Practice test 5 Flashcards
What type of cable would you use to connect a router to a switch?
Crossover
RG-6
Rollover
RS-232
Straight-through
Explanation
When connecting switches to routers, you can just use a straight-through cable because switches are DCE and routers are DTE devices. When you connect a (switch/hub) to a (switch/hub), you need a crossover. If you connect a (switch/hub) to a (router/computer), you need a straight through. If you connect a (router/computer) to (router/computer), then you need a crossover. If this was a real question on the exam, you would have the words provided in a list, and you would drag them below the appropriate drawing.
During what period should all scheduled work on production network equipment be conducted?
Maintenance window
Development life cycle
Down time
Business hours
Explanation
By using a Maintenance Window, all downtime is limited and the organization can prepare in advance for the scheduled work to be carried out.
You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?
Cipher lock
Thumbprint reader
Video monitoring
Mantrap
Explanation
A mantrap allows you to enter one door and wait for it to close before entering another door. Video monitoring is a passive security feature, so it won’t prevent two people from entering at once. The thumbprint reader or cipher lock will ensure that only an authorized user can open the door, but it won’t prevent someone from piggybacking and entering with them.
The network technician has received a large number of complaints from users that there is poor network performance. The network technician suspects a user may have created a malicious flood on the network with a large number of ping requests. What should the technician do?
Block all ICMP request
Update all antivirus software
Remove all suspected users from the network
Upgrade firmware on all network cards
Explanation
Ping requests use the Internet Control Message Protocol to send operational information about a host or router. Blocking all ICMP requests would eliminate the ping request flood, although it may become harder to diagnose network issues in the future as ICMP is used heavily in network troubleshooting.
A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to the company file server. Right now, any employee can upload and download files with basic system authentication (username and password). What should he configure to increase security?
Kerberos authentication
MDS authentication
Multi-factor authentication
Single sign-on authentication
Explanation
This security approach provides a defense layer that makes it difficult for an unauthorized user to break into a system. It provides multiple factors that a user must know in order to obtain access. For instance, if one factor is successfully broken, there will be few others that the individual attempting to enter the system must overcome.
John is investigating a performance issue on a server and has begun by gathering the server’s utilization statistics. John notices that the statistics are outside of the normal acceptable ranges. What should John do next?
Archive the logs
Conduct a vulnerability scan
Conduct a baseline review
Conduct a port scan
Explanation
John should conduct a baseline review to compare the statistics he collected against the previous baseline. He can then use this information to further investigate the cause of the drop in the server’s performance.
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which system should be used?
Event log
Syslog
SIEM
SNMP
Explanation
Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated. SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM).
Your company has installed a guest wireless network in the break room. According to company policy, employees may only connect to the network and use it while on their lunch break. Which of the following policies should you have each employee sign to show they understand and accept the conditions of use for this guest network?
MOU
AUP
SLA
NDA
Explanation
An acceptable use policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used. In this scenario, this is the most appropriate policy to utilize.
You need to connect to a Linux server to conduct some maintenance. The server is located in a remote office about 50 miles from your own. You decide to connect the server remotely instead of driving to the location to save some time, but you want to ensure you do this securely. The Linux server has VNC installed, but it isn’t configured to provide an encrypted connection. Which of the following should you use to secure the VNC connection to the remote server?
HTTPS
SSH in tunnel mode
RDP
WPA2
Explanation
Since you want to use the existing VNC server to make the connection and it is unencrypted, you should tunnel the VNC protocol through a secure SSH connection to encrypt it. While an SSH client connects to a Secure Shell server, which allows you to run terminal commands as if you were sitting in front of another computer, it can also allow you to “tunnel” any port or protocol between your local system and a remote SSH server through its own encryption process. This allows you to add a layer of encryption and security to an unsecured protocol or application.
A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indicating weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of:
Session hijacking
Vulnerability scanning
Social engineering
Penetration testing
Explanation
Penetration testing is the act of using a computer system, an individual network, or another application to find vulnerabilities that an attacker could use to compromise your systems. Penetration testing can also find endpoints with vulnerabilities which makes the attack surface greater.
You just arrived at school today, pulled your laptop out of your backpack, and tried to connect your laptop to the Wi-Fi network. It worked fine yesterday, but today it won’t connect automatically or display any available networks. You haven’t done anything to the laptop since you left class yesterday. You ask your classmates if they are able to connect to the Wifi and every one of them is connected without any issues. What should you check FIRST in your attempt to connect your laptop to the Wifi?
Wireless controller configuration
IP address issued by the DHCP server
Wireless switch on your laptop
The configuration of the WAP
Explanation
Since everyone else’s laptops are connected without any issues, the problem is not with the network but with your laptop in some form. This rules out the wireless controller configuration or WAP settings since those are both things that would affect all users on the network. Since you are not connected or finding any networks, you won’t have a DHCP address assigned. The most likely cause of your issue is that the wireless switch on your laptop was accidentally switched to the off position when you put your laptop in your backpack. (Note: Not all laptops have a wireless switch, but from the options provided, this is the most logical answer. If you have a MacBook, for example, they do not use a physical wireless switch.)
Dion Training is considering moving its headquarters and data center to Florida, but they are worried about hurricanes disrupting their business operations. To mitigate this risk, Dion Training has signed a contract with a vendor located in a different state to provide hardware, software, and the procedures necessary for the company to recover quickly in the case of a catastrophic event, like a hurricane causing a power loss for up to 10 days. Jason, as the owner, is a little concerned that this contract isn’t sufficient to mitigate enough of the risk since it only provides a solution for the first 10 days. Jason wonders, “what will we do if a major outage occurs and our offices are not able to be used for 6-12 months?” Jason has hired you on to help develop Dion Training’s long-term strategy for recovering from such an event. What type of plan should you create?
Incident response plan
Disaster recovery plan
Business continuity plan
Risk management plan
Explanation
A business continuity plan (BCP) is a plan to help ensure that business processes can continue during a time of emergency or disaster. Such emergencies or disasters might include a fire or any other case where business is not able to occur under normal conditions. A disaster recovery plan is useful (and usually a piece of the large business continuity plan), but it is insufficient for the long-term strategy which is needed to support business operations during an extended outage.
A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful. What would resolve the issue?
Update the HOST file with the URLs for all websites
Use NSLOOKUP to resolve URLs
Ensure ICMP messages can pass through the firewall
Enable port 53 on the firewall
Explanation
Port 53 is used by DNS. The DNS Server is used to translate FQDN to IP addresses.
A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform first?
Test the theory
Establish a plan of action
Gather information
Question the obvious
Explanation
In order to have a good understanding and a clear idea on what the issue could be, the technician should gather information as the first step.
The Chief Security Officer is concerned with the possible theft of corporate data from the network. He wants to ensure that any sensitive data cannot be exfiltrated from the network. Which of the following should be implemented to BEST mitigate this threat?
AUP
DLP
(Correct)
NDA
MOU
Explanation
Data loss prevention (DLP) systems are used to ensure that end users do not send sensitive or critical information outside the corporate network. These DLP products help a network administrator control what data end users can transfer. While an Acceptable Use Policy (AUP), Non Disclosure Agreement (NDA), or MOU (Memorandum of Understanding) might provide some administrative controls to help mitigate the threat of data loss or theft, a DLP is the BEST solution as it provides a technical way to enforce your policies.
A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator is able to ping the fiber uplink interface, but none of the new PCs plugged into the switch respond to ICMP requests. What should the technician do next?
Check if there are link lights on the ports
Check the ports on the switch for full duplex
Check to see if port security is enabled
Check to see if the uplink interface is configured correctly
Explanation
By checking the link lights on the ports, the administrator can verify if there is any activity on the network, if the ports are enabled, and if the Layer 1 components are working correctly.
Which of the following cloud infrastructures includes on-premise servers utilizing a centralized syslog server that is hosted at a third-party organization in order to review the logs?
Hybrid
Public
Community
Private
Explanation
On-premise servers is an aspect of the private cloud, whereas syslog hosted on a third-party server is an aspect of the public cloud. Since a hybrid cloud consists of any type of cloud computing sharing multiple aspects of different cloud infrastructure designs, hybrid is the correct answer.
You have been asked to configure a router. Which of the following protocols should you enable to allow the router to determine the path to another network?
BGP
RTP
NTP
STP
Explanation BGP (Border Gateway Protocol) is a protocol that operates at layer 3 of the OSI model. Since the question asks about a router, you need to identify a routing protocol since this would enable the router to determine the path to another network using IP (layer 3) information. The other protocols listed are not routing protocols: RTP (Real-time Transport Protocol), NTP (Network Time Protocol), and STP (Spanning Tree Protocol).
Which of the following ports should be allowed to provide access to certain VoIP applications?
110
139
1720
5060
Explanation
5060 is used by SIP, which VOIP relies upon.
IPv4 addresses are written using Base 10 numbers while IPv6 addresses are written in Base 16 numbers. What type of notation does Base16 utilize?
Octet
Binary
Hexadecimal
Decimal
Explanation Hexadecimal (or Hex for short) is the system of numbering that uses Base16. This includes the numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
A switch technician is being tasked to centrally manage the switches and to segment the switches by broadcast domains. The corporate network is currently using VLAN 1 for all of its devices and is using a single private IP address range with a 24-bit mask. The supervisor wants VLAN 100 to be the management subnet and all switches to share the VLAN information. What option would be best to use?
Use VLSM on the IP address range, with STP and 802.1q on the inter switch connections with native VLAN 100
Use VLSM on the IP address range with VTP and 802.1x on all inter switch connections with native VLAN 100
Use VLSM on VLAN1, with VTP and 802.1w on the inter switch connections with native VLAN 100
Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with native VLAN 100
Explanation
802.1q is the networking standard that supports VLANs and VLAN tagging. VTP is the VLAN Trunk Protocol and carries all VLAN information to all switches in a VTP domain.
An administrator has a physical server with a single NIC. The administrator intends to deploy two virtual machines onto a single physical server. Each virtual machine needs two NICs, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet the requirements?
The administrator should create a virtual switch for each guest; each switch should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network
The administrator should create a virtual switch that is bridged to the corporate network, and a second virtual switch that carries intra-VM communication only
The administrator should create a virtual switch to bridge all of the connections to the network; the virtual heartbeat NICs should be set to addresses in an unused range
The administrator should install a second physical NIC onto the host, and then connect each guest machine’s NICs to a dedicated physical NIC
Explanation
By bridging all of the connections to the network, it allows for faster communication between the virtual machines (hosts). The heartbeat is set on unused address range in order to ensure there is no chance of data collision or loss of signal.
A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all the computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost effective manner. What devices would be MOST appropriate?
A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected to one another with a Gigabit Layer 2 switch.
(Correct)
A UTM should be used as a gateway device, with BGP as the routing protocol. The computers should be connected to one another using 1Gb Fibre Channel.
A router should be used as a gateway device, with EIGRP as the routing protocol. The computers should be connected to one another using a single 802.11N MIMO access point.
A router should be used as a gateway device, with OSPF as the routing protocol. The computers should be connected to one another using a Gigabit Layer 3 switch.
Explanation
A Gigabit Layer 2 switch is the cheapest switching solution offering 1Gbps network connectivity between the computers. RIPv2 has a lower overhead as set forth in the requirements.
A network administrator wants to increase the speed and fault tolerance of a connection between two network switches. To achieve this, which protocol should the administrator use?
LACP
LLDP
L2TP
LDAP
Explanation
The Link Aggregation Control Protocol (LACP) provides a method to control the bundling of several physical ports together to form a single logical channel. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on an IEEE 802 local area network, principally wired Ethernet. The Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.
You are currently troubleshooting a network connection error. When you ping the default gateway, you receive no reply. You checked the default gateway and it is functioning properly, but the gateway cannot connect to any of the workstations on the network. At which layer of the OSI model do you believe the issue is occurring?
Presentation
Transport
Session
Physical
Explanation
Ping requests occur at layer 3 (Network layer). Therefore, the problem could exist in layer 1 (physical), layer 2 (data link), or layer 3 (network). Since Physical (layer 1) is the only choice from layers 1-3 given, it must be the correct answer. Also, since the gateway cannot reach any of the other devices on the network, it is most likely a cable (physical) issue between the gateway and the network switch.
You are working for a brand new startup company who recently moved into an old office building because the CEO liked the “charm” of the place. You have been tasked with converting a small janitorial closet into an IDF to support the new office network. You measure the closet and determine that you can install a two-post rack inside of it, and all your necessary networking equipment will fit in the two-post rack. You test the power outlet that was installed in the closet, and it is sufficient for your needs. What is the NEXT thing you should be concerned with to ensure this closet can be used as your IDF?
Is there redundant power available?
Can I install a UPS in this closet?
Is there adequate air flow and cooling in the closet?
How will I label the cables during installation?
Explanation
Since you are converting an old closet into an IDF, you need to ensure you have 3 main things first: Power, Space, and Cooling. You already verified there was adequate power and space, so now you need to determine if there is adequate air flow and cooling to prevent the equipment from overheating. After that, you can then move into determining how to supply backup power (UPS or redundancy).
You have been asked to create an allow statement on the firewall’s ACL to allow NTP traffic to pass into the network. Which port should be included?
69
123
143
636
Explanation
The correct port for NTP is 123. Port 69 is used for TFTP. Port 143 is used for IMAP. Port 636 is used for LDAPS.
The administrator modifies a rule on the firewall and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager’s inquiry, what did the administrator forget to do first?
Submit a change request
Schedule a maintenance window
Provide notification of change to users
Document the changes
Explanation
A change request should be submitted through the change management process prior to any changes being made.