1. Which of the following technologies is designed
for communication over long distances on networks containing thousands or
millions of users, requiring
complex and
expensive infrastructure?
WAN
2. A user has performed multiple
JSON and XML edits. Which of the following layers of the OSI model relates to
the given operation?
Presentation
3. Which of the following protocols is not
included in the network layer of the OSI model?
SPX
4.According to the OSI model,
which of the following layer devices include more complex switches and routers?
Layer 3
5. Which layer of the OSI model
performs the process-to-process communication using segments?
Transport
6. Which of the following
layers of the OSI model provides delivery and formatting of information for
processing and display?
Presentation
7. Which of these
are the types of PDUs?
Set
Trap
Get
8. Which layer 1 technology allows a single primary rate
interface to deliver multiple voice calls simultaneously?
TDM
Which
of the following statements is true about TDM?
A)
The muxer and demuxer must be firmly synchronized.
10. Depending on the transmission
rate, what is the effective range of multimode fibers?
A)
500-2000 m
11. The simplest way of signaling
is by encoding it into a single binary signal and transmitting it along a wire
or fiber optic cable.
A)
True
12. Which type of connector is one
of the first popular MMF connectors and is increasingly being replaced by
SFF connectors?
A)
ST
13.
Which of the following statements is true about the twist rates in twisted-
pair
cables?
A)
Higher twist rates are more resistant to crosstalk but
need a little more wire for a cable of the same length.
14. Which of the following
statements is true about insertion loss?
A)
0 dB would indicate a perfect and a lossless
connection.
15. Jennifer, a network
administrator, is troubleshooting an expansion card in a computer that allows
the computer to receive faxes over a VoIP line. Which of the following cable
types is used to connect the line to the expansion card?
A)
CAT6
16. Which of the following types
of cables don't need EMI shielding?
A)
Optical
17. Ann, a network technician, is
replacing the existing cables in her company's remote location. She has to
re-install a new cabling solution that will have 10 Gbps speed and can also be
run between the structural and drop-down ceilings providing safety in case of
fires. Which of these will best meet the requirement of Ann?
A)
Plenum, Cat 6a
18. A company's management has
given a list of requirements to the network technician for a LAN connection
using CAT6 cabling in an older building. The technician has to keep the
environmental factors in mind during the network installation. Which of these should
the network technician consider while deciding whether or not to use
plenum-rated cables?
A)
Ceiling airflow condition
19. Which of the following
statements is true about a quick termination connector?
It is a connector with a factory-polished
ferrule already containing a fiber stub.
20. The users in a company have
reported intermittent connectivity issues. When the network technician asked
the users to detail the issue, they said the issue is frequent, happens
anytime, and the cause is unknown. While troubleshooting, the network
technician discovered that the Ethernet cable was running parallel to the
electric cable. What can be the cause of the issue mentioned in the given
scenario?
A)
EMI
21. Which of these is the correct
name of the original Ethernet standard?
A)
10BASE5
22. Which of the following IEEE
802.3 standards supports up to 30 workstations on a single segment?
A)
10Base2
23. The end goal of network
security is minimizing the risk to critical assets. However, to calculate risk,
the users need to know what threats they face and where the network is
vulnerable.
A)
True
24.Which
of the following statements is true about a learning bridge?
A)It can
use the network’s traffic to teach itself the location of any given
address.
25.A network technician in a
company has to assist a security team that wants to capture all traffic on a
single subnet between the router and the core switch. The team has to ensure
that there is only a single collision and a broadcast domain between the router
and the switch to collect the traffic easily. Which of the following devices
should the technician install to meet the goal mentioned in the given scenario?
A)Hub
26.The internal DNS servers
contain the complete list of records but respond only to requests from clients
inside the network.
A)True
27.Which of the following two
needs are balanced using the DNS resolution process?
A)Minimizing
DNS traffic volume and the time needed to update records
28.Services, such as DNS and
DHCP, rely on the rapid exchange of small amounts of data rather than extended
conversations.
A)True
29.Repeaters are used to extend
the range of wireless networks.
A)True
30.Your company has two mail
servers responsible for sending, receiving, and managing emails. Which of the
following network protocols will you use to transfer emails between mail
servers?
A)SMTP
31.Which protocol uses UDP port
123 and allows hosts to get information from a time source either by direct
queries or by listening to broadcast or multicast traffic?
A)NTP
32.TCP’s data unit is called
a router.
A)False
33.Which of the following fields
in the IPv4 packet specifies the current hop limit?
A)TTL
34.Which of the following statements are true about
SSH?
A)It is
an encrypted replacement for telnet and FTP.
It uses TCP port
22.
35.Multiple lower bit rate
streams are combined by a device called a multiplexer.
A)True
36.If the binary values are of
8-bits, the users show the full eight digits even if it starts with 0.
A)True
37.Multicast addressing enables
multiple recipients to receive messages without flooding the messages to all
hosts on a broadcast domain.
A)True
38.Which of the following statements
is true about the unique local addresses?
A)They
were designed to replace site-local addresses, so they allow
communication throughout a site while being routable to multiple local
networks.
39.To create subnetworks, the
users take bits from the host portion of the IP address and reserve them to
define the subnet address.
A)True
40.Which of the following system
ports is sometimes called the registered port?
A)User
41.Static routing does not scale
well in large networks, but dynamic routing does. Why is it so?
A)Because
network routes are automatically added to the routing table via the
routing protocol
42.Which of the following are not considered
link-state routing protocols?
A)RIP
RIPv2and
43. Markus, a network analyst,
wants to create broadcast domains to eliminate the need for expensive routers.
Which of these will help him to accomplish the task?
A)VLANand
44. How many broadcast domains are
created when an unmanaged 12-port switch is used?
A)1and
45. Jane, a user on a company's
network, is not able to access the shared printer and other resources. However,
she can reach the Internet. Other users are not having any such problem. What
can be the cause of the issue mentioned in the given scenario?
A)Incorrect VLAN
assignment
46.Which of the following
security features is designed to prevent DoS and reconnaissance attacks, which
utilize the control plane of software-defined networks?
A)CoPPand
47. On Wi-Fi networks, both WEP
and WPA-TKIP use the RC4 cipher, but WEP’s implementation is far more
vulnerable to attack.
A)True
48.Which type of cryptographic
technology can be used for authentication and non-repudiation?
A)Asymmetric
49.Your wireless network is configured with WEP
encryption and has a limited number of users. You notice that there are some
unauthorized connections on your access point. Which of the following steps
will you take to enhance the security of your network?
A)Configure WPA
encryption.
Configure MAC
filtering.
50.Which of the following SNMP
versions has no significant security features, and the devices only respond to
messages containing the correct community name string?
A)SNMPv1
51.Syslog uses a relatively
simple client-server model.
A)True
52.Which of the following
disasters is not included in the accidents and disasters category during
threat assessment?
A)Equipment failure
53. Which of the following methods are available for
hardening network devices?
A)Disable unnecessary
services to prevent their compromise.
Apply
all firmware security updates.
Disable unnecessary switch
ports and network interfaces to prevent unauthorized connections.
54.A network technician has
configured a VLAN for the Sales and Accounts department of a company. The users
of each department are located on different floors of the office. The network
technician decides to educate the users regarding the VLAN configuration. Which
of these will help the network technician to easily make the users understand
the VLAN configuration?
A)Physical network diagram
55.Which of the following
statements is true about fire suppression?
A)Class A
(flammable solids), Class B (flammable liquids), and Class D (combustible
metal) extinguishers should only be placed or used near fire hazards of their
appropriate types.
56.During lengthy outages, a UPS
is an ideal way to prevent interruption while the users turn on the generator.
A)True
57.Which of the following
statements is true about non-repudiation?
A)The
authenticity is verified in a way that even its creator can’t
dispute.
58)How is the
core of information security commonly summed up?
A)By the
CIA triad
59.While securing the
applications, the users must establish policies for acceptable and unacceptable
applications on network hosts.
A)True
60.Which of the following
statements is true regarding the process of restricting permissions using the principle
of least privilege?
A)Use
extra auditing for privileged accounts, such as administrators.
61.A company is concerned about
the possible attacks on its network by the attackers to gain access to
confidential research data. Which of these is a type of vulnerable system that
could be implemented to redirect any attackers on the network?
A)Honeypot
62.Networks commonly apply
cryptographic protections where an attack is most likely to occur, for
authentication processes, for particular types of traffic, or specific physical
network segments.
A)Trueand
63. A
company provides its sales managers access to the company's network from remote
locations. The sales managers use laptops to connect to the network. For
security purposes, the company's management wants the sales managers to log on
to the network using smart cards over a remote connection. Which authentication
protocol should be used to accomplish the goal mentioned in the given scenario?
A)EAPand
64. Smith, a network
administrator, is hardening an authentication server. One of the primary
requirements is to manage access control to several services by using one
centralized authentication server. Which of the following technologies should
Smith configure?
A)Kerberos
65.Authorization is vital,
especially against insider attacks, and as long as any access is associated
with a specific user, that user can be assigned specific permissions.
A)True
66. In which of the following
types of assessments do the users need to consider security risks through the
supply chain?
A)Vendor
67. Agentless SIEM relies on
packet captures or remote access protocols, such as SNMP and Syslog.
A)Trueand
68. Which type of attack works
well against the word-based or name-based passwords many users choose for ease
of memory?
A)Dictionary
69.The terms virus and worm are
often used interchangeably and are therefore easily confused. How are they
differentiated?
A)On the
basis of how they are spread
70.Which of these are considered social engineering
attacks?
A)Phishing
Piggybackingand
Shoulder surfing
71.Jennifer, a network analyst,
has been tasked to limit the users that can connect to a network printer
located centrally within an office environment. Which of the following tools
will Jennifer use to complete this task?
A)ACL
72.Which of these was the most
common reason for BSOD errors and system reboots in the older versions of
Windows?
A)Failure
of the graphics driver
73.Which of the following terms
examines the packet origins at a network's periphery to restrict the outside
traffic?
A)Edge control
74.Which of the following
statements is true about biometrics?
A)Inherence elements that
are based on personal physical characteristics are called biometrics.
75.Joey, a security analyst, is
tasked to implement multi-factor authentication in a company. On the basis of
the authentication factors, which of the following are the best implementations
that he should deploy?
A)Biometrics,
smart cards, and strong passwords
76.Why a password written on a
slip of paper is a knowledge factor?
A)Because
it’s meant to be remembered
77.Which of the following
statements is true with regards to securing
authentication
and identity management?
A)Ensure
that network-based authentication uses secure protocols.
78.Which of the following is not
an example of using network segmentation to control traffic through the
internal network?
A)Enable
DHCP snooping, dynamic ARP inspection, and (for IPv6) RA guard.
79.Which of the following
incident goals ensures that incident prevention and
A)response
follow the organization’s policies plus any relevant laws, business agreements,
or generally expected industry practices?
A)Regulatory compliance
80.Which of these is not a
symmetric algorithm?
A)MD5and
81. Which
of these is a proprietary protocol used by Cisco routers?
A)NetFlowand
82. A technician is setting up a
direct connection between two older PCs so they can communicate but not be on the
corporate network. The technician does not have access to a spare switch but
does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician
cuts off one end of the cable. Which of the following pin mappings represent
what the technician should do to make a crossover cable before crimping the new
plug?
A)1 >
3, 2 > 6, 3 > 1, and 6 > 2
83.A technician is
troubleshooting a point-to-point fiber-optic connection at a remote site of a
company that has no connectivity to the main site. The technician verifies that
the switch and the send-and-receive light levels are within an acceptable
range. Also, both fiber SFPs are confirmed as working. Which of these should
the technician use to reveal the location of the fault?
A)OTDRand
84. Which of the following
vulnerability scanning tools is also known as a sniffer?
A)Protocol analyser
85.A network technician is
receiving complaints from the management board that they are unable to do
meetings from the conference room. The network is too slow, and there are
frequent disconnections. The network technician finds that the conference room
and cafeteria are located on either side of a single hallway where there is
only one access point. He also observers that there is a large number of people
in the cafeteria. Which of these best describes the cause of the issue
mentioned in the given scenario?
A)Overcapacity
86.The chief information officer
has noticed that the corporate wireless signal is available in the parking lot.
Now, the management requests the network administrator to change the wireless
network so that it is no longer accessible in public areas without affecting
the availability inside the building. Which of these should the network
administrator change on the wireless network?
A)Power levels
87.A network technician is
troubleshooting a wireless connectivity issue in a small building where the
tenants access multiple wireless networks. The users report intermittent
connectivity. Which of the following is the most likely cause of the
problem?
A)Channel overlap
88.A network technician has
recently installed a new wireless access point on the company's wireless
network. All the settings for the new access point were copied from the
baseline. Due to this change, the network technician is getting reports from
the sales department that they are having irregular wireless connectivity,
while other departments are having no such problem. What can be the possible
cause of the issue mentioned in the given scenario?
A)Incorrect AP
placement
89.If there is a difference of 1
dB between two signals, then what will be its ratio?
A)1.26and
90. In a NetFlow system, what are
the devices that identify network flows called?
A)Flow exporters
91.Adam, a user, reports to you
that he is unable to communicate with a particular IP address on the company's
network. You have addressed the issue and, now, you need to find where the
traffic is stopping. Which of the following commands will you use?
A)tracertand
92. Which of these is used when a
host joins a network or is assigned a new MAC address?
A)ARP announcement
93.Roy,
a network administrator, needs to delete the DNS cache and the current cache
that has incorrect entries. Which of the following parameters will he use?
A)/flushdns
94.Consider the
following command:
A)The users
can use these options to change the command’s functions.
The server hosting resources ask for credentials, and the
client provides them.
Which of the following networks connects multiple LANs using long-range transmission media?
WAN
James, a network engineer, is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following networks will James implement?
MAN
Ethernet is not only the standard used for almost all modern wired LANs, it’s also increasingly being used for telecommunications and storage networks and is even increasingly adopted as a WAN technology.
True
Which of the following technologies is used to connect private devices?
PAN
Which of the following standards are used within the telecommunication networks?
MPLS
Frame Relay
Internet is an example of the largest WAN.
True
A LAN could have hundreds or thousands of nodes.
True
SDWAN is a virtual WAN architecture that uses software to manage connectivity, devices, and services and can make changes in the network that is based on the current operations.
True
A WAN operates using leased lines from a telecommunication provider, connecting to the LANs in each site.
True
Which of the following statements are true about networks?
In a logical network, connections are the protocols that
guide data to its destination address.
Radio signals are part of the physical network.
Which of these is a primary concern for WANs?
Security
Which type of network scope is often used to connect all or parts of a city?
MAN
Which of the following statements are true about a logical network?
It is the information carried by the physical network.
It is the network from the perspective of the computers that use it.
It is the path that the information follows.
Which of these implies a line topology with reference to the point-to-point connections?
Bus
An effective network’s topology is a matter of planning, not organic growth.
True
Essential WAN technologies include user-level connections, such as cable, DSL, or 4G.
True
Which of these is a standardized rule for formatting data?
Protocol
Tasks, such as data compression, decompression, encryption, and decryption, are all associated with the presentation layer of the OSI model.
True
Which of the following statements is correct about sessions in the session layer of the OSI model?
They must be created, maintained separately from other sessions, and ended.
Which of the following statements are not true about the OSI model?
It describes network communication in terms of the underlying network technology or structure.
It is a suite of protocols that serves as the world's primary network standard.
Which of the following statements is true about the data link layer of the OSI model?
It is subdivided into two sublayers, namely, MAC and LLC.
Which of the following statements is correct about the OSI model in networking?
It is made up of seven layers arranged vertically in what is called a stack.
A communication protocol or network appliance can be described by the layer it occupies.
The transport layer of the OSI model translates the data between network packets and also the data used by applications.
True
The OSI model is more general and widely used by network engineers to discuss network theory, but most protocols that the users use daily were written as part of the TCP/IP model.
True
Which of the following statements is true about the twisted-pair cables?
Each balanced pair is warped around itself for the cable’s length, so even a nearby source, such as a parallel cable, will, on average, balance out.
APC connectors can be used only with other APC connectors.
True
Which type of cable uses low-smoke and fire-retardant materials?
Plenum
Ethernet addressing uses the MAC address burned into each and every Ethernet NIC.
True
Which of these are the common representations of binary values?
Hexadecimal
Octal
What is the correct distance range of 1000BaseLX?
From 3 km up to 10 km
Which of the following actions are taken by a learning bridge when it checks the destination address against its MAC table?
If the destination is on the same segment as the source, it filters the frame by ignoring it.
If the destination is in the table and on a different segment from that source, it forwards the frame to only that segment.
If the destination address isn’t in the table, it floods the frame to all other segments except the source.
A network technician has to perform maintenance on many of the company's web servers during a scheduled change window. This maintenance should not affect the service availability. Which of the following network devices should the network technician use for this purpose?
Load balancer
Which of these is not considered a network device?
Media
Which DNS record is an IPv6 address record that maps a hostname to an IPv6 address?
AAAA
Which of the following statements is true about the networking concepts?
A repeater is a node on the physical network.
Which of these best describes network reliability?
Minimal transmission errors, and detection and correction of any that do occur
The MIB is a database with a set of predefined questions that the NMS can ask the agents regarding the health of the device or network.
True
Why is the TCP/IP model in such wide use, despite its
limitations?
It proved so robust and scalable that it was quickly
adopted by the US government and research networks that formed the early
Internet.
Which of the following statements is correct about SMB?
It allows folders or hard
drives to be shared over the network and accessed as if they were local drives.
Which of the following
are the resource-sharing protocols?
LDAP
SMB
What is the port number of SMB?
TCP 445
Which of the following IP addresses is reserved for private
use?
10.100.200.0
Which of the following would be the most efficient
subnet mask for a subnetwork accommodating eight hosts?
/28
A network technician in a company has to create a subnet for
500 host machines. The technician is instructed to use a class B address scheme
and leave possible rooms for additional subnets of the same size. Which of the
following addresses would fulfill these requirements?
172.18.0.0/23
A technician is troubleshooting a customer's network
connectivity issue. He needs to determine the IP address of the customer's
router. The customer has an IP address of 192.168.1.55/24. Which of these is
the address of the customer's router?
192.168.1.1
A company is setting up a new branch office. The new office
will have two departments, Finance and Engineering. The Finance department will
have 55 employees and the Engineering department will have 5 employees. The IP
subscribed from the ISP is 192.168.1.0/29. The network administrator is
configuring the subnets for the two departments starting with the Finance
department. What will be the last host address on the Engineering subnet?
192.168.1.78
A network technician has to set up a firewall on a company's
network that would assign private IP addresses to users inside the network and
show a public IP address out to the Internet. Which of these should the network
technician use to achieve this goal?
NAT
The original intention of NAT was to slow the depletion of
available IP address space by allowing many private IP addresses to be
represented by some smaller number of public IP addresses.
True
Why is a routing table more complicated than a MAC table on a
switch?
Because each entry has to have more
pieces of information
Both RIPv1 and RIPv2 are distance-vector protocols, which
means that each router running RIP sends its complete routing tables out to all
active interfaces at periodic time intervals.
True
Which of the following statements is true about RIP?
Since it has a maximum
allowable hop count of 15 by default, a hop count of 16 would be deemed
unreachable.
Which of these is not a distinct function of the layer
2 switches?
Easy maintenance
Which of the following statements is true
regarding network convergence?
High-performance TCP/IP networks
augmented by additional technologies are increasingly displacing other options.
Which of the cellular technologies is a type of cell phone
that contains a SIM chip?
GSM
An ad hoc network would not scale well and is not recommended
due to collision and organization issues.
True
What should you do if you cannot connect to an AP and you've
verified that your DHCP configuration and WEP key are correct?
Check the MAC address
filtering on the AP.
Which of the following statements is true about the input
errors?
They often indicate high-level
errors, such as CRCs.
Which of these is not a category of the cause of
disaster in a disaster recovery plan?
Technical
Which of the following protocols allows active-active load
balancing?
GLBP
Which of the following statements is true about
the dial-up access?
Some ISPs offer dial-up access
to users who subscribe to other services.
An attacker floods a switch with frames in an attempt to
redirect traffic to his server. Which of the following attacks is the attacker most
likely using?
ARP spoofing
An attacker, after gaining access to a facility, places a
wireless access point to make it look as though it belongs to the network. He
then begins eavesdropping on the wireless traffic. Which of the following
attacks has the attacker performed?
Evil twin
A hospital has installed CCTVs on all the entrances and
hallways to monitor the people entering and leaving the facility. The camera
feeds go to the surveillance room where security personnel monitors the
activities. One of the security personnel notices a man wearing a doctor's lab
coat whose identity cannot be verified by looking through the video feed. The
man is seen interacting and mobilizing with other people around him. What kind
of attack is the security personnel witnessing?
Social engineering
Which of the following statements is true about RBAC?
It is commonly used in
networks to simplify the process of assigning new users the permission required
to perform a job role.
A network technician configured a network device. After
restarting, the device was unresponsive. Even after doing a hard reset, the
device was not restored to factory defaults and did not display any output.
Which of these has the technician most likely performed?
Firmware update
A company wants to secure its WLAN network by implementing a
method that will provide a web page before the users ask for authentication
credentials while allowing them access to the network. Which of these will help
in satisfying this requirement?
Captive portal
The most effective way to control both authentication of
remote users and the application of their permissions is to provision an AAA
server.
True
A network administrator has to implement a physical security
control method that can prevent an attacker from gaining access to a network
closet or server room. Which of these will help the network administrator in
achieving this goal?
Mantrap
Which of the following combinations will form a two-factor
authentication process?
Smart card and PIN
Which of the following statements is true about access
control hardware?
It comprises a category of
devices that are used to identify and authenticate users.
Which of these is a technique that writes data patterns over
the entire media, thereby eliminating any trace data?
Overwriting
Which of the following services provides the desktop and
other resources?
DaaS
QoS refers to the way the resources are controlled so that
the quality of service is maintained.
True
Which of these are installed in racks, such as servers,
firewall appliances, and redundant power supplies?
System labeling
A network administrator is setting up a web-based application
that needs to be continually accessible to the end-users. Which of the
following concepts would best ensure this requirement?
High availability
High memory utilization can be as severe as a saturated CPU.
True
Decibels can be used to describe the absolute power level of
a signal that’s being sent or received or the relative losses due to the
transmission medium.
True
Loopback adapters are only useful to verify that the port
transmits and receives electronics successfully.
True
A laser transmission would stay in a tight beam and only
suffer attenuation due to absorption by the air.
True
Which of the following statements is true about SNR?
The higher the SNR, the lower the noise floor with
respect to the signal.
Members of a basic service set share a 48-bit identifier
compatible with the MAC standard and included in every Wi-Fi frame sent by its
members. What is this identifier called?
BSSID
Which of these are some
of the calamities that the users should escalate while implementing the
solution during network troubleshooting?
Routing loops
Routing problems
Broadcast storms
Which of the following is not the step for testing a
theory when troubleshooting?
Measure the plausibility
of the theory against the most obvious cause of the problem.
On the network, you don’t just need to know what the matter
is, but you need to know how many users are affected. Which of the following
steps of problem identification is explained in the given information?
Identify the symptoms.
Which of these describes the resolution of a problem while
troubleshooting the network?
Planning and implementing a fix for
the problem
Which of these is not a general guideline for
establishing the probable cause of a network problem?
Consider only the most relevant
approach.
While troubleshooting a network, it's important to view the
identification of a problem as an ongoing process.
True
The important troubleshooting process for Network+ is
CompTIA's five-step model.
False
Which of the following
procedures are employed when identifying a network problem?
Determine if anything has changed.
Question users.
Approach multiple problems
individually.
Which of the following
statements are true about network troubleshooting?
The users can solve a
surprising amount of problems by fiddling with one piece of a system after
another until things work.
The important thing is
that the specific methods find a complete process and stick to it,
especially during the diagnosis process.
Using a systematic process
will give the users quicker and more consistent results.
Which TCP/IP tool supersedes the ifconfig, arp, and route
commands?
ip
Which of the following TCP/IP tools tests the reachability
and latency of a given host?
Ping
Which of the following TCP/IP tools is a more powerful
alternative to nslookup for performing DNS lookups?
dig
WAN
Which specific type of network configuration is often used in
the case of a single institution consisting of multiple and collocated
buildings?
CAN
A junior network technician is configuring voice control of
devices in the CEO's cabin. Which type of IoT network is established in the
given scenario?
PAN
Which topology consists of two distinct and terminated ends,
with each of its computers connecting to one unbroken cable running its entire
length?
Bus
A node on the logical network isn’t described by its physical
location but rather by its address.
True
Which of the following leased line has a maximum data rate of
1.544 Mbps?
T1
NFV is the process of taking networking functions (such as
routers, switches, firewalls, load balancers, and controllers) and virtualizing
them.
True
The network layer of the OSI model is responsible for
identifying and establishing the availability of the intended communication
partner and determining whether sufficient resources for the requested
communication exist.
False
Which of these is not included in the layer 2 protocol
of the OSI model?
IPv4 protocol
Which of the following
statements are true about the presentation layer of the OSI model?
It controls the formatting and
security of data.
It is sometimes called the
syntax layer.
Which of the following layers of the OSI model translates
physical layer bits to and from ordered packets called frames, transfers them
between nodes, and optionally receives acknowledgment of their receipt?
Data link
Which of the following components is the transparent optical
fiber that carries the signal and is made out of silica glass, which is far
more transparent than ordinary consumer glass?
Core
Why is return loss a
problem?
Because it causes interference
Because less signal reaches
the receiver
Some connections use intelligent demarc that performs signal
translation or routing.
True
If an Ethernet segment needs to connect to another segment
that uses Wi-Fi, Token Ring, or even a different Ethernet speed, a repeater can
join them.
False
Broadband is frequently used for referring to fast Internet
connections instead of slow ones.
True
A narrowband transmission is highly susceptible to
interference, either from noise sources or another network or electronic device
using the same channel.
True
What is the wavelength of MMF?
Around 850 nm or 1300 nm
Which of the following devices should a network administrator
configure on the outermost part of a network?
Firewall
Which of the following
statements are correct about network connectivity?
The target system must be able
to recognize and act on the data it receives.
There must be a physical
connection between all points on the network.
Each system on the network
must be able to transmit information to any other system with which it might
want to communicate.
Which of the following
statements are true about load balancer configurations?
In the round-robin method, servers
are listed in order, and each request goes to the server next in line.
The least-connection method is more
complicated to implement than round-robin, but it’s better able to deal with
services that have variable session lengths.
In which of the following methods, each incoming connection
goes to the server with the fewest active connections?
Least connection
What is the purpose of a load balancer?
To deploy a hardware or
software appliance designed to transparently combine distributed services into
a single and virtual whole
What is the purpose of health checking in load balancing
devices?
To track the functionality of
each server in the load balancing pool and remove it in the case of a failure
Which of these is not a primary method of
load-balancer configuration?
Priority weighting
Which of the following layer 1 devices connects multiple
nodes into a star configuration?
Hub
Which of the following
statements are true about a hub?
A hub has no memory for storing
data.
It's similar to a
repeater with more than two ports.
Connections to a hub are always effectively half-duplex.
Each connection to the hub is its own electrical connection
but part of the same overall collision domain.
True
VoIP is used not only in voice chat apps but also in many
phones.
True
Which of these are
examples of IoT devices?
A smartphone app for your home
thermostat
A remotely monitored cardiac
pacemaker
A refrigerator with an
internal camera
The simplest repeater has ports listening in two directions
along a cable.
True
The users would use a bridge in a network to reduce
collisions within broadcast domains and to increase the number of collision
domains in their network.
True
Ann, a network technician, has set up an FTP server for a
company to distribute software updates for the company's products. For security
reasons, each customer is provided with a unique username and password. Several
customers have discovered a virus in one of the security updates. The network
technician tested all files before uploading them but on retesting the file,
found the virus. Which of these should the network technician do for the
customers to validate the proper security patch?
Provide an MD5 hash for each
file.
Which of the following well-known ports do the users use to
configure outgoing mail on a POP3 email client?
25
Layer 3 devices need a control protocol for sending
diagnostic and error information relevant to layer 3.
True
The most common use for MySQL is for creating a manual
database.
False
Which of these is a designation used in routing to send
packets to a remote network?
Network address
Which of the following IP addresses is a local host that the
router has already spotted via Ethernet traffic and added to the table?
192.168.100.24
In networks using IPv6 tunneling, an IPv6 packet can be
carried as the payload of an IPv4 packet.
True
Which of these would be the most efficient subnet mask
for a point-to-point link?
/30
Which of the following terms represents a higher layer router
that uses NAT to split server requests between multiple identical servers?
Content switch
NAT is great to have around when an organization changes its
ISP and the networking manager doesn't want the hassle of changing the internal
address scheme.
True
Which of the following commands is used to view or alter the
routing table?
Route
A network administrator has configured RIPv2 as the routing
protocol for the company's network. Which metric will be in use for deciding
the best path to the network?
Hop count
What happens when a switching loop floods the network
repeatedly?
Broadcast storm
Which of the following statements is true about STP?
It is standardized as IEEE
802.1D.
STP is used by switches to communicate their relative
positions and detect redundant links.
True
A properly designed VLAN-based network only routes a minority
of traffic, while most packets remain within their VLAN.
True
Which of the following statements is true about VLANs?
They aren’t a single standard but
rather a collection of method switches that can be used to partition broadcast
domains.
You are installing an
ADSL router for your company's new branch office. The router has a switch
module containing four Ethernet ports, all of which are assigned to the default
VLAN named VLAN1. When you plug a laptop into one of the Ethernet ports, you
can access the Internet with no difficulties. Now, you need to connect the ADSL
router to the company's network so that the wireless access points on the
network can provide the users with Internet access through the ADSL router.
However, when you plug the router into a network switch port that is assigned
to VLAN4, the switch starts generating 'Native VLAN mismatch detected' errors
once every minute. Which of the following steps should be a part of the
solution that you implement to stop the error messages from appearing?
Create a VLAN4 on the ADSL router's
switch module.
Configure the router port
connected to the network switch to use VLAN4.
Switches can create multiple broadcast domains by
partitioning the network into the software. What are these domains called?
VLANs
All ports on the root switch are designated ports that
forward the traffic they receive from their segment.
True
Which of the following technologies lets the switch bind
multiple physical ports into a single logical interface?
Port aggregation
Which of the following statements is true regarding LACP?
It allows ports to be
configured as active or passive.
Network taps and port mirrors should be placed on chokepoints
for critical traffic.
True
What is the other name for the current 802.11ax Wi-Fi
standard?
Wi-Fi 6
A network technician is setting up a wireless access point
for a SOHO location. The user has demanded exclusive use of the 5GHz band.
Which of the following wireless standards should the network technician use for
the purpose mentioned in the given scenario?
802.11ac
Which of the following
standards utilize MIMO on non-overlapping channels?
802.11ac
802.11n
Which of the following statements is true about the original
1997 802.11 standards?
It only supported network
speeds of 2 Mbps.
Which wireless standard uses the 800-900 MHz ISM band with
precise frequencies varying by country?
Z-wave
What is the primary purpose of SSID?
To allow devices to
self-identify as members of a single interoperating logical network segment
A network technician is
setting up a new wireless network. With the WPA2 standard in use, which of these
will provide both data confidentiality and data integrity?
AES
CCMP
Which of these can be
used to authenticate remote workers connecting from an offsite location?
RADIUS server
802.1X
Ad hoc networks are created peer to peer or directly between
stations and not through an AP.
True
A high-latency network connection is one that experiences
short delay times, while a low-latency connection suffers from long delays.
False
An organization's security policy requires that when new
devices are introduced to the network, the devices must be monitored to
establish normal traffic patterns. Which of these is generated from the initial
monitoring of the devices?
Baseline
Which of the following
are the functions of load balancing?
TCP offloading
Content caching
Priority queuing
Link aggregation can be used on routers or even hosts with
multiple interfaces, where it’s more commonly known as NIC teaming.
True
Which of these makes
clustering a less desirable option than load balancing?
It requires identical or
nearly identical hardware for each node.
It doesn’t work as well for
some services.
It can be more complicated to
configure.
Which of the following spares is connected, powered on, and
ready to serve as an automatic failover if the primary connection fails?
Hot
A company recently faced an attack on its network
infrastructure. On further inspection, it was found that the attacker exploited
the vulnerabilities resulting from open switch ports. The CIO has instructed
the network administrator that he not only wants the network to be secure but
also would like to monitor any attack in the future. Which of these should the
network administrator implement to achieve the goal mentioned in the given
scenario?
Create a VLAN with honeypots.
A network technician has been given permission to exploit a
weakness in the company's network. Which process is described in the given
scenario?
Penetration testing
The attackers use the monlist command, which is a remote
command in older versions of NTP, that sends the requester a list of the last
600 hosts who have connected to that server.
True
A disgruntled employee performs a man-in-the-middle attack on
a company's network. All the layer 2 traffic, which was destined for the
default gateway, is redirected to the employee's network. What kind of attack
has the employee performed?
ARP cache poisoning
A network administrator discovers multiple attempts to scan
network hosts and devices originating from a single host on the network. Which
of the following threats is most likely involved in the given scenario?
Compromised system
An organization has been facing an increased number of
successful social engineering attacks. Which of these can help in reducing
these attacks in the near future?
End-user awareness training
In an organization, many users are reporting that they are
unable to access the Internet in the evening. Users working the day shift are
not having such a problem. Which of these can be the cause of this issue?
Time-based ACL
A company has provided kiosks to employees within the
organization's boundaries. However, some of the kiosks are in close proximity
to a shopping center. The management is concerned about someone accessing the
Internet via the kiosk's wireless network. The network technician has been
asked to implement a solution that will provide wireless access only to the employees
working at the kiosk. Which of these should the network technician implement?
Switch port security
Your supervisor has asked
you to increase the security of the servers on your network. Which of the
following procedures can be considered to be the server hardening techniques?
Disabling unnecessary services
Creating privileged user
accounts
Disabling unused TCP and UDP
ports
The inverse-square law applied to antenna placement dictates
that if the distance from the antenna to the receiving device is doubled, then
the signal will drop by how much?
6 dB
To ensure security, the users need to install new
certificates or generate new SSH keys when deploying a device.
True
Ann, a network technician, has to implement a physical
security control that will allow her to detect any intrusion into the server
room. Which of the following physical security controls will be most
suitable for the purpose mentioned in the given scenario?
CCTVs
Which of the following types of cameras are helpful in low-traffic
areas, where full-time recording might waste network bandwidth or storage
space?
Motion-sensitive
A company wants a cloud service solution that can provide a
deployment platform for its applications, and it doesn't need to worry about
the infrastructure requirements. Which of the following cloud services should
be used for the purpose mentioned in the given scenario?
PaaS
A new employee is assigned a laptop by the network
administrator, which was assigned to someone else in the company. Upon
delivering the laptop to the new employee, the administrator documents the new
location, the employee's name, and when the device was reassigned. Which of
these best describes the actions mentioned in the given scenario?
Asset management
Which backup strategy contains the changes in data since the
last full backup?
Differential
Which of these are the
characteristics of jumbo frames?
MTU > 1500
Improves network performance
Used in SAN
Which of the following statements is true regarding the
applications of heightened scrutiny to network applications?
Use secure alternatives to
insecure protocols, such as HTTPS and SSH, instead of HTTP and Telnet.
Which of these frequently reports RSSI as a negative dBm
measurement?
Wi-Fi analyzer
Which of the following formulas can be used to express EIRP
in decibels?
EIRP = ERP + 2.15
Which of the following approaches starts in the middle of the
stack and can be quicker than the top-to-bottom and bottom-to-top approaches?
Divide-and-conquer
A network technician, while troubleshooting a Linux system,
wants to display the associated IP address of a network adapter. Which of the
following commands should he use?
Ifconfig
You are working at the IT help desk when
a user calls to report that he cannot access the Internet, although he can
connect to the computers on the local network. At the user's workstation, you
run the ipconfig /all
command and examine the output. Which of the following
options is the most likely explanation for the user's problem, based on
the given ipconfig results?
The 'Default Gateway' setting is
incorrect.
Which of the following ping commands specifies the time stamp
for count hops in IPv4 addresses only?
ping -s count
A user reports an issue to a network technician that he is
unable to connect to the server. The user has Linux OS installed on his system.
Which of the following commands should the network technician use to test the
connectivity issue between two network devices?
ping
Comments
Post a Comment