Test 0 Flashcards
- A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
A. Move the UTM onto the LAN side of the network
B. Enable TLS inspection on the UTM
C. Enable stateful inspection on the UTM
D. Configure the UTM to deny encrypted files from being transferred
C. Enable stateful inspection on the UTM
Stateful-inspection firewalls: Unlike packet-filtering firewalls, stateful-inspection firewalls can track and “understand” when a TCP connection has occurred. This allows for reply traffic to be allowed through the firewall without the need for explicit rules. As a result, stateful-inspection firewalls make configuration easier, but can add a bit more inspection overhead and slow down traffic slightly more than packet-filtering firewalls. so C could be the correct answer
- A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?
A. Swap the fiber pairs in one of the SFPs
B. Replace the jumpers with single-mode fiber
C. Set the correct MTU on the new interface
D. Install an optic that matches the fiber type
B. Replace the jumpers with single-mode fiber
“extended-range 10Gb SFP” is the key here. And their use of the word “jumpers” means all the mm fiber is getting changed.
- A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?
A. DLP B. IDS C. WAF D. WPA E. TPM
C. WAF
Web Application Firewall
Option C is correct: The clue here is “ cloud-based file storage”. The only security mechanism here is Web Application Firewall (WAF).
Data Lost prevention (DLP): A security technique that detects potential data breaches/data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest.
Intrusion Detection System (IDS): A device or software application that monitors a network or systems for malicious activity or policy violations.
Wi-Fi Protected Access (WPA): A security protocol designed to create secure wireless (Wi-Fi) networks.
Trusted Platform Module (TPM): A cryptographic module that enhances computer security and privacy.
- A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting departmentג€™s router, but is not able to ping the machine from the IT network. Which of the following is MOST likely the cause?
A. Incorrect default gateway
B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment
A. Incorrect default gateway
If the technician can ping the workstation from the accounting department’s router (and there is no mention of the staff person having difficulties connecting to accounting resources), we can assume the workstation is in the correct VLAN. The only other answer that makes sense is an incorrect default gateway - likely due to manual misconfiguration (they make no mention of using DHCP, so manual entry errors should be considered). A makes sense - it’s just a poorly worded question to make you think it through.
- A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?
A. NAT B. PAT C. STP D. SNAT E. ARP
B. PAT
The answer is PAT.
Static Network Address Translation (SNAT) would be used to translate from one address to another. The question asks how to convert from one port to another; this is called Port Address Translation (PAT)
- A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
A. Install additional WAPs
B. Install external antennas
C. Move the WAPs closer to the more populated area
D. Change the antenna types
A. Install additional WAPs
- A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
A. Damaged fiber
B. Corrupted operating system
C. VLAN mismatch
D. Bad port
B. Corrupted operating system
If the switch doesn’t boot up, it’s likely due to the operating system, not the configuration of the switch itself. Even with a vlan mismatch, the switch should completely boot up.
- A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A. It segments broadcast domains in the network infrastructure
- A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved?
A. Rack diagrams
B. Network topology
C. Standard operating procedures
D. Wiring documentation
A. Rack diagrams
It asked for “reference to determine the location of the equipment being moved”. Keyword is the physical location, you need the rack diagrams to determine the space and the positions of the servers/network equipment.
network topology refers to… Bus, Star, Mesh, Ring topologies.. not physical location of equipment.
- Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?
A. MAC address reservation
B. Static IP address
C. IP address exclusion
D. Custom DNS server entry
A. MAC address reservation
Because it says the ‘physical address’ and physical address is another word for MAC address. Launch CMD in windows and type ‘ipconfig/all’ next to physical address you will find the MAC address of your device.
- A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?
A. Access control lists
B. Captive portal
C. WPA2
D. Port security
D. Port security
keyword “via Ethernet” aka port
They want to prevent an unauthorized host from connecting to the network via Ethernet. Anyone can hook up their laptop to an open Ethernet port. Port Security (Layer 2) would only allow certain computers to connect via a given port. ACL is associated with Layer 3 of the OSI model. Therefore, answer is D.
- A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests.
Which of the following represents the MOST secure method to configure guest access to the wireless network?
A. Guests should log into a separate wireless network using a captive portal
B. Guests should log into the current wireless network using credentials obtained upon entering the facility
C. The existing wireless network should be configured to allow guest access
D. An additional wireless network should be configured to allow guest access
A. Guests should log into a separate wireless network using a captive portal
A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
- The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?
A. Proxy server
B. UTM appliance
C. Content filter
D. Load balancer
D. Load balancer
Load balancing refers to the process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.
- A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
A. GSM B. TDM C. CDMA D. PSTN E. MIMO
A. GSM
The Global System for Mobile Communications (GSM) is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991. By the mid-2010s, it became a global standard for mobile communications achieving over 90% market share and operating in over 193 countries and territories.
- A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?
A. 172.16.80.0-172.16.85.254
B. 172.16.80.0-172.16.88.255
C. 172.16.80.1-172.16.87.254
D. 172.16.80.1-172.16.85.255
C. 172.16.80.1 - 172.16.87.254
16 (classful subnet - 255.255.0.0)
21 ( classless subnet - 255.255.248.0) 5 bits borrowed from host portion count in bit format to get your magic number ( block size) 128,192,224,240,248 = 5 bits which equals 8 block size, so you count in 8’s to for your networks in this case .80-87 (88 is the last IP which is broadcast so you cannot use that)
- A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks.
Which of the following should the technician perform to discover possible interference?
A. Site survey B. Vulnerability scanning C. Wardriving D. Checking logical diagram E. Bandwidth test
A. Site survey
The site survey will allow us to see the overlap of networks, being able to pinpoint where the interference is coming from.
Installing and configuring a Wi-Fi network requires a number of discrete steps. You should start with a site survey to determine any obstacles (existing wireless, interference, and so on) you need to overcome and to determine the best location for your access points.
because bandwidth deals with the AMOUNT OF DATA TRANSMITTED over an internet connection at a given time. So a bandwidth test would just be checking the upload/download times of the network.
- A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?
A. Test the possible solution
B. Question the users
C. Determine what has changed
D. Document the theory
A. Test the possible solution
A good mnemonic for the CompTia troubleshooting steps is: I Go To Poland Via Denmark.
- Identify
- Guess
- Test
- Plan
- Verify
- Document
- Identify the problem.
- Establish a theory of probably cause. (Question the obvious)
- Test the theory to determine cause.
- Establish a plan of action to resolve the problem and implement the solution.
- Verify full system functionality and if applicable implement preventative measures.
- Document findings, actions, and outcomes.
- A network technician has discovered a rogue access point placed under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?
A. Disable unused ports on switches
B. Enable DHCP guard to detect rogue servers
C. Configure WPA2 on all access points
D. Use TACACS+ authentication
B. Enable DHCP guard to detect rogue servers
Enabling DHCP guard will protect the network from another rogue AP in all the ports. Disabling unused ports will just protect unused ports, it’s a good option but it doesn’t erradicates the issue.
- Which of the following provides the ability to deploy consistent access point configurations from a central location?
A. Wireless controller B. AAA server C. WiFi-protected setup D. Proxy server E. VPN concentrator
A. Wireless controller
What Is a Wireless LAN Controller?
A wireless LAN controller, or WLAN controller, monitors and manages wireless access points in bulk and allows wireless devices to connect to WLAN, a wireless network architecture. As a centralized device in the network, the wireless LAN controller is usually located at the data center, to which all the wireless APs on the network are directly or indirectly connected.
How a Wireless LAN Controller Functions?
The wireless access controller takes the bandwidth produced coming from a router and stretches it to fit the network needs. Similar to an amplifier in a stereo system, the wireless controller allows devices from farther distances to connect. Besides, it enables the network administrators to check all the data related to the network and is able to detect rogue access points and recent traps generated by the access points.
- A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?
A. a
B. ac
C. g
D. n
B. ac
- A network administrator configures a router with the following IP address information:
Gigabit Ethernet 1 Interface: 10.10.0.1/24
Serial 0 Interface: 10.10.0.253/30
Clients are connected to a switch on the gigabit Ethernet interface; the ISP is connected to the Serial 0 interface. When the router configuration is complete and client devices are reconfigured, all clients report that they are unable to connect to the Internet. Which of the following is the MOST likely reason?
A. The router was configured with an incorrect IP address
B. The router was configured with an incorrect default gateway
C. The router was configured with an incorrect subnet mask
D. The router was configured with an incorrect loopback address
C. The router was configured with an incorrect subnet mask
The subnet mask is incorrectly configured.
A /30 would give you a subnet mask of 255.255.255.252
First available would be 10.10.255.253
If the (ISP) is conNECTED to the 253 itS WRONG
It should be 252 which is the network ID
- A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)
A. Network scan B. Banner grab C. Tracert D. DHCP server check E. Brute-force attack
A. Network scan
C. Tracert
The answer is A and C because the question is asking what they should do FIRST. Banner Grab is done AFTER you determine what systems have open ports.
First start with;
A penetration test is an active test that attempts to exploit
discovered vulnerabilities. It starts with a vulnerability scan and then
bypasses or actively tests security controls to exploit vulnerabilities.
A Network/port scanner scans systems for open ports and attempts to
discover what services and protocols are running.
Banner grabbing queries remote systems to detect their operating
system, along with services, protocols, and applications running on
the remote system.
Pick your answer this.
Tracert—A command-line tool used to trace the route between two systems.
- Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A. traceroute
B. ping
C. nslookup
D. netstat
A. traceroute
Using traceroute, you can see where the connection drops and determine whether that specific point is located within your network or on the way to the ISP.
- Which of the following is a vulnerable system designed to detect and log unauthorized access?
A. SIEM
B. Honeypot
C. DMZ
D. Proxy server
A. SIEM
Security information and event management (SIEM) gather and analyze the log data you send to it.
Security Information and Event Management (SIEM) software has been in use in various guises for over a decade and has evolved significantly during that time. SIEM solutions provide a holistic view of what is happening on a network in real-time and help IT teams to be more proactive in the fight against security threats.
What is unique about SIEM solutions is that they combine Security Event Management (SEM) - which carries out analysis of event and log data in real-time to provide event correlation, threat monitoring an incident response - with Security Information Management (SIM) which retrieves and analyzes log data and generates a report. For the organization that wants complete visibility and control over what is happening on their network in real-time, SIEM solutions are critical.
In computer terminology, the term honeypot refers to a security structure or mechanism that is built to deflect the attackers. In other words, a honeypot is there to distract the attackers from valuable assets of the organization.
Honeypot can be defined as a system that is attached to the network. It is set up to be a decoy. It lures the hackers and wastes their time as they try to gain unauthorized access to the network or systems of the organization.
- According to the OSI model, at which of the following layers is data encapsulated into a packet?
A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5 E. Layer 6
B. Layer 3
Some People Fear Birthdays
Start at layer four and work down: Some -- Segments People -- Packets Fear -- Frames Birthdays -- Bits
Some – Segments –> Layer 4 Transport Layer: Datagram (UDP) or Segment (TCP)
People – Packets –> Layer 3 Network Layer: Packet (IP)
Fear – Frames –> Layer 2 Data Link Layer: Frame
Birthdays -Bits –> Layer 1 Physical Layer: Bit
26. Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels? A. DSL B. POTS C. T1 D. DOCSIS
C. T1
OBJ-2.5: A T1 can transmit 24 telephone calls at a time because it uses a digital carrier signal (DS-1). DS-1 is a communications protocol for multiplexing the bit streams of up to 24 telephone calls simultaneously. The T1’s maximum data transmission rate is 1.544 Mbps. DOCSIS is the standard for a cable modem. DSL is a Digital Subscriber Line which has variable speeds from 256 Kbps and up. POTS is the Plain Old Telephone System, and provides only a single phone connection at a time. Out of these options, the T1 is the BEST to ensure you can reliably provide 23 simultaneous phone connections.
- Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?
A. Sticky MAC
B. 802.1x
C. ACL
D. NA
A. Sticky MAC
Persistent MAC learning, also known as Sticky MAC, is a port security feature that enables an interface to retain dynamically learned MAC addresses when the switch is restarted or if the interface goes down and is brought back online. This is a security feature that can be used to prevent someone from unplugging their office computer and connecting their own laptop to the network jack without permission since the switch port connected to that network jack would only allow the computer with the original MAC address to gain connectivity using Sticky MAC.
- A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?
A. 23
B. 25
C. 110
D. 143
B. 25
This is clearly the function of SMTP (25).
POP (110) and IMAP (143) are used in receiving and retrieving emails, respectively. The question clearly asks which port is to be left open so the server can relay/send emails.
- In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme:
Subnet 1: 192.168.1.0/26
Subnet 2: 192.168.1.65/26
Company B uses the following scheme:
Subnet 1: 192.168.1.50/28
The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the BEST way for the company to connect these networks?
A. DMZ
B. PAT
C. NAT
D. VLAN
C. NAT
in a nutshell: when you are at home on your private network your devices have a private Ip normally in the 192.168.1.0/24 range. These devices use their assigned private ip’s to communicate locally however when a private ip needs to talk to a website like amazon, NAT will assigns/masks/translates (however you want to say it) that private IP to your public IP. Your public ip is provided by your ISP. NAT was created to address the ever depleting usable IPv4 address
- A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers.
In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network from the other eight computers.
Which of the following represents the BEST configuration for the remote site?
A. One router connected to one 24-port switch configured with three VLANS: one for the managers computers and printer, one for the other computers and printer, and one for the VoIP phones
B. Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the managers desktop computers, VoIP phones, and printer
C. One router connected to one 12-port switch configured for the managers computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer
D. One router connected to one 24-port switch configured with two VLANS: one for the managers computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer
A. One router connected to one 24-port switch configured with three VLANS: one for the managers computers and printer, one for the other computers and printer, and one for the VoIP phones.
One 24-port router and 3 VLANs is the most correct solution.
Remote site hosts 22 devices so 24 ports are needed. Management gets one VLAN, remaining users get another, and phones also get another.
Getting two routers is incorrect as this is not cost effective. Connecting a firewall only to one router is not feasible for security. This setup also does not split each group by network.
Single 12-port router for each group is incorrect; this is neither efficient nor cost effective.
24-port router with two VLANs is incorrect; there are not enough VLANs to properly separate hosts.
31. A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable? A. Tone generator B. Multimeter C. OTDR D. Loopback adapter
A. Tone generator
Tone generator is the most correct answer. A tone generator sends a signal through a cable so a technician can find its termination easier.
A multimeter checks and measures electrical signals and is incorrect.
An OTDR is incorrect as it would not help the technician identify the cable termination.
A loopback adapter is incorrect as this only allows testing of the local host device.
- A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician
MOST likely to consider? (Choose three.)
A. SIP B. NTP C. H.323 D. SMB E. ICMP F. RTP G. IPSec H. RDP
A. SIP
C. H.323
F. RTP
SIP, H.323, and RTP are the most correct answers.
Session Initiation Protocol is used for multimedia communication sessions.
H.323 is used to define how real-time audio, video and data information is transmitted. It provides signaling, multimedia and bandwidth control mechanisms over RTP.
Real-time Transport Protocol is a packet-formatting standard for delivering audio and video over the Internet, and is popularly implemented for VoIP solutions.
NTP is incorrect; Network Time Protocol’s functions are not relevant to a VoIP PBX.
SMB is incorrect; Server Message Block is a Windows protocol for sharing access to files and printers between hosts.
ICMP is incorrect; Internet Control Message Protocol is not relevant to the functions of a PBX.
IPsec is incorrect; IP security is not relevant to the function of the PBX.
RDP is incorrect; Remote Desktop Protocol features are not relevant to the function of the PBX.
- A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch offices router status?
A. Use a modem to console into the router
B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site
A. Use a modem to console into the router
- A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?
A. STP B. RTP C. RIP D. NTP E. SIP
C. RIP
RIP is the most correct answer.
Routing Information Protocol is used at the Network layer to determine the next hop for a travelling packet.
STP is incorrect; Spanning Tree Protocol is a Data Link layer protocol.
RTP is incorrect; Remote Desktop Protocol is an Application layer protocol and has no bearing on where data routes to.
NTP is incorrect; Network Time Protocol is not relevant to routing in this context.
SIP is incorrect; Session Initiation Protocol is an Application layer protocol designed to establish connections for multimedia communication sessions.
- A network administrator is setting up a web-based application that needs to be continually accessible to the end users. Which of the following concepts would
BEST ensure this requirement?
A. High availability
B. Snapshots
C. NIC teaming
D. Cold site
A. High availability
Key words “continually accessible”
This makes option A most appropriate.
- Which of the following devices should a network administrator configure on the outermost part of the network?
A. Media converter
B. Switch
C. Modem
D. Firewall
D. Firewall
- A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?
A. Asset tracking tags
B. Motion detectors
C. Security guards
D. Computer locks
A. Asset tracking tags
The tags are entered into a tracking database, which also usually has a map of the coverage area so that a particular asset can be located.
- A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?
A. Straight-through
B. Console
C. Rollover
D. Crossover
D. Crossover
Router to router cross Pc to router cross switch to switch cross pc to switch straight switch to router straight
“…without the use of autosensing ports…”. If you had autosensing ports then you could use a straight cable
39. A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use? A. Loopback adapter B. Cable tester C. Tone generator D. Multimeter
A. Loopback adapter
Loop back adapters are used to test T1 lines.
The question is asking for ‘to verify the configuration of the router’ which only leaves us with A.
- Which of the following policies would Joe, a user, have to agree to when he brings in his personal tablet to connect to the company’s guest wireless Internet?
A. NDA
B. IRP
C. BYOD
D. SLA
C. BYOD
Bring your own device (BYOD) refers to the trend of employees using personal devices to connect to their organizational networks and access work-related systems and potentially sensitive or confidential data. Personal devices could include smartphones, personal computers, tablets, or USB drives.