Test 1 Flashcards
- You just started work as a network technician at Dion Training. You have been asked to check if DHCP snooping has been enabled on one of the network devices. Which of the following commands should you enter within the command line interface?
A) SHOW ROUTE
B) SHOW INTERFACE
C) SHOW DIAGNOSTIC
D) SHOW CONFIG
D) SHOW CONFIG
Explanation
OBJ-5.3: The “show configuration” command is used on a Cisco networking device to display the device’s current configuration. This would show whether or not the DHCP snooping was enabled on this device. The “show interface” command is used on a Cisco networking device to display the statistics for a given network interface. The “show route” command is used on a Cisco networking device to display the current state of the routing table for a given network device. The “show diagnostic” command is used on a Cisco networking device to display details about the hardware and software on each node in a networked device.
- What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?
A) ARP SPOOFING
B) AMPLIFIED DNS ATTACKS
C) AN EVIL TWIN
D) SESSION HIJACKING
C) AN EVIL TWIN
Explanation
OBJ-4.2: An evil twin is the most common way to perform an on-path attack on a wireless network. An evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the user’s knowledge. A man-in-the-middle or on-path attack consists of sitting between the connection of two parties and either observing or manipulating traffic. This could be through interfering with legitimate networks or creating fake networks that the attacker controls. ARP spoofing, session hijacking, and amplified DNS attacks are not techniques specific to attacking wireless networks.
- Which of the following remote access tools is a command-line terminal emulation program operating on port 23?
A) SSH
B) RDP
C) VNC
D) TELNET
D) TELNET
Explanation
OBJ-1.5: Telnet is a TCP/IP application protocol supporting remote command-line administration of a host (terminal emulation). Telnet is unauthenticated, which means it sends data such as the username and password in plain text. For this reason, it should not be used, and SSH should be used instead. Telnet runs over TCP port 23. Virtual Network Computing (VNC) is a cross-platform screen sharing system that was created to remotely control another computer from a distance by a remote user from a secondary device as though they were sitting right in front of it. Secure Shell (SSH) uses port 22 to securely create communication sessions over the Internet for remote access to a server or system. Remote Desktop Protocol (RDP) uses port 3389 and is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
- Scott is a brand new network technician at Dion Training. He has been told to remote into the edge switch from his desk and enable DHCP snooping. Which of the following commands should he use?
A) TFTP SERVER
B) NMAP
C) IP
D) TELNET
D) TELNET
Explanation
OBJ-5.3: The telnet command is used to open a command-line interface on a remote computer or server. Telnet operates in plain text mode and should never be used over an untrusted or public network. While it would be better for Scott to use SSH for security reasons, telnet is still the best answer based on the options presented in this question. Nmap, or Network Mapper, is a cross-platform, open-source tool used to scan IP addresses and ports on a target network, and to detect running services, applications, or operating systems on that network’s clients, servers, and devices. A trivial file transfer protocol (TFTP) server is used to send or receive files over a TCP/IP network. TFTP servers are commonly used to transfer firmware images and configuration files to network appliances like routers, switches, firewalls, and VoIP devices. The ip command is a suite of tools used for performing network administration tasks, such as displaying the current TCP/IP network configuration, refreshing the DHCP and DNS settings, assigning an IP address, and configuring TCP/IP settings for a given interface.
- You are installing a new LAN in a building your company just purchased. The building is older, but your company has decided to install a brand new Cat 6a network in it before moving in. You are trying to determine whether to purchase plenum or PVC cabling. Which environmental conditions should be considered before making the purchase?
A) AIR DUCT PLACEMENT
B) WORKSTATION MODELS
C) WINDOW PLACEMENT
D) FLOOR COMPOSITION
A) AIR DUCT PLACEMENT
Explanation
OBJ-5.2: In a large building, the plenum is the space between floors used to circulate the air conditioning ductwork, piping, electrical, and network cables throughout the building. This space is also an ideal place to run computer network cabling. However, if there is a fire in the building, the PVC network cables can be very hazardous as they create a noxious gas when burnt. If you have a plenum area in the ceiling containing the air ducts, you will need to use plenum-rated cables in your cable trays to prevent creating a dangerous environment for your users.
- Which of the following must be added to a VLAN’s gateway to improve the security of the VLAN?
A) ACCESS CONTROL LIST
B) SPANNING TREE PROTOCOL
C) SPLIT HORIZON
D) HOLD DOWN TIMER
A) ACCESS CONTROL LIST
Explanation
OBJ-4.3: Without a properly configured ACL, there is no additional security provided by a VLAN. A VLAN (virtual local area network) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). Adding a VLAN to a network provides segmentation of the traffic and traffic must be routed between the VLANs. This allows network administrators the opportunity to allow or deny traffic into or out of a given VLAN for additional security by using access control lists. The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks and operates at layer 2 of the OSI model. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. A split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned. A hold down timer is a function of a router that prevents a route from being updated for a specified length of time (in seconds). A hold down timer allows for the routers in a topology to have sufficient time to reach convergence and be updated when a route fails.
- Your company is experiencing slow network speeds of about 54Mbps on their wireless network. You have been asked to perform an assessment of the existing wireless network and recommend a solution. You have recommended that the company upgrade to an 802.11n or 802.11ac wireless infrastructure to obtain higher network speeds. Which of the following technologies allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps?
A) LWAPP
B) WPA2
C) PoE
D) MIMO
D) MIMO
Explanation
OBJ-2.4: One way 802.11n and 802.11ac networks achieve superior throughput and speeds by using multiple-input multiple-output (MIMO) and multi-user MIMO (MU-MIMO), respectively. MIMO uses multiple antennas for transmission and reception, which results in higher speeds than 802.11a and 802.11g networks, which can only support up to 54 Mbps of throughput. Wireless N and Wireless AC networks also utilize the 5 GHz frequency band, allowing them to achieve speeds greater than 54 Mbps. WPA2 is a wireless encryption standard and can be used with Wireless G, N, AC, or AX. Using WPA2 does not increase the speed of the wireless network. Power over Ethernet (POE) is a technology that lets network cables carry electrical power. POE is defined in the IEEE 802.3af. PoE does not affect the speed of a wireless network. Lightweight Access Point Protocol (LWAPP) is the name of a protocol that can control multiple Wi-Fi wireless access points at once. This can reduce the amount of time spent on configuring, monitoring, or troubleshooting a large network. LWAPP does not affect the speed of a wireless network.
- You are trying to select the BEST network topology for a new network based on the following requirements. The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client’s requirements?
A) MESH
B) BUS
C) RING
D) STAR
C) RING
Explanation
OBJ-1.2: A ring topology is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed-loop configuration. Ring topologies aren’t used heavily in local area networks anymore, but they are still commonly found in wide area network connections as an FDDI ring. An FDDI ring is a Fiber Distributed Data Interface ring, which allows for a network that can communicate up to 120 miles in range, uses a ring-based token network as its basis, and uses two counter-rotating token ring topologies to comprise the single network. This provides redundancy for the network because if one cable is broken or fails, the other can maintain the network operations. The token is used to control which device can communicate on the network, preventing congestion or collisions. A mesh topology connects every node directly to every other node. This creates a highly efficient and redundant network, but it is expensive to build and maintain. A star topology connects all of the other nodes to a central node, usually a switch or a hub. A star topology is the most popular network topology in use on local area networks. A bus topology uses a single cable which connects all the included nodes and the main cable acts as a backbone for the entire network.
- Which of the following type of network models requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?
A) CLIENT SERVER
B) POINT-TO-POINT
C) PEER-TO-PEER
D) HUB- AND- SMOKE
A) CLIENT SERVER
Explanation
OBJ-1.2: A client-server network model utilizes specific devices (servers) to provide services to requesters (clients). A server is a specialized computer that runs a networking operating system. A client is any device that requests services over a network, such as a desktop, laptop, tablet, or internet of things device. A peer-to-peer network model does not differentiate between the clients and the servers, and every node can become a client and a server when requesting and responding to service requests. A hub and spoke topology is a network topology where a central device (the hub) is connected to multiple other devices (the spokes). A point-to-point connection provides a path from one communication endpoint to another.
- Dion Training’s email server is not sending out emails to users who have a Yahoo email address. What is the proper order that you should follow to troubleshoot this issue using the CompTIA troubleshooting methodology?
A) 1. VERIFY SYSTEM FUNCTIONALITY. 2. IDENTIFY THE PROBLEM 3. ESTABLISH A THEORY OF CAUSE 4. ESTABLISH A PLAN OF ACTION TO RESOLVE THE PROBLEM 5. TEST THE THEORY TO DETERMINE THE CAUSE 6. IMPLEMENT THE SOLUTION 7. DOCUMENT THE FINDINGS AND ACTIONS
B) 1. IDENTIFY THE PROBLEM 2. ESTABLISH A PLAN OF ACTION TO RESOLVE THE PROBLEM 3. IMPLEMENT THE SOLUTION 4. ESTABLISH A THEORY OF CAUSE 5. TEST THE THEORY TO DETERMINE THE CAUSE 6. DOCUMENT THE FINDINGS AND ACTIONS - VERIFY SYSTEM FUNCTIONALITY.
C) 1. IDENTIFY THE PROBLEM 2. ESTABLISH A THEORY OF CAUSE 3. TEST THE THEORY TO DETERMINE THE CAUSE 4. ESTABLISH A PLAN OF ACTION TO RESOLVE THE PROBLEM 5. IMPLEMENT THE SOLUTION 6. VERIFY SYSTEM FUNCTIONALITY 7. DOCUMENT THE FINDINGS AND ACTIONS
D) 1. ESTABLISH A THEORY OF CAUSE 2. TEST THE THEORY TO DETERMINE THE CAUSE 3. IDENTIFY THE PROBLEM 4. ESTABLISH A PLAN OF ACTION TO RESOLVE THE PROBLEM 5. VERIFY SYSTEM FUNCTIONALITY 6. IMPLEMENT THE SOLUTION 7. DOCUMENT THE FINDINGS AND ACTIONS
C) 1. IDENTIFY THE PROBLEM 2. ESTABLISH A THEORY OF CAUSE 3. TEST THE THEORY TO DETERMINE THE CAUSE 4. ESTABLISH A PLAN OF ACTION TO RESOLVE THE PROBLEM 5. IMPLEMENT THE SOLUTION 6. VERIFY SYSTEM FUNCTIONALITY 7. DOCUMENT THE FINDINGS AND ACTIONS
Explanation
OBJ-5.1: You must know the network troubleshooting methodology steps in the right order for the exam. You will see numerous questions both in the multiple-choice and simulation sections on this topic. If you received this question on the real exam, it will appear as a “drag and drop” question with each of the steps making up a single box, and you need to put them into the correct order. The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, (6) Verify full system functionality and if applicable implement preventative measures, and (7) Document findings, actions, outcomes, and lessons learned.
- A network administrator updated an Internet server to evaluate some new features in the current release. A week after the update, the Internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet. Which of the following should the administrator do to mitigate this risk?
A) DOWNGRADE THE SERVER AND DEFER THE NEW FEATURE TESTING
B) ENABLE HIPS TO PROTECT THE SERVER UNTIL THE PATCH IS RELEASED
C) UTILIZE WAF TO RESTRICT MALICIOUS ACTIVITY TO THE INTERNET SERVER
D) ENABLE THE HOST BASED FIREWALL ON THE INTERNET SERVER
A) DOWNGRADE THE SERVER AND DEFER THE NEW FEATURE TESTING
Explanation
OBJ-4.3: Since the vendor stated that the new version introduces vulnerabilities in the environment, it is best to downgrade the server to the older and more secure version until a patch is available.
- A network technician is diligent about maintaining all system servers at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?
A) CONFIGURE AN AUTOMATED PATCHING SERVER
B) VIRTUALIZE THE SERVERS AND TAKE DAILY SNAPSHOTS
C) CONFIGURE A TEST LAB FOR UPDATES
D) CONFIGURE A HONEYPOT FOR APPLICATION TESTING
C) CONFIGURE A TEST LAB FOR UPDATES
Explanation
OBJ-4.3: To prevent the service pack issues, make sure to validate them in a test/lab environment first before going ahead and applying a new Service Pack in your production environment. While using an automated patching server is a good idea, no patches should be deployed before being tested in a lab first.
- You are conducting a wireless penetration test against a WPA2-PSK network. Which of the following types of password attacks should you conduct to verify if the network is using any of the Top 1000 commonly used passwords?
A) HYBRID
B) DICTIONARY
C) BRUTE-FORCE
D) SPRAYING
B) DICTIONARY
Explanation
OBJ-4.2: A dictionary attack is a method of breaking into a password-protected computer, network, or other IT resource by systematically entering every word in a dictionary or list file. A brute-force attack consists of an attacker submitting every possible combination for a password or pin until they crack it. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. A hybrid attack merges a dictionary attack and a brute-force attack, but provides keywords from a list to use during the brute-force attack modifying the suffixes or prefixes.
- Which type of wireless technology are OFDM, QAM, and QPSK examples of?
A) MODULATION
B) FREQUENCY
C) SPECTRUM
D) RF INTERFERENCE
A) MODULATION
Explanation
OBJ-2.4: Modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal, with a separate signal called the modulation signal that typically contains information to be transmitted. WiFi can use different digital modulation schemes for data transmission. Common types of modulation include Orthogonal frequency-division multiplexing (OFDM), Quadrature Amplitude Modulation (QAM), and Quadrature Phase-shift keying (PSK). Frequency is the number of occurrences of a repeating event per unit of time. Wireless networks utilize three different frequency bands: 2.4 GHz, 5 GHz, and 6 GHz. Interference occurs when two radios are transmitting or receiving on the same frequencies. Spectrum refers to the range of frequencies used by a radio transmitter or receiver, such as the 2.4 GHz spectrum which includes frequencies from 2.412 GHz to 2.472 GHz in the United States.
- What type of cloud model would allow the sharing of resources by multiple organizations to create a service that benefits all of its members?
A) COMMUNITY CLOUD
B) PRIVATE CLOUDE
C) PUBLIC CLOUD
D) HYBRID CLOUD
A) COMMUNITY CLOUD
Explanation
OBJ-1.8: A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns, whether managed internally or by a third party and hosted internally or externally. Community Cloud is a hybrid form of private cloud. They are multi-tenant platforms that enable different organizations to work on a shared platform. Community Cloud may be hosted in a data center, owned by one of the tenants, or by a third-party cloud services provider and can be either on-site or off-site. A public cloud contains services offered by third-party providers over the public Internet and is available to anyone who wants to use or purchase them. They may be free or sold on-demand, allowing customers to pay only per usage for the CPU cycles, storage, or bandwidth they consume. A private cloud contains services offered either over the Internet or a private internal network and only to select users instead of the general public. A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud, and third-party public cloud services with orchestration between these platforms. This typically involves a connection from an on-premises data center to a public cloud.
- You have been asked to install a media converter that connects a newly installed SMF to the existing Cat 6a infrastructure. Which type of media converter should you use?
A) COAXIAL TO ETHERNET
B) FIBER TO COAXIAL
C) COAXIAL TO FIBER
D) FIBER TO ETHERNET
D) FIBER TO ETHERNET
Explanation
OBJ-1.3: A media converter is a Layer 1 device that changes one type of physical network connection to another. In this case, we are converting single-mode fiber (SMF) cable to Cat 6a (ethernet) cable.
- Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?
A) 802.11G
B) 802.11N
C) 802.11B
D) 802.11A
E) 802.11AC
F) 802.11AX
A) 802.11G
Explanation
OBJ-2.4: The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth. The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6.
- A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of?
A) DYNAMIC DNS
B) DYNAMIC NAT
C) PORT FORWARDING
D) STATIC NAT
C) PORT FORWARDING
Explanation
OBJ-1.4: Port forwarding is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. Port Address Translation (PAT) is a type of dynamic NAT that can map multiple private IP addresses to a single public IP address by using port forwarding. Static NAT (Network Address Translation) is a one-to-one mapping of a private IP address to a public IP address. Dynamic NAT can be defined as mapping a private IP address to a public IP address from a group of public IP addresses known as the NAT pool. Dynamic NAT establishes a one-to-one mapping between a private IP address to a public IP address. Dynamic DNS (DDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real-time, with the active DDNS configuration of its configured hostnames, addresses, or other information. Since this question focused on the relationship between port 80 at the gateway or public IP address being mapped to port 81 on the internet server, this is an example of port forwarding that was configured on the gateway or firewall of this network.
- A client has asked you to provide their local office with the BEST solution for a wireless network based on their requirements. The client has stated that their users will need a wireless network that provides a maximum of 54 Mbps of bandwidth and operates in the 2.4GHz frequency band. Which of the following wireless network types should you install to meet their needs?
A) 802.11AC
B) 802.11B
C) 802.11A
D) 802.11G
D) 802.11G
Explanation
OBJ-2.4: 802.11g provides transmission over short distances at up to 54 Mbps in the 2.4 GHz band. It is backward compatible with 802.11b (which only operates at 11 Mbps). While an 802.11ac network would be the fastest solution, it does not operate in the 2.4 GHz frequency band. 802.11a operates in the 5 GHz frequency band at up to 54 Mbps. Wireless networks utilize three different frequency bands: 2.4 GHz, 5 GHz, and 6 GHz. The 2.4 GHz frequency band is used by 802.11b, 802.11g, and 802.11n. The 5 GHz frequency band is used by 802.11a, 802.11n, 802.11ac, and 802.11ax. The 6 GHz frequency band is used by Wi-Fi 6E under the 802.11ax standard.
- A technician is configuring a computer lab for the students at Dion Training. The computers need to be able to communicate with each other on the internal network, but students using computers should not be able to access the Internet. The current network architecture is segmented using a triple-homed firewall to create the following zones: ZONE INTERFACE, IP address ————————————— PUBLIC, eth0, 66.13.24.16/30 INSTRUCTORS, eth1, 172.16.1.1/24 STUDENTS, eth2, 192.168.1.1/24 What rule on the firewall should the technician configure to prevent students from accessing the Internet?
A) DENY ALL TRAFFIC FROM ETH2 TO ETH0
B) DENY ALL TRAFFIC FROM ETH2 TO ETH1
C) DENY ALL TRAFFIC FROM ETH0 TO ETH2
D) DENY ALL TRAFFIC FROM EHT1 TO ETH0
A) DENY ALL TRAFFIC FROM ETH2 TO ETH0
Explanation
OBJ-4.3: By denying all traffic from the eth2 to eth0, you will block network traffic from the internal (STUDENT) network to the external (PUBLIC) network over the WAN connection. This will prevent the students from accessing the Internet by blocking all requests to the Internet. For additional security, it would be a good idea to also block all traffic from eth0 to eth2 so that inbound traffic from the internet cannot communicate with the student’s computers. But, since the outbound connections from the students to the internet are being blocked, the student will be unable to access any webpages since they cannot send a request over port 80 or 443. Additionally, by choosing this rule, we have not blocked any network traffic between the instructors and the students.
- You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist?
A) 514
B) 143
C) 445
D) 123
C) 445
Explanation
OBJ-1.5: Server Message Block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. When the WannaCry ransomware was spreading rapidly across the internet, you could help protect your organization’s network by blocking ports 139 and 445 at your firewall to prevent your machines from getting infected over the internet. Network Time Protocol (NTP) uses port 123 and is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Internet Message Access Protocol (IMAP) uses port 143 and is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. System Logging Protocol (Syslog) uses port 514 and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.
- Which of the following levels would a debugging condition generate?
A) 6
B) 1
C) 0
D) 7
D) 7
Explanation
OBJ-3.1: The severity levels range from zero to seven, with zero being the most severe and seven being the least severe. Level 0 is used for an emergency and is considered the most severe condition because the system has become unstable. Level 1 is used for an alert condition and means that there is a condition that should be corrected immediately. Level 2 is used for a critical condition, and it means that there is a failure in the system’s primary application and it requires immediate attention. Level 3 is used for an error condition, and it means that something is happening to the system that is preventing the proper function. Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions. Level 6 is used for information conditions and it is a normal operational message that requires no action. Level 7 is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications.
- Tamera and her husband are driving to the beach for the weekend. While her husband drives, she is using her iPhone to browse Facebook. Her phone shows only 1 bar of 3G signal in the current location. She can make and receive calls, but Facebook is refusing to load her news feed. Which of the following is MOST likely the problem?
A) THE BASEBAND FIRMWARE NEEDS TO BE UPDATED
B) THE CELLULAR RADIO CANNOT CONNECT TO THE CELLPHONE TOWERS
C) THE SMARTPHONE HAS BEEN INFECTED WITH A VIRUS
D) THE DATA SPEEDS ARE INSUFFICIENT WITH ONLY ONE BAR OF SIGNAL
D) THE DATA SPEEDS ARE INSUFFICIENT WITH ONLY ONE BAR OF SIGNAL
Explanation
OBJ-2.4: To make and receive a call using a smartphone, you need at least one bar of signal. A phone call requires much less signal than using cellular data. As the signal strength decreases, so does the data speed. Depending on the frequency and type of signal being used, you may see speeds under 100 Kbps with one bar. This is too slow to load a Facebook news feed adequately.
- What ports do FTP and SFTP utilize?
A) 21,22
B) 22 , 23
C) 21 ,23
D) 20, 21
A) 21,22
Explanation
OBJ-1.5: FTP (File Transfer Protocol) uses ports 20 and 21. SFTP (Secure File Transfer Protocol) uses port 22. Port 23 is used by Telnet. If this were a question on the real exam, you would see a list of ports on one side and a list of protocols on the other, and you would drag and drop each one to match them up. (It might also have 4-6 different pairs to match up.)
- You are configuring a point-to-point link between two routers and have been assigned an IP of 77.81.12.14/30. What is the network ID associated with this IP assignment?
A) 77.81.12.13
B) 77.81.12.12
C) 77.81.12.15
D) 77.81.12.14
B) 77.81.12.12
Explanation
OBJ-1.4: In classless subnets using variable length subnet mask (VLSM), the network ID is the first IP address associated within an assigned range. In this example, the CIDR notation is /30, so each subnet will contain 4 IP addresses. Since the IP address provided is 77.81.12.14/30, the network ID is 77.81.12.12/30, the first router is 77.81.12.13/30, the second router is 77.81.12.14/30, and the broadcast address is 77.81.12.15/30.
- Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router can recognize drives up to 4TB in size, but she cannot get her 3TB hard drive to show up on the network. Which of the following should Lynne do to solve this issue?
A) DOWNLOAD A NEW MUSIC PLAYER ON HER COMPUTERS
B) INSTALL THE LATEST OS ON HER COMPUTERS
C) LOAD THE LATEST HARDWARE DRIVERS FOR HER USB DRIVE
D) FLASH THE LATEST FIRMWARE FOR HER ROUTER
D) FLASH THE LATEST FIRMWARE FOR HER ROUTER
Explanation
OBJ-5.5: Routers can be updated by conducting a firmware flash. This is similar to upgrading or patching your computer’s operating system or even updating a device driver. By flashing the firmware, it can provide the ability to communicate with newer devices and remove known software vulnerabilities from the device.
- Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?
A) RTO
B) MTTR
C) RPO
D) MTBF
C) RPO
Explanation
OBJ-3.3: The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance. The recovery time objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster to avoid unacceptable consequences associated with a break in continuity. The mean time to repair (MTTR) measures the average time it takes to repair a network device when it breaks. The mean time between failures (MTBF) measures the average time between when failures occur on a device.
- Which of the following network topologies requires that all nodes have a point-to-point connection with every other node in the network?
A) STAR
B) RING
C) BUS
D) MESH
D) MESH
Explanation
OBJ-1.2: A mesh topology connects every node directly to every other node. This creates a highly efficient and redundant network, but it is expensive to build and maintain. A star topology connects all of the other nodes to a central node, usually a switch or a hub. A star topology is the most popular network topology in use on local area networks. A ring topology connects every device to exactly two other neighboring devices to form a circle. Messages in a ring topology travel in one direction and usually rely on a token to control the flow of information. A bus topology uses a single cable which connects all the included nodes and the main cable acts as a backbone for the entire network.
- Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera’s security concerns? (Select TWO)
A) ENABLE TWO-FACTOR AUTHENTICATION ON THE DEVICE’S WEBSITE ( IF SUPPORTED BY THE COMPANY)
B) UPGRADE THE FIRMWARE OF THE WIRELESS ACCESS POINT TO THE LATEST VERSION TO IMPROVE THE SECURITY OF THE NETWORK
C) CONFIGURE THE THERMOSTAT TO TCONNECT TO THE WIRELESS NETWORK USING WPA2 ENCRYPTION AND A LONG, STRONG PASSWORD
D) DISABLE WIRELESS CONNECTIVITY TO THE THERMOSTAT TO ENSURE A HACKER CANNOT ACCESS IT
E) CONFIGURE THE THERMOSTAT TO USE THE WEP ENCRYPTION STANDARD FOR ADDITIONAL CONFIDENTIALITY
F) CONFIGURE THE THERMOSTAT TO USE A SEGREGATED PART OF THE NETWORK BY INSTALLING IT INTO A SCREENED SUBNET
C) CONFIGURE THE THERMOSTAT TO TCONNECT TO THE WIRELESS NETWORK USING WPA2 ENCRYPTION AND A LONG, STRONG PASSWORD
F) CONFIGURE THE THERMOSTAT TO USE A SEGREGATED PART OF THE NETWORK BY INSTALLING IT INTO A SCREENED SUBNET
Explanation
OBJ-2.1: The BEST options are to configure the thermostat to use the WPA2 encryption standard (if supported) and place any Internet of Things (IoT) devices into a DMZ/screened subnet to segregate them from the production network. While enabling two-factor authentication on the device’s website is a good practice, it will not increase the IoT device’s security. While disabling the wireless connectivity to the thermostat will ensure it cannot be hacked, it also will make the device ineffective for the customer’s normal operational needs. WEP is considered a weak encryption scheme, so you should use WPA2 over WEP whenever possible. Finally, upgrading the wireless access point’s firmware is good for security, but it isn’t specific to the IoT device’s security. Therefore, it is not one of the two BEST options.
- You are working as a network technician running new unshielded twisted pair cables from the intermediate distribution frame to the individual offices on the same floor. The cable comes in 1000 foot spools. Which of the following tools should you use to break the cable into shorter distances?
A) CABLE STRIPPER
B) CABLE CRIMPER
C) PUNCHDOWN TOOL
D) CABLE SNIP
D) CABLE SNIP
Explanation
OBJ-5.2: A cable snip or cable cutter is used to cut copper cables into shorter lengths from a longer spool of wound cable. A cable crimper is used to join the internal wires of a twisted pair cable with metallic pins houses inside a plastic connector, such as an RJ-45 connector. A cable stripper is a hand-held tool that is used to remove the insulation or outer sheath from copper cables such as UTP, STP, or coaxial cables. A punchdown tool is used to insert wires into insulation displacement connectors on patch panels, keystone modules, or punchdown blocks.
- Which protocol is used for the synchronization of clocks between different computer systems over a packet-switched, variable-latency data network?
A) NTP
B) DNS
C) DHCP
D) TFTP
A) NTP
Explanation
OBJ-1.6: NTP is a networking protocol that is used for the synchronization of clocks between different computer systems that communicate over a packet-switched, variable-latency data network. TCP/IP networks are packet-switched networks, so NTP is used for the synchronization of time across IP-connected servers. Trivial File Transfer Protocol (TFTP) uses port 69 and is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. The Dynamic Host Configuration Protocol (DHCP) uses port 67 and is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client-server architecture. The Domain Name System (DNS) uses port 53 and is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network.
- A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem?
A) SHARED SECRET KEY IS MISMATCHED
B) GROUP POLICY HAS NOT PROPOGATED TO THE DEVICE
C) IDS IS BLOCKING RADIUS
D) USERNAME IS MISSPELLED IN THE DEVICE CONFIGURATION FILE
A) SHARED SECRET KEY IS MISMATCHED
Explanation
OBJ-4.1: AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems. A shared secret is a text string that serves as a password between hosts.
- A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the technician use to correct this issue?
A) IPCONFIG/ RENEW
B) IPCONFIG / RELEASE | IPCONFIG / RENEW
C) IPCONFIG / ALL
D) IPCONFIG / DHCP
B) IPCONFIG / RELEASE | IPCONFIG / RENEW
Explanation
OBJ-5.3: The ipconfig tool displays all current TCP/IP network configuration values on a given system. The ipconfig also can release and renew a DHCP-received IP on a workstation. The first thing to do is release the IP address using the command ipconfig /release. Next, the technician should dynamically assign another IP address using the command ipconfig /renew. These commands could be each entered individually or combined using the pipe (|) syntax as shown in this question. The ipconfig /all option would be used to display the assigned IP addresses. The ipconfig /renew option would be used to renew an existing DHCP lease and not request a new IP address.
- Dion Training utilizes a wired network throughout the building to provide network connectivity. Jason is concerned that a visitor might plug their laptop into a CAT 5e wall jack in the lobby and access the corporate network. What technology should be utilized to prevent users from gaining access to network resources if they can plug their laptops into the network?
A) VPN
B) UTM
C) DMZ
D) NAC
D) NAC
Explanation
OBJ-4.1: Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology, the user or system authentication, and network security enforcement. NAC restricts the data that each particular user can access and implements anti-threat applications such as firewalls, anti-virus software, and spyware detection programs. NAC also regulates and restricts the things individual subscribers or users can do once they are connected. If a user is unknown, the NAC can quarantine the device from the network upon connection. A DMZ (demilitarized zone), a type of screened subnet, is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted network such as the Internet. A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Unified threat management (UTM) provides multiple security features (anti-virus, anti-spam, content filtering, and web filtering) in a single device or network appliance.
- Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 3.5 Gbps?
A) 802.11G
B) 802.11N
C) 802.11AC
D) 802.11B
E) 802.11A
F) 802.11AX
C) 802.11AC
Explanation
OBJ-2.4: The 802.11ac (Wireless AC or Wi-Fi 5) standard utilizes a 5 GHz frequency to provide wireless networking at theoretical speeds up to 3.5 Gbps. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. The 802.11ax (Wireless AX or Wi-Fi 6) standard utilizes 2.4 GHz and 5.0 GHz frequencies to provide wireless networking at theoretical speeds up to 9.6 Gbps. Wireless AC uses orthogonal frequency-division multiple access (OFDMA) to conduct multiplexing of the frequencies transmitted and received to each client to provide additional bandwidth. Wireless AC uses channel bonding to create a single channel of up to 160 MHz to provide additional bandwidth. Wireless AC uses multi-user multiple-input-multiple-output (MU-MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless AC also has a version called Wi-Fi 6E that supports the 6GHz frequency instead of the 2.4 GHz and 5.0 GHz frequencies used in Wi-Fi 6. The 802.11a (Wireless A) standard utilizes a 5 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11b (Wireless B) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 11 Mbps. The 802.11g (Wireless G) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 54 Mbps. The 802.11n (Wireless N) standard utilizes a 2.4 GHz frequency to provide wireless networking at speeds up to 108 Mbps or a 5.0 GHz frequency to provide wireless networking at speeds up to 600 Mbps. Wireless N supports the use of multiple-input-multiple-output (MIMO) technology to use multiple antennas to transmit and receive data at higher speeds. Wireless N supports channel bonding by combining two 20 MHz channels into a single 40 MHz channel to provide additional bandwidth.
- A company has a secondary datacenter in a remote location. The datacenter staff handles cable management and power management. The building’s security is also handled by the datacenter staff with little oversight from the company. Which of the following should the technician do to follow the best practices?
A) SECURE THE PATCH PANELS
B) ENSURE POWER MONITORING IS ENABLED
C) ENSURE LOCKING CABINETS AND RACKS ARE USED
D) SECURE THE UPS UNITS
C) ENSURE LOCKING CABINETS AND RACKS ARE USED
Explanation
OBJ-4.5: By ensuring locking cabinets and racks are used, the staff would have keyed or RFID card locks installed. This provides an extra layer of physical security to the servers, which is considered a best practice.