Module 13 - 17 practice exams Flashcards

1
Q

Which two types of ICMP messages are common to both ICMPv4 and ICMPv6? (Choose two.)
* Destination or Service Unreachable
* Hostname resolution
* IP configuration
* Source Unreachable
* Time exceeded

A
  • Destination or Service Unreachable
  • Time Exceeded
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of ICMPv6 message would a host send to acquire an IPv6 configuration when booting up?
* Neighbor Advertisement (NA) message
* Neighbor Solicitation (NS) message
* Router Advertisement (RA) message
* Router Solicitation (RS) message

A

Router Solicitation (RS) message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a function of the tracert command that differs from the ping command when they are used on a workstation?
* The tracert command reaches the destination faster.
* The tracert command shows the information of routers in the path.
* The tracert command sends one ICMP message to each hop in the path.
* The tracert command is used to test the connectivity between two devices.

A

The tracert command shows the information of routers in the path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?
* redirect
* ping
* time exceeded
* destination unreachable

A

time exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two things can be determined by using the ping command? (Choose two.)
* the number of routers between the source and destination device
* the IP address of the router nearest the destination device
* the average time it takes a packet to reach the destination and for the response to return to the source
* the destination device is reachable through the network
* the average time it takes each router in the path between source and destination to respond

A
  • the average time it takes a packet to reach the destination and for the response to return to the source
    -the destination device is reachable through the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement describes a characteristic of the traceroute utility?
* It sends four Echo Request messages.
* It utilizes the ICMP Source Quench messages.
* It is primarily used to test connectivity between two hosts.
* It identifies the routers in the path from a source host to a destination host.

A

It identifies the routers in the path from a source host to a destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

\Which utility uses the Internet Control Messaging Protocol (ICMP)?
* RIP
* DNS
* ping
* NTP

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed?
* ipconfig
* netstat
* telnet
* traceroute

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is used by IPv4 and IPv6 to provide error messaging?
* ICMP
* NDP
* ARP
* DHCP

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What message is sent by a host to check the uniqueness of an IPv6 address before using that address?
    * neighbor solicitation
    * ARP request
    * echo request
    * router solicitation
A

neighbor solicitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing packets to be dropped. The technician only has the IP address of the end point device and does not have any details of the intermediate devices. What command can the technician use to identify the faulty node?
* tracert
* ping
* ipconfig /flushdns
* ipconfig /displaydns

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping command?
* to obtain a dynamic IP address from the server
* to request that gateway forward the connection request to the file server
* to test that the host has the capability to reach hosts on other networks
* to resolve the domain name of the file server to its IP address

A

to test that the host has the capability to reach hosts on other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies. What conclusion can be drawn based on this connectivity test?
* The PC can access the network. The problem exists beyond the local network.
* The IP address obtained from the DHCP server is correct.
* The PC can access the Internet. However, the web browser may not work.
* The TCP/IP implementation is functional.

A

The TCP/IP implementation is functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which command can be used to test connectivity between two devices using echo request and echo reply messages?
* netstat
* traceroute
* ICMP
* ping

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which transport layer protocol statement is true?
* TCP has fewer fields than UDP.
* TCP is faster than UDP.
* UDP is a best-effort delivery protocol.
* UDP provides reliability.

A

UDP is a best-effort delivery protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which transport layer protocol would be used for VoIP applications?
* Session Information Protocol (SIP)
* Transmission Control Protocol (TCP)
* User Datagram Protocol (UDP)
* VoIP Transfer Protocol

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What field content is used by ICMPv6 to determine that a packet has expired?
* TTL field
* CRC field
* Hop Limit field
* Time Exceeded field

A

Hop Limit field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol provides feedback from the destination host to the source host about errors in packet delivery?
* ARP
* BOOTP
* DNS
* ICMP

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which TCP header statement is true?
* It consists of 4 fields in an 8-byte header.
* It consists of 8 fields in a 10-byte header.
* It consists of 10 fields in a 20-byte header.
* It consists of 20 fields in a 40-byte header.

A

It consists of 10 fields in a 20-byte header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two applications would use the TCP transport layer protocol? (Choose two.)
* FTP
* HTTP
* ICMP
* TFTP
* VoIP

A
  • FTP
  • HTTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a stateless best-effort delivery transport layer protocol?
* ICMP
* IP
* TCP
* UDP

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which UDP header statement is true?
* It consists of 4 fields in an 8-byte header.
* It consists of 8 fields in a 10-byte header.
* It consists of 10 fields in a 20-byte header.
* It consists of 20 fields in a 40-byte header

A

It consists of 4 fields in an 8-byte header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Which two applications would use the UDP transport layer protocol? (Choose two.)
    * FTP
    * HTTP
    * ICMP
    * TFTP
    * VoIP
A
  • TFTP
  • VoIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many exchanges are needed to end both sessions between two hosts?
* one exchange
* two exchanges
* three exchanges
* four exchanges
* five exchanges

A

four exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which control bit flags are used during the three-way handshake?
* ACK and FIN
* FIN and RESET
* RESET and SYN
* SYN and ACK

A

SYN and ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Assume a host with IP address 10.1.1.10 wants to request web services from a server at 10.1.1.254. Which of the following would display the correct socket pair?
* 1099:10.1.1.10, 80:10.1.1.254
* 10.1.1.10:80, 10.1.1.254:1099
* 10.1.1.10:1099, 10.1.1.254:80
* 80:10.1.1.10, 1099:10.1.1.254

A

10.1.1.10:1099, 10.1.1.254:80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which port group includes port numbers for FTP, HTTP, and TFTP applications?
* dynamic ports
* private ports
* registered ports
* well-known ports

A

well-known ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which Windows command would display the protocols in use, the local address and port numbers, the foreign address and port numbers, and the connection state?
* ipconfig /all
* ping
* netstat
* traceroute

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which two fields are the same in a TCP and UDP header? (Choose two.)
* Control bits
* Destination port number
* Sequence number
* Source port number
* Well-known port number

A
  • Destination port number
  • Source port number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following would be valid source and destination ports for a host connecting to an email server?
* Source: 25, Destination: 49152
* Source: 80, Destination: 49152
* Source: 49152, Destination: 25
* Source: 49152, Destination: 80

A

Source: 49152, Destination: 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What field is used by the destination host to reassemble segments into the original order?
* Control Bits
* Destination Port
* Sequence Number
* Source Port
* Window Size

A

Sequence Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What field is used to provide flow control?
* Control Bits
* Destination Port
* Sequence Number
* Source Port
* Window Size

A

Window Size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What happens when a sending host senses there is congestion?
* The receiving host increases the number of bytes it sends before receiving an acknowledgment from the sending host.
* The receiving host reduces the number of bytes it sends before receiving an acknowledgment from the sending host.
* The sending host increases the number of bytes it sends before receiving an acknowledgment from the destination host.
* The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.

A

The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is UDP desirable for protocols that make a simple request and reply transactions?
* Flow Control
* Low overhead
* Reliability
* Same-order delivery

A

Low overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this?
* The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.
* The source decreases the window size to decrease the rate of transmission from the destination.
* The destination decreases the window size.
* The destination sends fewer acknowledgement messages in order to conserve bandwidth

A

The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which UDP datagram reassembly statement is true?
* UDP does not reassemble the data.
* UDP reassembles the data in the order that it was received.
* UDP reassembles the data using control bits.
* UDP reassembles the data using sequence numbers.

A

UDP reassembles the data in the order that it was received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following would be valid source and destination ports for a host connecting to a DNS server?
* Source: 53, Destination: 49152
* Source: 1812, Destination: 49152
* Source: 49152, Destination: 53
* Source: 49152, Destination: 1812

A

Source: 49152, Destination: 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which two operations are provided by TCP but not by UDP? (Choose two.)
* identifying the applications
* acknowledging received data
* tracking individual conversations
* retransmitting any unacknowledged data

A
  • acknowledging received data
  • retransmitting any unacknowledged data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the TCP mechanism used in congestion avoidance?
* three-way handshake
* socket pair
* two-way handshake
* sliding window

A

sliding window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a responsibility of transport layer protocols?
* providing network access
* tracking individual conversations
* determining the best path to forward a packet
* translating private IP addresses to public IP addresses

A

tracking individual conversations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How does a networked server manage requests from multiple clients for different services?
* The server sends all requests through a default gateway.
* Each request is assigned source and destination port numbers.
* The server uses IP addresses to identify different services.
* Each request is tracked through the physical address of the client.

A

Each request is assigned source and destination port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two)
* FTP
* DNS
* HTTP
* POP3
* VoIP

A
  • DNS
  • VoIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the purpose of using a source port number in a TCP communication?
* to notify the remote device that the conversation is over
* to assemble the segments that arrived out of order
* to keep track of multiple conversations between devices
* to inquire for a nonreceived segment

A

to keep track of multiple conversations between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which number or set of numbers represents a socket?
* 01-23-45-67-89-AB
* 21
* 192.168.1.1:80
* 10.1.1.15

A

192.168.1.1:80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)
* ACK
* FIN
* PSH
* RST
* SYN
* URG

A
  • ACK
  • SYN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What happens if part of an FTP message is not delivered to the destination?
* The message is lost because FTP does not use a reliable delivery method.
* The FTP source host sends a query to the destination host.
* The part of the FTP message that was lost is re-sent.
* The entire FTP message is re-sent.

A

The part of the FTP message that was lost is re-sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What type of applications are best suited for using UDP?
* applications that are sensitive to delay
* applications that need reliable delivery
* applications that require retransmission of lost segments
* applications that are sensitive to packet loss

A

applications that are sensitive to delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which action is performed by a client when establishing communication with a server via the use of UDP at the transport layer?
* The client sets the window size for the session.
* The client sends an ISN to the server to start the 3-way handshake.
* The client randomly selects a source port number.
* The client sends a synchronization segment to begin the session.

A

The client randomly selects a source port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which transport layer feature is used to guarantee session establishment?
* UDP ACK flag
* TCP 3-way handshake
* UDP sequence number
* TCP port number

A

TCP 3-way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the complete range of TCP and UDP well-known ports?
* 0 to 255
* 0 to 1023
* 256 – 1023
* 1024 – 49151

A

0 to 1023

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a socket?
* the combination of the source and destination IP address and source and destination Ethernet address
* the combination of a source IP address and port number or a destination IP address and port number
* the combination of the source and destination sequence and acknowledgment numbers
* the combination of the source and destination sequence numbers and port numbers

A

the combination of a source IP address and port number or a destination IP address and port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts.
* application
* transport
* network
* physical

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

MKV, GIF, and JPG standards are associated with which OSI layer?
* application
* presentation
* session
* transport

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

These three OSI layers define the same functions as the TCP/IP model application layer.
* application
* presentation
* session
* transport
* network
* data link

A
  • application
  • presentation
  • session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which two are protocols that belong in the OSI application layer?
* PNG
* DNS
* SMTP
* QuickTime

A
  • DNS
  • SMTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

This is a function of the OSI session layer.
* compress and decompress data
* provide an interface between applications
* format data for the application layer
* exchange of information to initiate dialog between peers

A

exchange of information to initiate dialog between peers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access.
* True
* False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which peer-to-peer application allows users to share pieces of many files with each other at the same time?
* Hybrid
* Gnutella
* BitTorrent

A

BitTorrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

True or false? In a peer-to-peer network environment every peer can function as both a client and a server.
* True
* False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following is a feature of the Gnutella protocol?
* Users can share whole files with other users.
* Users can share pieces of files with other users.
* Users can access an index server to get the location of resources shared by other users.

A

Users can share whole files with other users.

(Users can access an index server to get the location of resources shared by other users.) - canvas answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

This message type is used when uploading data files to a web server.
* GET
* POST
* PUT

A

POST

44
Q

This protocol is used by a web browser to establish a connection to a web server.
* HTTP
* SSL
* IMAP
* SMTP

A

HTTP

45
Q

This protocol is used by a client to send email to a mail server.
* POP
* SMTP
* IMAP
* HTTP

A

SMTP

46
Q

Which is a feature of IMAP?
* It uploads email messages to a server.
* It listens passively on port 110 for client requests.
* It downloads a copy of email messages leaving the original on the server.

A

It downloads a copy of email messages leaving the original on the server.

47
Q

True or false? HTTP is a secure protocol.
* True
* False

A

False

48
Q

Which of the following DNS record types is used to resolve IPv6 addresses?
* A
* NS
* AAAA
* MX

A

AAAA

49
Q

How many connections are required by FTP between client and server?
* 1
* 2
* 3
* 4

A

2

49
Q

True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting client.
* True
* False

A

False

49
Q

Which of the following is displayed by the nslookup utility?
* the configured default DNS server
* the IP address of the end device
* all cached DNS entries

A

the configured default DNS server

50
Q

Which of the following DNS resource record types resolves authoritative name servers?
* NS
* A
* MX
* AAAA

A

NS

51
Q

True or false? FTP data transfers take place from client to server (push) and from server to client (pull).
* True
* False

A

True

52
Q

Which of these ports are used by FTP? (Choose two.)
* 20
* 21
* 25
* 110

A
  • 20
  • 21
52
Q

True or false? Resource sharing over SMB is only supported on Microsoft operating systems.
* True
* False

A

False

53
Q

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network?
* a dedicated file server
* a home router
* an ISP DHCP server
* a DNS server

A

a home router

53
Q

Which TCP/IP model layer is closest to the end user?
* application
* internet
* network access
* transport

A

application

53
Q

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?
* .com
* www
* http
* index

A

.com

53
Q

What message type is used by an HTTP client to request data from a web server?
* GET
* POST
* PUT
* ACK

A

GET

54
Q

Which statement is true about FTP?
* The client can choose if FTP is going to establish one or two connections with the server.
* The client can download data from or upload data to the server.
* FTP is a peer-to-peer application.
* FTP does not provide reliability during data transmission.

A

The client can download data from or upload data to the server.

55
Q

A wireless host needs to request an IP address. What protocol would be used to process the request?
* FTP
* HTTP
* DHCP
* ICMP
* SNMP

A

DHCP

55
Q

What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
* responsibility for logical addressing
* responsibility for physical addressing
* the creation and maintenance of dialogue between source and destination applications
* closest to the end user
* the establishing of window size

A
  • the creation and maintenance of dialogue between source and destination applications
  • closest to the end user
56
Q

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
* ТСР
* HTTP
* MPEG
* GIF
* IP
* UDP

A
  • HTTP
  • MPEG
  • GIF
57
Q

Which protocol uses encryption?
* DHCP
* DNS
* FTP
* HTTPS

A

HTTPS

58
Q

Why is DHCP preferred for use on large networks?
* Large networks send more requests for domain to IP address resolution than do smaller networks.
* DHCP uses a reliable transport layer protocol.
* It prevents sharing of files that are copyrighted.
* It is a more efficient way to manage IP addresses than static address assignment.
* Hosts on large networks require more IP addressing configuration settings than hosts on small networks.

A

It is a more efficient way to manage IP addresses than static address assignment.

59
Q

Which two tasks can be performed by a local DNS server? (Choose two.)
* providing IP addresses to local hosts
* allowing data transfer between two network devices
* mapping name-to-IP addresses for internal hosts
* forwarding name resolution requests between servers
* retrieving email messages

A
  • mapping name-to-IP addresses for internal hosts
  • forwarding name resolution requests between servers
60
Q

Which protocol can be used to transfer messages from an email server to an email client?
* SMTP
* POP3
* SNMP
* HTTP

A

POP3

61
Q

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
* HTTP
* SMTP
* DHCP
* SMB

A

SMB

61
Q

An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
* client
* master
* server
* slave

A

client

62
Q

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?
* IMAP
* РОР
* SMTP
* HTTPS

A

IMAP

63
Q

What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

data loss or manipulation

64
Q

What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

identify theft

65
Q

What kind of threat is described when a threat actor prevents legal users from accessing data services?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

disruption of service

66
Q

What kind of threat is described when a threat actor steals scientific research data?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

information theft

67
Q

What kind of threat is described when a threat actor overloads a network to deny other users network access?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

disruption of service

68
Q

What kind of threat is described when a threat actor alters data records?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

data loss or manipulation

69
Q

What kind of threat is described when a threat actor is stealing the user database of a company?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

information theft

70
Q

What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
* data loss or manipulation
* disruption of service
* identify theft
* information theft

A

identify theft

71
Q

Angela, an IT staff member at ACME Inc., notices that communication with the company’s web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME’S web server. What type of attack is described in this scenario?
* access attack
* denial of service (DoS) attack
* malware attack
* reconnaissance attack

A

denial of service (DoS) attack

72
Q

George needed to share a video with a co-worker. Because of the large size of the video file, he decided to run a simple FTP server on his workstation to serve the video file to his co-worker. To make things easier, George created an account with the simple password of “file” and provided it to his co-worker on Friday. Without the proper security measures or a strong password, the IT staff was not surprised to learn on Monday that George’s workstation had been compromised and was trying to upload work related documents to the internet. What type of attack is described in this scenario?
* access attack
* denial of service (DoS) attack
* malware attack
* reconnaissance attack

A

access attack

73
Q

Jeremiah was browsing the internet from his personal computer when a random website offered a free program to clean his system. After the executable was downloaded and running, the operating system crashed. Crucial operating system related files had been corrupted and Jeremiah’s computer required a full disk format and operating system re-installation. What type of attack is described in this scenario?
* access attack
* denial of service (DoS) attack
* malware attack
* reconnaissance attack

A

malware attack

74
Q

Arianna found a flash drive lying on the pavement of a mall parking lot. She asked around but could not find the owner. She decided to keep it and plugged it into her laptop, only to find a photo folder. Feeling curious, Arianna opened a few photos before formatting the flash drive for her own use. Afterwards, Arianna noticed that her laptop camera was active. What type of attack is described in this scenario?
* access attack
* denial of service (DoS) attack
* malware attack
* reconnaissance attack

A

malware attack

75
Q

A computer is used as a print server for ACME Inc. The IT staff failed to apply security updates to this computer for over 60 days. Now the print server is operating slowly, and sending a high number of malicious packets to its NIC. What type of attack is described in this scenario?
* access attack
* denial of service (DoS) attack
* malware attack
* reconnaissance attack

A

denial of service (DoS) attack

76
Q

Sharon, an IT intern at ACME Inc., noticed some strange packets while revising the security logs generated by the firewall. A handful of IP addresses on the internet were sending malformed packets to several different IP addresses, at several different random port numbers inside ACME Inc. What type of attack is described in this scenario?
* access attack
* denial of service (DoS) attack
* malware attack
* reconnaissance attack

A

reconnaissance attack

77
Q

Which device controls traffic between two or more networks to help prevent unauthorized access?
* AAA Server
* firewall
* ESA/WSA
* IPS

A

firewall

78
Q

Which device is used by other network devices to authenticate and authorize management access?
* AAA Server
* firewall
* ESA/WSA
* IPS

A

AAA Server

79
Q

Which backup policy consideration is concerned with using strong passwords to protect the backups and for restoring data?
* frequency
* storage
* security
* validation

A

validation

80
Q

This zone is used to house servers that should be accessible to outside users.
* inside
* outside
* internet
* DMZ

A

DMZ

81
Q

Which is appropriate for providing endpoint security?
* a AAA server
* antivirus software
* a server-based firewall
* an ESA/WSA

A

antivirus software

82
Q

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
* a password on the console line
* an IP domain name
* a user account
* an enable mode password
* a unique hostname
* an encrypted password

A
  • an IP domain name
  • a user account
  • a unique hostname
83
Q

What is the objective of a network reconnaissance attack?
* discovery and mapping of systems
* unauthorized manipulation of data
* disabling network systems or services
* denying access to resources by legitimate users

A

discovery and mapping of systems

84
Q

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task?
* smartcard settings
* firewall settings
* MAC address settings
* file system settings

A

firewall settings

84
Q

Which benefit does SSH offer over Telnet for remotely managing a router?
* encryption
* TCP usage
* authorization
* connections via multiple VTY lines

A

encryption

85
Q

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the SSH connection?
* out-of-band access to a switch through the use of a virtual terminal with password authentication
* remote access to the switch through the use of a telephone dialup connection
* on-site access to a switch through the use of a directly connected PC and a console cable
* remote access to a switch where data is encrypted during the session
* direct access to the switch through the use of a terminal emulation program

A

remote access to a switch where data is encrypted during the session

86
Q

What is one of the most effective security tools available for protecting users from external threats?
* firewalls
* router that run AAA services
* patch servers
* password encryption techniques

A

firewalls

87
Q

Which type of network threat is intended to prevent authorized users from accessing resources?
* DoS attacks
* access attacks
* reconnaissance attacks
trust exploitation

A

DoS attacks

88
Q

Which three services are provided by the AAA framework? (Choose three.)
* accounting
* automation
* authorization
* authentication
* autobalancing
* autoconfiguration

A
  • accounting
  • authorization
  • authentication
89
Q

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
* virus
* worm
* Trojan horse
* social engineering

A

worm

90
Q
A
91
Q

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe?
* configuration
* environmental
* electrical
* maintenance

A

environmental

92
Q

What does the term vulnerability mean?
* a weakness that makes a target susceptible to an attack
* a computer that contains sensitive information
* a method of attack to exploit a target
* a known target or victim machine
* a potential threat that a hacker creates

A

a weakness that makes a target susceptible to an attack

93
Q

Which component is designed to protect against unauthorized communications to and from a computer?
* security center
* port scanner
* antimalware
* antivirus
* firewall

A

firewall

94
Q

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts within 10 seconds?
* RouterA(config)# login block-for 10 attempts 2 within 30
* RouterA(config)# login block-for 30 attempts 2 within 10
* RouterA(config)# login block-for 2 attempts 30 within 10
* RouterA(config)# login block-for 30 attempts 10 within 2

A

RouterA(config)# login block-for 30 attempts 2 within 10

95
Q

What is the purpose of the network security accounting function?
* to require users to prove who they are
* to determine which resources a user can access
* to keep track of the actions of a user
* to provide challenge and response questions

A

to keep track of the actions of a user

96
Q

What type of attack may involve the use of tools such as nslookup and fping?
* access attack
* reconnaissance attack
* denial of service attack
* worm attack

A

reconnaissance attack

97
Q

Which statement correctly relates to a small network?
* Small networks are complex.
* Small networks require an IT department to maintain.
* The majority of businesses are small.

A

The majority of businesses are small.

98
Q

Which factor must be considered when selecting network devices?
* color
* console connections
* cost
* elasticity

A

cost

99
Q

What is necessary to plan and use when implementing a network?
* device names
* IP addressing scheme
* MAC addressing scheme
* printer location

A

IP addressing scheme

100
Q

What is required to maintain a high degree of reliability and eliminate single points of failure?
* accessibility
* expandability
* integrity
* redundancy

A

redundancy

101
Q

What is required to classify traffic according to priority?
* IP addressing scheme
* quality of service (QoS)
* routing
* switching

A

quality of service (QoS)

102
Q

What are two forms of software programs or processes that provide access to the network? (Choose two.)
* antivirus software
* application layer services
* gaming software
* network applications
* productivity software
* virtual machine software

A
  • application layer services
  • network applications
103
Q

Which two network protocols are used to establish a remote access network connection to a device? (Choose two.)
* File Transfer Protocol (FTP)
* Hypertext Transfer Protocol (HTTP).
* Remote Connect (RC)
* Secure Shell (SSH)
* Simple Mail Transfer Protocol (SMTP)
* Telnet

A
  • Secure Shell (SSH)
  • Telnet
104
Q

Which elements are required to scale to a larger network? (Choose two.)
* budget
* device configurations
* increased bandwidth
* network documentation
* windows hosts

A
  • budget
  • network documentation
105
Q

Which software installed on key hosts can reveal the types of network traffic flowing through the network?
* Linux
* MacOS
* SSH
* Windows
* Wireshark

A

Wireshark

106
Q

A technician is troubleshooting a network problem and has just established a theory of probable causes. What would be the next step in the troubleshooting process?
* Document findings, actions, and outcomes.
* Establish a plan of action and implement the solution.
* Identify the problem.
* Test the theory to determine cause.
* Verify solution and implement preventive measures.

A

Test the theory to determine cause.

107
Q

What Windows 10 tool is useful to determine which applications are using network services on a host?
* Control panel
* Data Usage
* File Manager
* Windows Defender Firewall
* Windows Explorer

A

Data Usage

108
Q

A technician is troubleshooting a network problem. After troubleshooting, the technician concludes that a switch should be replaced. What should the technician do next?
* Email all users to let them know they are replacing a switch.
* Escalate the trouble ticket to the manager to approve the change.
* Purchase a new switch and replace the defective one.
* Resolve the problem.

A

Escalate the trouble ticket to the manager to approve the change.

109
Q

A technician is using the debug ip icmp privileged EXEC command to capture live router output. Which commands would stop this debug command on a Cisco router? (Choose two.)
* debug ip icmp off
* no debug debug ip icmp
* no debug ip icmp
* undebug all
* undebug debug ip icmp

A
  • no debug ip icmp
  • undebug all
110
Q

A technician has established a remote connection to router R1 to observe debug output. The technician enters the debug ip icmp command then pings a remote destination. However, no output is displayed. Which command would the technician have to enter to display log messages on a remote connection?
* monitor debug output
* monitor terminal
* terminal monitor
* terminal monitor debug

A

terminal monitor

111
Q

Which two traffic types require delay sensitive delivery? (Choose two.)
* email
* web
* video
* voice

A
  • video
  • voice
112
Q

A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
* show interfaces
* show running-config
* show ip interface brief
* show mac-address-table

A

show interfaces

113
Q

hich statement is true about CDP on a Cisco device?
* The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.
* To disable CDP globally, the no cdp enable command in interface configuration mode must be used.
* CDP can be disabled globally or on a specific interface.
* Because it runs at the data link layer, the CDP protocol can only be implemented in switches.

A

CDP can be disabled globally or on a specific interface.

114
Q

What factor should be considered in the design of a small network when devices are being chosen?
* cost of devices
* redundancy
* traffic analysis
* ISP

A

cost of devices

115
Q

Where are Cisco IOS debug output messages sent by default?
* memory buffers
* vty lines
* Syslog server
* console line

A

console line

115
Q

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming applications?
* QoS
* PoE
* AAA
* ICMP

A

QoS

116
Q

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same site by typing http://72.163.4.161. What is the issue?
* default gateway
* DHCP
* DNS
* TCP/IP protocol stack

A

DNS

117
Q

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
* IP
* DNS
* DHCP
* HTTP

A

DHCP

117
Q

Which element of scaling a network involves identifying the physical and logical topologies?
* traffic analysis
* network documentation
* device inventory
* cost analysis

A

network documentation

118
Q

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain connectivity if the router itself, or its connection to the ISP, fails?
* Activate another router interface that is connected to the ISP, so the traffic can flow through it.
* Have a second router that is connected to another ISP.
* Purchase a second least-cost link from another ISP to connect to this router.
* Add more interfaces to the router that is connected to the internal network.

A

Have a second router that is connected to another ISP.

119
Q

When should an administrator establish a network baseline?
* when the traffic is at peak in the network
* when there is a sudden drop in traffic
* at the lowest point of traffic in the network
* at regular intervals over a period of time

A

at regular intervals over a period of time

120
Q

Which network design consideration would be more important to a large corporation than to a small business?
* Internet router
* firewall
* low port density switch
* redundancy

A

redundancy

121
Q

A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
* devices with a fixed number and type of interfaces
* devices that have support for network monitoring
* redundant devices
* devices with support for modularity

A

devices with support for modularity

122
Q

What type of traffic would most likely have the highest priority through the network?
* FTP
* instant messaging
* voice
* SNMP

A

voice

123
Q

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?
* trace 10.1.1.5
* traceroute 10.1.1.5
* tracert 10.1.1.5
* ping 10.1.1.5

A

tracert 10.1.1.5