QUIZ 14
1. Which
of these should not be updated to reflect the changed state of the
network?
A. Notification
to change
2. Which of these represents the amount of time a
system will be down or unavailable during the implementation of changes?
A. Maintenance
window
3. Which of these is a plan for reversing changes
and recovering from any adverse effects from the changes?
A. Rollback
4. Which of these indicates the way of properly
installing or removing software on the servers?
A. Procedure
5. You have made the release of product plans
available only to the Sales group members. Which tool can prevent the emailing
of a document to anyone other than Sales group members?
A. DLP
6. To what type of devices are the BYOD policies
applied?
A. Mobile
7. Which policy shows the time before a password
can be reused?
A. Password
history
8. Which of the following is not a device hardening
technique?
A. Deploy
an access control vestibule.
9. A network baseline delimits when bandwidth is
available and the amount of that bandwidth.
A. True
10. Which of these connects equipment (inside
plant) to cables and subscriber carrier equipment (outside plant)?
A. MDF
Quiz-15
1. Which of these provides a method to join multiple physical
switches into a single logical switching unit?
A. Switch stacking
2. Which of
the following protocols gives the users a way to configure more than one
physical router to appear as if they were only a single logical one?
A. FHRP
3. Which of the following fire suppression systems is not a good choice for locating computing equipment?
A. Deluge
4. Which site
is a leased facility that contains all the resources needed for full operation?
A. Hot
5. Which of
the following statements is true about the HSRP group?
A. It has only one active router, at least one standby
router, and many listening routers.
6. What is the
HSRP group number of the group with the HSRP MAC address as 0000.0c07.ac0a?
A. 10
7. Which of
the following timers have the default interval of 3 seconds and identifies the
state that each router is in?
A. Hello
8. Which of
these is an IEEE standard (RFC 2338) for router redundancy?
A. VRRP
9. Which of
these is a measure back in time when the data was preserved in a usable format,
most often to the recent backup?
A. RPO
10. Which of
the following backup types does not include the data?
A. System state
Quiz-16
1. Which of the following concerns should the
users have when they encrypt data before sending it?
A. Confidentiality
2. Which of these is not an external threat?
A. Accidental
file deletion by an ex-employee
3. Which of these is maintained by the MITRE
Corporation and includes entries that describe a vulnerability in detail, using
a number and letter system?
A. CVE
4. Which of these is an attack where no known fix
exists?
A. Zero-day
5. Which of these occurs when a threat agent takes
advantage of weakness and uses it to advance an attack?
A. Exploit
6. Which principle specifies that the users should
be given access only to resources required to do their job?
A. Least
privilege
7. Which of the following access methods allows
the new employees to be simply placed in the group and inherit all the required
permissions?
A. Role-based
8. You have decided that the default permission
for all files will be 'No Access'. What principle are you following?
A. Zero
Trust
9. Which of these is a method of checking the
security health of network hosts before they're allowed to access the network?
A. NAC
10. Which of these are you following when you are
encrypting a file, applying access permissions to it, and locking the door to
the room where the server on which the file resides is located?
A. Defense-in-depth
QUIZ-17
1. Which of these is an
AP that is not under the user's control but is used to perform a
hijacking attack?
A. Evil
twin
2. Which of these is connected to the users' wired
infrastructure without their knowledge?
A. Rogue AP
3. Which of these is the process of adopting
another system's MAC address for the purpose of receiving the data meant for
that system?
A. ARP
spoofing
4. Which of the following types of attacks
includes double tagging?
A. VLAN
hopping
5. Which of these was previously known as the
man-in-the-middle attack?
A. On-path
6. In which of these do the attacker and his bots
send a small spoofed 8-byte UDP packet to the vulnerable NTP servers that
request a large amount of data to be sent to the DDoS's target IP address?
A. NTP
7. Which of these is an attack that inundates the
receiving machine with lots of packets that cause the victim to waste resources
by holding connections open?
A. SYN
flood
8. Which of these is a
version of the DoS attack that floods its victim with spoofed broadcast ping
messages?
A. Smurf
9. Which of the following attacks includes the
command and control server?
A. DDoS
10. Which of the following is not a technology-based
attack?
A. Shoulder
surfing
QUIZ-18
1. Where should the users always start their
search for driver updates?
A. Website
of the manufacturer
2. Which of the following conditions should be
included when configuring ACLs between the Internet and the private network to
mitigate security problems?
A. Deny
any addresses from the internal networks.
3. In which of the following systems are users
organized by job into security groups, which are then granted the rights and
permissions required to perform that job?
A. RBAC
4. Which of these is also called whitelisting?
A. Implicit
deny
5. Which of the following statements is true about
the explicit deny approach?
A. All
traffic is allowed unless it is especially denied with a rule
6. Which of these can be used with a wireless
sniffer?
A. MAC
address filter
7. Which of these creates two WLANs in one?
A. Guest
network isolation
8. Which of these defines the area in which an
operation can be performed by using a GPS?
A. Geofencing
9. Which of these is a web page to which the users
are directed when they attempt to connect to the WLAN?
A. Captive
portal
10. Which of these is a role that an IoT device can
play in a botnet?
A. Zombie
QUIZ-19
1. Which of the following types of VPN includes a split tunnel and a full tunnel?
A. Client-to-site
2. Which of these is not an example of a
remote desktop connection?
A. SSH
3. Which of
these operates similar to Telnet, except instead of getting a command-line
prompt as the users do with Telnet, they get the actual GUI of the remote
computer?
A. RDP
4. Which of these was formerly called Terminal
Services Client?
A. Remote
Desktop Connection
5. Which of these allows the users to tunnel
directly to the remote server with no VPN?
A. RDP
Gateway
6. Which of these is a network protocol that is
designed as an alternative to command-based utilities, such as Telnet?
A. SSH
7. Which of the following is not a component of VNC?
A. VNC
desktop
8. Which of these is an operating system image
delivered over the network at each startup?
A. Virtual desktop
9. Which of the following is provisioned for the
most effective way to control both authentication of remote users and the
application of their permissions?
A. AAA
10. Which of the following technologies includes
Integrated Lights-Out?
A. Out-of-band
management
QUIZ-20
1. Which of these includes an open case warning?
A. Tamper
detection
2. Which motion detection system operates by
emitting a magnetic field and monitoring that field?
A. Capacitance
3. Which motion detection system operates by
identifying changes in heat waves in an area?
A. Infrared
4. Which of these is managed using a simple
desktop or mobile software?
A. Smart
locker
5. Which of these was previously known as mantrap?
A. Access
control vestibule
6. Which of these occurs when a legitimate user is
denied authentication in a biometric system?
A. False
negative
7. Which of these are not examples of
multifactor authentication?
A. USB fob
and smart card
8. Which of these comprises a category of devices
that are used to identify and authenticate users?
A. Access
control hardware
9. Which of these is designed to operate using
characteristic and behavioral factors?
A. Biometric
system
10. Which of the following would not be considered a detection method?
A. Employee
training
1)At which layer do the
servers connect on a three-tiered network?
A) Access
2) Which of these is used to
describe network traffic flow that either enters or leaves the data center
from/to a system physically residing outside the data center?
A) North-South
3) Which of these allows for
applications to control and configure the network without human intervention?
A) API
4) Where does the SDN controller interface reside in the
control plane with the switching fabric?
A) Control
plane
5) Which of these is a
process-related standard that outlines best practices for IT asset management
in an organization?
A) 19770-1
6) You have upgraded the firmware
on your switches and access points. Which documentation do you need to update?
A) Physical
network diagram
7) UTP cable has specific colors
for the wire associated with each pin. Based on the TIA/EIA 568B wiring
standard, what is the correct color order, starting with pin 1?
A) White/orange,
orange, white/green, blue, white/blue, green, white/brown, brown
8) Which pins are switched in a crossover
cable?
A) 1 and
3, 2 and 6
9) Which of these governs how a
network is configured and operated as well as how people are expected to behave
on a network?
A) Policies
10) Which virtualization approach runs within a
conventional operating system environment?
A) Type 2
hypervisor
11) Which of these describes
numerous technologies that are able to deliver voice communications over the
Internet or other data networks?
A) VoIP
12) Which of these are the reasons to optimize network performance?
A) Minimizing
latency
Using VoIP
Using video applications
13) Which of these methods are used to connect a
private cloud to a public cloud?
A) Internet
VPN
Direct Connect
14) Public clouds are divided into
logical groupings that allow many different customers to access a section as if
it were their own private data center. This process is known as
___________________.
A) multitenancy
15) When the vendor provides the
hardware platform or data center, and the company installs and manages its own
operating systems and application systems, which service type is being used?
A) Infrastructure
as a Service
16) After a network configuration
change has been made, which of these is not a document that needs to be
updated?
A) Application
document
17) While unexpected adverse effects
of a change can't always be anticipated, a good-faith effort should be made to identify
all possible systems that could be impacted by the change.
A) True
18) Abstracting the cloud hardware
into software objects for automated configuration is referred to as
___________________.
A) Infrastructure
as Code
19) Which of these is included in
the rack security?
A) Swing
handle with a number and a key lock
20) Which of the following
components of virtual networking can perform all the same functions as physical
servers?
A) Virtual
server
QUIZ 22
1) Which
device components should not be allowed to reach full capacity?
A) Memory
CPU
2) Which of the following
statements is true about latency?
A) More
the latency, longer the delay, and longer the users have to stare
blankly back at their computer screen, hoping something happens soon
3) What is the variation in delay
called?
A) Jitter
4) Which SNMP version added support for the GET BULK operations?
A) SNMPv2c
5) Which of these supports strong
authentication with MD5 or SHA, providing confidentiality and data integrity of
messages via DES or DES-256 encryption between agents and managers?
A) SNMPv3
6) Which of the following versions
of SNMP supports plaintext authentication with community strings and uses only
UDP?
A) SNMPv1
7) Which networking protocol uses
OIDs and MIBs for data collection and organization of data?
A) SNMP
8) Which of these is a text string
containing detailed information about the event being reported?
A) Description
9) Which protocol allows the users to display, sort,
and even search messages, all of which makes it a great troubleshooting tool?
A) Syslog
10) Which of the following Syslog
severity level denotes that the system is unusable?
A) Emergency
11) Which of these represents the bi-directional
traffic flow across an Ethernet interface?
A) Full-duplex
12) Which of these mathematically
determines network errors?
A) CRC
13) Which environmental variables are critical factors
in the health of computing equipment?
A) Temperature
Humidity
14) Which of these occurs when a
segment of data fails the addition or deletion of header information?
A) Encapsulation
error
15) What can be the smallest size of
an Ethernet frame?
A) 64
bytes
16) A specific server's baseline describes norms for
factors, such as how busy its processors are and how much of the memory it
uses.
A) True
17) Which of these can refer to the
standard level of performance of a certain device or to the normal operating
capacity for the whole network?
A) Baseline
18) Which of these can collect more
granular information on traffic flows than SNMP is able to?
A) NetFlow
19) Which of these is a
system-design protocol that guarantees a certain amount of operational uptime
during a given period?
A) High
availability
20) Which of these are the metrics that are tracked to
account for utilization in operations?
A) Uptime
Downtime
QUIZ 23
1) You install
new switches in your server room and are now experiencing network instability
and other issues across all servers in the rack. Which device would be used to
alert you of system overheating?
A) Voltage
event recorder
2) Which of the following tools can
test a port on a device?
A) Loopback
plug
3) Which device monitors incoming voltage
levels and overvoltage thresholds?
A) Surge
protector
4) On which of these would a
technician use a punch-down tool?
A) 110
blocks
5) Which tool is used to attach an
RJ-45 connector to Cat 5e, 6, 7, or 8 cables?
A) Crimper
6) Which tool pushes a conductor
between the sides of a V inside an IDC?
A) Punch-down
tool
7) Which device will be used to
locate a specific connection in an unlabeled punch-down block?
A) Toner
probe
8) Which device would be used to
measure voltage?
A) Multimeter
9) Which of these is not a
function of a TDR?
A) Display
unused services.
10) Which software tool looks at all traffic on a network
segment?
A) Packet
sniffer
11) Which device should be used if
you need to determine whether your network meets ISO or TIA standards?
A) Certifiers
12) Which of these can check the
speed and condition of the signal on a cable, measure the time it takes to send
a signal down the wire and back, and find the exact location of a break?
A) TDR
13) What is the purpose of wire-map
testers?
A) To
detect transposed wires, opens, and shorts in twisted-pair cables
14) Which of the following
statements is true about a butt set?
A) It
is essentially a portable telephone that allows the users to
test analog wet or dry lines and is used to monitor those lines.
15) End-to-end loss across an
Ethernet cable is called _______.
A) attenuation
16) You need to create a cable that
will connect your host to a wall jack connection. Which of the following tools
will you use?
A) Snips
17) Which tool would the users use
to both find a break in a fiber-optic connection and test the fiber
connectivity on the network?
A) OTDR
18) Which tool will the users use to
trace cables in multiple-pair wiring?
A) Toner
probe
19) Which of the following
statements is true about a wire-map tester?
A) It is a
device that transmits signals through each wire in a copper twisted-pair cable
to determine if it's connected to the correct pin at the other end.
20) Which of these is a wiring error
where two connections that are supposed to be connected using the two wires of
a twisted-pair cable are instead connected using two wires from different
pairs?
A) Split
pair
Comments
Post a Comment