just purchased a domain name and created an A Record to bind his domain name to an IP address. Which of the following tools should he use to verify the record was created propertly?
dig
ipconfig
arp
tcpdump
dig
Explanation:
DIG = command is used to query the Domain Name SYstem (DNS) to obtain information about host addresses, mail exchanges, nameservers, and related information.
ARP = command is used to view and modify the local Address Resolution Protocol (ARP) cache of a device, which contains recently resolved MAC addresses of IP hosts on the Network.
TCPDUMP = is a text-based packet capture and analysis tool that can capture packets and display the contents of a packet capture (PCAP) file.
IPCONFIG = is used on Windows Devices to display the current TCP/IP Network configuration and refresh the DHCP and DNS settings on a given host.
Which of the following types of telecommunication links is used to provide high-speed internet service over a traditional phone line?
DSL
Satellite
Leased Line
Cable
DSL
A client reports that half of the office is unable to access a shared printer on the Network. Which of the following should the Network tech use to troubleshoot the issue?
Network Diagrams
Vendor Documentation
Data Backups
Baseline Information
Network Diagrams
Which of the following remote acces sprotocols should you use to connect to a Windows 2019 Server and control it with your mouse and keyboard from your workstation?
RDP
VNC
SSH
Telnet
RDP (Remote Desktop Protocol)
Explanation:
RDP (remote desktop protocol) is a Windows feature that allows a remote user to initiate a connection at any time and sign on to the local machine using an authorized account. This connection allows a Windows administrator to see and control what is on a remote computer’s screen. RDP authentication and session data are always encrypted. This means that a malicious user with access to the same network cannot intercept credentials or interfere or capture anything transmitted during the session.
Secure Shell (SSH) uses port 22 to securely create communication sessions over the Internet for remote access to a server or system.
Telnet uses port 23 to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection but sends its data in plaintext making it an insecure protocol.
Virtual Network Computing (VNC) is a cross-platform screen sharing system that was created to remotely control another computer from a distance by a remote user from a secondary device as though they were sitting right in front of it.
Which of the following weaknesses exist in WPS-enabled wireless Networks?
Brute Force occurs within 11,000 combinations.
Utilizes a 24-bit initialization vector.
Utilizes TKIP to secure the authentication handshake.
Utilizes a 40-bit encryption key
Brute Force occurs within 11,000 combinations.
Explanation:
The most prominent attack against WPS0-enabled wireless networks involves brute-forcing the 8-digit PIN that client uses to enroll their devices without knowing the pre-shared key. WPS checks each half of the PIN individually, reducing the number of possible combinations from a maximum of 100,000,000 to only 11,000. This only takes a few minutes to crack on most modern computers, as long as the WAP doesn’t have a lockout after a certain number of failures. The lockout mechanism may also be triggered based on the client’s MAC, so you can often spoof MAC to bypass this defense.
What describes an IPv6 address of ::1?
Public
Broadcast
Multicast
Loopback
Loopback