Test 6 Flashcards
- A web server administrator has changed the domain registrars A record for the companys website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?
A. The NAT has not been configured to point to an internal resource.
B. An egress firewall rule is blocking access to the web server.
C. The IDS has determined it is a rogue web server.
D. The corporate DNS server has not been updated.
D. The corporate DNS server has not been updated.
- Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?
A. Multicast
B. Spanning tree
C. ICMP
D. SNMP
A. Multicast
- Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?
A. Switching loop B. ARP cache poisoning C. Improperly tagged ports D. Wrong VLAN assignment E. Duplicate IP addresses
A. Switching loop
- A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?
A. Allow communication through ifconfig.
B. Use netstat to open necessary ports.
C. Add access rules in iptables.
D. Employ arp to configure a new route.
C. Add access rules in iptables.
- A network administrator notices a wireless network with the SSID HOME-33BC-5G that has a high signal strength and open authentication. When the administrator connects to the SSID, corporate servers can be accessed. Which of the following has the network administrator discovered?
A. Evil twin B. Man in the middle C. Spoofing D. Rogue AP E. Wardriving
D. Rogue AP
“A rogue access point is specifically an AP inside a network not administered by the network owner, giving it unwanted access to network.
An evil twin is a copy of a legitimate access point not necessarily giving it access to a specific network or even to internet.”
- A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?
A. International export controls policy B. Remote access policy C. Privileged user agreement D. Data loss policy E. Service-level agreement
B. Remote access policy
- A network technician is working on a new wireless project. The network manager has a primary requirement of achieving speeds of at least 1 Gbps when connected. Which of the following standards would be appropriate for the technician to implement?
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11n
B. 802.11ac
- 11a 5 GHz 54 Mbit/s
- 11b 2.4 GHz 11 Mbit/s
- 11g 2.4 GHz 54 Mbit/s
- 11n 5 GHz and/or 2.4 GHz 600 Mbit/s
- 11ac 5 GHz ~6.8 Gbit/s
- A company needs to implement a fault-tolerant server configuration after the failure of its database server. The company decides to implement load-balancing redundant servers. Which of the following should be used for file storage for the servers?
A. IDE
B. Cloud storage
C. SAN
D. iSCSI
C. SAN
- A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate the router?
A. Diagram symbols
B. Rack diagram
C. Logical diagram
D. Port locations
B. Rack diagram
assuming the router is located in the mdf, rack diagram is the appropriate answer.
- A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?
A. Configure MIMO.
B. Remove the channel overlap.
C. Add another AP.
D. Adjust the security type.
C. Add another AP.
- A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?
A. Run a port scanner on each name server to ensure TCP port 53 is open and listening.
B. Run tracert from a desktop client to query each name server and see what answers are sent back from each server.
C. Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.
D. Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.
C. Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.
“Both servers respond to queries made at the console.”
- A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?
A. Router B. Layer 3 switch C. Proxy server D. Firewall E. Intrusion detection system
D. Firewall
- A companys Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?
A. Additional PIN
B. Security questions
C. RSA token
D. Access control lists
C. RSA token
- When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST question to ask to determine the scope of the issue?
A. What has been changed on the web server since the previous day?
B. Is the application online for the end user to access?
C. Does the user have access to the application?
D. Is this a system-wide issue or just a certain userג€™s issue?
A. What has been changed on the web server since the previous day?
the Correct answer is A
Identify the problem
• Information gathering, identify symptoms,
question users, Check Change management documents
- A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?
A. RJ11
B. LC
C. BNC
D. F-type
B. LC
assuming the tech used the appropriate cables. Any copper cables would be subject to EMI. So it has to be fiber. LC (local connector) is a fiber connector type
- A Chief Information Officer (CIO) wants a third party to verify the security surrounding an enterprise SQL database server. Which of the following services should the CIO implement?
A. PCI compliance
B. Database health check
C. Penetration test
D. Network baseline
C. Penetration test
- An end-user at an Internet cafe tries to visit an online retailers website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitors page still loads. Which of the following BEST describes what is occurring?
A. Cross-site scripting
B. Session hijacking
C. Man in the middle
D. DNS poisoning
D. DNS poisoning
- A technician is troubleshooting a host that is having intermittent issues connecting to internal network resources and the company servers. Using a packet sniffer, the technician notices there are several TCP communications that are missing packets in sequence and need to be retransmitted. The technician receives several
SYN-ACK packets with incorrect addressing. Which of the following is the MOST likely cause of these issues?
A. DNS poisoning attack
B. Evil twin on the company network
C. ARP poisoning attack
D. Misconfigured VLAN on the local switch
C. ARP poisoning attack
- A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?
A. IDS
B. IPS
C. Layer 7 firewall
D. RADIUS server
A. IDS
- An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?
A. Man in the middle
B. A brute-force attack
C. A hash comparison
D. Rainbow tables
D. Rainbow tables
- A network technician is supporting a library system that wants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?
A. IR
B. Bluetooth
C. PAN
D. RFID
D. RFID
- A switch vendor recently released a patch to fix a critical vulnerability found in its switch OS. Which of the following should a network administrator do NEXT according to best practices?
A. Test the patch in a test environment.
B. Put the patch into production immediately.
C. Put the patch into production with a rollback plan.
D. Choose a single production switch and pilot the patch.
E. Put the patch into production at the next maintenance window.
A. Test the patch in a test environment.
- Which of the following services describes a distribution model in which applications are hosted by a service provider and made available to users?
A. PaaS
B. SaaS
C. IaaS
D. MaaS
B. SaaS
- A company requires a network storage solution that allows for the use of OS-specific credentials and permissions. The company purchases a SOHO solution, which includes support for SMB, iSCSI, FTP, Telnet, and NFS natively out of the box. Which of the following should be done FIRST?
A. Verify user credentials.
B. Generate new keys and certificates.
C. Disable unnecessary services.
D. Hash files that will be stored.
C. Disable unnecessary services.
- A companys receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?
A. Implement WPA2-PSK.
B. Implement a captive portal.
C. Implement certificate-based 802.1X.
D. Implement MAC filtering.
B. Implement a captive portal.
- A consulting company was hired to project and deploy a new datacenter in a different city. This new facility must have the same components installed as the current datacenter to be ready to take over all the network services as soon as the primary site becomes unavailable. Which of the following describes what will be deployed in the new location?
A. Cold site B. Hot site C. Warm site D. Off-site backup E. Infrastructure as a service
B. Hot site
- A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?
A. 10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.
B. 127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.
C. 172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.
D. 192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.
B. 127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.
- A company is redesigning its office to remove the divider walls between desks and create an open collaboration area. All network cables are run through the divider walls, and a new wireless network will be installed. Which of the following sets of documents will need to be revised based on the new configuration?
A. Standard operating procedures and rack diagrams.
B. Inventory management forms and MDF inventory forms
C. Work instructions and performance baselines
D. Physical network layout and port locations
D. Physical network layout and port locations
- Given the table below:
Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?
A. 192.168.5.1
B. 192.168.11.0
C. 192.168.11.255
D. 192.168.255.255
C. 192.168.11.255
Answer is correct bcz it will broadcast to C and D
- A senior technician is reconfiguring the companys firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?
A. The technician should put the junior teams lab in a VLAN and the phone system in the DMZ.
B. The technician should put the junior teams lab in a DMZ and the phone system in a VLAN.
C. The technician should put the junior teams lab in the LAN and the phone system in the WAN.
D. The technician should put the junior teams lab in the WAN and the phone system in a WLAN
B. The technician should put the junior teams lab in a DMZ and the phone system in a VLAN.
- A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?
A. Punchdown tool
B. Crimper
C. OTDR
D. Loopback adapter
A. Punchdown tool
You need the need to physically punch-down the cable for conductivity. “demarcation ‘ is the key word.
- Which of the following properties should be configured to extend logical network separation on an uplink interface to a second switch?
A. 802.1Q trunking
B. Multiple untagged ports
C. Port mirroring
D. Management VLAN
A. 802.1Q trunking
Logical network separation is also known a VLAN, and 802.1Q is the IEEE standard that enables trunking.
- A new datacenter is being created, and management is trying to control access to that area. Which of the following are the BEST choices for providing access to the new datacenter? (Choose two.)
A. Captive portal B. Wireless IP camera C. Biometrics D. Key fob E. Private key infrastructure F. Access control list
C. Biometrics
D. Key fob
- A network technician is capturing packets on the network and notices a UDP packet stream from a phone to the PBX system. The payload of the packet shows the phone downloaded the file cm7910-sccp-load-2995.xml. Which of the following protocols was MOST likely used to download this file?
A. SIP
B. TFTP
C. SSL
D. ICMP
B. TFTP
- A server administrator is building an email server. To protect the corporate/internal network from external users, the email server should be placed:
A. on the intranet.
B. in a subnet isolated from the internal network.
C. on the company LAN segment.
D. in the DMZ.
D. in the DMZ.
- A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the companys network? (Choose three.)
A. 67 B. 68 C. 161 D. 636 E. 1720 F. 5060 G. 5061
E. 1720
F. 5060
G. 5061
Port 1720 is used by the H.323 teleconferencing protocol (most commonly encountered in Microsoft NetMeeting) during call setup negotiation.
Ports 5060 and 5061, both on TCP and UDP, are associated to the Session Initiation Protocol (SIP) by IANA.
- When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?
A. SFTP
B. SSH
C. SNMPv1
D. LDAPS
B. SSH
Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH
- A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is associated with which of the following OSI layers?
A. Layer 2
B. Layer 3
C. Layer 6
D. Layer 7
D. Layer 7
it’s application becuase you can (See) ..GUI
- A network device compares a computed value of its major software components against a stored value. While the network device is loading, the device halts and alerts the administrator that the values are different. Which of the following is the name of the value in use, and what does this process provide? (Choose two.)
A. A snapshot B. A hash C. A password service D. A key E. Provides authentication F. Provides integrity G. Provides confidentiality H. Provides availability
B. A hash
F. Provides integrity
- A flood disables the equipment in a companys server room. When implementing the disaster recovery plan, all operations are immediately transitioned to another location with momentary downtime. This is an example of a:
A. warm site.
B. cold site.
C. snapshot.
D. hot site.
D. hot site.
Per Mike Meyer’s book: Warm site should only take a day or 2 to bring online whereas a Hot Site should only take a few hours to bring online