Practice test 4 Flashcards
As you arrive to work this morning, you look up at the building and notice a microwave antenna that is pointing another antenna on top of your company’s support building across the street. Which of the following network topologies BEST represents this network connection over the microwave link?
Point to multipoint
Point to point
Mesh
peer to peer
This connection is best represented by a point-to-point connection since it is being used as a Campus Area Network connection to directly connect the two buildings.
A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following needs to be added to allow the network management tool to interpret the new device and control it using SNMP?
MIB
TRAP
WALK
GET
Management Information Base (MIB) is used for managing all entities on a network using Simple Network Management Protocol. It would allow whatever tool to correctly interpret the information received.
A company utilizes a patching server to regularly update its PCs. After the latest round of patching, all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC. What could be done to prevent this problem next time?
Disable to automatic driver updates to PCs on the patching server.
Require the patching server to update the oldest PCs off hours.
Throttle the connection speed of the patching server to match older PCs.
Enable automatic rebooting of the PCs after patching is completed.
The most likely cause of this issue was a forced driver update being pushed from the update server to the older PCs, breaking their ability to use their network cards. It is best to disable automatic driver updates for PCs and have them tested first.
Your supervisor has asked you to run a Cat 5e cable between two network switches in the server room. Which type of connector should be used with a Cat 5e cable?
DB-25
RJ-45
RS-232
RJ-11
A Cat 5e cable should uses a RJ-45 connector on each end of the cable. This is the standard type of connector for Cat 3, Cat 5, Cat 5e, and Cat 6a cables.
What is used to authenticate remote workers who connect from offsite?
VTP trunking
OSPF
802.1x
Virtual PBX
802.1x can be used because it is designed to enhance the security of wireless local area networks (WLANs) . WLANs provide an authentication framework, allowing a user to be authenticated by a central authority. RADIUS (Remote Authentication Dial-In User Service) allows a company to maintain user profiles in a central database that all remote servers can share. It provides better security, allowing a company to set up a policy that can be applied at a single administered network point. Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server. 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server is the RADIUS server.
You are currently working as a firewall technician. You have received a request to open up a few ports on the firewall to allow a newly VoIP system to operate properly. The installer has requested that the ports associated with SIP, RDP, H.323, and RTP be opened to allow the new system to operate properly. Which of these ports are NOT used by a typical VoIP system?
H.323
RDP
SIP
RTP
RDP is the protocol for the Remote Desktop Protocol and operates over port 3389. This is not used in a typical VoIP system. SIP (Session Initiation Protocol), H.323 (voice/video conferencing) protocol, and the RTP (Real-time Transport Protocol) are all used heavily in VoIP and video conferencing solutions.
A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference the _______________.
Network topology
Network diagram
PoE requirements
Site survey
Since it is a wireless network, a review of a site survey is necessary to determine any physical advantages and disadvantages. Network topology and Network diagrams can be created once the site survey is complete and the location of the access points is determined.
A technician wants to update the organization’s disaster recovery plans. Which of the following would allow network devices to be replaced quickly in the event of a device failure?
Proper asset tagging and labeling
Archives/backups
Vendor documentation
Network Baseline
Having backups of the server data would allow for a quick recovery in the event of a device failure.
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company’s encryption to become unsecure. What would be required to resolve the exploit?
Install recommended updates
Configure the firewall to block port 22
Send all log files through SMTP
Utilize an FTP service
If the encryption is insecure, then we must look for encryption software updates or patches. If they are available, we must install them.
Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability?
MPLS trunking
Load balancing
Multiplexing
VLAN tagging
Load Balancing is a technique used to spread work across multiple computers, network links, or other devices.
Thomas has a server that streams media to the local network and the device is currently visible on the network. All of the workstations on the LAN can ping the device and all the firewalls are currently turned off. The goal is for the streaming media server to be able to allow different workstations to watch the stream if they choose to subscribe to it.The streaming device appears to be functioning properly, but the media won’t stream when requested. Which of the following TCP/IP technologies is MOST likely not implemented properly?
Anycast • Unicast • Multicast * Broadcasts
Explanation
Multicast is not implemented properly because that is the TCP/IP technology that sends out the packets to the requested devices when streaming to multiple workstations from a single streaming media server. As opposed to broadcast (one-to-all), which sends out packets to all devices, multicast (one-to-many-of-many/many-to-many-of-many) only sends packets to many that are specifically requested but not all. Multicast would need to be implemented to route the network device to the LAN so that streaming can function properly.
A network administrator has set up a firewall and entered only three rules allowing network traffic over ports 21, 110, and 25 in an effort to minimize the attack surface and to better secure the network. Unfortunately, now the administrator is receiving complaints from users who are reporting that they cannot access any web pages using their URLs, such as DionTraining.com. Which of the following should the administrator do to correct this issue?
Add a rule to the ACL to allow traffic on ports 137 and 66
Add a rule to the ACL to allow traffic on ports 143 and 22
Add a rule to the ACL to allow traffic on ports 80 and 53
Add a rule to the ACL to allow traffic on ports 445 and 173
Port 80 is used for HTTP traffic. It must be open to allow the web browser to make a request from the network to the web server. Port 53 is needed to reach the DNS servers in order to determine the IP address for a given URL or domain name (such resolving DionTraining.com to its IP address).
A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct the issue. Which of the following should the company do to reduce this type of action from causing network problems in the future?
Verify the update hashes match those on the vendor’s website
Segment the network and create a test lab for all updates before deployment
Coordinate the Internet Server update to coincide with the users’ updates
Implement a disaster recovery plan with a hot site to allow users to continue working
Explanation
Segmented networks would ensure every system isn’t updated at the same time and would be updated in groups. The test lab would ensure proper functionality prior to deployment or would allow you to work through the technical difficulties prior to deployment.
What should be considered when troubleshooting the coverage and signal strength of a 802.11n WLAN?
Building materials in the area
Temperature
Humidity
Malware
Explanation
Some building materials are more dense than others. The denser the object, the more you will have a degradation of signal. For optimal signal, a LoS (Line of sight) of 25 feet or less is advised as well.
A network technician is asked to redesign an Ethernet network before some new monitoring software is added to each workstation on the network. The new software will broadcast statistics from each host to a monitoring server for each of the five departments in the company. The added network traffic is a concern of management that must be addressed. How should the technician design the new network?
Place each department in a separate VLAN
Add a router and create a segment for all the monitoring host stations
Increase the collision domains to compensate for the added broadcasts
Increase the number of switches on the network to reduce broadcasts
Explanation
Placing each of the departments on separate VLANs will help minimize the added network traffic. VLANs work by taking multiple physical hosts and LANs and configuring them to act as if they were attached to the same Ethernet switch.
What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform?
Network-based anti-malware
Signature-based anti-malware
Host-based anti-malware
Cloud-based anti-malware
Explanation
The network-based anti-malware can keep the system secure by testing all communications to/from a distributed target platform.
Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?
Kerberos
AES
ISAKMP
TKIP
Explanation
ISAKMP is used in IPSec, which is commonly used in securing the key exchange during the establishment of a client-to-server VPN connection.
A network technician receives the following alert from a network device: “High utilizations threshold exceeded on gi1/0/24 : current value 8463257.54” What is being monitored to trigger the alarm?
Network device memory
Speed and duplex mismatch
Network device CPU
Interface link status
Explanation
This is an error message that indicates that threshold of high utilization of network interface, in this case interface gi1/0/24, has been exceeded. The message has been triggered on the interface link status. (Note: gi1/0 would be a gigabyte interface.)
A home user reports that a speed test website shows the following information: Download speed: 33.3Mbps
Upload speed: 10.2Mbps Which of the following is the best interpretation of the results?
The home PC is receiving data at 33.3 Mbps and sending data at 10.2 Mbps.
The home PC downloaded 33.3 MB of data to the website and uploaded 10.2 MB of data to the website.
The website upload bandwidth is saturated and it does not match the download speed.
The website is downloading data to its server at 33.3 Mbps and uploading data from its server at 10.2 Mbps.
Explanation
This connection is an asymmetric connection, like a cable modem or DSL, where upload and download speeds do not match
A small real estate office has about 15 workstations and would like to use DHCP to assign classful IP addresses to each workstation. The subnet only has one octet for the host portion of each device. Which of the following IP addresses could be assigned as the default gateway?
- 0.0.1
- 16.0.1
- 254.0.1
- 168.0.1
Explanation
A non-routable IP address (in this case 192.168.0.1), also known as a private IP address, is not assigned to any one organization and does not need to be assigned by an Internet Service Provider. Since the question wants a classful IP addressing scheme to be assigned to devices, and only one octet being available for the host portion, it would need to be a Class C address. The only Class C address to choose is 192.168.0.1 based on the options provided. The IP 10.0.0.1 is a Class A address. The IP 172.16.0.1 is a Class B address. The IP 169.254.0.01 is an APIPA (reserved) address.
Which of the following devices does a CSU/DSU connect?
A local network to a VPN
A cable modem to a wireless router
A T1 line to a network router
An analog line to a network router
Explanation
A CSU/DSU device is designed to connect a terminal device to a T1 line. The terminal device or Data Terminal Equipment (DTE) such as a router will connect to the T1 line via CSU/DSU (Channel Service Unit/Data Service Unit).
Which of the following should be implemented to allow wireless network access for clients in the lobby using a password key?
RADIUS
IPSec
WPA2
Firewall
Explanation
WPA2 allows the use of a preshared key for wireless network access.
Which WAN technology relies on virtual circuits and point-to-multipoint connections?
PRI
Frame relay
MPLS
ISDN
Explanation
Frame Relay is a WAN technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology. It supports the use of virtual circuits and point-to-multipoint connections. It is commonly used to connect multiple smaller corporate office locations back to a larger centralized headquarters.
Which of the following network topologies requires that all nodes have a point-to-point connection with each and every other node in the network?
Ring
Mesh
Bus
Star
Explanation
A mesh network is a network topology in which each node relays data for the network. Because of this, physical mesh networks are very expensive to implement and not often used.
A network architect is designing a highly-redundant network with a distance vector routing protocol in order to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize?
Route poisoning
Spanning tree
Split horizon
Hold down timers
Explanation
The Route poisoning setting in Cisco’s Split Horizon is what prevents routing loops and shows the failed routes.
A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in various locations. This document is known as ______________.
Heat map
Bandwidth survey
Network baseline
Logical Network map
Explanation
A heat map will show the signal strengths of wireless network signals in various locations. Technicians will document this information and use it as a tool during troubleshooting and optimization efforts.
Which of the following is the BEST encryption to use from the options below to meet your manager’s requirements for the new visitors’ Wireless Network?
WPA2-CCMP
WEP
WPA
WPA2-TKIP
Open
Explanation
Since your manager has requested that the visitors not be required to configure anything on their devices, the only option you can choose is Open. This option presents NO security for the visitor’s wireless network, but it also requires no setup on the user’s devices. All of the other options would require some sort of pre-shared key and setup to allow the visitor to use the network.
A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. What rule should the technician verify FIRST?
An implicit deny is enabled
All inbound traffic is blocked
All outbound traffic is blocked
A DMZ has been created
Explanation
Implicit deny only allows certain traffic through that is specified by certain ports.