Maandag 1-300 Flashcards
At which of the following OSI model layers would a technician find an IP header?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: C
Explanation:
Network layer, layer 3.
The most significant protocol at layer 3 (also called the network layer) is the Internet Protocol, or IP. IP is the standard for routing packets across interconnected networks–hence, the name internet
An IT technician suspects a break in one of the uplinks that provides connectivity to the core switch. Which of the following command-line tools should the technician use to determine where the incident is occurring?
A. nslookup
B. show config
C. netstat
D. show interface
E. show counters
Answer: D
Explanation:
show interface will allow one to see the uplink states of each port
A network requirement calls for segmenting departments into different networks. The campus network is set up with users of each department in multiple buildings. Which of the following should be configured to keep the design simple and efficient?
A. MDIX
B. Jumbo frames
C. Port tagging
D. Flow control
Answer: C
Explanation:
Port Tagging is the best answer. Port tagging is used for connecting switches that may be on different networks (trunking)
A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
A. Password complexity
B. Port security
C. Wireless client isolation
D. Secure SNMP
Answer: B
Explanation:
B, Port security, would be the best option to use to stop the rogue AP in this scenario. Port security is a feature that can be used to limit the number of devices that can be connected to a switchport. By configuring port security on the switchport to which the rogue AP is connected, the network administrator can ensure that only authorized devices are able to connect to the network and receive an IP address. This would prevent unauthorized devices, such as the rogue AP, from providing Internet access to employees in the break room.
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?
A. 172.15.0.0/18
B. 172.18.0.0/10
C. 172.23.0.0/16
D. 172.28.0.0/8
E. 172.32.0.0/14
Answer: C
Explanation:
Network address translation (NAT) and Port address translation (PAT) are often used to translate between global and private ip addresses. Private address for Class B is 172.16.0.0 to 172.31.255.255. Only 172.23.0.0/16 fit the range.
After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?
A. Modify the device’s MIB on the monitoring system.
B. Configure syslog to send events to the monitoring system.
C. Use port mirroring to redirect traffic to the monitoring system.
D. Deploy SMB to transfer data to the monitoring system.
Answer: A
Explanation:
Modify the device’s MIB on the monitoring system.
The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy’s requirements?
A. Recover all systems to a loss of 48 hours of data.
B. Limit network downtime to a maximum of 48 hours per year.
C. Recover all systems within 48 hours.
D. Require 48 hours of system backup maintenance.
Answer: C
Explanation:
Recovery time objective (RTO) is the period following a disaster that an individual IT system may remain offline. This represents the maximum amount of time allowed to identify that there is a problem and then perform recovery (restore from backup or switch in an alternative system, for instance).
A network technician is troubleshooting an application issue. The technician is able to recreate the issue in a virtual environment. According to the troubleshooting methodology, which of the following actions will the technician most likely perform NEXT?
A.Gather information from the initial report.
B.Escalate the issue to a supervisor.
C.Implement a solution to resolve the issue.
D.Establish a theory of probable cause.
Answer: D
Explanation:
According to the troubleshooting methodology, the technician will most likely perform the next step of “Establishing a theory of probable cause” after being able to recreate the issue in a virtual environment.
Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?
A. iSCSI
B. FCoE
C. Three-tiered network
D. Spine and leaf
E. Top-of-rack switching
Answer: C
A network administrator is trying to identify a device that is having issues connecting to a switchport. Which of the following would BEST help identify the issue?
A. A syslog server
B. Change management records
C. A rack diagram
D. The security log
Answer: C
Explanation:
would provide the IP address of switching, the VLAN assigned to ports and tech could confirm PC on correct subnet and GW.
- Device needs to be connected for syslog
- If the device is not connected or having issues that will not be able to send the logs to the log servers. Also, the technician is trying to identify the device that we could see by checking the rack diagram.
A network administrator is troubleshooting the communication between two Layer 2 switches that are reporting a very high runt count. After trying multiple ports on both switches, the issue persists. Which of the following should the network administrator perform to resolve the issue?
A. Increase the MTU size on both switches.
B. Recertify the cable between both switches.
C. Perform a factory reset on both switches.
D. Enable debug logging on both switches.
Answer: B
Explanation:
Increasing MTU will increase more Runts and CRCs. This is a Cabling issue.
Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure?
A. Business continuity plan
B. Onboarding and offboarding policies
C. Acceptable use policy
D. System life cycle
E. Change management
Answer: E
Explanation:
Business continuity plan is for after an emergency.
When are talking about backup plans they are talking about backup plans if the change/patch fails. Most places would call this a backout plan but they are calling it a backup plan.
To access production applications and data, developers must first connect remotely to a different server. From there, the developers are able to access production data. Which of the following does this BEST represent?
A. A management plane
B. A proxy server
C. An out-of-band management device
D. A site-to-site VPN
E. A jump box
Answer: E
Explanation:
A jump box (also known as a jump server or a bastion host) is a dedicated server or virtual machine that provides secure access to other systems on a network. In the scenario described in the question, the jump box is the server that the developers connect to remotely in order to access production applications and data.
The purpose of the jump box is to provide an additional layer of security by restricting direct access to the production servers. This helps to protect the production servers from potential security threats that could be introduced through the developers’ remote connections.
A malicious user is using special software to perform an on-path attack. Which of the following best practices should be configured to mitigate this threat?
A. Dynamic ARP inspection
B. Role-based access
C. Control plane policing
D. MAC filtering
Answer: A
Explanation:
Dynamic ARP Inspection (DAI) is a security feature that validates Address Resolution Protocol (ARP) packets in a network. DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. This capability protects the network from certain “man-in-the-middle” attacks.
Which of the following compromises Internet-connected devices and makes them vulnerable to becoming part of a botnet? (Choose two.)
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
Answer: BE
Explanation:
an attacker must install malware that opens a backdoor
remote connection by using the default credentials.