Woensdag 601-750 Flashcards
A network technician is configuring a wireless access point and wants to only allow company-owned devices to associate with the network. The access point uses PSKs, and a network authentication system does not exist on the network. Which of the following should the technician implement?
A.Captive portal
B.Guest network isolation
C.MAC filtering
D.Geofencing
Answer: C
Explanation:
C. MAC filteringTo only allow company-owned devices to associate with the wireless network when using PSKs (Pre-Shared Keys) and in the absence of a network authentication system, the network technician should implement MAC filtering. MAC filtering involves creating a whitelist of allowed MAC addresses (the unique hardware addresses of network interfaces) that are permitted to connect to the wireless network.By configuring MAC filtering on the wireless access point, only devices with MAC addresses specified in the whitelist will be allowed to associate with the network.Therefore, the correct answer is C. MAC filtering.
Following a fire in a data center, an executive is concerned about the amount of data that must be reentered. Which of the following describes the executive’s concern?
A.RTO
B.MTBF
C.MMTR
D.RPO
Answer: D
Explanation:
A recovery point objective (RPO) is the maximum length of time permitted that data can be restored from, which may or may not mean data loss. It is the age of the files or data in backup storage required to resume normal operations if a computer system or network failure occurs.
A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?
A.110
B.66
C.Bix
D.Krone
Answer: A
Explanation:
110 is used for ethernet. Bix and Krone are proprietary, and 66 block is for telephone.
A network engineer turned on logging to assist with troubleshooting a suspected configuration issue. Which of the following would provide the network engineer with the most informative log information?
A.FATAL
B.ERROR
C.DEBUG
D.WARN
Answer: C
Explanation:
DEBUG log entries contain the most detailed information.
Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?
A.The switch is oversubscribed and cannot handle the additional throughput.
B.The printer is tying up the server with DHCP discover messages.
C.The web server’s back end was designed for only single-threaded applications.
D.The workstation was configured with a static IP that is the same as the server.
Answer: D
Explanation:
D. The workstation was configured with a static IP that is the same as the server.If a workstation is configured with a static IP address that is the same as the server’s IP address, it can lead to network conflicts and connectivity issues. This is known as an IP address conflict, where two devices on the same network have the same IP address.Therefore, the most likely cause of the reported issue is that the workstation and the server have conflicting IP addresses, leading to connectivity problems.
Which of the following OSI model layers are responsible for handling packets from the sources to the destination and checking for errors? (Choose two.)
A.Physical
B.Session
C.Data link
D.Network
E.Presentation
F.Application
Answer: CD
Explanation:
C. Data linkD. NetworkLayers responsible for handling packets from source to destination and checking for errors in the OSI model are:C. Data link: This layer is responsible for framing packets, error detection, and handling the access to the physical network medium. It includes the logical link control (LLC) sublayer and the media access control (MAC) sublayer.D. Network: This layer is responsible for routing packets between different networks, logical addressing, and providing services such as fragmentation and error handling. It includes IP (Internet Protocol) in the case of the TCP/IP protocol suite.Therefore, the correct answers are C. Data link and D. Network.
Which of the following fiber connector types is the most likely to be used on a network interface card?
A.LC
B.SC
C.ST
D.MPO
Answer: A
Explanation:
LC - widely used due to its small size and ease of use SC - used in Gigabit Ethernet networks, data com, and telecom applications ST - used in multimode data com (but was replaced by SC and LC)MPO - used in high-speed data center applications.
Which of the following best describe the functions of Layer 2 of the OSI model? (Choose two.)
A.Local addressing
B.Error preventing
C.Logical addressing
D.Error detecting
E.Port addressing
F.Error correcting
Answer: AD
A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10GB connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?
A.Port mirroring
B.Log aggregation
C.Flow data
D.Packet capture
Answer: C
Explanation:
C. Flow data. Flow data, collected through flow monitoring protocols such as Net Flow, s Flow, or IPFIX, provides aggregated information about network traffic, including details on source and destination IP addresses, ports, protocols, and more. This method doesn’t capture the actual packet contents but summarizes network traffic flow. By leveraging flow data, the network administrator can gather information about the traffic patterns and bandwidth usage across the network. This method is less resource-intensive than performing packet captures and can provide valuable insights into the sources and destinations of the traffic causing the saturation on the 40Gb connection.
Which of the following security concepts is related to ensuring that encrypted data is not edited while in transit?
A.Zero trust
B.Integrity
C.Availability
D.Confidentiality
Answer: B
Explanation:
B. Integrity (GPT4)Integrity in the context of cybersecurity refers to the assurance that data is not altered or tampered with in transit. It ensures that the information sent from the source arrives at the destination exactly as it was sent, without any unauthorized modifications. This is an essential security concept for encrypted data to ensure that it remains trustworthy and unaltered during transmission.
A user took a laptop on a trip and made changes to the network parameters while at the airport. The user can access all internet websites but not corporate intranet websites. Which of the following is the most likely cause of the issue?
A.Duplicate IP address
B.Duplicate SSID
C.Incorrect DNS
D.Incorrect subnet mask
Answer: C
A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?
A.Change the email client configuration to match the MX record.
B.Reduce the TTL record prior to the MX record change.
C.Perform a DNS zone transfer prior to the MX record change.
D.Update the NS record to reflect the IP address change.
Answer: B
Explanation:
B. Reduce the TTL (Time To Live) record prior to the MX record change.TTL (Time To Live): TTL is a value in a DNS record that determines the amount of time it can be cached by DNS resolvers and other devices on the internet. When making changes to DNS records, reducing the TTL beforehand helps minimize the time it takes for the changes to propagate throughout the internet.MX Record Change: Changing the MX (Mail Exchange) record directs email traffic to the specified mail server. However, DNS changes take time to propagate across the internet due to caching. If the TTL is set too high, old records may be cached for an extended period, leading to email delivery issues.
Which of the following would be best suited for use at the access layer in a three-tier architecture system?
A.Router
B.Multilayer switch
C.Layer 2 switch
D.Access point
Answer: B
Explanation:
B. Multilayer Switch (BEST answer)Rationale: Layer 2 switches can (and do) reside at the access layer, BUT multilayer switches are used at the access layer to efficiently manage local traffic within a network segment while also allowing for inter-VLAN routing.
Which of the following layers of the OSI model is responsible for end-to-end encryption?
A.Presentation
B.Application
C.Session
D.Transport
Answer: A
Explanation:
A. Presentation.
The Presentation layer of the OSI model is primarily responsible for formatting, encrypting, and compressing data in a way that the Application layer can understand. Encryption, as a part of data formatting, is often implemented in this layer to ensure end-to-end secure communication between applications.
While encryption can also be implemented at other layers of the OSI model, such as the Application layer (for application-specific encryption) and the Transport layer (for transport-level encryption such as SSL/TLS), the Presentation layer specifically deals with the syntax and semantics of the data to be exchanged and is where data encryption/decryption often takes place, allowing for secure communication between applications.
A company, which is located in a coastal town, retrofitted an office building for a new data center. The underground fiber optics were brought in and connected to the switches in the basement network MDF. A server data center was built on the fifth floor with the two rooms vertically connected by fiber optics. Which of the following types of environmental sensors is most needed?
A.Temperature sensor in the network MOF
B.Water sensor in the network MDF
C.Temperature sensor in the data center
D.Water sensor in the data center
Answer: B
Explanation:
Correct answer is B:Water sensor in the network MDF.
A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
A.Least privilege network access
B.Dynamic inventories
C.Central policy management
D.Zero-touch provisioning
E.Configuration drift prevention
F.Subnet range limits
Answer: AC
Explanation:
A. Least privilege network access: Implementing the principle of least privilege ensures that users and systems have only the minimum levels of access or permissions necessary to perform their functions. This helps to limit the potential impact of security breaches.C. Central policy management: Centralized policy management allows for consistent application of security policies across the entire network. This ensures that security settings are centrally configured, monitored, and enforced, reducing the likelihood of misconfigurations or oversights that could lead to security vulnerabilities.While all the options listed can contribute to overall security, the two mentioned above are particularly effective in controlling access and managing security policies, which are crucial aspects of post-breach security measures.
Which of the following is most likely to be implemented to actively mitigate intrusions on a host device?
A.HIDS
B.NIDS
C.HIPS
D.NIPS
Answer: C
Explanation:
Correct answer is C:HIPS.
A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer use to upgrade the gateway?
A.NGFW
B.Proxy
C.Layer 3 switch
D.Load balancerv
Answer: A
Explanation:
A. NGFW (Next-Generation Firewall)
NGFW (Next-Generation Firewall): NGFWs are advanced security devices that go beyond traditional firewalls. They provide filtering and inspection capabilities at multiple OSI layers, including application-layer filtering, intrusion prevention, and advanced threat protection. NGFWs are designed to offer more sophisticated and comprehensive security features compared to traditional routers.
A customer lost the connection to the telephone system. The administration console is configured with multiple network interfaces and is connected to multiple switches. The network administrator troubleshoots and verifies the following:
*The support team is able to connect remotely to the administration console.
*Rebooting the switch shows solid link and activity lights even on unused ports.
*Rebooting the telephone system does not bring the system back online.
*The console is able to connect directly to individual modules successfully.
Which of the following is the most likely reason the customer lost the connection?
A.A switch failed.
B.The console software needs to be reinstalled.
C.The cables to the modules need to be replaced.
D.A module failed.
Answer: D
Explanation:
Correct answer is D:A module failed.