A. Telnet
B. SSH
C. SFTP
D. VNC
B. SSH
A. Telnet - not encrypted, not secure
B. SSH - secure shell, encrypted, port 22, typical secure way to access Linux servers
C. SFTP - FTP over ssh but only limited to file transfers
D. VNC - not encrypted by default, hence not secure
A. The DHCP scope has been exhausted.
B. The security passcode has been changed.
C. The SSID is hidden.
D. The AP configuration was reset.
A. The DHCP scope has been exhausted.
A. The DHCP scope has been exhausted.
B. The security passcode has been changed - eliminated
C. The SSID is hidden - eliminated
D. The AP configuration was reset - eliminated
the reason I support A is that all home routers I have come across can have their DHCP scope reduced to a handful of IPs. In my home that number is 10. To make sure my own devices always get an IP, I also add a DHCP reservation for their MAC addresses.
This behavior of not getting an IP is due to DHCP scope exhaustion.
A. Evil twin
B. Social engineering
C. Insider threat
D. Phishing
B. Social engineering
or
C. Insider threat
Somehow, I think they misspelt “authorized” instead of “unauthorized” which would then make a lot more sense.
A. PTR
B. A
C. AAAA
D. SRV
C. AAAA
AAAA address record maps hostname to IPv6 address
A. TCP 443 is allowed. B. UDP 1720 is allowed. C. UDP 5060 is allowed. D. UDP 5061 is allowed. E. TCP 8080 is allowed. F. TCP 8181 is allowed.
C. UDP 5060 is allowed.
D. UDP 5061 is allowed.
the two ports 5060 & 5061 both are on UDP/TCP and are both associated SIP by IANA. In particular, port 5060 is assigned to clear text SIP, and port 5061 is assigned to encrypted SIP, also known as SIP-TLS (SIP over a TLS, Transport Layer Security, encrypted channel). Unfortunately, the standard TLS (successor of SSL) can only be established over TCP.
A. FTP B. TFTP C. VLSM D. SIP E. SMTP F. IMAP
A. FTP
B. TFTP
File transfer protocol and trivial file transfer protocol,
A. Username + password
B. Smart card + PIN
C. Fingerprint + retina scan
D. Key fob + ID card
B. Smart card + PIN
Authentication factors
1) What you know such as username, passwords, pin
2) What you have such as keycard, token, badge
3) What you are such as retina scan, fingerprint , voice
2FA requires combination of any 1,2,3.
3 FA requires all 1,2,3
A. Install a six-port switch.
B. Configure port forwarding on the router.
C. Install WAPs near the devices.
D. Configure the switchports as EtherChannel ports.
A. Install a six-port switch.
A. Standard operating procedure B. Work order C. Performance baseline D. Logical diagram E. Change management
A. Standard operating procedure
OP is a manual or set of detailed instructions to ensure anyone can come on the scene and conduct business as usual in the absence of management or other familiar persons.
A. NDA
B. SOP
C. BYOD
D. SLA
C. BYOD
Bring your own device (BYOD) basically what you can or can’t do on a personal device in someone’s/companies/business network. In this case, acceptable use policy (AUP) would work IF the answer choice was not an option, don’t forget that AUP is not only limited to personal devices but any device on the network! However, if both options (BYOD and AUP) BYOD would be a better answer.
Which of the following are characteristics of jumbo frames? (Choose two.)
A. Commonly used on SAN B. MTU size greater than 1500 C. MTU size greater than 10000 D. Commonly used on IaaS E. MTU size greater than 12000
A. Commonly used on SAN
B. MTU size greater than 1500
A jumbo frame is defined as an Ethernet packet with a payload size greater than the standard maximum transmission unit (MTU) of 1500 bytes.
A. FTP B. SMTP C. VPN D. SSH E. SNMP
C. VPN
D. SSH
A. File hash
B. File date
C. File type
D. File size
A. File hash
Hash is used to checking integrity, for example, if a file before it was sent across the internet had the hash of “1243541” and after it was sent it had the hash of “1254341” you know something is up with the file, it might be altered or corrupted or whatnot, thus the file has lost its integrity and cant be trusted.
A. tracert B. ping C. tcpdump D. pathping E. netstat F. nslookup G. route
A. tracert
D. pathping
node is a point of redistribution, therefore the given answer is correct
A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF
A. CSMA/CD
Carrier Sense Multiple Access with Collision Detection is the most correct answer. CSMA/CD works by checking for active communications and attempting to transmit when clear. If a collision occurs, then it will use the back-off timer.
CSMA with Collision Avoidance is incorrect. Since it is not conventionally possible to determine if or when a device is transmitting, collisions are inevitable. To counter this, a timer mechanism is in place to regulate transmissions and will back-off pre-emptively, actively avoiding as many collisions as it can.
Multiprotocol Label Switching is incorrect; this relates to labelling switched traffic of different protocols and has no relevance to collision aversion.
Open Shortest Path First is incorrect; OSPF helps find the shortest path through a network for fast and efficient delivery of data and has no relevance to collision aversion.
A. DHCP exhaustion
B. Channel overlapping
C. Interference
D. Overcapacity
D. Overcapacity
From Mike’s book:
We overwork WAPs in many different ways, but one of the most
common is by attaching too many devices to a single SSID over
time, what’s called device saturation. This creates overcapacity
issues, such as slow speeds and inability to connect to the network.
Avoid device saturation by adding more capacity. Careful
placement of extra WAPs in high-demand areas is a huge step in
the right direction.
A. A router with default credentials
B. An open mail relay server
C. An SNMPv1 private community
D. A privilege escalation script
D. A privilege escalation script
An exploit (concerning cybersecurity) is code generally written by a researcher or a malicious actor. It’s used to test or take advantage of software vulnerability/security flaws.
Question D is correct. Privilege escalation occurs when a malicious actor uses vulnerabilities (e.g., design flaws, configuration errors…).
Questions A, B, and C are incorrect; these are examples of vulnerabilities.
A. Load balancer
B. IDS
C. Proxy server
D. Wireless controller
C. Proxy server
Proxy server is the most correct answer. In addition to providing web filtering, proxy servers can also cache web sites for network users for faster access. These two features together meet the performance and security requirements of the scenario.
Load balancer is incorrect; while it will help optimize network performance at large, it does not explicitly provide any security features.
Intrusion Detection System is incorrect; while a prolific security feature, an IDS will not proactively defend a network, and may instead congest traffic.
Wireless controller is incorrect; wireless controllers are used to maintain and manage multiple wireless access points. As it is more of a management tool, it does not explicitly provide increased network performance or added security.
A. Reflection B. Latency C. Interference D. Packet loss E. Signal-to-noise ratio F. Attenuation
B. Latency
D. Packet loss
A. UDP port 22 B. TCP port 22 C. TCP port 25 D. UDP port 53 E. UDP port 69
E. UDP port 69
Trivial File Transfer Protocol (TFTP).
It is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
A. UDP port 22
The IANA has assigned als UDP port 22 for SSH.
B. TCP port 22
SCP - Secure copy protocol. is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.
Also SSH uses TCP port 22.
Also SFTP is a file transfer protocol built upon the SSH (Secure Shell). It uses also port 22.
C. TCP port 25
Simple Mail Transfer Protocol (SMTP), used for email routing between mail servers.
D. UDP port 53
DNS protocol.
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
When bridge mode is enabled, it essentially turns the respective router into a switch. the best way to do this question is to do a logical topology with simple squares since we are pressed for time. so server,– router/switch,– modem connects to internet. Modem is buffer between internet.
A. The router has a time-based ACL, applied for the network segment.
B. A light source is creating EMI interference, affecting the UTP cabling.
C. Nightly backups are consuming excessive bandwidth.
D. The user has violated the AUP, and Internet access has been restricted.
D. The user has violated the AUP, and Internet access has been restricted.
With A B & C the whole network will be affected. Even though D seems wrong, it’s the only situation where only one system is affected.
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
B. Install a BPDU guard on switchports and enable STP.
C. Create a DMZ for public servers and secure a segment for the internal network.
D. Install antivirus software and set an ACL on the servers.
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
A. iSCSI
B. Fibre Channel
C. NAS
D. InfiniBand
C. NAS