Test 2 Flashcards
- The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regards to the manager’s inquiry, what did the administrator forget to do first?
A) DOCUMENT THE CHANGES
B) PROVIDE NOTIFICATION OF CHANGE TO USERS
C) SCHEDULE A MAINTENANCE WINDOW
D) SUBMIT A CHANGE REQUEST
D) SUBMIT A CHANGE REQUEST
Explanation
OBJ-3.2: A change request should be submitted through the change management process prior to any changes being made. Change management is a systematic approach to dealing with the transition or transformation of an organization’s goals, processes, or technologies.
- You have just finished installing a new web application and need to connect it to your SQLnet database server. Which port must be allowed to enable communications through your firewall between the web application and your database server?
A) 3389
B) 1433
C) 1521
D) 3306
C) 1521
Explanation
OBJ-1.5: SQLnet uses ports 1521, and is a relational database management system developed by Oracle that is fully compatible with the structured query language (SQL). Microsoft SQL uses ports 1433 and is a proprietary relational database management system developed by Microsoft that is fully compatible with the structured query language (SQL). MySQL uses ports 3306 and is an open-source relational database management system that is fully compatible with the structured query language (SQL). Remote Desktop Protocol (RDP) uses port 3389 and is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
- Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
A) WIPING
B) PURGING
C) DEGAUSSING
D) SHREDDING
A) WIPING
Explanation
OBJ-4.5: Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse. Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Therefore, it is a bad solution for this scenario. Purging involves removing sensitive data from a hard drive using the device’s internal electronics or an outside source such as a degausser, or by using a cryptographic erase function if the drive supports one. Shredding involves the physical destruction of the hard drive. This is a secure method of destruction but doesn’t allow for device reuse.
- Dion Training has created a guest wireless network for students to use during class. This guest network is separated from the corporate network for security. Which of the following should be implemented to require the least amount of configuration for a student to access the Internet over the guest network?
A) CONFIGURE THE ACCESS POINT TO 802.1x FOR AUTHENTICATION
B) ENABLE TWO-FACTOR AUTHENTICATION ON THE STUDENT’S DEVICE
C) ENABLE SSID BROADCAST FOR THE GUEST WIRELESS NETWORK
D) CONFIGURE WEP WITH A PRE-SHARED KEY
C) ENABLE SSID BROADCAST FOR THE GUEST WIRELESS NETWORK
Explanation
OBJ-2.4: Since security was not listed as a requirement for the guest wireless network, it would be easiest not to set up any encryption, passwords, or authentication mechanisms on the network. Instead, you should enable the SSID broadcast for the guest network so students can easily find and connect to it. Using two-factor authentication, 802.1x, or WEP would require the students to complete additional configurations prior to connecting to the guest network.
- You are currently troubleshooting a workstation in the office and determined that it is an issue with the cabling somewhere between the workstation and the switch. You have tested the patch cable from the workstation to the wall jack and it is not faulty. You want to check the port on the switch next. Which of the following would BEST help you identify which switch port is associated with the workstation’s wall jack?
A) NETWORK BASELINE
B) PROPER LABELING
C) INVENTORY MANAGEMENT
D) STANDARD PROCEDURES
B) PROPER LABELING
Explanation
OBJ-3.2: You should always use proper labeling of your cables, wall jacks, and patch panels to make it easy to locate which switchport is associated with each portion of the cable distribution plant. Ensuring everything is properly labeled will help when you need to troubleshoot a network connection in your interior cable distribution plant. A standard procedure is a set of step-by-step instructions compiled by an organization to help workers carry out routine operations. A baseline is a process for studying the network at regular intervals to ensure that the network is working as designed. Inventory management refers to the process of ordering, storing, and using a company’s inventory.
- Which type of antenna broadcasts an RF signal in a specific direction with a narrow path?
A) PATCH
B) BIDIRECTIONAL
C) UNIDIRECTIONAL
D) OMNIDIRECTIONAL
C) UNIDIRECTIONAL
Explanation
OBJ-2.4: Directional antennas broadcast radio frequencies in a single direction (unidirectional) or two directions (bidirectional) to create a zone or area of coverage. Unidirectional antennas focus the broadcast signal in a single direction instead of all directions, focusing the transmission and making the signal stronger. A specific type of unidirectional antenna is known as a Yagi antenna. Omnidirectional antennas broadcast radio frequencies in all directions creating a large sphere of coverage. The antenna has the capability to send and receive signals in a circumference around the antenna. A patch antenna is a type of antenna with a low profile that can be mounted on a surface. A patch antenna can be omnidirectional, bidirectional, or unidirectional, therefore it is not the best answer to this question and unidirectional should be chosen instead.
- A network technician responds to a customer reporting that a workstation continually loses the connection to the network. The user explains that it occurs randomly, and it happens several times throughout the day. Which step of the troubleshooting method should the technician perform NEXT?
A) ESTABLIH A PLAN OF ACTION TO RESOLVE THE PROBLEM
B) ESTABLIH A PLAN OF PROBABLE CAUSE
C) VERIFY FULL SYSTEM FUNCTIONALITY
D) TEST THE THEORY TO DETERMINE THE CAUSE
B) ESTABLIH A PLAN OF PROBABLE CAUSE
Explanation
OBJ-5.1: The scenario described in the question is best classified as “identify the problem”, so the next step would be to “establish a theory of probable cause”. The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, (6) Verify full system functionality and if applicable implement preventative measures, and (7) Document findings, actions, outcomes, and lessons learned.
- Which of the following is a connectionless protocol?
A) ICMP
B) TCP
C) SSL
D) SSH
A) ICMP
Explanation
OBJ-1.5: A connectionless protocol is a form of data transmission in which data is transmitted automatically without determining whether the receiver is ready or even whether a receiver exists. ICMP, UDP, IP, and IPX are well-known examples of connectionless protocols. TCP, SSH, and SSL are all examples of connection-oriented protocols.
- Which of the following levels would an emergency condition generate?
A) 0
B) 7
C) 1
D) 6
A) 0
Explanation
OBJ-3.1: The severity levels range from zero to seven, with zero being the most severe and seven being the least severe. Level 0 is used for an emergency and is considered the most severe condition because the system has become unstable. Level 1 is used for an alert condition and means that there is a condition that should be corrected immediately. Level 2 is used for a critical condition, and it means that there is a failure in the system’s primary application and it requires immediate attention. Level 3 is used for an error condition, and it means that something is happening to the system that is preventing the proper function. Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions. Level 6 is used for information conditions and it is a normal operational message that requires no action. Level 7 is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications.
- Dion Training allows its visiting business partners from CompTIA to use an available Ethernet port in their conference room to establish a VPN connection back to the CompTIA internal network. The CompTIA employees should obtain internet access from the Ethernet port in the conference room, but nowhere else in the building. Additionally, if any of the Dion Training employees use the same Ethernet port in the conference room, they should access Dion Training’s secure internal network. Which of the following technologies would allow you to configure this port and support both requirements?
A) MAC FILTERING
B) CONFIGURE A SIEM
C) IMPLEMENT NAC
D) CREATE AN ACL TO ALLOW ACCESS
C) IMPLEMENT NAC
Explanation
OBJ-4.3: Network Access Control (NAC) uses a set of protocols to define and implement a policy that describes how to secure access to network nodes whenever a device initially attempts to access the network. NAC can utilize an automatic remediation process by fixing non-compliant hosts before allowing network access. Network Access Control can control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do. In this scenario, implementing NAC can identify which machines are known and trusted Dion Training assets and provide them with access to the secure internal network. NAC could also determine unknown machines (assumed to be those of CompTIA employees) and provide them with direct internet access only by placing them onto a guest network or VLAN. While MAC filtering could be used to allow or deny access to the network, it cannot by itself control which set of network resources could be utilized from a single ethernet port. A security information and event management (SIEM) system provides real-time analysis of security alerts generated by applications and network hardware. An access control list could define what ports, protocols, or IP addresses the ethernet port could be utilized. Still, it would be unable to distinguish between a Dion Training employee’s laptop and a CompTIA employee’s laptop like a NAC implementation could.
- When you arrived at work today, you saw a message on your computer screen stating that your hard drive has been encrypted and you must pay 1 ETH to get the decryption key. What type of attack has occurred against your workstation?
A) BRUTE-FORCE
B) MALWARE
C) RANSOMEWARE
D) PHISHING
C) RANSOMEWARE
Explanation
OBJ-4.2: Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s personal data or perpetually block access to it unless a ransom is paid. Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. By contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug. Malware includes viruses, worms, logic bombs, and many other malicious types of code. Phishing is a type of social engineering where an attacker sends a fraudulent email designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim’s infrastructure like ransomware. A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. A brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- You are troubleshooting a cable modem for a home user’s network. The connection speeds are much lower than you expected. You suspect the coaxial cable between the wall jack and the cable modem is faulty. Based on your research, a coaxial cable used in data networks should have an impedance of 50 ohms. Which of the following tools should you use to measure the resistance of the coaxial cable?
A) MULTIMETER
B) CABLE CERTIFIER
C) SPECTRUM ANALYZER
D) CABLE TESTER
A) MULTIMETER
Explanation
OBJ-5.2: A multimeter is a measuring instrument that can measure the voltage, resistance, and amperage of a cable or conduit. To test this cable, you should set the multimeter to resistance and connect one of the multimeter’s leads to each end of the coaxial cable to determine the resistance as measured in ohms. A cable tester is used to verify the electrical connections in a twisted pair or coaxial cable. A cable certifier is used to test the continuity of a cable and verify that a cable meets its specifications such as the bandwidth, frequency, and length. A spectrum analyzer is used to measure the magnitude of an input signal’s frequency.
- A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?
A) 21
B) 161
C) 25
D) 22
D) 22
Explanation
OBJ-1.5: To securely upload a file, the employees could use SFTP (Secure FTP) or SCP (Secure Copy). Both SFTP and SCP operate over port 22, therefore port 22 must be opened by the firewall so that the employees can reach the file servers. Port 21 is used by the File Transfer Protocol, but it is not a secure method of sending files. There is a more secure version of FTP known as FTPS, but that uses port 990. Port 25 is reserved for the simple mail transfer protocol (SMTP), which is an internet standard communication protocol for electronic mail transmission. Port 161 is reserved for simple network management protocol (SNMP), which is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks.
- Which of the following layers within software-defined networking focuses on resource requests or information about the network?
A) INFRASTRUCTURE LAYER
B) APPLICATION LAYER
C) MANAGEMENT PLANE
D) CONTROL LAYER
B) APPLICATION LAYER
Explanation
OBJ-1.7: The application layer focuses on the communication resource requests or information about the network. The control layer uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to. The infrastructure layer contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements. The management plane is used to monitor traffic conditions, the status of the network, and allows network administrators to oversee the network and gain insight into its operations.
- Which type of network device operates at layer 2 of the OSI model and allows connected devices to operate at full-duplex since each port is in their own collision domain?
A) ACCESS POINT
B) ROUTER
C) SWITCH
D) HUB
C) SWITCH
Explanation
OBJ-2.1: A switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A switch operates at the data link layer (Layer 2) of the OSI model and makes switching decisions based upon MAC addresses. Each switchport on a switch is a separate collision domain, but all switchports are in a common broadcast domain. A router is networking hardware that connects computer networks and forwards data packets between those networks. A router operates at the network layer (Layer 3) of the OSI model and makes routing decisions based upon IP addresses. Each switchport on a router is a separate collision domain and a separate broadcast domain. A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. A hub operates at the physical layer (Layer 1) of the OSI model. All devices connected by a hub are in a single collision domain and a single broadcast domain, therefore they must use half-duplex for communication and CSMA/CD. A wireless access point is a networking device that allows other Wi-Fi devices to connect to a wired network. A wireless access point operates at the physical layer (Layer 1) of the OSI model to extend the wired network into the wireless domain.
- The network administrator noticed that the border router has high network capacity loading during non-working hours. This excessive load is causing outages for the company’s web servers. Which of the following is the MOST likely cause of the issue?
A) DISTRIBUTED DoS
B) SESSION HIJACKING
C) EVIL TWIN
D) ARP SPOOFING
A) DISTRIBUTED DoS
Explanation
OBJ-4.2: A distributed denial-of-service (DDoS) attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. A denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting the services of a host connected to the Internet. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. Session hijacking, also known as TCP session hijacking, is a method of taking over a web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. An evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the user’s knowledge.
- Dion Training is concerned with the threat of an attacker modifying the MAC address to IP bindings within the local area network. Which of the following could be enabled on the company’s network to prevent this from occurring?
A) DHCP SNOOPING
B) DYNAMIC ARP INSPECTION
C) PRIVATE VLAN
D) ROUTER ADVERTISEMENT GUARD
B) DYNAMIC ARP INSPECTION
Explanation
OBJ-4.3: Dynamic ARP Inspection (DAI) is a security feature that validates Address Resolution Protocol (ARP) packets in a network. DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). Port mirroring, ARP inspection, and VLANs do not add any redundancy to the network. DHCP snooping is a series of techniques applied to improve the security of a DHCP infrastructure. When DHCP servers are allocating IP addresses to the LAN clients, DHCP snooping can be configured on LAN switches to prevent malicious or malformed DHCP traffic or rogue DHCP servers. The IPv6 Router Advertisement Guard feature provides support for allowing the network administrator to block or reject unwanted or rogue router advertisement guard messages that arrive at the network device platform.
- A technician is tasked with troubleshooting a network’s slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they can access the sites using the web browsers. What is the MOST likely cause of the failed pings?
A) A VLAN HOPPING ATTACK IS BEING CONDUCTED
B) TACACS+ IS MISCONFIGURED ON THIS NETWORK
C) JUMBO FRAMES ARE NOT ENABLED ON THE NETWORK
D) ICMP TRAFFIC BEING BLOCKED BY THE FIREWALL
D) ICMP TRAFFIC BEING BLOCKED BY THE FIREWALL
Explanation
OBJ-5.3: Many companies block ICMP at the firewall, causing ping to fail since it relies on ICMP. If the user can access the site in the web browser but cannot when using ping, then ICMP is most likely being blocked by the firewall. Jumbo frames are any frames larger than 1500 bytes, which is the default MTU size on most networks. VLANs are logical segments of the local area network. TACACS+ is used for remote authentication.
- You have just received an email regarding a security issue detected on the company’s standard web browser. Which of the following should you do to fix the issue?
A) FIRMWARE UPDATE
B) OS UPDATE
C) DRIVER UPDATE
D) VULNERABILITY PATCH
D) VULNERABILITY PATCH
Explanation
OBJ-4.3: Since there is a security issue with the current web browser, it most likely needs to be updated with a manufacturer’s vulnerability patch. A vulnerability patch is a piece of software that fixes security issues.
- Which of the following network devices would be considered a perimeter device and installed at the outermost part of the network?
A) SWITCH
B) BRIDGE
C) WIRELESS ACCESS POINT
D) FIREWALL
D) FIREWALL
Explanation
OBJ-2.1: A firewall is considered a perimeter security device. It should be installed at the perimeter or boundary of a network to provide maximum security. Switches, bridges, and wireless access points are all considered internal network devices and should not be installed at the network’s outermost perimeter.
- Which of the following IEEE specifications describes the use of VLANs?
A) 802.1q
B) 802.1x
C) 802.3af
D) 802.1d
A) 802.1q
Explanation
OBJ-2.3: 802.1Q is the networking standard that supports virtual LANs on an IEEE 802.3 Ethernet network. The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames. Power over Ethernet (POE) is a technology that lets network cables carry electrical power. POE is defined in the IEEE 802.3af. The IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network. This defines port security. The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server. The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks to prevent bridge loops and the broadcast storms that results from them. STP is defined in the IEEE 802.1d standard.
- Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?
A) INSTALL A UPS
B) INSTALL AN UPGRADED ROUTER
C) INSTALL A NEW ELECTICAL OUTLET
D) INSTALL A SURGE PROTECTOR
A) INSTALL A UPS
Explanation
OBJ-3.3: The best solution would be to install a UPS. Since you are a network technician and not an electrician, you should not install a new electrical circuit. The primary function of UPS is to provide battery backup when the electrical power fails or drops to an unacceptable voltage level. It ensures that your electrical equipment gets a consistent current so damage and device power cycling do not occur. A surge protector defends against possible voltage spikes that could damage your electronics, appliances, or equipment. A network technician is not qualified to install a new electrical outlet since that is a job for an electrician. The scenario presents issues that focus on the power levels, therefore installing an upgraded router would not solve these issues.
- A network engineer is designing an 802.11g wireless network that uses three wireless access points for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point?
A) ADJACENT ACCESS POINTS SHOULD BE ASSIGNED CHANNELS 4, 8, AND 12 WITH A 40MHz CHANNEL WIDTH
B) ADJACENT ACCESS POINTS SHOULD BE ASSIGNED CHANNELS 2, 6, AND 10 WITH A 20MHz CHANNEL WIDTH
C) ADJACENT ACCESS POINTS SHOULD BE ASSIGNED CHANNELS 1, 6, AND 11 WITH A 20MHz CHANNEL WIDTH
D) ADJACENT ACCESS POINTS SHOULD BE ASSIGNED CHANNELS 7, 9, AND 11 WITH A 40MHz CHANNEL WIDTH
C) ADJACENT ACCESS POINTS SHOULD BE ASSIGNED CHANNELS 1, 6, AND 11 WITH A 20MHz CHANNEL WIDTH
Explanation
OBJ-5.4: Because the overlapping signals are from access points from unrelated non-overlapping channels, the access points are least likely to interfere with each other. For Wireless B and G networks, you should always use channels 1, 6, and 11 to ensure you are using non-overlapping frequencies.
- It has been determined by network operations that there is a severe bottleneck on its mesh topology network. The field technician has chosen to use log management and found that one router makes routing decisions slower than the others on the network. Which of the following types of issues would you classify this as?
A) DELAYED RADIUS RESPONSES
B) NETWORK DEVICE CPU ISSUES
C) STORAGE AREA NETWORK ISSUES
D) NETWORK DEVICE POWER ISSUES
B) NETWORK DEVICE CPU ISSUES
Explanation
OBJ-5.5: Routing decisions are processed by the router and rely on the networking device’s central processing unit (CPU). The CPU performance can become a severe bottleneck in the network performance if you have an underpowered router for a large enterprise environment. Network device power issues would cause network outages, not network slowdowns as this scenario presented. The scenario did not state that this mesh network is a storage area network, therefore it is not a SAN issue. Similarly, the scenario did not mention authentication issues, therefore the network performance issue is not caused by delayed RADIUS responses.
- The network administrator is troubleshooting the switchports for a file server with dual NICs. The file server needs to be configured for redundancy, and the dual NICs need to be combined for maximum throughput. What feature on the switch should the network administrator ensure is enabled for best results?
A) LOAD BALANCING
B) LACP
C) BPDU
D) SPANNING TREE
B) LACP
Explanation
OBJ-2.3: The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol is used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing. The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks to prevent bridge loops and the broadcast storms that result from them. STP is defined in the IEEE 802.1d standard. A Bridge Protocol Data Unit (BPDU) is used by STP to prevent the bridge loops. Load balancing refers to the process of distributing a set of tasks over a set of resources, with the aim of making their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.
- Which of the following IEEE specifications describes the use of network authentication?
A) 802.1d
B) 802.3af
C) 802.3ad
D) 802.1x
D) 802.1x
Explanation
OBJ-2.3: The IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network. This defines port security. The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server. The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks to prevent bridge loops and the broadcast storms that result from them. STP is defined in the IEEE 802.1d standard. Link Aggregation Control Protocol or LACP is one element of an IEEE specification (802.3ad) that provides guidance on the practice of link aggregation for data connections. Power over Ethernet (POE) is a technology that lets network cables carry electrical power. POE is defined in the IEEE 802.3af.
- A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document?
A) LOGICAL NETWORK DIAGRAM
B) AUDIT REPORT
C) NETWORK BASELINE
D) SITE SURVEY REPORT
D) SITE SURVEY REPORT
Explanation
OBJ-3.2: A wireless site survey report will usually take the form of a floorplan with a color-coded series of rings on it to show the signal strengths of wireless network signals in various locations. This is often referred to as a “heat map” by technicians. The technician performing the survey will document this information and use it as a tool during troubleshooting and optimization efforts concerning the wireless coverage in a specific office or building. A logical network diagram illustrates the flow of information through a network and shows how devices communicate with each other. It typically includes elements like subnets, network objects and devices, routing protocols and domains, voice gateways, traffic flow, and network segments. Network baselining is the act of measuring and rating the performance of a network in real-time situations. Providing a network baseline requires testing and reporting of the physical connectivity, normal network utilization, protocol usage, peak network utilization, and average throughput of the network usage. A network audit entails collecting data, identifying threats and areas of weakness, and compiling a formal audit report. This report is then sent on to network administrators and other relevant parties.
- Which of the following types of agreements is used to protect an organization’s intellectual property and is considered legally binding between the signatories?
A) SLA
B) NDA
C) AUP
D) MOU
B) NDA
Explanation
OBJ-3.2: A non-disclosure agreement (NDA) is a documented agreement between two parties that define what data is considered confidential and cannot be shared outside of that relationship. An NDA is used to protect an organization’s intellectual property. An acceptable use policy (AUP) is a set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used. A memorandum of understanding (MOU) is a non-binding agreement between two or more organizations to detail what common actions they intend to take. A service level agreement (SLA) is a documented commitment between a service provider and a client, where the quality, availability, and responsibilities are agreed upon by both parties.
- A network administrator, Tamera, follows the best practices to implement firewalls, patch management, and security policies on his network. Which of the following should be performed to verify that the security controls are in place?
A) SINGLE POINT OF FAILURE TESTING
B) PENETRATION TESTING
C) AAA AUTHENTICATION TESTING
D) DISASTER RECOVERY TESTING
B) PENETRATION TESTING
Explanation
OBJ-4.1: Penetration testing or pentesting is the practice of testing a computer system, network, or web application in order to find vulnerabilities that an attacker could exploit. It can be used to ensure all security controls are properly configured and in place. Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. Testing AAA might be a part of a larger penetration test, but by itself it would not test the firewalls and patch management systems sufficiently. A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization’s business continuity/disaster recovery planning process. A disaster recovery test would not test the firewalls, patch management, or security policies. A single point of failure (SPOF) is a part of a system that, if it fails, will stop the entire system from working. A single point of failure test is used to identify a single point of failure in the network or system, and it is not designed to test the network’s firewalls, patch management, or security policies.
- Which of the following encryption types was used by WPA to better secure wireless networks than WEP?
A) AES
B) TKIP
C) CCMP
D) IV
B) TKIP
Explanation
OBJ-2.4: Wi-Fi protected access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme. Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection. WEP is considered vulnerable to attacks that can break its encryption. WEP relies on the use of a 24-bit initialization vector to secure its preshared key. Wi-Fi protected access version 2 (WPA2) replaced the original version of WPA after the completion of the 802.11i security standard. WPA2 features an improved method of key distribution and authentication for enterprise networks, though the pre-shared key method is still available for home and small office networks. WPA2 uses the improved AES cipher with counter mode with cipher-block chaining message authentication protocol (CCMP) for encryption.
- A network administrator needs to install a centrally located firewall that needs to block specific incoming and outgoing IP addresses without denying legitimate return traffic. Which type of firewall should the administrator install?
A) A HOST-BASED STATELESS FIREWALL
B) A STATELESS NETWORK-BASED FIREWALL
C) A HOST-BASED STATEFUL FIREWALL
D) A STATEFUL NETWORK-BASED FIREWALL
D) A STATEFUL NETWORK-BASED FIREWALL
Explanation
OBJ-2.1: A stateful firewall enhances security through packet filtering, and these types of firewalls also keep track of outbound requests and open the port for the returning traffic to enter the network. Since a centrally located firewall was required by the question, a network-based firewall should be chosen instead of a host-based firewall.
- Which of the following would require the network administrator to schedule a maintenance window?
A) A MAJOR RELEASE UPGRADE OF A CORE SWITCH IN A TEST LAB
B) REBOOTING THE NETWORK ADMINISTRATOR’S LAPTOP
C) A MINOR RELEASE UPGRADE OF A PRODUCTION ROUTER
D) A COMPANY-WIDE EMAIL NOTIFICATION MUST BE SENT OUT
C) A MINOR RELEASE UPGRADE OF A PRODUCTION ROUTER
Explanation
OBJ-3.2: During an update of a production router, the router would not route packets, and the network traffic would be affected. Therefore, it would be necessary to announce a maintenance window. A maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could disrupt service is allowed to be performed.
- A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. What should the engineer reference before estimating the number of WAPs required?
A) PoE REQUIREMENTS
B) SITE SURVEY
C) NETWORK TOPOLOGY
D) NETWORK DIAGRAM
B) SITE SURVEY
Explanation
OBJ-3.2: Since it is a wireless network, a review of a site survey is necessary to determine any physical advantages and disadvantages. Network topology and network diagrams can be created once the site survey is complete, and the location of the access points is determined based on distance and expected coverage requirements. The purpose of a wireless site survey is to look at the feasibility of each individual wireless link to provide seamless connectivity for a wireless network.
- Which of the following network devices is used to separate broadcast domains?
A) BRIDGE
B) SWITCH
C) HUB
D) ROUTER
D) ROUTER
Explanation
OBJ-2.1: A router is networking hardware that connects computer networks and forwards data packets between those networks. A router operates at the network layer (Layer 3) of the OSI model and makes routing decisions based upon IP addresses. Each switchport on a router is a separate collision domain and a separate broadcast domain. A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. A hub operates at the physical layer (Layer 1) of the OSI model. All devices connected by a hub are in a single collision domain and a single broadcast domain, therefore they must use half-duplex for communication and CSMA/CD. A switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device. A switch operates at the data link layer (Layer 2) of the OSI model and makes switching decisions based upon MAC addresses. Each switchport on a switch is a separate collision domain, but all switchports are in a common broadcast domain. A bridge is networking hardware that forwards traffic between network segments at the data link layer (Layer 2) of the OSI model using MAC addresses. Each switchport on a bridge is a separate collision domain, but all switchports are in a common broadcast domain.
- The Security Operations Center is trying to determine if there are any network anomalies currently being observed. To assist them, you gather information about the current performance of the network. Which of the following should you also gather to compare the current information against?
A) Pcap
B) LOGS
C) NetFlow
D) BASELINE
D) BASELINE
Explanation
OBJ-3.1: While all of the network artifacts, such as logs, pcap files, and NetFlow data, are useful, the general terms for the historical network performance data is a baseline. A baseline may be created from these other types of data, but the baseline is the MOST correct answer based on the question. A baseline is a process for studying the network at regular intervals to ensure that the network is working as designed.