Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CS NETWORKS Practice Questions v2./ CS NETWORKS Practice Questions v2., Exams of Computer Science

CS NETWORKS Practice Questions v2. / CS NETWORKS Practice Questions v2.

Typology: Exams

2021/2022

Available from 09/22/2022

Tutor001
Tutor001 🇺🇸

3.8

(4)

465 documents

1 / 99

Toggle sidebar

Related documents


Partial preview of the text

Download CS NETWORKS Practice Questions v2./ CS NETWORKS Practice Questions v2. and more Exams Computer Science in PDF only on Docsity! 1.1.5 Practice Questions 1. Which topologies is a CAN able to use? Bus // Star // Ring 2. You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? Peer-to-peer 3. You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have? Client-server 4. Which of the following geographic network types are typically managed by a city as a public utility? Metropolitan area network (MAN) 1.2.3 Practice Questions 1. You have a small network that uses a switch to connect multiple devices. Which physical topology are you using? Star 2. Your manager has asked you to implement a wired network infrastructure that will accommodate failed connections. You don’t have a large budget, so you decide to provide redundancy for only a handful of critical devices. Which of the following network topologies should you implement? Partial Mesh 3. You have a network that uses a logical ring topology. How do messages travel through the network? Messages travel from one device to the next until they reach the destination device. 4. You have a network that uses a logical bus topology. How do messages travel through the network? Messages are broadcast to all devices connected to the network. 5. Which of the following topologies connects all devices to a trunk cable? Bus 6. Which of the following topologies connects each device to a neighboring device? Ring 7. In which of the following topologies does each device on the network act as a repeater, sending the signal to the next device? Ring 8. Which of the following topologies connects each network device to a central hub? Star 9. You have implemented an ad hoc wireless network that doesn’t employ a wireless access point. Every wireless network card can communicate directly with any other wireless network card on the network. What type of physical network topology has been implemented in this type of network? Mesh 10. Your manager has asked you to implement a network infrastructure that will accommodate failed connections. Which of the following network topologies provides redundancy for a failed link? Mesh 11. You want to implement a fault tolerant topology as you connect routers on your wide area network. Which of the following topologies meets your needs? Mesh 12. What device is used to create a physical star topology? Switch 1.3.6 Practice Questions 1. Which of the following functions are performed by the OSI Transport layer? (Select three) Reliable message delivery // Data segmentation and reassembly // End-to-end flow control 2. What is the basic purpose of the OSI Physical layer? Coordinates rules for transmitting bits 3. Which of the following are included as part of Data Link layer specifications? (Select two) Identifying physical network devices // Controlling how messages are propagated through the network 4. In the OSI model, what is the primary function of the Network layer? Routes messages between networks 5. Which of the following tasks is associated with the Session Layer? Connection establishment 6. In the OSI model, which of the following functions are performed at the Presentation Layer? (Select two) Encrypt and compress data // Specify data format (such as file formats) 7. In the OSI model, which of the following functions are performed at the Application layer? (Select all that apply) TCP 5. Which of the following protocols stores email on the mail server and allows users to access messages from various client devices without having to download the email? IMAP4 6. Which protocol is used to securely browse a website? HTTPS 7. The UDP transport protocol provides which of the following features? (Select all that apply) Low overhead // Connectionless datagram services 8. What protocol sends email to a mail server? SMTP 9. You have a large TCP/IP network and want to keep a host’s real time clock synchronized. What protocol should you use? NTP 10. Which of the following TCP/IP protocols do email clients use to download messages from a remote mail server? POP3 11. You are asked to recommend an email retrieval protocol for a company’s sales team. The sales team needs to access email from various locations and possibly different computers. The stales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose? IMAP4 12. Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes? TCP 1.5.3 Practice Questions 1. What is the binary format for the following decimal IP address? 131.9.202.111 128 64 32 16 8 4 2 1 1 1 1 10000011 = 131 128 64 32 16 8 4 2 1 0 0 0 0 1 0 0 1 00001001 = 9 128 64 32 16 8 4 2 1 1 1 0 0 1 0 1 0 11001010 = 202 128 64 32 16 8 4 2 1 0 1 1 0 1 1 1 1 01101111 = 111 131.9.202.111 = 10000011.00001001.11001010 2. What is the decimal format of the following binary IP address? 11001110.00111010.10101010.01000011 128 64 32 16 8 4 2 1 1 1 0 0 1 1 1 0 128+64+8+4+2 = 206 128 64 32 16 8 4 2 1 0 0 1 1 1 0 1 0 32+16+8+2 = 58 128 64 32 16 8 4 2 1 1 0 1 0 1 0 1 0 128+32+8+2 = 170 128 64 32 16 8 4 2 1 0 1 0 0 0 0 1 1 64+2+1 = 67 3. Match each decimal value on the left with the corresponding hexadecimal value on the right. Not all decimal values have a corresponding hexadecimal value. Hex 0 1 2 3 4 5 6 7 8 9 A B C D E F Dec 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Hex 10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F Dec 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 11 = 17 B = 11 D = 13 F = 15 C = 12 10 = 16 2.1.4 Practice Questions 1. Which of the following cable types often includes a solid plastic core that keeps the twisted pairs separated? Cat 6 2. Which of the following connectors is used with Ethernet 100BaseT networks? RJ45 3. Which of the following connector types would you most likely use to connect to a T1 WAN service? RJ48c 4. You are installing networking wiring for a new Ethernet network at your company’s main office building. The project specifications call for Cat 5e UTP network cabling and RJ45 wall jacks. Near the end of the project, you run out of wire before the last few runs are complete. You have a spool of Cat 3 network cable in storage. Upon investigation, it appears very similar to Cat 5e wiring. Should you use Cat 3 cabling as a substitute for Cat 5e cabling to finish the project? No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing cross-talk and supporting higher data rates. 5. You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for hearting and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use? Plenum rated cable 6. Why might you use an RJ11 connector? You want to connect your computer to the internet with a DSL modem 7. When would you typically use and RJ11 connect? When connecting a phone to a phone line 7. You need to terminate a Cat 6 UTP cable with an RJ45 connector. Your organization’s IT policy stats that all cable connectors must be wired according to TIA568B standards. Drag the UTP wire on the left to the correct pin in the RJ45 connector on the right. TIA568B standard = White/orange, orange, white/green, blue, white/blue, green, white/brown, brown 8. You need to terminate a Cat 6 UTP cable with an RJ45 connector. Your organization’s IT policy states that all cables connectors must be wired according to TIA568A standards. Drag the UTP wire on the left to the correct pin in the RJ45 connector on the right. TIA568A standard = White/green, green, white/orange, blue, white/blue, orange, white/brown, brown 9. Which of the following is used to terminate individual wires from a 25 pair or 100 pair cable using female RJ45 ports? Patch panel 10. Which of the following describes the point where the service provider’s responsibility to install and maintain wiring and equipment ends, and the customer’s responsibility begins? Demarc 11. You have a network that occupies all three floors of a building. The WAN service provider has installed the line for the WAN service into the building in a wiring closet on the main floor. You have a wiring closet on the two remaining floors directly above the wiring closet on the main floor. What would you use to connect the wiring closets together? Vertical cross connect 12. Which of the following terms identifies the wiring closet in the basement or a ground floor that typically includes the demarcation point? MDF 13. You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor? IDF 2.5.7 Practice Questions 1. You are working with an existing fiber optic installation in your building. You want to know the length of each cable that runs through the walls. Which tool should you use? OTDR 2. You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps. Which tool should you use to test the drop cable and the connection to the network? Certifier 3. You have been asked to document the wiring in your building. You would like to identify the length of each Cat5 cable to verify that it meets Ethernet standards. You need to identify the length of the cables, but most cables run through walls and ceilings, making them difficult to trace. Which tool should you use? TDR 4. You want to measure the voltage, amps, and ohms of various devices. Which tool should you use? Multimeter 5. You have a cable internet connection at home. The installer had connected the router near the outside wall of your house with RG6 cable. You move the cable router a distance of 50 meters using RG8 cables and special connector adapters. Which condition are you most likely to experience? Echo 6. You use Cat5e twister pair cable on your network. Cables are routed through walls and the ceiling. A user puts a screw in the wall to hang a picture and pierces the cable so that a signal sent to pin 1 arrives on the cable connected to pin 7. Which term describes this condition? Short circuit 7. Users report that the internet is no longer accessible. You suspect that the line connecting your building to the internet is not working properly. Which of the following allows the service provider to remotely test the local loop? Smartjack 8. Which type of polish grade uses green-colored connectors to help you keep from using the wrong connector type? Angled Physical Contact (APC) 9. You need to replace a fiber optic cable that is connecting two switches together. You inspect the existing fiber cable and determine that it uses LC connectors. You also notice the cable’s ferrule has a slight slant to it. Which polish grade should you use to replace the existing cable? Angled Physical Contact polish 10. You’ve connected a cable certifier to an RJ45 wall jack, and the output shown below is displayed on the device. What does this output indicate? (Select two) This is a crossover cable // The cable is functioning correctly 11. Consider the 850 nm multimode fiber optic cable shown below. How much loss can you expect between the transmitter and the receiver? -1.2 dB 12. You are troubleshooting a connectivity problem in which one client system is unable to connect to a server. Both the server and client system are connected to the same Ethernet network switch. No other users have complained of a problem, and you suspect that faulty network cabling might be to blame. Which of the following troubleshooting steps are you most likely to perform first? Use a cable tester to test the cable between the computer system and the network switch 7. Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning? Data Link 8. At which of the following OSI layers does a router operate? Layer 3 9. Which of the following devices operate at the Data Link layer of the OSI model? (Select three) Bridges // Switches // Network Interface Cards (NICs) 10. Which of the following devices operate at OSI model Layer 2? (Select two) Switch // Network Interface Card 11. A switch is associated with which OSI model layer? Data Link 12. At which layer of the OSI model do hubs operate? Physical 13. Which of the following devices operates at the OSI model Layer 2? Switch 14. Which of the following devices operates at the OSI model Layer 1? Hub 3.3.4 Practice Questions 1. Which of the following hardware devices links multiple networks and directs traffic between networks? Router 2. You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your organization's network to the internet to provide users with internet access. Since doing so, it has come to your attention that an intruder has invaded your network from the internet on three separate occasions. What type of network hardware should you implement to prevent this from happening again? Firewall 3. Which of the following is the best device to deploy if you want to protect your private network from a public untrusted network? Firewall 4. Which of the following is a good reason to install a firewall? To prevent hackers from accessing your network. 5. You are the administrator of your company’s network. You want to prevent unauthorized access to your intranet from the internet. Which of the following should you implement? Firewall 4.1.3 Practice Questions 1. Which of the following physical topologies are used with Ethernet networks? (Select two) Star // Bus 2. Which of the following use the CSMA/CD access method? 1000BaseT 3. The media access control method of all Ethernet networks is ______. CSMA/CD 4. A network is connected following the IEEE 802.3 specifications. Which of the following best describes when a device can transmit messages? The device listens to determine if the transmission media is free. 4.2.4 Practice Questions 1. What is the minimum cable specification that supports 1000 Mbps Ethernet? Cat 5e 2. You want to implement an Ethernet network at very long distances using fiber optic cables. Which standard and cable type would you choose? (Select two) Single-mode fiber // 1000BaseLX 3. Ethernet 100BaseFX networks use what type of cabling? Fiber optic 4. Which of the following Ethernet standards uses fiber-optic cabling? (Select two) 100BaseFX // 1000BaseLX 5. Your network follows the 100BaseFX specifications for Fast Ethernet and uses half-duplex multi-mode cable. What is the maximum cable segment length allowed? 412 meters 6. Your network follows the 100BaseTX specifications for Fast Ethernet. What is the maximum cable segment length allowed? 100 meters 7. You have been tasked with designing an Ethernet network. Your client needs to implement a very high-speed network backbone between campus buildings, some of which are around 300 meters apart. Multi-mode fiber optic cabling has already been installed between buildings. Your client has asked that you use the existing cabling. Which Ethernet standard meets these guidelines? (Choose two) 1000BaseSX // 10GBaseSR 8. What type of cabling is used with 100BaseTX Fast Ethernet networks? Cat5 or higher 9. What topology is used with 100BaseTX Fast Ethernet networks? (Select two) Physical star/logical star // Physical star/logical bus 10. Which of the following are requirements of the 1000BaseT Ethernet standards? (Select three) Cat 5e cabling // The cable length must be less than or equal to 100m // RJ45 connectors 11. You are planning a network for an educational campus. Due to the size of the buildings and the distance between them, you have elected to use 10BaseFL hubs, cabling, and network interface cards. What is the maximum length for the network cable between a workstation and a hub? 2000 meters 12. Which Gigabit Ethernet standard uses multimode fiber optic cabling and supports network segments up to a maximum of 550 meters long? 1000BaseSX 13. You have been tasked with designing a high-speed Ethernet network. Your client’s building already has 150-ohm shielded twisted pair (STP) wiring installed. Due to budget constraints, they have asked you to reuse the existing wiring instead of installing new fiber optic cabling. Which Ethernet standard could you implement in this situation? 1000BaseCX 14. Which Gigabit Ethernet standard can support long network segments up to a maximum of 5 km when used with single-mode fiber optic cable? 1000BaseLX 15. You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or greater. Which of the following would be the minimum requirement for the implementation? (Select two). 10GBaseLR standard // Single-mode fiber 4.3.4 Practice Questions 1. You need to transfer data from one laptop to another, and you would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use? Crossover Drag the cable type on the left to the most appropriate network location on the right. Each cable type can be used more than once. A. Drop cables – Cat 6 straight-through UTP B. Patch cables – Cat 6 straight-through UTP C. Uplink cables – Cat 6 crossover UTP D. WAN cables – Single-mode fiber optic 11. You want to create a rollover cable that has an RJ45 connector on both ends. How should you connect the wires within the connectors? Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5 4.4.10 Practice Questions 1. You’ve connected a cable certifier to an RJ45 wall jack and the output shown below is displayed on the device. What does this output indicate? (Select two). Pin 4 is open // Pin 6 is open 2. Users are complaining that sometimes network communications are slow. You use a protocol analyzer and find that packets are being corrupted as they pass through a switch. You also notice that this only seems to happen when the elevator is running. What should you do? Install shielded cables near the elevator 3. You have a network connected using a physical bus topology. One of the cables that connects a workstation to the bus breaks. Which of the following best describes what effect this will have on network connected? No devices will be able to communicate 4. You have a network connected using a physical star topology. One of the drop cables connecting a workstation has been removed. Which of the following best describes what affect this will have on network communications? All devices except the device connected with the drop cable will be able to communicate 5. You have a network connected using a full physical mesh topology. The link between device A and device B is broken. Which of the following best describes what affect this will have on network communication? Device A will be able to communicate with all other devices. 6. During a network infrastructure upgrade, you have replaced two 10 Mbps bus with switches and upgraded from Category 3 UTP cable to Category 5e. During the process, you accidently cut the Cat 5e patch cable that stretches from the network printer to the upgraded switch. What is the impact on the network? All network nodes except the printer will be available. 7. You have just connected four new computer systems to an Ethernet switch using spare patch cables. After the installation, only three systems are able to access the network. You verify all client network settings and replace the network card in the failed system. The client is still unable to access the network. Which of the following might you suspect is the real cause of the problem? Failed patch cable 8. You are moving a client to a new location within an Ethernet network. Previous to the move, the client system did not have difficulty accessing the network. During the relocation, you attach patch cables from the client system to the wall jack and from the patch panel to the switch. Once connected, you do not get a link light on the network card or the switch. You swap out the cable running between the patch panel and the switch with a known working one, but you still cannot connect. Which of the following might you suspect is the problem? Failed patch cable between the client system and the wall jack 9. Upon conducting a visual inspection of the server room, you see that a switch displays LED collision light that are continually lit. You check the LED on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time. What is the cause of the network collision? Faulty network card 10. A user from the sales department calls to report that he is experiencing problems connecting to the sales file server. All users in the sales department connect to the sales server through a single Ethernet switch. No other users have reported problems connecting to the sales server? Which of the following troubleshooting actions are you most likely to perform first? Replace the network card in the user’s computer 11. You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat 6e cable to connect the wiring closet to the shipping building. Which of the following should you include in your plan? Repeater 12. Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic, Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and allow future growth? Switch 5.1.10 Practice Questions 1. You recently created a new network segment for the development department. Because the hosts are now on a different network segment, they can no longer contact the DHCP server. Both network segments are connected via a Cisco router. Which of the following would be the best action to take in order to fix the problem? Implement an IP helper address on the router IP address: 192.168.12.46 Subnet mask: 255.255.255.240 Default gateway: 192.168.12.34 DNS Server: 198.162.1.22 14. You manage a subnet that uses the subnet address 198.162.1.0/23. Which of the following best describes how addressing is configured for the subnet? Supernetting 15. You manage a server that uses an IP address of 192.168.255.188 with a mask of 255.255.0.0. Which of the following describes the address type? Classless 5.2.5 Practice Questions 1. Which of the following IP address ranges is reserved for automatic private IP addressing? 169.254.0.1 – 169.254.255.254 2. What is the network address and subnet mask used by APIPA? (Select two) 255.255.0.0 // 169.254.0.0 3. CorpServ is a small company with 14 client systems and a network printer. Because there are only a limited number of networked systems, you decide to use APIPA addressing for the network. With APIPA configured, all systems are able to communicate with each other, but you are having trouble configuring Internet access. What is the likely cause of the problem? Private addresses cannot directly communicate to hosts outside the local subnet. 5.3.10 Practice Questions 1. After installing a new DHCP server on the network, you need to verify that network devices are receiving IP addressing via DHCP. You reboot a Windows 10 client system and using the ipconfig /all command, receive the following information: Ethernet adapter Local Area Connection 1: Description……….: Intel® Ethernet Connection Physical Address……: 02-00-4C-4F-3F-50 DHCP Enabled…..: Yes Autoconfiguration Enabled….: Yes Autoconfiguration IPv4 Address..: 169.254.25.129 Subnet Mask …..: 255.255.0.0 Default Gateway……: DNS Server…..: Which of the following statements are true? (Select two) The client system is unable to reach the DHCP server // The client system is configured to use DHCP 2. Your Windows DHCP server had a default lease time of eight days. However, you have decided to reconfigure this DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days. What impact, if any, will this have on the network? Increase network traffic 3. You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use? DHCP server 4. Which two of the following statements about the dynamic host configuration protocol (DHCP) are true? A DHCP server assigns addresses to requesting hosts // It can deliver other configuration information in addition to IP addresses 5. Which of the following strategies are used to prevent duplicate IP addresses being used on a network? (Select two) Install a DHCP server on the network // Use Automatic Private IP Addressing 6. Due to widespread network expansion, you have decided to upgrade the network by configuring a DHCP server. The network uses Linux, Windows, and Mac OS X client systems. You configure the server to distribute IP addresses from 192.168.2.1 to 192.168.2.100. You use the subnet mask of 255.255.255.0. After making all setting changes on the DHCP server, you reboot each client system, but they are not able to obtain an IP address from the DHCP server. Which of the following would explain the failure? The clients must be configured to obtain IP addressing from a DHCP server. 7. You have a TCP/IP network 50 hosts. There have been inconsistent communication problems between hosts. You run a protocol analyzer and discover that two hosts have the same IP address assigned. Which protocol can you implement on your network to help prevent problems such as this? DHCP 8. You are implementing a DHCP server for your segment. Your segment’s IP address is 192.168.1.0. Your default gateway address is 192.168.1.254. Your DNS server address is 192.168.1.1. Your default gateway is configured as a NAT router to translate addresses between network segments. You configure the 03 Router option on your DHCP server so it can deliver the IP address of the default gateway to workstation. After configuring your workstation to get their IP addressing information dynamically, your users complain that they are unable to access websites on the internet. How can you resolve this problem? You must configure your DHCP server with an option that delivers the IP address of the DNS server (Option 06). 5.4.5 Practice Questions 1. You have a Windows Server 2016 system that you want to use as a DHCP relay agent. Which Windows Server 2016 service would you use to do this? Routing and Remote Access 2. You need to configure a Cisco RFC 1542-compliant router to forward any received DHCP frames to the appropriate subnet. The address of the remote DHCP server is 172.16.30.1 Which of the following commands would you use to configure the router? Ip helper-address 172.16.30.1 3. You are configuring the DHCP Relay Agent role on a Windows server. Which of the following is a required step for the configuration? Specify which server network interface the agent listens on for DHCP messages. 5.5.9 Practice Questions 1. You need to enable hosts on your network to find the IP address of logical names such as srv1.myserver.com. Which device would you use? DNS server 2. You want to implement a protocol on your network that allows computers to find the IP address of host from a logical name. Which protocol should you implement? DNS 4. Which address type is used for a video conference call consisting of multiple participants? Multicast 5. Which protocol does an IP host use to inform a router that it wants to receive specific multicast frames? IGMP 6. Which type of address is the IP address 198.162.12.254/24? Unicast 5.8.9 Practice Questions 1. You administer a network with Windows Server 2016 and UNIX servers and Windows 10 Professional, Windows 7, and Macintosh clients. A Windows 7 computer user calls you one day and says he is unable to access resources on the network. You type ipconfig on the user’s computer and receive the following output: 0 Ethernet adapter: IP address…..: 169.254.1.17 Subnet Mask…..: 255.255.0.0 Default Gateway……: You also check your NIC and see the link light is on. What might the problem be? An unavailable DHCP server 2. You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : mydomain.local Description….: Broadcom network adapter Physical Address….: 00-AA-BB-CC-74-EF DHCP Enabled….: No Autoconfiguration Enabled….: Yes IPv4 Addres….: 192.168.1.102 (Preferred) Subnet Mask….: 255.255.0.0 Default Gateway….: 192.168.1.1 DNS Server….: 192.168.1.20 192.168.1.27 What is the most likely cause of the problem? Incorrect subnet mask 3. You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : mydomain.local Description….: Broadcom network adapter Physical Address….: 00-AA-BB-CC-74-EF DHCP Enabled….: No Autoconfiguration Enabled….: Yes IPv4 Addres….: 192.168.1.102 (Preferred) Subnet Mask….: 255.255.255.0 Default Gateway….: 192.168.2.1 DNS Server….: 192.168.2.20 What is the most likely cause of the problem? Incorrect default gateway 4. You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet. This workstation cannot communicate with any other host on the network. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix. : mydomain.local Description….: Broadcom network adapter Physical Address….: 00-AA-BB-CC-74-EF DHCP Enabled….: No Autoconfiguration Enabled….: Yes IPv4 Addres….: 192.168.2.102 (Preferred) Subnet Mask….: 255.255.255.0 Default Gateway….: 192.168.1.1 DNS Server….: 192.168.2.20 What is the most likely cause of the problem? Incorrect IP address 5. Your office has both Windows and Linux computers. You want to be able to view the address of the default gateway that a computer is using. Which of the following utilities could you use? (Select two) route // ipconfig 5.9.9 Practice Questions 1. You work in an office that uses Linux servers and Windows servers. The network uses the TCP/IP protocol. You are sitting at a workstation that uses Windows 10. An application you are using is unable to contact a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server? Ping 2. You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. Youa re sitting at the Linux server and want to check its IP address. Which command should you use? Ifconfig 3. Your computer is sharing information with a remote computer using TCP/IP protocol. Suddenly, the connection stops and appears to hang. Which command can you use to check the connection? Netstat 4. Which command displays network activity statistics for TCP, UDP, and IP? Netstat -s 5. You are troubleshooting a connectivity problem on a Linux server. You are able to connect to another system on the local network, but are not able to connect to a server on a remote network. You suspect that the default gateway information for the system may be configured incorrectly. Which of the following commands would you use to view the default gateway information on the Linux server? Ifconfig 6. You have been called in to troubleshoot a connectivity problem on a newly installed Windows Server 2016 system. The system is operating satisfactorily and is able to communicate with other systems on the local network. However it is unable to access any systems on other segments of the corporate network. You suspect that the default gateway parameter for the system has not been configured, or may be configured incorrectly. Which of the following utilities are you most likely to use to view the default gateway information for the system? Ipconfig 2. Mary calls to tell you that she can’t connect to an intranet server called WebSrv1. From her computer, you ping the server’s IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem? Nslookup 3. You are troubleshooting a network connectivity issue on a Unix system. You are able to connect ot remote systems by using their IP address, but unable to connect using the host name. You check the TCP/IP configuration and note that a DNS server IP address is configured. You decide to run some manual resolution queries to ensure that the communications between the Unix system and the DNS server are working correctly. Which utilities can you use to do this? (Choose two). Nslookup // dig 4. Examine the following output: Server: to.xct.mirrorxhq.net Address: 209.53.4.130 Name: westxsim.com Address: 64.78.193.84 Which of the following utilities produced this output? Nslookup 5. Consider the following output. ;; res options: init recurs defnam dnsrch ;;got answer: ;;->>HEADER<<-opcode:QUERY, status; NOERROR,id:4 Dig 6. Consider the following output from a dig command run on a Linux system. 202.64.49.150 7. A user reports that he can’t browse to a specific website on the internet. From his computer, you find that a ping test to the web server succeeds. A traceroute test shows 17 hops to the destination web server. What is the most likely cause of the problem? Incorrect DNS server address 6.1.4 Practice Questions 1. Match each switch management method on the left with its corresponding characteristics on the right. Each method may be used once, more than once, or not at all. Competes with normal network traffic for bandwidth: In-band management Uses a dedicated communication channel: Out-of-band management Must be encrypted to protect communications from sniffing: In-band management Does not compete with normal traffic for bandwidth: Out-of-band management Affected by network outages: In-band management 2. Match each type of switch on the left with its corresponding characteristics on the right. Each switch type may be used once, more than once, or not at all. Commonly sold at retail stores: Unmanaged switch Provides port security features: Managed switch Supports VLANs: Managed switch Provides very few configuration options: Unmanaged switch Can be configured over a network connection: Managed switch Can be configured over a dedicated communication channel: Managed switch 3. Match the Cisco device password type on the left with its function on the right. Controls the ability to log on through a LAN or WAN interface configured on the device: VTY Controls the ability to connect to the device using a web browser using HTTPS: SDM Controls the ability to connect to the device using a direct connection: Console 6.2.5 Practice Questions 1. Which command would you use on a switch to enable management from a remote network? Ip default-gateway 192.168.10.185 2. What does the ip address dhcp command allow you to do? Configure the switch to obtain an IP address from a DHCP server 3. You are configuring a switch so that you can manage it using PuTTY from the same network segment as the switch. On the switch, you enter the following commands: Switch#config terminal Switch(config)#interface vlan1 Switch(config-if)#ip address 192.168.1.10 255.255.255.0 Will this configuration work? No, the no shutdown command needs to be entered 6.3.8 Practice Questions 1. A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF:FF. What will the switch do with the frame? Send it out all ports except for the port it was received on. 2. You need to configure the FastEthernet 0/1interface on a switch to automatically detect the appropriate link speed and duplex setting by negotiating with the device connect to the other end of the link. Drag the command on the left to the appropriate configuration step on the right. It is possible that not all of the commands are required. Enter global configuration mode: conf t Enter interface configuration mode: int fa0/1 Set the speed of the interface: speed auto Set the duplex setting for the interface: duplex auto 2. You have two switches connected together as shown in the following diagram. How many broadcast domains are in the network shown? 2 3. Computers A and B are on the same VLAN and are separated by two switches as shown in the exhibit. Computer A sends a frame to Computer B. Which of the following best describes the composition of the frames as it travels from A to B? Computer A sends a normal frame. The first switch appends a VLAN ID to the frame. The second switch removes the VLAN ID before forwarding it to Computer B. 4. Which of the following statements accurately describes a VLAN ID? Switches append a VLAN ID to the header of each frame to identify the virtual network it belongs to. 5. You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches? Trunking 6. You manage a network with two switched. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch in VLAN 1. What should you configure to allow communication between these two devices through the switches? Trunking 7. When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? Trunk ports 6.6.10 Practice Question 1. You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? Spanning tree 2. Which of the following solutions would you implement to eliminate switching loops? Spanning tree 3. Which problem does the spanning tree protocol prevent? Switching loops from developing when redundant paths are implemented between switches. 4. Which statement accurately describe the port states of both bridges and switches? (Select two) Ports in a blocked state still receive BPDUs // In the learning state, the MAC address table can be populated, but frames are not forwarded. 5. A switch running STP is classified as a backup bridge. What state is it in? Blocking 6. Switches running STP are in the process of exchanging BPDUs and redefining their roles. Which port state are the switches currently in? Listening 7. A switch is running STP is in the learning state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? It uses the source MAC address and network segment information to build its bridge database, but does not forward the message. 8. A switch running STP is in the listening state. A message destined for a different network segment arrives at the switch. Which of the following best describes what the switch will do? It does not record address or segment information., It does not forward the message 9. You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, which switch will become the root bridge? B 10. You have just connected four switches as shown in the Exhibit. Assuming the default switch configuration, how can you force switch C to become the root bridge? Configure a priority number of 4096 for Switch C 11. You have three switches configured as shown in the Exhibit. How do you guarantee that switch C becomes the root bridge? Configure switch C with a lower priority value 12. You need to configure spanning tree on a Cisco switch. You’d like to use a protocol that conforms to the 802.1w standards. Which protocol should you use? Rapid PVST+ 13. Match the EtherChannel protocol on the left with its characteristics on the right. Each protocol may be used once, more than once, or not at all. Desirable mode places the port in a negotiating state: Port Aggregation Protocol (PAgP) Based on the 802.3ad standard: Link Aggregation Control Protocol (LACP) Passive mode places the port into a passive negotiating state: Link Aggregation Control Protocol (LACP) Auto mode places the port into a passive negotiating state: Port Aggregation Protocol (PAgP) Active mode places the port in a negotiating state: Link Aggregation Control Protocol (LACP) 14. Which of the following features dynamically places switch ports in blocking or forwarding states? Spanning tree 15. You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should your switch support? Spanning tree 6.7.3 Practice Questions 1. You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devise on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement? VLANs 2. Select the statement that best describes a broadcast storm. 4. Which of the following routing protocols is classified as a hybrid routing protocol? EIGRP 5. What are the main differences between the OSPF and IS-IS routing protocols? OSPF requires an area 0, while IS-IS does not. 6. Which of the following protocols has a limit of 15 hops between any two networks? RIP 7. Under which of the following circumstances might you implement BGP on your company network and share routes with Internet routers? If the network is connected to the Internet using multiple ISPs 8. Which of the following statements about RIP is true? RIP uses hop counts as the cost metric 9. Which of the following best describes OSPF? OSPF is a classless link state routing protocol 10. You have a private network connected to the internet. Your routers will not share routing information about your private network with internet routers. Which of the following best describes the type of routing protocol you would use? IGP 11. A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned of networks 192.168.3.0/24 and 192.168.4.0/24. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do? Wait for convergence to take place 12. You have a network configured to use the OSPF routing protocol. Which of the following describes the state when all OSPF routers have learned about all other routes in the network? Convergence 13. Which of the following routing protocols uses paths, rules, and polices instead of a metric for making routing decisions? BGP 7.3.6 Practice Questions 1. Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host? Port forwarding 2. Your computer has an IP address of 161.13.5.15. Your computer is on a: Public network 3. Which of the following IP addresses is a valid IP address for a host on a public network? 142.15.6.1 4. Which of the following is not one of the ranges of IP addresses defined in RFC 1918 that are commonly used behind a NAT server? 169.254.0.1 – 169.254.255.254 5. Which of the following associates a port number with a host on a private network? PAT 6. You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access? Static NAT 7. You are the network administrator for a small company that implements NAT to access the internet. You recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don’t want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside. Which method of NAT translation should you implement for these five servers? Static 8. You want to connect your small company network to the internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connections to internal hosts. What type of network address translation (NAT) should you implement? Dynamic 9. You have a computer that is connected to the internet through a NAT router. You want to use a private addressing scheme for your computer. Which of the following IP addresses could you assign to the computer? (Select all that apply) 10.0.12.15 // 192.168.12.253 // 172.18.188.67 10. You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. All computers on your home network can connect to the internet. From your work office, you try to access your home computer using its IP address, but are unable to communicate with the server. You are able to connect to other hosts on the internet. Why can’t you access the server? Private addresses are not accessible through the internet 7.4.6 Practice Question 1. You work for a large multinational organization that has an extensive global network that is interconnected using WAN links and routers. Lately, uses in one location have complained that they are unable to access resources stored on a server named FS23 in a South American branch office. To troubleshoot the issue, you have done the following:  Verified that the server is up and running  Verified that the various routers in between the two locations are up and running. You suspect that perhaps one of the routers between the two locations may be dropping packets. To test this theory, you enter ping FS23 -f -l 1500 command on your workstation. The ping command returns the following command for each ping packet sent: “Packet needs to be fragmented but DF set” What does this mean? One of the intermediate routers is an MTU black hole. 2. You have just connected a new computer to your network. The network uses static IP addressing. You find that the computer can communicate with hosts on the same subnet, but not with hosts on a different subnet. No other computers are having a problem. Which of the configuration values would you most likely need to change? Default Gateway 3. You manage a network with multiple subnets connected to the internet. A user reports that she can’t access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on that subnet. However, the computer does access other computers on other subnets as well as the internet. Which of the following is most likely the cause of the problem? Missing route on the default gateway router 4. You manage a network with multiple subnets connected to the internet. A user reports that she can’t access the internet. You investigate the problem and find that she can access all hosts on the private network, but not hosts on the internet. Which of the following is likely the cause of the problem? Missing default route on a router 5. Examine the following output: 4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62] 5 39 ms 39 ms 65 ms plalca01gr00.bb.ispxy.com [154.11.12.11] 6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14] 7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [205.171.205.29] 8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1] 9. You connect your computer to a wireless network available at the local library. You find that you can access all the websites you want on the internet except for two. What might be causing the problem? A proxy server is blocking access to the websites 10. You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all the apply) Destination address of packet // Port Number // Source address of a packet 11. Haley configures a website using Windows Server 2016 default values. What are the HTTP port and SSL port settings? 80 for HTTP; 443 for SSL 12. You have recently installed a new Windows Server 2016 system. To ensure the accuracy of the system time, you have loaded an application that synchronizes the hardware clock on the server with an external time source on the internet. Now, you must configure the firewall on your network to allow time synchronization traffic through. Which of the following ports are you moist likely to open on the firewall? 123 13. You are configuring a firewall to allow access to a server hosted on the demilitarized zone of your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, which applications are most likely to be hosted on the server? Web server and email server. 14. You are monitoring network traffic on your network, and you see traffic between two network hosts on port 2427. Which kind of network traffic uses this port? The MGCP protocol is generating traffic, which VoIP uses to send voice data over a network. 15. You are monitoring network traffic on your network, and you see traffic between two network hosts on port 1720. What is the source of this network traffic? Someone is using voice over IP (VoIP) to make a telephone call. 8.2.5 Practice Questions 1. An all-in-one security appliance is best suited for which type of implementation? A remote office with no on-site technicians 2. Which of the following features are common functions of an all-in-one security appliance? (Select two) Spam filtering // Bandwidth shaping 3. You recently installed a new all-in-one security appliance in a remote office. You are in the process of configuring the device. You need to:  Increase the security of the device  Enable remote management from the main office  Allow users to be managed through Active Directory You want to configure the device so you can access it from the main office. You also want to make sure the device is as secure as possible. Which of the following tasks should you carry out? (Select two) Change the default username and password // Configure the device’s authentication type to use Active Directory 8.3.9 Practice Questions 1. Match the firewall type on the right with the OSI layer at which it operates. Each OSI Layer may be used once, more than once, or not at all. Packet filtering firewall: OSI Layer 3 Circuit-level proxy: OSI Layer 5 Application-level gateway: OSI Layer 7 Routed firewall: OSI Layer 3 Transparent firewall: OSI Layer 2 2. Your company has a connection to the internet that allows users to access the internet. You also have a web server and an email server that you want to make available to internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ? Network-based firewall 3. You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two) Put the database server on the private network // Put the web server inside the DMZ 4. You have a router that is configured as a firewall. The router is a Layer 3 device only. Which of the following does the router use for identifying allowed or denied packets? IP address 5. You have just installed a packet filtering firewall on your network. Which options will you be able to set on your firewall? (Select all that apply) Port number // Destination address of packet // Source address of a packet 6. Which of the following describes how access lists can be used to improve network security? An access list filters traffic based on the IP header information such as source or destination IP address, protocol, or socket number 7. Which of the following is likely to be located in a DMZ? FTP Server 8. In which of the following situations would you most likely implement a demilitarized zone (DMZ)? You want to protect a public web server from attack 9. Match the firewall type on the left with its associated characteristics on the right. Each firewall type may be used once, more than once, or not at all. Operates at Layer 2: Virtual firewall Operates at Layer 3: Routed firewall Counts as a hop in the path between hosts: Routed firewall Does not count as a hop in the path between hosts: Virtual firewall Each interface connects to a different network: Routed firewall Each interface connects to the same network segment: Virtual firewall 10. When designing a firewall, what is the recommended approach for opening and closing ports? Close all ports; open only ports required by applications inside the DMZ. 11. After blocking a number of ports to secure your server, you are unable to send email. To allow email service, which of the following needs to be done? Open port 25 to allow SMTP service 12. You administer a web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the website as follows:  IP address: 192.168.23.8  HTTP Port: 1030  SSL Port: 443 Users complain that they can’t connect to the website when they type www.westsim.com. What is the most likely source of the problem? The HTTP port should be changed to 80 13. You want to maintain tight security on your internal network, so you restrict access to the network through certain port numbers. If you want to allow users to continue to use DNS< which port should you enable? 53 14. In the output of the netstat command, you notice that a remote system has made a connection to your Windows Server 2016 system using TCP/IP port 21. Which of the following actions is the remote system most likely performing? PoE 9.3.4 Practice Questions 1. In virtualization, what is the role of the hypervisor? A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. 2. What type of virtualization completely simulates a real physical host? Full virtualization 3. Which component is most likely to allow physical and virtual machines to communicate with each other? Virtual switch 4. Which of the following are advantages of virtualization? (Select two) Easy system migration to different hardware // Centralized administration 9.4.6 Practice Questions 1. You have configured a virtual network that includes the following virtual components:  Four virtual machines (Virtual OS1, Virtual OS2, etc.)  One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out on the physical network. Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virtual OS1 can communicate with. ***click Virtual OS2 and Virtual OS3** 2. You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual Servers 3. You have configured a virtual network that includes the following virtual components:  Four virtual machines (Virtual OS1, Virtual OS2, etc.)  One virtual switch The virtual switch is connected to a physical network to allow the virtual machines to communicate with the physical machines out of the physical network. Given the port configuration for the virtual switch and the physical switch in the table below, click on all of the virtual and physical machines that Virual OS1 can communicate with. **Virtual OS3 // Physical OS1 // Physical OS2 //Physical OS3 // Physical OS4** 4. You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor’s network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution.) Connect the virtual network interfaces in the virtual machines to the virtual switch // Create a new virtual switch configured for host-only (internal) networking. 5. Match the virtualization feature on the right with the appropriate description on the left. Flexibility: Moving virtual machines between hypervisor hosts Testing: Verifying that security controls are working as designed Server consolidation: Performing a physical-to-virtual migration (P2V) Sandboxing: Isolating a virtual machine from the physical network. 6. You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in- house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines has a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do? (Select two. Each response is one part of the complete solution). Create a new virtual switch configured for bridged (external) networking. // Connect the virtual network interfaces in the virtual machines to the virtual switch 7. What key advantage does a virtual router have over a physical router? Multiple networks can be connected to a single interface 8. You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do? Implement a virtual firewall within the hypervisor. 9. Which of the following statements about virtual NICs are true? (Select two) Virtual NICs need to appropriate driver installed to function. // Multiple virtual NICs can be added to a virtual machine 9.5.3 Practice Questions 1. Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? SaaS 2. Which of the following best describes the platform as a service (PaaS) cloud computer service model? PaaS delivers everything a developer needs to build an application onto the cloud infrastructure. 3. Which of the following are true regarding cloud computing? (Select three) Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser // Cloud computing software, data access, computation, and storage services provided to clients through the internet // The term “cloud” is used as a synonym for the internet 4. Match each description on the left with the appropriate cloud technology on the right. Public cloud: Provides cloud services to just about anyone Private cloud: Provides cloud services to a single organization Community Cloud: Allows cloud services to be shared by several organizations Hybrid cloud: Integrates one cloud service with other cloud services. 10.3.7 Practice Questions 1. You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue? Network Bridge 2. You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points? Same SSID, different channel 3. You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the client to connect. What should you do? Decrease the beacon interval 4. You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do? Configure a profile on the wireless client 5. You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access point. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two) TKIP encryption // Preshared key 10.4.9 Practice Questions 1. What is the risk associated with smart technology used in networked devices such as smart refrigerators, environmental controls, or industrial equipment? They are vulnerable to exploits due to weaker security 2. Which protocol is well known for its use in the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low data transfer rate? Z-wave 3. To optimize your network, you want to configure your wireless AP to use a channel that meets the following criteria:  Non-overlapping  Low utilization  Low interference You performed a spectrum analysis to identify 2.4 GHz wireless channel utilization, as shown in the exhibit. (To read the spectrum analysis, imagine a line coming down from the center of the highest point of each wave. For example, the four waves whose crests are over channel 11 belong to channel 11.) Based on the results, which channel should you configure your wireless AP to use? Channel 1 4. Your wireless network consists of multiple 802.11n access points that are configured as follows:  SSID (hidden): CorpNet  Security: WPA2-PSK using AES  Frequency: 5.7 GHz  Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do? Double the bandwidth assigned per channel to 40 MHz 5. You are designing an update to your client’s wireless network. The existing wireless network uses 802.11g equipment, which your client complains runs too slowly. She wants to upgrade the network to run at 150 Mbps or faster. Due to budget constraints. Your client wants to upgrade the wireless access points in the network this year. Next year, she will upgrade the wireless NICs in the workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation? 802.11n 6. You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation? 802.11n 7. You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz. Which 802.11 standard will work best in this situation? (Select two) 802.11a // 802.11n 8. You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask? (Select three) Is the size of the business expected to grow in the future? // What type of data will be transmitted on the network? // How many devices will need to be supported? 9. You are building a wireless network within and between two buildings. The buildings are separated by more than 3000 feet. The wireless network should meet the following requirements:  Wireless data within Building 1 should be protected with the highest degree of security.  Wireless data within Building 2 should be accessible and permitted by any wireless client.  Wireless signals between Buildings 1 and 2 should be protected with the highest degree of security.  Wireless signals within Buildings 1 and 2 should cover the whole structure, but not extend to the outside. For each location on the image below, you need to select the following:  Antenna option  Security option Drag the items from the list on the left to the location identifier on the right. Items may be used more than once. Not all items will be used. Building 1 – Location A: Right-facing directional antenna // WPA2 with CCMP Building 1 – Location B: Omni-directional antenna // WPA2 with CCMP Building 1 – Location C: Left-facing directional antenna // WPA2 with CCMP Building 1 – Location D: Right-facing high-gain directional antenna // WPA2 with CCMP B: Normal gain directional antenna aimed south C: Normal gain directional antenna aimed north D: Normal gain directional antenna aimed west E: High-gain directional antenna aimed east F: High-gain directional antenna aimed west 2. Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, WPA2 Personal 3. What is the least secure place to locate an access point with an omni-directional antenna when creating a wireless cell? Near a window 4. Which of the following measures will make your wireless network invisible to the casual attacker performing war driving? Disable SSID broadcast 5. Which of the following provides security for wireless networks? WPA 6. Which of the following features are supplied by WPA2 on a wireless network? Encryption 7. You need to configure a wireless network. You want to use WPA2 Enterprise. Which of the following components will be part of your design? (Select two) 802.1x // AES encryption 8. You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication? On a RADIUS server 9. You are the wireless network administrator for your organization. As the size of the organization has grown, you’ve decided to upgrade your wireless network to use 802.1x authentication instead of using preshared keys. To do this, you need to configure a RADIUS server and RADIUS clients. You want the server and the clients to mutually authenticate with each other. What should you do? (Select two. Each response is a part of the complete solution). Configure the RADIUS server with a server certificate // Configure all wireless access points with client certificates. 10. You are designing a wireless network implementation for a small business. The business deals with sensitive customer information, so data emanation must be reduced as much as possible. The floor plan of the office is shown below. Match each type of access point antenna on the left with the appropriate location on the floor plan on the right. Each antenna type can be used once, more than once, or not at all. A: Directional B: Directional C: Omni-directional D: Directional E: Directional F: Directional G: Directional 11. You need to implement a wireless network link between two building on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. What type of wireless antennae should you use on each side of the link? (Select two) High-gain // Directional 12. Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network in his office. What type of security risk is this? Rogue access point 13. An attacker is trying to compromise a wireless network that has been secured using WPA2-PSK and AES. She first tired using AirSnort to capture packets, but found that she couldn’t break the encryption. As an alternative, she used software to configure her laptop to function as an access point. She configured the fake access point with the same SSID as the wireless network she is trying to break into. When wireless clients connect to her access point, she presents them with a web page asking them to enter the WPA2 passphrase. When they do, she then uses it to connect a wireless client to the real access point. Which attack technique did the attacker use in this scenario? (Select two) Evil Twin // Pharming 14. You want to connect your client computer to a wireless access point that is connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of the following must you configure manually on the client? (Select three) AES // SSID // Preshared key 15. Which of the following protocols or mechanisms is used to provide security on a wireless network? (Select three) WPA // IPsec // 802.1x 10.7.8 Practice Questions 1. Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building? Place access points above where most clients are 2. Your wireless network consists of multiple 802.11n access points that are configured as follows:  SSID (hidden): CorpNet  Security: WPA2-PSK using AES  Frequency: 5.75 GHz  Bandwidth per channel: 40 MHz Because of the unique construction of your organization’s facility, there are many locations that do not have a clean line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do? Implement antenna diversity 3. You have physically added a wireless access point to your network and installed a wireless networking card in two laptops running Windows. Neither laptop can find the network, and you have come to the conclusion that you must manually configure the wireless access point (AP). Which of the following values uniquely identify the network AP? SSID 4. You need to place a wireless access point in your two-story building. While trying avoid interference, which of the following is the best location for the access point? On the top floor RouterA(config-if)#encap ppp RouterA(config-if)#ppp auth chap RouterA(config)#username RouterB password cisco 3. Which of the following statements about the functionality of LCP are true? (Select three) Usernames and passwords may be required during the handshake // Data can be compressed at the source and decompressed at the destination // LCP provides multilink support 4. Which of the following are benefits of LCP? (Select three) Negotiates the use (or lack) of authentication before starting the session // Provides load balancing across multiple links // Monitors data dropped on the link and avoids frame looping 5. What connection order would two TCP/IP routers use to open a session with PPP? LCP, authentication, NCP 6. PPP supports authentication, compression, and multiple Network layer protocols. Which of the following correctly sequences these functions when a PPP link is established? Negotiate compression settings, perform authentication, negotiate Network layer protocols 7. Which of the following protocols is used by PPP to enable support for multiple network layer protocols? NCP 8. Two routers with the host names SLC and PROVO have been configured to connect using PPP with CHAP authentication through their BRI0 interface. Attempts to establish session between two routers fail. You check the running configuration on both routers and find the output shown below: What should you do to correct the problem? On SLC, change the username password to chocolate 11.3.5 Practice Questions 1. Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels? ISDN BRI 2. A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas? Satellite 3. You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal? PSTN 4. Which of the following is most susceptible to interference-related to atmospheric conditions? Satellite 5. Which of the following is a characteristic of SDSL? Supports data traffic only (no voice) 6. Which of the following internet connection technologies requires that the location be within a limited distance of the telephone company central office? DSL 7. Which of the following services are available regardless of whether the telephone company network is available? Cable modem 8. Which of the following internet services provides equal upload and download bandwidth? SDSL 9. Which of the following are characteristics of VDSL? (Select two) Supports both data and voice at the same time // Unequal download and upload speeds 10. Which of the following cellular network types provide internet connectivity? (Choose four) HSPA+ // LTE // 4G // EDGE 11. Which type of internet service uses the DOCSIS specification? Coaxial cable 12. Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly? Wireless 13. Which of the following technologies does GSM use to allow multiple connections on the same frequency? Time division multiple access 14. Which of the following cellular network types use MIMI to increase 3G data throughput? (Select two) HSPA+ // LTE 15. Which of the following describe the EDGE cellular technology? (Select two) Offers speeds of 400-1,000 Kbps // The first internet-compatible technology 11.4.5 Practice Questions 1. Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two) TACACS+ // RADIUS 2. You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following is a required part of your configuration? Configure the remote access servers as RADIUS clients 3. Which of the following are characteristics of TACACS+? (Select two) Allows the possibility of three different servers, one each for authentication, authorization, and accounting // Uses TCP 4. Which of the following are differences between RADIUS and TACACS+? RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers 5. Which of the following protocols can be used to centralize remote access authentication? TACACS 6. RADIUS is primarily used for what purpose? Authenticating remote clients before access to the network is granted 7. Which of the following is a characteristic of TACACS+? Encrypts the entire packet, not just authentication packets 8. Which of the following ports are used with TACACS? 49 9. You are configuring your computer to dial up to the internet. What protocol should you use? PPP 10. Which of the following protocols or services is commonly used on cable internet connections for user authentication? 5. You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number of CRC errors displayed. What are the most likely causes? (Select two. Each response is a complete solution) Collisions // EMI or cross-talk on the cable connected to the interface 6. A workstation is connected to a switch on the Gi 0/2 interface using a straight-through cable. The Ethernet interface in the workstation has been manually configured to use a 100 Mbps link speed in full- duplex mode. Which of the following are true in this scenario? (Select three) If the link speed is 1000 Mbps or faster, the full-duplex is used // If the link speed is 10 Mbps or 100 Mbps, half-duplex is used // The switch attempts to sense the link speed. If it can’t, the slowest link speed supported on the interface is selected 7. Considered the network shown in the exhibit. You have been experiencing intermittent connectivity issues with switch2. To check the status of the interfaces, you run the following commands: Siwtch2# show interfaces fa0/1 status Port Name Status Vlan Duplex Speed Type Fa0/1 connected 3 a-half-a-100 10/100BastTX Switch2# show interfaces Gi0/1 status Port Name Status Vlan Duplex Speed Type Gi0/1 connected trunk a-full a-1000 1000BaseTX Switch2# show interfaces Gi0/2 status Port Name Status Vlan Duplex Speed Type Gi0/2 connected trunk a-full a-1000 1000BaseTX What is the issue with this network? The device connect to the Fa0/1 interface has auto-negotiation disabled 8. Your organization recently opened a branch office in a remote area. Because of its location, traditional WAN connectivity was not available, so you contracted with a satellite provider to connect the branch office network to your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? There is latency on the WAN link 9. Your organization recently opened a branch office. You contracted with a WAN service provider to connect the branch office with your home office network. Recently, your CEO conducted a video conference with the employees at the branch office. The employees complained that the video was choppy and the audio was frequently out of sync with the video. What is the most likely cause of this poor WAN performance? The WAN provider is throttling bandwidth on the link 12.2.6 Practice Questions 1. Which of the following is an example of an internal threat? A user accidentally deletes the new product designs. 2. What is the greatest threat to theft of data in most secure organizations? USB devices 3. Which of the following network strategies connects multiple servers together so that if one server fails, the others immediately take over its tasks, preventing a disruption in service? Clustering 4. If an organization shows sufficient due care, which burden is eliminated in the event of a security breach? Negligence 5. Purchasing insurance is what type of response to risk? Transference 6. Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called? Residual risk 7. When is choosing to do nothing about an identified risk acceptable? When the cost of protecting the asset is greater than the potential loss. 8. What is the primary goal of business continuity planning? Maintaining business operations with reduced or restricted infrastructure capabilities or resources 9. In business continuity planning, what is the primary focus of the scope? Business processes 10. When analyzing assets, which analysis method assigns financial values to assets? Quantitative 11. You manage the website for your company. The Web1 server hosts the website. This server has the following configuration:  Dual core processor  Dual power supplies  RAID 5 volume  One RAID controller  Two 1000 Mbps network adapters Which component is a single point of failure for the website? Disk controller 12. You manage a website for your company. The website uses three servers configured in a cluster. Incoming requests are distributed between the three servers. All servers use a shared storage device that holds the website contents. Each server has a single network connection and a single power supply. Considering the availability of your website, which component represents a single point of failure? Website storage 13. When recovery is being performed due to a disaster, which service are to be stabilized first? Mission critical 14. Which of the following is not a valid response to a risk discovered during a risk analysis? Denial 12.3.5 Practice Questions 1. Arrange the steps in the change and configuration management process on the left into correct completion order on the right. Step 1 – Identify the need for a change Step 2 – Conduct a feasibility analysis Step 3 – Define the procedure for implementing the change Step 4 – Notify affected parties of the pending change Step 5 – Implement the change a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a username admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? Move the router to a secure server room. 2. You are an IT consultant and are visiting a new client’s site to become familiar with their network. As you walk around their facility, you note the following:  When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager’s cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock.  The office manager informs you that the organization’s servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.  She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media.  You notice the organization’s network switch is kept in an empty cubicle adjacent to the office manager’s workspace.  You notice that a route/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two) Relocate the switch to the locked server closet // Control access to the work area with locking doors and card readers. 3. Which of the following are solutions that address physical security? (select two) Require identification and name badges for all employees // Escort visitors at all times. 4. Which of the following can be used to stop piggybacking from occurring at a front entrance where employees swipe smart cards to gain entry? Deploy a mantrap 5. Which of the following is not an example of a physical barrier access control mechanism? One-time passwords 6. You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose? PTZ 7. You want to use CCTV as a preventative security measure. Which of the following is a requirement for you plan? Security guards 8. Which of the following CCTV types would you use in areas with little or no light? Infrared 9. Which of the following CCTV camera types lets zoom the focus in and out? Varifocal 10. Which of the following allows for easy exit of an area in the event of an emergency, but prevents entry? (Select two) Double-entry door // Turnstile 11. Which of the following controls is an example of a physical access control method? Locks on doors 12. Five salesmen who work out of your office. They frequently leave their laptops laying on the desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best way to address your concerns? Use cable locks to chain the laptops to the desks 13. Match each physical security control of the left with an appropriate example of that control of the right. Each security control may be used once, more than once, or not at all. Hardened carrier: Protected cable distribution Biometric authentication: Door locks Barricades: Perimeter barrier Emergency escape plans: Safety Alarmed carrier: Protected cable distribution Anti-passback system: Physical access control Emergency lighting: Safety Exterior floodlights: Perimeter barrier 14. You are an IT consultant and are visiting a new client’s site to become familiar with their network. As you walk around their facility, you note the following:  When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager’s cubicle. The receptionist uses a notebook system that is secure to her desk with a cable lock.  The office manager informs you that the organization’s servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.  She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media.  You notice the organization’s network switch is kept in an empty cubicle adjacent to the office manager’s workspace.  You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two) Relocate the switch to the locked server closet // Control access to the work area with locking doors and proximity readers. 15. Which of the following is the most important way to prevent console access to a network switch? Keep the switch in a room that is locked by a keypad. 13.2.5 Practice Questions 1. What is the primary countermeasure to social engineering? Awareness 2. Which of the following are examples of social engineering? (Select two) Shoulder surfing // Dumpster diving 3. How can an organization help prevent social engineering attacks? (Select two) Publish and enforce clearly written security policies // Educate employees on the risks and countermeasures. 4. Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this? Phishing 5. You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you need enter your username and password at a new website so you can manage your email and spam using the new service. What should you do? Verify that the email was sent by the administrator and that this new service is legitimate 6. Which of the following is not a form of social engineering? Impersonating a user by logging on with stolen credentials 7. What is the primary difference between impersonation and masquerading? One is more active, and the other is more passive 8. Which of the following is a common social engineering attack? Hoax virus information emails Configure the software to automatically download the virus definition files as soon as they become available. 14. You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day. What else should you do to protect your system from malware? (Select two) Educate users about malware // Schedule regular full system scans 15. While using the internet, you type the URL of one of your favorite sites in the browser. Instead of going to the correct site, the browser displays a completely different website. When you use the IP address of the web server, the correct site is displayed. Which type of attack has likely occurred? DNS poisoning 13.4.8 Practice Questions 1. As you are helping a user with a computer problem, you notice that she has written her password on a note stuck to her computer monitor. You check the password policy of your company and find that the following settings are currently required: As you are helping a user with a computer problem, you notice that she has written her password on a note stuck to her computer monitor. You check the password policy of your company and find that the following settings are currently required: • Minimum password length = 10 • Minimum password age = 4 • Maximum password age = 30 • Password history = 6 • Account lockout clipping level = 3 • Require complex passwords that include numbers and symbols Which of the following is the best action to take to make remembering passwords easier so that she no longer has to write the password down? Implement end-user training 2. A user named Bob Smith has been assigned a new desktop workstation to complete his day-to-day work. The computer runs Windows 7. When provisioning Bob’s user account in your organization’s domain, you assigned an account name of BSmith with an initial password of bw2Fs3d. At his first logon, Bob is prompted to change his password, so he changes it to Fido, the name of his dog. What should you do to increase the security of Bob’s account? (Select two) Train users not to use passwords that are easy to guess // Require users to set a stronger password upon initial logon 3. In a variation of a brute force attack, an attacker may use a predefined list (dictionary) of common usernames and passwords to gain access to existing user accounts. Which countermeasure best addresses this issue? A strong password policy 4. Which of the following attack is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle? Buffer overflow 5. While using a web-based order form, an attacker enters an unusually large value in the quantity filed. The value entered is large enough to exceed the maximum value supported by the variable type used to store the quantity in the web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the web application processes the order as a return instead of a purchase, and the attacker’s account is refunded a large sum of money. What type of attack has occurred in this scenario? Integer overflow 6. Which of the following is a text file that a website stores on a client’s hard drive to track and record information about the user? Cookie 7. When you browse to a website, a pop-up window tells you that your computer has been infected with a virus. You click on the window to see what the problem is. Later, you find out that the window has installed spyware on your system. What type of attack has occurred? Drive-by download 8. You’ve just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for entry. You’ve backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You configure the management interface with the username admin and the password password. What should you do to increase the security of this device? Use a stronger administrative password 9. Which of the following attacks, if successful, causes a switch to function like a hub? MAC flooding 10. You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this? Client-side scripts 13.5.6 Practice Questions 1. You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You want to make sure that visitors cannot plug their computers into the free network jacks and connect to the network. But employees who plug into those same jacks should be able to connect to the network. What feature should you configure? Port authentication 2. Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts? RADIUS 3. Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two) RADIUS // TACACS+ 4. You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use? EAP 5. You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server? Obtain a certificate from a public PKI 6. Which of the following is a feature of MS-CHAP v2 that is not included in CHAP? Mutual authentication 7. Which of the following actions typically involves the use of 802.1x authentication? (Select two) Controlling access through a wireless access point // Controlling access through a switch 8. When using Kerberos authentication, which of the following terms is used to describe the token that verifies the user’s identity to the target system? Ticket 9. You are a contractor that has agreed to implement a new remote access solution based on a Windows Server 2016 system for a client. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client? EAP 10. Which of the following authentication methods uses tickets to provide single sign-on? Kerberos 3. A VPN is used primarily for which purpose? Support secured communications over an untrusted network 4. You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task? PPTP 5. Which of the following protocols can your portable computer use to connect to your company’s network via a virtual tunnel through the internet? (Select two) PPTP // L2TP 6. IPsec is implemented through two separate protocols. What are these protocols called? (Select two) AH // ESP 7. Which of the following network layer protocols provides authentication and encryption services for IP- based network traffic? IPsec 8. Which of the following statements about SSL VPN are true? (Select two) Encrypts the entire communication session // Uses port 443 9. Which of the following can route Layer 3 protocols across an IP network? GRE 10. You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file? Your copy is the same as the copy posted on the website 11. Which of the following networking devices or services prevents the use of IPsec in most cases? NAT 12. A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement? VPN concentrator 13.8.5 Practice Questions 1. Which of the following attacks tries to associate an incorrect MAC address with an known IP address? ARP poisoning 2. Which of the following best describes the ping of death exploit? An ICMP packet larger than 65,536 bytes 3. Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker’s computer? ARP poisoning 4. As the victim of a Smurf attack, what protection measure is the most effective during the attack? Communicating with your upstream provider 5. You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? (Select two) Change default account passwords // Apply all patches and updates 14.1.9 Practice Questions 1. You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? Port scanner 2. What security mechanism can be used to detect attacks originating on the internet or from within an internal trusted subnet? IDS 3. What actions can a typical passive intrusion detection system (IDS) take when it detects an attack? (Select two) The IDS logs all pertinent data about the intrusion // An alert is generated and delivered via email, the console, or an SNMP trap 4. Which of the following activities are considered passive in regards to the function of an intrusion detection system? (Select two) Listening to network traffic // Monitoring the audit trails on a server 5. An active IDS system often performs which of the following actions (Select two) Perform reverse lookups to identify an intruder // Update filters to block suspect traffic 6. Which of the following is most common detection method used by an IDS? Signature 7. You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis? Update the signature files 8. Which of the following are security devices that perform stateful inspection of packet data, looking for patterns that indicate malicious code? (Select two) IPS // IDS 9. Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. What step must be taken to ensure that the information is useful for maintaining a secure environment? Periodic reviews must be conducted to detect malicious activity or policy violations. 10. You are concerned about attacks directed at your network firewall. You want to be able to identify attacks and be notified of attacks. In addition, you want they system to take immediate action when possible to stop or prevent the attack. Which tool should you use? IPS 11. As a security precaution, you have implemented IPsec between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement? Host-based IDS 12. You are concerned about protecting your network from network-based attacks from the internet. Specifically, you are concerned about zero day attacks (attacks that have not yet been identified or that do no have prescribed protections). Which type of device should you use? Anomaly-based IDS 13. Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the following main intrusion detection and prevention goals? (Select two) Reveals information about an attacker’s methods and gathers evidence for identification or prosecution purpose // Offers attacks a target that occupies their time and attention while distracting them from valid resources. 14. What does a tarpit specifically do to detect and prevent intrusion into your network? Answers connection requests in such a way that the attacking computer is stuck for a period of time. 15. If maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network? Terminate the intruder’s session 4. Why should you store backup media off site? To prevent the same disaster from affecting both the network and the backup media 15.3.5 Practice Questions 1. You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two) Use an SSH client to access the router configuration // Change the default administrative user name and password 2. You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connect to a computer at home. Which protocol should you use? RDP 3. Which of the following protocols or services would you associate with Window’s Remote Desktop Services network traffic? RDP 4. You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have resolved the problem, but you would like to be able to manage the server remotely just in case more issues occur. Which of the following protocols would you use for remote management? (Select two) VNC // ICA 15.4.7 Practice Questions (13 Questions) 15.5.7 Practice Questions (13 Questions) 15.6.8 Practice Questions (15 Questions) 15.7.4 Practice Questions 1. You are the network administrator for a growing business. When you were hired, the organization was small, and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device’s console. The organization has grown considerably in recent months. Now you manage eight individual switches and three routers. It’s becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do? Use syslog to implement centralized logging 2. Which of the following is a standard for sending log messages to a central logging server? Syslog 3. Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Auto-duplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 [...] 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 15387 packets input, 1736263 bytes, 0 no buffer Received 15241 broadcasts, 0 runts, 0 giants 0 input errors, 1 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 watchdog, 0 multicast 0 input packets with dribble condition detected 607 packets output, 6141 bytes, 0 underruns 4 output errors, 10 collisions, 3 interface resets, 0 restarts 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Which of the following statements are true about the fa0/0 interface? (Select three) The interface is dropping incoming packets // Several collisions have occurred // One cyclic redundancy check error has occurred 4. Consider the following log message generated on a router: *Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message? %LINEPROTO 15.8.4 Practice Questions 1. You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do? Implement version 3 of SNMP 2. Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two) Encryption of SNMP messages // Authentication for agents and managers 3. Which protocol uses traps to send notifications from network devices? SNMP 4. Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. Which protocol will the software use to detect the problem? SNMP 16.1.8 Practice Questions (15 Questions) 16.2.5 Practice Questions 1. You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy? Establish the symptoms 2. You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network. You go to the office and see that one of the user’s stiletto heels has broken and exposed some of the wires in the Cat 5 network cable. You have another cable and attach it from the wall plate to the user’s computer. What should you do next in your troubleshooting strategy? Test the solution
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved