Practice Test 1 Flashcards

1
Q

It is 3 am on a Saturday and you just received a call from a system administrator that reports multiple network outages across the office network. It is snowing heavily outside and the roads are inaccessible for you to get to the building to check the configuration of the network devices. What technology should you use to connect to the network from your home office in order to troubleshoot the network outages?

HTTP
TELNET
SNMP
SSH

A

SSH
You should use a VPN or a SSH connection to remotely connect to your office network remotely from home. Either of these options would provide you with an encrypted tunnel to the office network and allow you to begin troubleshooting remotely just as if you were physically located inside the building. SNMP isn’t used for troubleshooting, but instead for network monitoring and reporting. Telnet and HTTP are both insecure and should not be used to connect to your office network from home without the fear of the information being intercepted or changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your company has two office buildings which are connected via copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?

Cross talk on the cable
An open circuit has been created
Electromagnetic interference on the cable
Signal attenuation on the cable

A

An open circuit has been created

Since the issue started after construction began, it is most likely that the construction crew broke the cable during digging operations. This can cause an open circuit or short circuit, depending on how the cable was cut/broken by the construction workers. This can be verified using a Time-Domain Reflectometer to determine exactly where in the cable the break has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mark is setting up a DHCP server on a segment of the corporate LAN. Which of the following options is NOT required in the DHCP scope in order to allow hosts on that LAN segment to be assigned a dynamic IP addresses and to still be able to access the Internet and internal company servers?

Default gateway
Reservations
DNS servers
Subnet mask

A

Reservations

In order to effectively access the Internet, the DHCP must provide a default gateway, DNS server, and subnet mask to each client. Using DHCP reservations is not required to be configured to meet the requirements provided in the question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician added memory to a router, but that memory is never recognized by the router. The router is then powered down, and the technician relocates all of the memory to different modules. On startup, the router does not boot and displays memory errors. Which of the following is the MOST likely cause of this issue?

VTP
Driver Update
ESD
Halon particles

A

ESD

The most likely cause is that the memory chips are bad, because they have suffered from electrostatic discharge (ESD) during the installation and movement of the chips. (This question references a concept covered in-depth in your A+ curriculum, but is considered fair game on the Network+ exam.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the Internet via the kiosk’s wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?

Firewall
Web filtering
MAC filtering
Host-based antivirus

A

Mac filtering

MAC Filtering will control access to the network by restricting access to only certain devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A technician has installed an 802.11n network and most users are able to see speeds of up to 300Mbps. There are few users who have an 802.11n network card but are unable to get speeds higher than 108Mbps. What should the technician do to fix the issue?

Upgrade the OS version to 64-bit
Roll back the firmware on WLAN card
Install a vulnerability patch
Upgrade the WLAN card driver

A

Upgrade the WLAN card driver

Wireless N networks can support up to 600Mbps with the proper software drivers for the network cards. Without them, they can only achieve 108Mbps since they cannot communicate with the increased data compression rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A malicious user is blocking mobile devices from connecting to the Internet when other people are in the coffee shop. What is the malicious user implementing?

Removing the AP from the classroom
ACL
Jamming
Firewall
IPS
A

Jamming

Jamming is one of the many exploits used to compromise a wireless environment. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following provides origin authenticity through source authentication, data integrity through hash functions, and confidentiality through encryption protection for IP packets?

IPSEC
SHA
DES
CRC

A

IPSEC

Internet Protocol Security (IPSec) is a network protocol that encrypts and authenticates data sent over a network. All other choices offer encryption or authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Routing prefixes, which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR), are known as what?

Network handle
Autonomous system number
Route aggregation
Top level domain

A

Autonomous system number

ASN (or Autonomous System Number) are used to control routing with BGP routing protocols to route traffic across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following BEST describes how a DHCP reservation works?

By leasing a set of reserved IP addresses according to their category
By letting the network switches assign IP addresses from a reserved pool
By assigning options to the computers on the network by priority
By matching a MAC address to an IP address within the DHCP scope

A

By matching a MAC address to an IP address within the DHCP scope

When the client requests an IP address by sending a message on the network to the DHCP server, the DHCP server will assign an IP from its DHCP scope to the client and reserve it based on the client’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is used to proxy client requests for IP configurations across different network segments?

DHCP relay
SOCKS
Teredo tunneling
Reverse proxy

A

DHCP relay

A DHCP client is an Internet host using DHCP to obtain configuration parameters such as an IP address. A DHCP relay agent is any host that forwards DHCP packets between clients and servers. Relay agents are used to forward requests and replies between clients and servers when they are not on the same physical subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?

Port scanner tool
Interface monitoring tool
Packet capture tool
Spectrum Analyzer tool

A

Spectrum Analyzer tool

A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. Since the issue only occurs when connecting wirelessly, it is most like a spectrum interference issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. What is the cause of this issue?

Latency
Throttling
Interference
Split horizon

A

Interference

As a process of elimination, throttling slows down speed and latency slows down speed even further. Split horizon prevents loops so it only makes sense that interference is the choice. Also, interference causes drops in connections in many circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are troubleshooting the network connectivity between a remote server and your workstation. Which of the following tools should you use to determine the connection path between your workstation and the remote server?

pathping
tcpdump
netstat
ping

A

Pathping

Pathping works on Windows systems from the command line. This command provides details of the path between two hosts and Ping-like statistics for each node in the path based on samples taken over a time period, depending on how many nodes are between the start and end host. The advantages of PathPing over ping and traceroute are that each node is pinged as the result of a single command, and that the behavior of nodes is studied over an extended time period, rather than the default ping sample of four messages or default traceroute single route trace. The disadvantage is that it takes a total of 25 seconds per hop to show the ping statistics. This makes pathping the best option to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In what type of attack does the potential intruder trick a user into providing sensitive information?

Social engineering
Bluesnarfing
Man in the middle
Evil Twin

A

Social engineering

Social engineering is the art of convincing people to reveal confidential information to the intruder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following network protocols is used to send email from one server to another server?

RTP
SNMP
POP
SMTP

A

SMTP

Simple Mail Transfer Protocol (SMTP) is a well-known application that uses port 25 for sending email from one server to another server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A network administrator is tasked with building a wireless network in a new building located right next door. The wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should he configure the new wireless network in the new building?

Use the same SSIDs on different channels and AP isolation
Use diff SSIDs on differ channels and VLANs
Use differ SSIDs on the same channels and VLANs
Use the same SIDs on same channels with AP isolation

A

Use the same SSIDs on different channels and AP isolation

For users to be able to seamlessly migrate between the two buildings, both Access Points (AP) must use the same SSIDs. They must be on different channels though. Otherwise, interference would occur. Access Point (AP) isolation is a technique for preventing mobile devices connected to an AP from communicating directly with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

At which of the following OSI layer does QoS operate?

1
3
5
7

A

Quality of Service (QoS) occurs at both Layer 2 and Layer 3 of the OSI Model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are trying to connect to a router using SSH to check its configuration. Your attempts to connect to the device over SSH keep failing. You ask another technician to verify that SSH is properly configured, enabled on the router, and is allowing access from all subnets. She attempts to connect to the router over SSH from her workstation and confirms all the settings are correct. Which of the following steps might you have missed in setting up your SSH client that is preventing you from connecting to the router?

Change default credentials
Perform file hashing
Generate a new SSH key
Update firmware

A

Generate a new SSH key

When configuring your SSH connection, you must ensure that a key is established between your client and the server. If you never setup an SSH key, you will need to generate a new key to get SSH to connect properly. Since the other technician was able to connect on her machine, we can rule out a SSH server issue, so it must be an issue with your account or client. The only option that relates solely to your account or client is the possibility that a key was not generated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your network relies on the use of ATM cells. At which layer of the OSI model do ATM cells operate?

Network
Session
Transport
Data Link

A

Data Link

In the data link layer (layer 2) of the OSI model, the basic unit of transfer is called a frame. In an ATM network, these frames are called cells and are of a fixed (53 octets or bytes) length that allows for faster switching of the cells across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A technician is concerned about security and is asked to set up a network management protocol. Which network management protocol will provide the best security?

SLIP
SNMPv3
TKIP
SNMPv2

A

SNMPv3

Simple Network Management Protocol (SNMP) is an Internet-standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Three significant versions of SNMP have been created, with SNMPv3 being the most secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The UPS that provides backup power to your server is malfunctioning because its internal battery has died. To replace the battery, you must shut down the server, unplug it from the UPS, and unplug the UPS from its power source (the wall outlet). You perform these actions but think that there has to be a better way to increase the availability of the server in the future. Which of the following recommendations would BEST increase the availability of the server based on your experience with the UPS battery replacement?

Install a second UPS in the rack
Install a surge protector instead
Add a redundant power supply to the server
Replace the UPS with a generator

A

Add a redundant power supply to the server

The BEST recommendation would be to install a redundant power supply in the server. Adding a second UPS would not solve the problem if the server still only has one power supply available. Switching from a UPS to a generator will not solve this issue, either, because generators also requirement scheduled maintenance and downtimes. Finally, adding a surge protector won’t provide power when you need to power off a UPS for a battery replacement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What tool would a network technician use to troubleshoot a span of single-mode fiber cable?

Punchdown tool
Spectrum analyzer
Ethernet tester
OTDR

A

OTDR

The other answers are used with copper cables (like CAT5). An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to characterize an optical fiber. An OTDR is the optical equivalent of an electronic time domain reflectometer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An offsite backup service is involved in an investigation currently. Because of this, they are not recycling the outdated tapes. Which of the following is the MOST likely reason for this?

The process of discovery
A chain of custody breach
A data transport request
A notice of a legal hold

A

A notice of a legal hold

A legal hold is a process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated. If a legal hold notice has been given to the backup service, they will not destroy the old backup tapes until the hold is lifted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Your company has decided to upgrade its legacy phone system to use VoIP devices instead. The new phones will download the configurations from a server each time they boot up. Which of the following ports needs to be opened on the firewall to ensure the phones can communicate with the TFTP server?

21
53
69
161

A

TFTP uses port 69 to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following network concepts is prevented by using a split horizon?

Large routing tables
Duplicate addresses
Collisions
Loops

A

Loops

In computer networking, split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Susan is a network administrator who is in the process of preparing and cleaning network switches for resale. She splashes the cleaning agent in her eye and needs to know the procedure to do in order to cleanse her eye. Where should she look to find the right procedure?

EULA
MSDS
SLA
MOU

A

MSDS

The Manufacturers Safety Data Sheet (MSDS) lists the chemical composition of the solution and states the relevant protocol for first aid treatment. (This is another concept covered by the A+ exam, but if you didn’t know it, you should have been able to guess it based on eliminating the other 3 options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the copper conductor on several of the wire strands. These exposed wires come into contact with each other forming an electrical connection. Which of the following conditions was created?

Short
Open
Electrostatic discharge
Crosstalk

A

Short

A short in electrical terms is an abbreviation for a short circuit. This generally means that there is an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected together causing the cable to fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

Tagging
Encapsulation
Tunneling
De-encapsulation

A

De-encapsulation occurs as the data travels up the OSI layers. As information travels down the OSI model from layer 7 to layer 1, it is encapsulated along the way.

30
Q

A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO’s requirement?

Hybrid
Bus
Mesh
Star

A

A mesh topology connects every endpoint to every other endpoint, creating a fully redundant network.

31
Q

An administrator arrives at work and is told that network users are unable to access the file server. The administrator logs into the server and sees the updates were automatically installed last night and the network connection shows “limited” with no availability. What rollback action should the technician perform?

Browser on the server
Server’s NIC drivers
Server’s IP address
Antivirus updates

A

Server’s NIC drivers

An IP address is attached to a NIC’s MAC address, which would not change in the event of an update. Sometimes, software updates can adjust hardware driver settings accidentally, so it is a good practice to always review these settings first to eliminate this.

32
Q

Jason is the network manager and is leading a project to deploy a SAN. He is working with the vendor’s support technician to properly set up and configure the SAN on the network. To begin SAN I/O optimization, what should Jason need to provide to the vendor support technician?

Network diagrams
Baseline documents
Asset management document
Access to the data center

A

Network diagrams

A network diagram is a visual representation of network architecture. It maps out the structure of a network with a variety of different symbols and line connections. This information will be important when deploying a Storage Area Network (SAN).

33
Q

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if the issue is occurring due to a problem with your ISP?

netstat
nslookup
ping
tracert

A

Tracert is a command-line utility that is used to trace the path of an IP packet as it moves from its source to its destination. While using ping will tell you if the remote website is reachable or not, it will not tell you where the connection is broken. Tracert, though, performs a series of ICMP echo requests to determine which device in the connection path is not responding appropriately. This will help to identify if the connectivity issue lies within your intranet or is a problem with the ISPs connection.

34
Q

What happens when convergence on a routed network occurs?

All routers are using hop count as the metric
All routers have the same routing table
All routers learn the route to all connected networks
All routers use route summarization

A

All routers learn the route to all connected networks
Routers exchange routing topology information with each other by using a routing protocol. When all routers have exchanged routing information with all other routers within a network, the routers are said to have converged. In other words: In a converged network, all routers “agree” on what the network topology looks like.

35
Q

The accounting department has been relocated to a new area of the building which is more than 70 meters away from the closest IDF. In order to comply with a SLA which requires that 10Gb speeds be provided, what type of media should be installed?

CAT6a
CAT5e
802.11n
802.11ac

A

Cat6a is the only one listed that can meet 10 Gbps. CAT5e and 802.11 ac can only support speeds up to 1 Gbps.

36
Q

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?

Social engineering
Spoofing
Zero-day attack
VLAN hopping

A

Social engineering is a type of attack on a network using confidence and gullibility of users to gain access. It is the only type of attack on a network that is directed towards the human element. The human interaction with the network administrator makes the other three answers incorrect.

37
Q

What would be used in an IP-based video conferencing deployment?

RS-232
56k modem
Bluetooth
Codec

A

The term “codec” is a concatenation of “encoder” and “decoder”. In video conferencing, a codec is a software (or can be a hardware) that compresses (encodes) raw video data before it is transmitted over a network. Generally, audio/video conferencing systems utilize the H.323 protocol with various codecs like H.263 and H.264 to operate.

38
Q

A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which describes what the network administrator should do next?

Return the system to step four since this was the last working step
Request additional time since the change is near completion
Leave the change as is and inform users of a workaround
Return the system back to the original state before the change

A

Return the system back to the original state before the change

By performing a rollback, the administrator will change everything back to the last known good configuration prior to the change being started.

39
Q

A technician is called to investigate a connectivity issue to a remote office that is connected by fiber optic cable. Using a light meter, it is determined that the dB loss is excessive. The installation has been working for several years. The switch was recently moved to the other side of the room and a new patch cable installed. Which of the following is most likely the reason for this problem?

Distance limitations
Wavelength mismatch
Bend radius limitation
Dirty connectors

A

Dirty connectors

When Fiber Optic Connectors become dirty, the loss of signal can cause severe problems and performance issues. The technician will need to use appropriate cleaning cloth to clean the dirty connectors and restore the service.

40
Q

A user is unable to connect to a server in another building and discovers the following while troubleshooting the issue:

1) Client PC 1 has an IP address if 172.16.10.25/25
2) PC 1 can successfully ping its gateway of 172.16.10.1/25, which is an interface of router A
3) Server A is named “BLDGRILFESVR01’ and has an IP address of 172.16.10.145/25
4) PC 2 with an IP address of 172.16.10.200/25 can successfully ping server A

However, when PC 1 pings Server A, it gets an error of destination host unreachable. Which of the following might be the issue?

Link from SERVER A to PC 1 are on different subnets
Link from ROUTER A to SERVER A is down
Link from PC to ROUTER A has duplex issues
Link from SERVER A to PC 2 is down

A

Link from SERVER A to PC 1 are on different subnets

Since the IPs listed are all using /25 for their CIDR notation, we can determine that they are on two separate subnets (172.16.10.0-172.16.10.127 and 172.16.10.128-172.16.10.255).

41
Q

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. Which of the following might be the result of this?

The OSPF of not so stubby area is misconfigured
Reduce wireless network coverage
Spanning tree ports in flooding mode
BGP routing issues

A

BGP (Border Gateway Protocol) is used to route data between autonomous systems (AS). A collection of networks that fall within the same administrative domain is called an autonomous system (AS). The routers within an AS use an interior gateway protocol, such as the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information among themselves.

42
Q

An administrator is upgrading the switches in the server room to support 10 Gbps of throughput. The switch will need to take advantage of the existing CAT6a lines that run to each server. Which of the following Ethernet standards should be used to meet this requirement?

10GBaseT
10GBaseFX
10GBaseSR
10GBaseSW

A

10GBaseT

CAT6a can reach speeds of 10 Gbps over 10GBaseT cables. The other cables listed are all fiber cables, and not CAT6a.

43
Q

While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local routers and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used. What server is MOST likely offline?

WINS server
Domain controller
DHCP server
DNS server

A

DNS server

The DNS Server translates Fully Qualified Domain Names (FQDN) to IP addresses.

44
Q

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the datacenter. Which technology should be used to meet her requirement?

Smart card
Biometric access
Video Surveillance
Access badge reader

A

Video surveillance

Since her requirement is to detect unauthorized access, video surveillance should be utilized. If she were trying to prevent access from occurring, the other three options would be able to provide that, but they cannot detect unauthorized access (for example, if the attacker stole a valid smart card or access badge).

45
Q

Which of the following is a logical host on the network where unauthorized users are placed in which they still believe they’re on the production network?

Virtual server
VLAN
Honeypot
Virtual Terminal

A

Honeypot

A honeypot is a computer security mechanism set to detect, deflect, or in some manner counteract attempts of unauthorized use of information systems. It acts as a decoy so that hackers think there on the production network, but they’re actually not.

46
Q

You have been asked to create a network where visitors can access the Internet without disrupting the office’s own intranet. Which of the following types of networks should you created?

Guest network
VLAN network
Security network
DMZ network

A

Guest network

Guest network allows anyone to have access to the Internet without having the rights to disrupt the intranet. This network should be logically isolated from the corporate intranet of the office. Generally, these guest networks will provide a direct connection out to the internet with little or no security or monitoring on that network.

47
Q

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. What is the MOST likely mitigation for this reported item?

Ensure patches are deployed
install a IDS on the network
Configure the firewall to block traffic on port 443
Implement a VPN for employees

A

A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be able to read SSL traffic, in a piece of software.

48
Q

A network technician is working with a junior technician when the network technician is called away for a more urgent issue. The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the following will MOST likely be an issue with the new cable?

Wavelength mismatch
Distance limitations
Connector mismatch
Attenuation/DBloss

A

Connector mismatch

While both SC and ST are fiber cables, they utilize different connectors. The cable ordered will not be compatible with the current equipment in use.

49
Q

Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?

Warrant
Legal document
Chain of custody
Forensic report

A

Chain of custody refers to documentation that identifies all changes in the control, handling, possession, ownership, or custody of a piece of evidence.

50
Q

A company has just installed a VoIP system on their network. Prior to the installation, all of the switches were upgraded to layer 3 capable in order to more adequately route packets. What network segmentation technique is this an example of?

Compliance implementation
Separate public/ private networking
Honeypot implementation
Performance optimization

A

Performance optimization

Voice over Internet Protocol (VoIP) performance optimization can help a business improve the quality of its video and audio communications over the Internet by tending to such issues as transport and protocol conversion, as well as mitigation.

51
Q

A network technician needs to connect two switches. The technician needs a link between them that is capable of handling 10 Gbps of throughput. Which of the following media would BEST meet this requirement?

CAT5e cable
Coax cable
Fiber Optic cable
CAT3 cable

A

Fiber Optic cable

To achieve 10 Gbps, you should use CAT 6a or a fiber cable. Since CAT6a isn’t an option, fiber is the best answer here. CAT 5e can only operate up to 100 meters at 1 Gbps of speed.

52
Q

What is an example of a signaling protocol used in VoIP telephony?

VRRP
H.323
RTSP
SIP

A

SIP is the Session Initiation Protocol and it is used for VoIP and audio/video conferencing. Alternatively, you could use the process of elimination to find the correct answer. VRRP is the (virtual router redundancy protocol) that automatically assigns IP routers to hosts, H 323 is something that works with A/V (audio visual), RTSP is a real time streaming protocol designed to control media servers, and SIP is a session initiation protocol. SIP is a signaling protocol used on the application layer.

53
Q

What is considered a classless routing protocol?

IGRP
IS-IS
RIPv1
STP

A

IS-IS is known as a classless protocol. Classless routing protocols are those protocols that include the subnet mask information when the routing tables or updates are exchanged. Other classless routing protocols include EIGRP, RIPv2 (or newer), and OSPF.

54
Q

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device, and when the device was reassigned. Which of the following BEST describes these actions?

Network map
Asset management
Change management
Baselines

A

Asset management

Documenting the location, the user of the device, and the date of the reassignment would be part of the asset management process.

55
Q

A company is having a new T1 line installed. Which of the following does this connection MOST likely terminate to?

Firewall
MDF
Ethernet router
IDF

A

The telecom company usually terminates the circuits at the Main Distribution Facility (MDF).

56
Q

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACLs should the technician implement?

A

PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80

This will permit traffic from the internal network (192.168.0.0/24) from any port to access the external network (any IP) to port 80 (HTTP).

57
Q

Tim is a network administrator who is setting up three additional switches in his test lab. While configuring the switches, he is verifying the connectivity but finds that when he pings one of the switches using its IP address, he receives “Destination Unreachable”. What kind of issue is this?

Denial of service attack
Misconfigured DNS settings
Misconfigured Split Horizon
RADIUS authentication errors

A

Misconfigured Split Horizon

Split horizon is a method of preventing a routing loop in a network. If it is misconfigured, the switches would be unable to communicate with each other. None of the other answers provided would prevent communication between the switches.

58
Q

Which of the following protocols must be implemented in order for two switches to share VLAN information?

VTP
MPLS
STF
PPTP

A

VTP

The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to other switches in a group of switches (that is, a VTP domain).

59
Q

A network technician has just run a new point-to-point fiber link between two local routers. After the fiber has been plugged in on both ends, the interface will not come up. The network technician has double-checked the interface configuration on both routers, both SFPs have been hard-looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient power. What is the cause of the problem?

Wavelength mismatch
Duplex mismatch
Distance limitations
Wrong IP address

A

Wavelength mismatch is when two different transmitters at each end of the cable have either longer or shorter wavelengths. Both transmitters have to be identical on each end of the cable.

60
Q

Which media access control technology will listen to a cable to ensure there is no traffic being transmitted before sending its traffic, but will implement a back-off timer if a collision does occur?

CSMA/CA
CSMA/CD
Token
Demand priority

A

In networking technologies that use CSMA/CD as their access method, a device first listens to the network media to make sure there is no signal already present from another device before it tries to place its own signal on the media. If a carrier signal is detected on the media, which indicates that a device is currently transmitting a signal, no other device can initiate a transmission until the carrier stops. If no carrier is detected, any device can transmit a signal. If two devices listen to the wire and detect no carrier signal, they may both decide to send signals simultaneously. If this happens, a collision occurs between the two signals generated. Next, both devices detect the collision and stop transmitting their signals immediately, sending out a jamming signal that informs all other devices on the network that a collision has occurred and that they should not transmit. Meanwhile, the two devices whose signals created the collision cease transmitting and wait random intervals of time (usually a few milliseconds) before attempting to retransmit.

61
Q

Which of the following network infrastructure implementations would be used to connect two remote sales machines back to the main campus for all of their data and voice network traffic?

Crossover cable
Single mode fiber
Satelite
MPLS

A

Single mode fiber

A crossover cable has a maximum distance of 300 ft over Cat5e. A satellite connection work for line of sight between the office and the satellite, but the signal isn’t always reliable or fast enough. MPLS is based on a short path rather than a long path. Single mode fiber can carry different types of data signals over long distances without losing any integrity, therefore it is the best choice. You can lease a pair of single mode fibers from the local telecommunications provider (called dark fiber) since it will already be buried underground and ready for your use.

62
Q

Which of the following threats can policies, procedures, and end-user training help to effectively mitigate?

Zero-day attacks
Attempted DDoS attacks
Man-in-the-middle attacks
Social engineering attempts

A

Social engineering attempts occur when someone uses something like: phishing (they are attempting to receive your personal information and look legitimate), pretexting (basically they give you a scenario and expect you to react quickly), tailgating (following too closely into a door they aren’t allowed in), and many other situations. Proper policies, procedures, and educating your users on the dangers posed by social engineering could prevent them from becoming a victim of a phishing attack, as well as many other attacks.

63
Q

Your company has just gotten a new OC-12 installed to support your server room. The telecommunications provider has installed the connection from their main offices to your demarcation point. When the installers test the connection from the provider’s offices to your demarcation point, everything works properly. You connect the OC-12 to your network, but you are noticing a large amount of dropped packets and errors. You suspect this may be a layer 1 issue. Which of the following should you attempt FIRST to identify the source of the issue?

Determine if any devices may be causing EMI on the cable
use a pinout tester to validate the cable’s integrity
Use an OTDR to validate the cable’s integrity
Use a multimeter to validate the cable’s integrity

A

Use an OTDR to validate the cable’s integrity

You may not know all the details involved in this question, but that is ok. Start with what you do know. The question talks about an OC12 connection. What kind of cable is used with that? An OC-12 is a fiber optic cable. Based on that, you know the only one of these options that has anything to do with a fiber cable is a OTDR (Optical Time-Domain Reflectometer). The other options are all applicable only to copper cables (like Cat 5e, Cat 6a, and T-1).

64
Q

You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address that is first connected to a particular switch port in order to prevent someone from unplugging a workstation from the switch port and connecting their own laptop to that same switch port. Which of the following security features would BEST accomplish this goal?

NAC
Sticky MAC
802.1x
ACL

A

Persistent MAC learning, also known as Sticky MAC, is a port security feature that enables an interface to retain dynamically learned MAC addresses when the switch is restarted or if the interface goes down and is brought back online. This is a security feature that can be used to prevent someone from unplugging their office computer and connecting their own laptop to the network jack without permission, since the switch port connected to that network jack would only allow the computer with the original MAC address to gain connectivity using Sticky MAC.

65
Q

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?

Data transport
First responder
eDiscovery
Encryption

A

eDiscovery

Process of elimination: Data transport is the transport of data while the First responder is the “first responder” and encryption is a method of putting data into a tunnel so it’s completely secure. That leaves us with eDiscovery. eDiscovery is the term that refers to the process of evidence collection through digital forensics.

66
Q

You have been asked to install a media converter that connects a newly-installed multimode cable to an existing CAT5e infrastructure. Which type of media converter should you use?

Ethernet to coaxial
Fiber to Ethernet
Fiber to coaxial
Multimode to single mode

A

Fiber to ethernet

A media converter is a layer 1 device that changes one type of physical network connection to another. In this case, we are converting multimode (fiber) cable to CAT5e (ethernet) cable.

67
Q

A project manager is tasked with the planning of a new network installation. The customer requires that everything discussed in the meetings will be installed and configured when a network engineer arrives onsite. Which document should the project manager provide the customer?

Acceptable Use Policy
Service Level Agreement
Statement of Work
Security Policy

A

A Statement of work (SOW) is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

68
Q

A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. What feature should he employ?

VLAN pooling
Subnetting
WPA2
LWAPP

A

LWAPP is the best choice because it serves as a standard single point that allows quick and efficient management of multiple wireless devices at a time.

69
Q

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?

PPP
PPTP
SSL
IPSec

A

An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol in a standard web browser to provide secure, remote-access VPN capability. In modern browsers and servers, it is more common to use TLS (transport layer security) which is the successor to SSL.

70
Q

What Ethernet feature will allow increased FCoE network throughput as long as all network devices recognize its specific size?

Frame relay
TCP offloading
Jumbo frame
Quality of service

A

By allowing jumbo frames, network throughput can be increased.