Test 2 Flashcards
- A junior network technician is working in the field and needs to connect to the company’s remote server, however, doing so will require the junior technician to use the public Internet. Because security is a concern, which of the following is the BEST method to use?
A. Telnet
B. SSH
C. SFTP
D. VNC
B. SSH
A. Telnet - not encrypted, not secure
B. SSH - secure shell, encrypted, port 22, typical secure way to access Linux servers
C. SFTP - FTP over ssh but only limited to file transfers
D. VNC - not encrypted by default, hence not secure
- A home user has purchased a new smart TV to stream online video services. The smart TV is unable to connect to the wireless network after several attempts. After returning from vacation, the home user tries again and can connect the TV to the wireless network. However, the user notices a laptop is no longer able to connect to the network. Which of the following is the MOST likely cause?
A. The DHCP scope has been exhausted.
B. The security passcode has been changed.
C. The SSID is hidden.
D. The AP configuration was reset.
A. The DHCP scope has been exhausted.
A. The DHCP scope has been exhausted.
B. The security passcode has been changed - eliminated
C. The SSID is hidden - eliminated
D. The AP configuration was reset - eliminated
the reason I support A is that all home routers I have come across can have their DHCP scope reduced to a handful of IPs. In my home that number is 10. To make sure my own devices always get an IP, I also add a DHCP reservation for their MAC addresses.
This behavior of not getting an IP is due to DHCP scope exhaustion.
- A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group. Which of the following security attacks is taking place?
A. Evil twin
B. Social engineering
C. Insider threat
D. Phishing
B. Social engineering
or
C. Insider threat
Somehow, I think they misspelt “authorized” instead of “unauthorized” which would then make a lot more sense.
- Which of the following DNS record types allows IPv6 records to be resolved to DNS names?
A. PTR
B. A
C. AAAA
D. SRV
C. AAAA
AAAA address record maps hostname to IPv6 address
- A network technician has recently installed new VoIP phones at all employeeג€™s desks to support a new SIP cloud VoIP solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? (Choose two.)
A. TCP 443 is allowed. B. UDP 1720 is allowed. C. UDP 5060 is allowed. D. UDP 5061 is allowed. E. TCP 8080 is allowed. F. TCP 8181 is allowed.
C. UDP 5060 is allowed.
D. UDP 5061 is allowed.
the two ports 5060 & 5061 both are on UDP/TCP and are both associated SIP by IANA. In particular, port 5060 is assigned to clear text SIP, and port 5061 is assigned to encrypted SIP, also known as SIP-TLS (SIP over a TLS, Transport Layer Security, encrypted channel). Unfortunately, the standard TLS (successor of SSL) can only be established over TCP.
- Which of the following would allow a network technician to access files on a remote system? (Choose two.)
A. FTP B. TFTP C. VLSM D. SIP E. SMTP F. IMAP
A. FTP
B. TFTP
File transfer protocol and trivial file transfer protocol,
- Which of the following provides two-factor authentication?
A. Username + password
B. Smart card + PIN
C. Fingerprint + retina scan
D. Key fob + ID card
B. Smart card + PIN
Authentication factors
1) What you know such as username, passwords, pin
2) What you have such as keycard, token, badge
3) What you are such as retina scan, fingerprint , voice
2FA requires combination of any 1,2,3.
3 FA requires all 1,2,3
- A technician set up a new SOHO network recently. The installed router has four Ethernet ports, however, the customer has seven devices that need wired connections. Which of the following should the technician do to BEST meet the customers requirements?
A. Install a six-port switch.
B. Configure port forwarding on the router.
C. Install WAPs near the devices.
D. Configure the switchports as EtherChannel ports.
A. Install a six-port switch.
- A technician is performing a maintenance task on a weekly basis and wants to ensure the task is properly documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?
A. Standard operating procedure B. Work order C. Performance baseline D. Logical diagram E. Change management
A. Standard operating procedure
OP is a manual or set of detailed instructions to ensure anyone can come on the scene and conduct business as usual in the absence of management or other familiar persons.
- A company is allowing its employees to use their personal computers, tablets, and IoT devices while at work. However, there are rules and guidelines to which employees must adhere. Which of the following documents applies to these employees?
A. NDA
B. SOP
C. BYOD
D. SLA
C. BYOD
Bring your own device (BYOD) basically what you can or can’t do on a personal device in someone’s/companies/business network. In this case, acceptable use policy (AUP) would work IF the answer choice was not an option, don’t forget that AUP is not only limited to personal devices but any device on the network! However, if both options (BYOD and AUP) BYOD would be a better answer.
Which of the following are characteristics of jumbo frames? (Choose two.)
A. Commonly used on SAN B. MTU size greater than 1500 C. MTU size greater than 10000 D. Commonly used on IaaS E. MTU size greater than 12000
A. Commonly used on SAN
B. MTU size greater than 1500
A jumbo frame is defined as an Ethernet packet with a payload size greater than the standard maximum transmission unit (MTU) of 1500 bytes.
- A network administrator gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? (Choose two.)
A. FTP B. SMTP C. VPN D. SSH E. SNMP
C. VPN
D. SSH
- A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?
A. File hash
B. File date
C. File type
D. File size
A. File hash
Hash is used to checking integrity, for example, if a file before it was sent across the internet had the hash of “1243541” and after it was sent it had the hash of “1254341” you know something is up with the file, it might be altered or corrupted or whatnot, thus the file has lost its integrity and cant be trusted.
- A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)
A. tracert B. ping C. tcpdump D. pathping E. netstat F. nslookup G. route
A. tracert
D. pathping
node is a point of redistribution, therefore the given answer is correct
- Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?
A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF
A. CSMA/CD
Carrier Sense Multiple Access with Collision Detection is the most correct answer. CSMA/CD works by checking for active communications and attempting to transmit when clear. If a collision occurs, then it will use the back-off timer.
CSMA with Collision Avoidance is incorrect. Since it is not conventionally possible to determine if or when a device is transmitting, collisions are inevitable. To counter this, a timer mechanism is in place to regulate transmissions and will back-off pre-emptively, actively avoiding as many collisions as it can.
Multiprotocol Label Switching is incorrect; this relates to labelling switched traffic of different protocols and has no relevance to collision aversion.
Open Shortest Path First is incorrect; OSPF helps find the shortest path through a network for fast and efficient delivery of data and has no relevance to collision aversion.
- A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users are connected to a single WAP and are reporting that connections keep dropping and network spends are unusable. Which of the following is the MOST likely cause of this issue?
A. DHCP exhaustion
B. Channel overlapping
C. Interference
D. Overcapacity
D. Overcapacity
From Mike’s book:
We overwork WAPs in many different ways, but one of the most
common is by attaching too many devices to a single SSID over
time, what’s called device saturation. This creates overcapacity
issues, such as slow speeds and inability to connect to the network.
Avoid device saturation by adding more capacity. Careful
placement of extra WAPs in high-demand areas is a huge step in
the right direction.
- Which of the following BEST describes an exploit?
A. A router with default credentials
B. An open mail relay server
C. An SNMPv1 private community
D. A privilege escalation script
D. A privilege escalation script
An exploit (concerning cybersecurity) is code generally written by a researcher or a malicious actor. It’s used to test or take advantage of software vulnerability/security flaws.
Question D is correct. Privilege escalation occurs when a malicious actor uses vulnerabilities (e.g., design flaws, configuration errors…).
Questions A, B, and C are incorrect; these are examples of vulnerabilities.
- A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?
A. Load balancer
B. IDS
C. Proxy server
D. Wireless controller
C. Proxy server
Proxy server is the most correct answer. In addition to providing web filtering, proxy servers can also cache web sites for network users for faster access. These two features together meet the performance and security requirements of the scenario.
Load balancer is incorrect; while it will help optimize network performance at large, it does not explicitly provide any security features.
Intrusion Detection System is incorrect; while a prolific security feature, an IDS will not proactively defend a network, and may instead congest traffic.
Wireless controller is incorrect; wireless controllers are used to maintain and manage multiple wireless access points. As it is more of a management tool, it does not explicitly provide increased network performance or added security.
- A technician is setting up VoIP phones on a wireless network. Users report that calls are choppy and sometimes dropped. The technician has measured two characteristics using simple command-line tools that verify the problem. Which of the following characteristics did the technician measure? (Choose two.)
A. Reflection B. Latency C. Interference D. Packet loss E. Signal-to-noise ratio F. Attenuation
B. Latency
D. Packet loss
- Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the FASTEST method possible?
A. UDP port 22 B. TCP port 22 C. TCP port 25 D. UDP port 53 E. UDP port 69
E. UDP port 69
Trivial File Transfer Protocol (TFTP).
It is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host.
A. UDP port 22
The IANA has assigned als UDP port 22 for SSH.
B. TCP port 22
SCP - Secure copy protocol. is a means of securely transferring computer files between a local host and a remote host or between two remote hosts.
Also SSH uses TCP port 22.
Also SFTP is a file transfer protocol built upon the SSH (Secure Shell). It uses also port 22.
C. TCP port 25
Simple Mail Transfer Protocol (SMTP), used for email routing between mail servers.
D. UDP port 53
DNS protocol.
- A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customers requirements?
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
When bridge mode is enabled, it essentially turns the respective router into a switch. the best way to do this question is to do a logical topology with simple squares since we are pressed for time. so server,– router/switch,– modem connects to internet. Modem is buffer between internet.
- A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?
A. The router has a time-based ACL, applied for the network segment.
B. A light source is creating EMI interference, affecting the UTP cabling.
C. Nightly backups are consuming excessive bandwidth.
D. The user has violated the AUP, and Internet access has been restricted.
D. The user has violated the AUP, and Internet access has been restricted.
With A B & C the whole network will be affected. Even though D seems wrong, it’s the only situation where only one system is affected.
- A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should the administrator do to BEST meet this requirement?
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
B. Install a BPDU guard on switchports and enable STP.
C. Create a DMZ for public servers and secure a segment for the internal network.
D. Install antivirus software and set an ACL on the servers.
A. Create a VLAN for the unused ports and create a honeyspot on the VLAN.
- A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches. A technician wishes to set up a new storage area network but must use existing infrastructure. Which of the following storage standards should the technician use?
A. iSCSI
B. Fibre Channel
C. NAS
D. InfiniBand
C. NAS
- A network technician needs to install a new access switch. After installing the new switch, the technician begins to move connections from the old switch to the new switch. The old switch used a GBIC with SC connectors, and the new switch uses an SFP with LC connectors. After connecting the SC connector to the SC- to-LC adapter and plugging it into the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT?
A. Replace SFP with a new one.
B. Fall back to the old switch.
C. Transpose the fiber pairs.
D. Replace multimode with single-mode cable.
C. Transpose the fiber pairs.
The TLDR definition of transpose means to flip. In this case change the pairs orientation going into the adapter.
- A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used?
A. UTP
B. Multimode
C. Coaxial
D. Serial
C. Coaxial
DOCSIS modem uses coaxial cable
- A technician needs to order cable that meets 10GBaseT and fire safety requirements for an installation between a drop ceiling and a standard ceiling. Which of the following should the technician order to ensure compliance with the requirements?
A. PVC Cat 5
B. Plenum Cat 5e
C. Plenum Cat 6a
D. PVC Cat 7
C. Plenum Cat 6a
We need plenum cable because of fire safety requirements for an installation
Cat 6a supports data rates up to 10Gps.
Cat 5e supports data rates up to 1Gbps.
- Which of the following physical security devices is used to detect unauthorized server room access?
A. Access badge
B. Biometrics
C. Smart card
D. Video surveillance
D. Video surveillance
I think the point here is that both the Access badge and the smart card can be handed to someone to be used, and for the Biometrics access will not be granted if it isn’t an authorized person. so the option is left to the video surveillance which it record undeniable footage of the perpetrator
- A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination?
A. nmap
B. pathping
C. route
D. nslookup
A. nmap
Nmap (Network Mapper) is used to discover hosts and services on a computer network by sending packets and analyzing the responses.
Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection,vulnerability detection and other features.
Nmap can adapt to network conditions including latency and congestion during a scan
- Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?
A. Incident response policy
B. BYOD policy
C. DLP policy
D. Remote access policy
B. BYOD policy
Using a non company owned device for work is considered BYOD. It doesn’t really matter where the device is located.
- A technician is allocating the IP address space needed for a new remote office. This office will contain the engineering staff with six employees and the digital marketing staff with 55 employees. The technician has decided to allocate the 192.168.1.0/24 block to the remote office. The engineering staff has been allocated the 192.168.1.64/29 subnet. Using the LEAST amount of space possible, which of the following would be the last usable IP address in the engineering subnet?
A. 192.168.1.62
B. 192.168.1.63
C. 192.168.1.70
D. 192.168.1.71
C. 192.168.1.70
- An administrator is troubleshooting a users intermittent wireless connectivity issue. Other users across the hallway can connect and use the wireless network properly. Upon inspection of the connection details, the administrator finds the following:
Which of the following is MOST likely the cause of the poor wireless connection?
A. Channel overlap
B. Overcapacity
C. Incorrect antenna type
D. Latency
C. Incorrect antenna type
The signal strength is 5% which means the AP and/or WNIC has the wrong antenna type. A,B, & D do not account for poor signal.
- A VoIP system will require 23 concurrent voice channels and one signaling channel. Which of the following types of WAN service would provide the BEST connectivity to the PSTN?
A. PRI
B. BRI
C. E1/E3
D. DSL
A. PRI
PRI is the standard for providing telecommunication services to enterprises and offices. It is based on T-carrier (T1) transmission in the US, Canada, and Japan, while the E-carrier (E1) is common in Europe and Australia.
The T1 line consists of 23 bearer (B) channels and one data (D) channel for control purposes.
The E1 line consists of 30 B-channels and one D-channels.
The Primary Rate Interface channels are typically used by medium to large enterprises with digital private branch exchange (PBX) telephone systems to provide digital access to the public switched telephone network (PSTN).
- A network administrator is going to be performing a major upgrade to the network. Which of the following should the administrator use in case of a failure?
A. Baseline report
B. Vulnerability report
C. Rollback plan
D. Business continuity plan
C. Rollback plan
If you have a failure you use a rollback plan, if you have a disaster you use a business continuity plan.
- A web application is unable to authenticate customers so they can access their bills. The server administrator has tested the LDAP query but is not receiving results. Which of the following is the NEXT step the server administrator should take to correct the problem?
A. Check port 636 to see if it is being blocked.
B. Change service port 636 to port 389.
C. Restart the web server.
D. Verify the browser is using port 443.
A. Check port 636 to see if it is being blocked.
Check port 636 to see if it is being blocked.
It is LDAP protocol over TLS/SSL.
It seems that LDAP query failed because port 636 is blocked.
- Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?
A. Wireless hub
B. Wireless firewall
C. Wireless access point
D. Wireless bridge
C. Wireless access point
- Which of the following devices are MOST often responsible for 802.1q tagging? (Choose two.)
A. Switch B. Router C. IDS D. Hub E. IPS F. Network tap
A. Switch
B. Router
- A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency. Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)
A. 802.11ac B. 802.11b C. 802.11g D. 802.11n E. Bluetooth F. Z-Wave
A. 802.11ac
D. 802.11n
802.11ac and 802.11n are the most correct answers. Both standards are capable of operating at 5GHz. Even though 802.11n can also operate at 2.4GHz, because it can also use 5GHz, it qualifies.
802.11b, g, and Bluetooth use 2.4GHz to operate.
Z-Wave uses 908.42MHz to operate.
- Which of the following concepts would BEST describe when a company chooses to use a third-party vendor to host and administer a critical application?
A. SaaS
B. IaaS
C. PaaS
D. CASB
C. PaaS
Platform as a service (PaaS) or application platform as a service (aPaaS) or platform-based service is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app
SAAS = You control nothing… Vendor controls everything (Salesforce.com, Google apps, etc…)
PAAS = You control only the app… Vendor controls servers, storage, network, and OS (Azure, etc…)
IAAS = You control app & OS… Vendor controls servers, storage, and network (AWS, Rackspace, etc…)
On PREM = You control everything… Vendor controls nothing