V18739 Quiz
V18739 Quiz
A layman asks you about DHCP and wants to know DHCP allows hosts to obtain IP address
6.7 the purpose of it. What would be your BEST information automatically to avoid configuring
explanation? hosts individually
As a network tech, what would be an indicator
6.8 that a rogue DHCP server is connected to your Your IP address is in a different network
network?
8.11
Essentially, what is the BEST description for the It ensures that daylight savings time is always
use
NTPofis Network Time
valuable in theProtocol (NTP)?
sense that it can synchronize accurate
time based on much higher-level systems. While
daylight savings time plays a factor, this is not the Top-level devices get their time from the top of
8.12 TRUE
A purpose
network techofset
NTP.
up It cannotserver
a DHCP manage witha alocal
scope the hierarchy, and any other device’s time isn’t
clock if you areto
of 192.168.4.1 not connected to A
192.168.4.254. a network.
file serverWhile
that accurate
it can detect your time zone, NTP does much
is constantly accessed is included in this scope. more
than Another network tech changed the server’s IP to
8.13 After this.
a few days, users complained that they could
a static one
no longer connect to this file server. The network
tech is troubleshooting this to figure out what
9 went wrong. What do you think the problem is?
17
What network type connects multiple networks
17.1 Wide Area Network (WAN)
within
Which ais city range? of IoT using your wireless
an example Amazon Echo base connecting to your home
17.2 network. You recently
network to connect to purchased cameras for your router
IoT services?
17.3 house. What would be the BEST way to secure Place a physical lock on the cameras
With VoIP, which
your cameras port does
so nobody canSession Initiation
hack you and get the
17.4 3389
Protocol (SIP) use?
When discussing end of life for a device, what is an Asset tags
17.5
important thing to have within your organization?
18
Which policy describes what users can and cannot
18.1 agency. The art department is going to be going Acceptable Use Policy
do with company equipment?
18.2 from local installations of
What would be the MOST efficientAdobe products
methodtoofthe Statement of Work (SOW)
Adobe creative cloud. After the conversion,
18.3 installing Windows 10 updates on host systems which Configure a deployment server that will pass all
What would be an example external threat to updates down to hosts
18.4 that are on the network? Hackers
network
What would assets?
be the BEST example of a posture
18.5 Assessing possible threats from threat actors
assessment?
18.6 What
lookingis to
theoutsource
purpose of a virtualtoIP?
a service another It is used to create various virtual machines
18.7 company. You come up with an agreement
find out that a disgruntled employee sent out that
a Statement of Work (SOW)
18.8 threatening e-mail to every member of the of
defines duties and a time frame. What type Confiscate the laptop
disaster hits your company, and you need to be up
18.9 organization from his company laptop. What is the Cloud site
and
Whatrunning at the
is one of another location
BIGGEST as fast to
challenges as a BYOD
18.10 The length and depth of a BYOD agreement
policy?
19
The CIA model is a basic model for security. What
19.1 Confidentiality, Integrity, and Availability
does
WhichCIA standbefor?
would an example of a Denial of Service
19.2 Masquerading
(DoS) attack?
Which would be the BEST example of an on-path Listening in on a conversation between two
19.3
attack (man-in-the-middle)?
from what looks like her bank. It requests that she network administrators
19.4 Phishing
click
Which type ofto
on a link fix her account
malware information.
seems innocent until What
you
19.5 Which type of password attack uses a cracking Worm
perform a specific action?
19.6 tool to submit every possible letter combination Dictionary
What is one way to determine if you have a rogue
19.7 until it gets the right word?
A host has an IP address that isn’t in your
DHCP server?
to try and impress his friends by attempting to network
19.8 Script kiddie
hack into an FBI database. What would this person
19.9 What is a zero-day attack? An attack that takes less than a day to execute
What is one method of protecting against double
19.10 Don’t use VLANs at all
tagging?
What is the BEST description of the Defense in It is a layered system to define where specific
19.11
Depth model? networking actions take place
20
20.1
Which tool allows network administrators to ICMP
manage
Which is their network
the most remotely?
common tool used for network
20.2 Syslog
monitoring?
20.3 What might be an example of a network metric? Memory timings
A computer that needs to manage a printer on
20.4 What might be an example of an SNMP Agent?
the
It is network
a technology that handles all types of
20.5 What is the purpose of SIEM?
security monitoring and management
21 A user calls and says they cannot get onto the
21.1 Internet. Based on the troubleshooting model, What is the error that is coming up?
21.2
and
whattry to getbeonto
would www.totalsem.com.
the first question to ask?It doesn’t Reboot the DNS server
work. However, you type a known IP address for
Correct
Answer Option Answer Option Answer Option Answer
Multimode can
Multimode uses laser and single-
travel farther than There really is no difference 1
mode uses light
single-mode
255.255.255.0 255.0.0.0 2
128-191 192.223 224-239 1
10.44.4.2 3
141.88.5.3 11.6.77.129
4
Servers can only use The server’s static IP is in another The server has a duplicate IP addr
3389 143 20 4
show route netstat -r netstat -f 3
IGP RIP EIGRP 1
EIGRP IS-IS OSPF 1
IS-IS BGP EIGRP 3
80 3389 110 1
CNAME MX A record 4
Misconfigured IP
Incorrect default gateway DNS 4
address
Hardware It’s very expensive, but worth the It can run on very low-end
2
consolidation price computers
Type 2 Linux
It is a network architecture that Windows Server
It allows one 2019
switch to be 1
It is a type of
describe how physical network electronically
Remotely configuring down
broken a 3
hypervisor
Virtualizing network devices will be virtualized into several broadcast domains 4
machine using more Installing a hypervisor on a switch
devices
wireless access point using
Supporting multiple customers on resources as much as possible
another device
or less of the host’s 1
Platform as a Service the same device or infrastructure to support one virtual
resources based on Infrastructure as a Service (IaaS) Infrastructure as Code (IaC) 2
Creating pipelines
(PaaS) Automatically updating servers Running several instances of an
that automate using 1
using Windows Update application automatically
longerPrivate
sequences Hybrid Community 2
The router operates at Layer 3 because it deals with IP addresses. Layer 2 is for MAC addresses. Layer 1 is for the ph
A frame is a max of 1514 bytes. There are frames that can be larger—up to 9000 bytes.
A MAC address uses hexadecimal and can use values of 0-9 and A-F
Layer 2 is the Data Link layer which contains the LLC and the MAC address. The MAC address is burned into a NIC. La
A router’s job is to use the IP address to forward packets to another network. A hub simply connects hosts to a cent
An IP address is a 32-bit number that uses four octets and the value of each octet can only be between 0-255.
A star topology has a centralized device such as a hub or a switch where all hosts connect. A bus topology connects
While RG-59 was used commonly years ago, the de facto standard RG used today is RG-6. RG-8 is a much older stan
An SPF cable uses two inner conductors that share an outer conductor. None of the other cables fall into the coaxial
Due to the many layers of coaxial cable, it is highly resistant to interference which is why it is more expensive and di
UTP has a max distance of 100 meters, or approximately 326 feet. A break in the cable could disrupt a connection, b
CAT 8 supports both 25 and 40 Gbps. CAT 7 goes up to 10 Gbps or more. CAT 6a is for 10GBase-T networks, and CAT
Single-mode uses a laser light which allows it to travel farther than multimode cable
PVC is not fire resistant and it burns very quickly and releases toxins. STP is not a grade, and fiber would not burn th
source/destination MAC address,
current UTP
data type, cable.
data, andRJ-11 is used
an FCS. IP
for phone cable. RS-232
Answer 1 is correct because is a
serial
Answer port
2 isconnector. F-Type is
the 568A standard.
CSMA/CD
The others do not exist. used
stripping is a
wires.technology
A punchdown
for
tooldevices
cannot totolisten
perform
is used this and see
UTPwho
function
connect
is communicating.
because it is merelyARP is a
a repeater.
method
Switchesused
also todoget
notthe MAC at
operate
address of hosts. Full-duplex is a
communication mode where two
devices can talk at the same
time. CSMA/CA is for collision
avoidance rather than detection.
Full duplex is when two devices can communicate at the same time. A CB radio operates at half-duplex where only o
Today’s switches have auto-sensing ports which allow a computer to connect to any port, and the switch’s auto-sen
LX is a fiber optic standard. The rest of the standards apply to twisted pair.
A switching loop occurs when multiple switches are connected back to each other. The network tech did not check t
The SPF can be installed in a switch to convert to fiber. There is no such thing as an RJ-11 converter, nor a fiber rege
Wall jacks are what you plug a UTP patch cable into. The horizontal runs go through the plenum space. The equipme
A punchdown tool cuts the cable as well as secure it to a 110-block. A toner probe tests cable continuity. A crimper
The MDF is also called the Main Distribution Frame. It houses most of your main equipment for the network. An IDF
The first thing to check when you cannot access anything at all is the link light. This light will verify that you have a c
A “U” is a measure of rack equipment, and it measures at 1.75 inches.
This question isolates one department while the others are fine. Therefore, it is most likely that the HR department
An optical time-domain reflectometer (OTDR) will test continuity, accuracy, and proper distance on fiber optic cable
If we take 128+64+32+8+4+2+1 we get 239. The key here is to see how many times 128 goes into 239. Once. So, we
The broadcast address is all F’s. The others here are just arbitrary MAC addresses.
ARP -a will show all entries in the ARP cache. ARP -v shows entries in verbose mode. ARP -q and ARP -c do not exist.
Biometric factors are related to human characteristics such as thumb prints, retina scans, weight sensors, facial recognition and so on.
0-126 is class A. 128-191 is class B. 192-223 is class C. 224-239 is class D and used for multicasting.
In this case, 26 bits are used for the subnet mask. Therefore, a typical Class C /24 would be 255.255.255.0. However
DHCP is a major convenience as it allows hosts to ask a DHCP server for IP address information and it is configured a
There are three private address ranges. 10.0.0.0 – 10.255.255.255. 172.16.0.0 to 172.31.255.255. 192.168.0.0 – 192
Usually, when Windows reports an error for IP configuration, there is a duplicate IP address. What probably happen
The main job of the router is to send data between two different hosts on two different networks. Answer 2 is incor
Network Address Translation (NAT) will allow a host with a private IP address to send data out on the public networ
Ports 20 and 21 are used for FTP. Port 80 is for HTTP. Port 3389 is for Remote Desktop Protocol (RDP). Port 143 is us
Netstat -r will show the routing table. Netstat -a will show all connections and listening ports. Show route is used on
EGP is an external gateway protocol that routes data between ASes. IGP is interior and routes data within an AS. RIP
RIP uses distance-vector. EIGRP can use both, so it isn’t specific to distance-vector. IS-IS and OSPF use link-state.
BGP is THE protocol for EGP. The rest are used for IGPs.
UDP is a connectionless-oriented protocol where there is little overhead. The data is just sent. TFTP uses this becaus
Tracert or traceroute (Linux) will show all the hops taken from a source host to a destination host. Ping will send an
Tracert is the best command to type next. This will determine if there is a problem once data leaves the company’s
Wireshark essentially grabs packets and frames and breaks them down so you can analyze them. It is definitely not l
Ping sends out an ICMP packet to see if a host if available, and the host will send a reply. Tracert shows the hop cou
Netstat -a will show all active ports. Netstat -n will show foreign addresses in a numerical format. Netstat -o will sho
HTTP uses port 80. 143 is for IMAP. 20 is for FTP. 53 is for DNS.
FTP can use port 20 or 21. 80 is for HTTP. 3389 is for Remote Desktop Protocol (RDP), and 110 is for POP3 (E-mail)
Simple Mail Transfer Protocol (SMTP) uses port 25 and is used for sending e-mail. IMAP and POP3 are used for recei
SSH is a secure way to connect to a remote host. RDP is the Remote Desktop Protocol, and it is not part of Telnet. TL
NTP is valuable in the sense that it can synchronize time based on much higher-level systems. While daylight savings
Clock strata is a hierarchy where the top tier devices like GPS or radio waves (Level 0) are the most accurate. As the
Certain hosts need to have the same IP address at all times for easy access. DHCP issues a leased IP address that can
Authoritative DNS servers have information readily available about their hosts. The rest are made up terms regardin
An A record is used with IPv4. An AAAA record is for IPv6. A CNAME is used as an alias, and an MX record is used for
DNS will resolve a host name to an IP address. If you can get to Google based on a known IP address for one of its se
DHCP can provide DNS settings. You need to ensure in your network adapter settings that it is receiving a DNS serve
Dig is a third-party tool used for DNS. NSlookup will work, but it is limited to Windows. Netstat shows TCP/IP connec
Authentication means gaining access to a system based on credentials. Accessing a folder would be authorization, a
Answer 1 is correct. First, you must prove who you are, then be sure that who you are has rights to access a system,
Answer 1 is correct. Multi-factor means authenticating using two different types. Single sign-on is authenticating wit
Answer 1 is correct. Role-based access control is assigning users and groups specific rights to specific resources. Ans
The key word in this question is Cisco. Cisco’s proprietary AAA method is TACACS+. RADIUS is an older AAA method
Kerberos uses a ticket-granting service and issues a TGT token to the host computer, and then an access token that
If a certificate has expired, this is a possible message that may come up because it sees your system as not having a
Managed switches have many configuration options for ports such as VLANs, port mirroring, and trunking. Therefor
The native VLAN is built into every switch and it is always VLAN 1 (Rarely is it VLAN 0). This is not limited to Ubiquiti.
The show running-config will give output of the current state of your switch. There is also show startup-config which
A BPDU guard will ensure that specific ports on switches do not negotiate using BPDUs (Bridge Protocol Data Units).
Port bonding takes the load off a single trunk port by adding another port to share the traffic, essentially making two
An Intrusion Prevention System (formerly called active IDS) can be an individual device or a feature of your firewall o
The DMZ (Demilitarized Zone) acts as a separate network that sits in between your edge firewall router and your pri
IPv6 is a 128-bit address, not 64-bit. It uses hexadecimal and it’s self-configured.
An IPv6 uses hexadecimal which are any characters from 0-9 and A-F. Also, there are 8 groups of 4 characters.
The rules are you can remove preceding zeros, and you can condense strings of zeroes to a double colon, but only in
Routers use stateless auto configuration in the router advertisement phase to provide IPv6 clients with the IPv6 add
DWDM does this, as does CWDM but at shorter distances. SONET is an older technology. MPLS is a router technolog
Metro optical is the term used for this on the Network+. SONET is an older technology. Metro Ethernet is the same
5G uses three bands to maximize speed. 4G had download speeds up to 300 Mbps but didn’t use 3 bands. GSM and
RDP uses port 3389. 5900 is used for TightVNC, another remote desktop application. Port 143 is used for IMAP. Port
When not using servers, Remote Assistance uses an invitation system through e-mail to make the connection. Remo
Cisco uses L2TP and IPSec. PPTP is mostly used by Microsoft, as is EAP. SSTP uses TLS (SSL) and it is not a Cisco propr
The first endpoint, on your end, will be the virtual NIC. A virtual switch is not always necessary for VPNs. The second
Never assume it is on the ISP when you cannot connect to the Internet. Try the basics first within your network—lin
The n standard can operate on both frequencies. 802.11a only operates at 5 GHz. 802.11b operates at 2.4 GHz. 802.
PoE+ falls under the 802.3at standard and can pump out 30 watts to support any PoE device. It can’t simply support
An omni antenna spreads out to all directions, so it is good to place in the center of the room, so it emanates to eve
AES with CCMP is used with WPA2. The exam may not always say WPA2, so know that AES is used. The same can be
An evil twin is nothing more than another WAP on your network that isn’t supposed to be there. While this scenario
The site survey will give you an overview of things that may or may not affect your wireless network. It cannot you w
Host computers save wireless networks into a profile. If anything changes on the access point that doesn’t match th
to do with efficient VPNs. It isn’t
expensive at all; in
host computer’s fact, it saves
physical
money on buying
hardware. Type 2 more
is systems.
a software-
description of a Software Defined
based hypervisor. Linux
Network (SDN). A hypervisor and is
great example.
software A barebetween
that resides metal
more
virtualormachine
less of the
is ahost’s
misnomer.
resources
software forbased
users onsuch
needasisAdobe
scalability. Supporting
Creative Cloud.Creating multiplean
IaaS provides
programmers. pipelines
entire
that network
use longer infrastructure.
sequences is
anyone. A hybrid cloud combines
orchestration. Neither
the benefits of private and Windows
public. A community cloud saves
A MAN connects multiple networks within a city range. A WAN connects larger networks using routers. A LAN is limi
IoT uses your wireless network because a device like the Echo must connect to your wireless network to connect to
The BEST way to secure cameras is to put them in a separate VLAN. A physical lock would only prevent theft. A sepa
SIP uses ports 5060 and 5061. 3389 is for Remote Desktop Protocol (RDP). 143 is for Internet Message Access Proto
Asset tags are THE most important way to track what devices are old, where they are being stored before disposal, a
The AUP defines what users can and cannot do with company equipment. A non-disclosure agreement states that a
Anytime you make any changes to the infrastructure of network (hardware or software) you must update you chang
The most efficient way is to test updates first, preferably on a virtual machine. Sure, you CAN configure a deploymen
External threats come from things outside of your company like hackers. Employees can be a possible internal threa
A posture assessment examines any possible security threat. The best example is looking at threats from actors. Inst
Servers can fail, so a virtual IP will cluster all traffic to one IP address in case things go wrong. You don’t need a virtu
An MOU defines an agreement between two parties such as duties and time frame. An SOW defines the scope of w
The first responder has a responsibility to the company to immediately confiscate any equipment that sends out thr
A cloud site keeps all your infrastructure in the cloud so if you must relocate you can access everything once you get
BYOD policies are great, but the biggest challenge is determining what to do with data when an employee leaves. M
While people can confuse CIA with the government CIA, it actually stands for confidentiality, integrity, and availabili
A ping flood will send continuous ping requests to a computer which will eventually crash it. Masquerading is a socia
The whole purpose of an on-path attack is to connect a device in the “middle” of two devices that need to connect.
Phishing is trying to get a standard user to click on a website and provide information for a bad person. Masqueradi
A Trojan malware acts like the story in mythology. It sits on your computer and doesn’t react until an action is perfo
This is called brute force because it uses a technique that tries every single possibility. A dictionary attack just search
The goal of a rogue DHCP server is to get a host to obtain an IP address from an unknown DHCP server so that rogue
A script kiddie’s goal is to gain recognition in the hacking world so he/she will try to perform a hack on a major orga
A zero-day attack is where an organization has zero days to recognize any vulnerabilities, which lead to exploits, and
The native VLAN should be used for maintenance only. Place anything else on other VLANs. Not using VLANs at all is
This is a layered model to prevent systems from failing should one system be exposed to a possible failure or vulner
SNMP is an invaluable tool that allows network administrators to use monitoring to troubleshoot or check in on the
While Performance Monitor, Event Viewer, and Resource Monitor are great tools, Syslog is the most efficient tool fo
Bandwidth usage is very important when determining if your network is running at optimal performance. Memory ti
An SNMP Agent is a device that can handle SNMP. The computer wouldn’t be the agent. It would be an SNMP Mana
SIEM is a technology that encompasses security monitoring and management. Enforcing any policy can be outlined
Getting answers from a user is key, so the first thing you want to do is find out the error. Asking if they installed any
The BEST solution is to figure out WHY you think it is a DNS problem. Rebooting the DNS server is premature becaus
es. Layer 1 is for the physical connection. And Layer 4 handles assembly and disassembly of packets.
is burned into a NIC. Layer 1 is the physical layer used for cables. Layer 7 is the Application layer, and Layer 6 is the Presentation
onnects hosts to a central location where they share bandwidth. A switch connects multiple hosts and uses frames within the sa
between 0-255.
bus topology connects multiple computers using a single trunk cable. A ring topology has data that gets passed around from on
-8 is a much older standard, and RG-32 doesn’t exist.
disrupt a connection, but it doesn’t apply in this cable. The network tech, even if using a different UTP cable, should know that
ork tech did not check the ports and simply plugged one switch into another. A router would not help this situation. Even disabl
verter, nor a fiber regenerator. The old RS-232 to USB is used very rarely to console into a switch.
um space. The equipment room is usually where all devices eventually connect to. The work area is where an end-user would b
continuity. A crimper is used to secure an RJ-45 head to a cable, and a screwdriver…well…you should know what that is for.
or the network. An IDF is a smaller version of the MDF and usually sits in another location that eventually routes back to the M
erify that you have a connection. The horizontal runs are one of the later things to check because most problems occur in the w
at the HR department connects to this switch. If the UPS was faulty, then any device connected to it wouldn’t work. While inco
nce on fiber optic cables. A standard TDR tests cables that use electrical signals. A wiremap ensures that a cable was properly co
into 239. Once. So, we subtract and get 111. Then we see how many times 64 goes into 111. Once. We subtract again and get 4
n and it is configured automatically. Answer 2 is incorrect because the DHCP must reside in the same subnet as the host, else y
What probably happened is that the network tech did not check the documentation for the hosts and gave a static IP similar to
orks. Answer 2 is incorrect because that is what switches do when using ARP. A bridge between two switches is a misnomer. Sw
t on the public network by using a translation method. DHCP is for automatically assigning IP addresses. EIGRP is a routing prot
ol (RDP). Port 143 is used for IMAP.
Show route is used on routers to show all available routes on a router. Netstat -f will list FQDNs for foreign addresses.
data within an AS. RIP and EIGRP are specific routing protocols used for specific purposes.
OSPF use link-state.
. TFTP uses this because it is a simple way to transfer files. All the other protocols, as well as most protocols, use TCP.
host. Ping will send an ICMP packet to see if another host exists. NSLookup is used for DNS. Netstat shows current connections.
leaves the company’s router. Netstat would be used to view TCP/IP connections. Nslookup is useful if you are having issues wit
em. It is definitely not limited to a specific resource like DHCP. It is not just on Linux and it doesn’t only look at large frames. It i
ert shows the hop count from one host to another. NSlookup is for DNS, and Netstat shows current TCP/IP connections.
mat. Netstat -o will show the process ID. Netstat -b shows the executable for every connection.
0 is for POP3 (E-mail)
OP3 are used for receiving e-mail. FTP is used for transferring files.
s not part of Telnet. TLS (formerly called SSL) is used to provide security over networks. HTTPS is the secure version of HTTP.
While daylight savings time plays a factor, this is not the TRUE purpose of NTP. It cannot manage a local clock if you are not co
most accurate. As the hierarchy progresses down, devices are less in synch until they reach level 15 where they are not in sync
sed IP address that can expire, and then a new IP address is issued. This is usually the same IP address, but it can change. For ho
ddress for one of its servers, but cannot connect through their host name, then you have a DNS issue. Answer 2 is wrong becau
receiving a DNS server from DHCP. Answer 2 is wrong because getting an APIPA address isn’t limited to DNS. The preferred DN
at shows TCP/IP connections. Ping can test for DNS, but it isn’t a third-party tool.
and trunking. Therefore, they DO require a lot of configuration. They are always more expensive than unmanaged switches due
not limited to Ubiquiti. All managed switches have this. No other devices are connected to this switch, or you would clearly see
w startup-config which will show the startup configuration. Show route is used for routers. The enable command puts you in p
e Protocol Data Units). These ports can only connect to specific devices. Port mirroring is copying any sending data coming in a
essentially making two ports logically act as one. Port mirroring is for listening to traffic on a specific port using another compu
ature of your firewall or router. Unlike an IDS which just detects bad traffic, the IPS will actually do something about it. While a
wall router and your private network. It still has protection, but not as robust as your internal network. An IPS works great for st
s of 4 characters.
ouble colon, but only in one area.
ents with the IPv6 address, subnet mask, default gateway, and DNS servers. Router solicitation is the packet that gets sent from
LS is a router technology that uses a labeling system to improve performance. Metro Ethernet is used to connect computers wi
o Ethernet is the same thing, but it is currently called Metro optical. Look out for this on the exam. MPLS is a router technology
use 3 bands. GSM and CDMA are transmission formats.
3 is used for IMAP. Port 80 is for HTTP.
the connection. Remote Desktop is more server-based. Both still use the same port—3389.
d it is not a Cisco proprietary protocol.
y for VPNs. The second endpoint is usually the VPN server on the other end. A VPN headend is the concentrator.
thin your network—link lights, other users, broken cables, and configurations. The ISP should be the last resort.
g routers. A LAN is limited to a small area like an office. A CAN is used to interconnect many networks on a campus, like a colleg
network to connect to services. Using your phone as a hot spot is a way to get around using your wireless network. Siri can be u
y prevent theft. A separate SSID is a great method too, but not the best method. Paying the ISP for another line isn’t necessary.
Message Access Protocol (IMAP), and port 80 is for HTTP.
ored before disposal, and the make and model. A Material Safety Data Sheet (MSDS) is useful to have, but it cannot track anyth
greement states that a person cannot disclose any company information. A BYOD policy discusses the parameters when bringin
must update you change management document. A SOW is an understanding of the work that needs to be done for consistenc
configure a deployment server as this is common practice, but only AFTER you test the updates. Never allow users to manually
possible internal threat. A water main break is a natural event. A tropical storm is a weather-based incident.
hreats from actors. Installing a firewall and configuring ACLs would be examples of preventative maintenance. A wireless site su
You don’t need a virtual IP to create various virtual machines. VLANs don’t use a virtual IP. Multiple virtual servers have their o
defines the scope of work to be performed. An NDA ensures that an employee does not reveal any company information to any
ment that sends out threats. Shutting down the laptop might erase any other incriminating information stored in memory. Deleti
verything once you get an Internet connection. A cold site could take weeks to bring equipment online. A warm site will take d
an employee leaves. Many companies will usually just wipe the company data, but other companies may wipe everything. The
ntegrity, and availability. The government agency is the Central Intelligence Agency, which is why CIA in networking is sometim
Masquerading is a social engineering tactic to get someone to give you personal information. Opening a bunch of web browser
that need to connect. Once connected, the attacker can intercept packets. Listening to people like network administrators is a
d person. Masquerading is when a social engineer pretends to be someone he/she is not to get a user to provide sensitive info
until an action is performed like installing software or opening a program. A worm is designed to slow down a network. A virus
onary attack just searches for words in the dictionary that people use as passwords. The other two don’t exist.
CP server so that rogue can sniff packets. Network techs should know their network address! If a web page takes too long to lo
a hack on a major organization to gain credit. A noob hacker isn’t really a term, but it could be called a green hat. A black hat ha
ch lead to exploits, and which lead to attacks. The attack doesn’t necessarily take less than a day, so this answer is a misnomer.
ot using VLANs at all is very dangerous. Disabling port 1 isn’t common practice because it can be used for maintenance. While y
ssible failure or vulnerability. The OSI defines a layered system for network actions and troubleshooting. Firewalls in a network
hoot or check in on their network. ICMP is a protocol used for ping. Netstat check current network connections. NSLookup is us
e most efficient tool for monitoring your network.
erformance. Memory timings and CPU usage is more of a local hardware issue. Dropped packets is something left for pinging an
ould be an SNMP Manager. A piece of software that monitors network traffic can be many things like Wireshark. A network adm
policy can be outlined in any document such as a BYOD or SLA. Firewalls already use ACLs. There are several network monitorin
ng if they installed anything seems accusatory. A common user certainly wouldn’t know their IP address. Asking about the last ti
er is premature because it could be limited to one website. Asking other users is an excellent option, but it would be part of fig
er 6 is the Presentation layer.
es frames within the same network. A firewall is used to filter out unwanted traffic.
passed around from one host to the next. A mesh topology connects all hosts to each other to provide fault tolerance.
ble, should know that 100 meters is the maximum distance. The NIC in the computer could be bad, but it doesn’t fit the narrati
because two people cannot text at the same time. Pinging a device can be considered a simplex way of communicating.
crossover cable was needed back in the day. Such is not the case anymore. If the switch was malfunctioning, it wouldn’t accep
s situation. Even disabled ports wouldn’t matter. A Layer 3 switch is just simply a switch with routing capabilities and wouldn’t
problems occur in the work area. Checking the router is too premature because the question mentions unsuccessful pings to ho
uldn’t work. While incorrect DHCP settings can cause problems, it wouldn’t be the case here since it is limited to one departme
a cable was properly constructed based on the TIA standards. A toner probe locates cables and can test for signals traveling wit
ubtract again and get 47. Then we see how many times 32 goes into 47. Once. Subtract again and get 15. Then, we see how ma
its at the beginning—128 and 64, which if we add up, equals 192. Answer 2 is the default Class C subnet mask. Answer 3 would
bnet as the host, else you need DHCP Relay. DHCP is not limited to several hosts so Answer 3 is incorrect. Answer 4 is incorrect
ve a static IP similar to another host on the network. The server’s NIC couldn’t be dead or else you couldn’t even configure an I
tches is a misnomer. Switches simply connect using a cable. Answer 4 is wrong because, while routers have routing tables, they
EIGRP is a routing protocol used mostly by Cisco. NAS is an attached storage system on your network.
ign addresses.
ou are having issues with DNS. Net use is for mapping to network shares.
clock if you are not connected to a network. While it can detect your time zone, NTP does much more than this.
ere they are not in synch at all. Answer 2 is wrong, because it trickles down and time become only slightly less accurate; it isn’t
ut it can change. For hosts that need to access it all the time, set aside a DHCP reservation to ensure the host always gets the sa
nswer 2 is wrong because if you have a scope issue, you won’t even get a proper IP address. Answer 3 is wrong because if you a
DNS. The preferred DNS server can be configured manually, but not without using DHCP without using some exceptions. If the
s an older authenticating method. Single sign-on allows a user to have one username and password to access various systems.
ning message should you want to proceed. If the web site was down, you would receive a different error indicating the site cou
managed switches due to their features. Managed switches can only perform routing abilities if they are Layer 3 switches.
r you would clearly see it.
ommand puts you in privileged mode. Show interface is for an individual port
nding data coming in and out of one port to another system. Trunking allows VLAN traffic on more than one switch to travel ba
rt using another computer. While adding another can break up traffic, it isn’t the most convenient solution. Connecting another
ething about it. While a router CAN have an IPS, the answer did not specifically state this. Keep an eye out for that. A Layer 3 sw
n IPS works great for stopping bad traffic, but it wouldn’t work because nobody would be able to access the web server. A Laye
cket that gets sent from clients to see if a router exists. Tunneling is an encapsulation method. In stateful auto configuration, th
ut it cannot track anything you are planning to get rid of. It is important to know city ordinances, but they may not apply to the
rameters when bringing your own device to work. An MOU defines an agreement between two parties.
be done for consistency. An SLA defines the scope, quality, and terms of service to be provided. An MOU defines an agreement
allow users to manually update their systems as this can cause many problems. Downloading updates to a USB stick and manua
ance. A wireless site survey shows signal strength for access point placement.
ual servers have their own IP address on a network.
pany information to anyone outside the company. An SLA defines the scope, quality, and terms of service to be provided.
tored in memory. Deleting the e-mail would be considered tampering with evidence. Shutting down the server could be the sam
A warm site will take days to bring everything back online because there is some equipment. A hot site is efficient, but they are
y wipe everything. The BYOD agreement is long and involved, but it isn’t the BIGGEST problem. Onboarding and offboarding pro
networking is sometimes called the ICA. The other two answers are inaccurate.
bunch of web browser pages will simply crash a system that doesn’t have enough memory to handle it. VLAN hopping is more o
ork administrators is a social engineering technique called eavesdropping. Hacking into someone’s phone using Apple Pay migh
o provide sensitive information. Should surfing is looking over someone’s shoulder to see sensitive information. Whaling is a ph
own a network. A virus requires a host to attach itself to and replicate. Adware is just a bunch of popups.
ge takes too long to load, it has nothing to do with DHCP. An APIPA address CAN be a symptom, but it could also mean that the
een hat. A black hat hacker hacks for malicious reasons and is experiences. A red hat hacker can be considered a vigilante that
answer is a misnomer. This is not a man-in-the-middle attack. It also isn’t a type of malware.
r maintenance. While you should always use VLANs, you may not need at least 2 depending on your situation.
Firewalls in a network are only one aspect of defense in depth.
Asking about the last time they had Internet access is a good question, but not the first.
it would be part of figuring out if it is a DNS problem. Rebooting the router would cause problems with everyone on the netwo
ult tolerance.
t doesn’t fit the narrative of the question. The distance mentioned is key.
ommunicating.
ning, it wouldn’t accept any cable.
nsuccessful pings to hosts on the same subnet. While checking for an IP address is an earlier step, it isn’t the MOST logical one
mited to one department. It cannot be the router because then every department would be unable to connect to the Internet.
or signals traveling within the cable.
. Then, we see how many times 16 goes into 15. It doesn’t so that gets a zero. Continue this and you will get 11101111.
mask. Answer 3 would be correct if we had a /25 network. Answer 4 is an invalid subnet mask.
n’t even configure an IP address and there would be no link light. Answer 3 is wrong because servers aren’t limited to DHCP. An
ave routing tables, they don’t send data between hosts on the same network—only different networks.
y less accurate; it isn’t only limited to Tier 0. Answer 3 is wrong because all devices can use NTP. Answer 4 is wrong because NT
host always gets the same IP. Answer 2 is wrong because, while a static IP may work, it doesn’t address the question since the
wrong because if you are using DHCP, you wouldn’t even configure the IP address. Answer 4 is wrong for the same reasons.
ome exceptions. If the home router is failing, then DHCP would be failing too.
Layer 3 switches.
one switch to travel back and forth. There is no term called BPDU defender.
on. Connecting another switch would not solve this problem.
ut for that. A Layer 3 switch doesn’t provide this feature.
the web server. A Layer 3 switch is just a managed switch with routing capabilities. Adding a second router could possibly be PA
l auto configuration, the hosts get their IPv6 address from a server.
ld be using your wireless network, but the answer is too vague to suggest Wi-Fi is being used.
ey may not apply to the device you are disposing. It is definitely important to store end of life devices in a secure place, but a lo
U defines an agreement between two parties.
a USB stick and manually installing them is not practical at all and would take forever in a large organization.
e to be provided.
server could be the same.
s efficient, but they are very expensive.
ng and offboarding procedures vary from company to company, so it is too ambiguous to be the biggest challenge. BYOD error
VLAN hopping is more of a way to access data rather than crash a system. Remember, the point of DoS is to deny service to reso
e using Apple Pay might be a man in the middle, but the difference is that the attack didn’t join to a network. A ping flood is a D
mation. Whaling is a phishing technique, but it targets high profile people. The question mentions a standard user.
ould also mean that the host cannot reach any DHCP server. Losing access to network resources doesn’t necessarily mean there
idered a vigilante that goes after black hats.
get 11101111.
en’t limited to DHCP. Answer 4 could be a possibility, but the error would manifest itself differently, especially when using ping.
4 is wrong because NTP is not an encryption method.
the question since the server is already using DHCP. Answer 3 is wrong because if the DHCP server failed, then nobody would g
a secure place, but a locker would be too small if you are removing devices in bulk.
challenge. BYOD errors are usually handled by the company’s technology department and it is usually outlined in the policy ag