0% found this document useful (0 votes)
7 views45 pages

V18739 Quiz

This document contains a series of CompTIA Network+ quiz questions covering various networking topics such as OSI model layers, IP addressing, network devices, cabling types, and troubleshooting techniques. It includes questions about protocols, network security, and tools used in network management. The quiz is designed to test knowledge relevant to networking concepts and practices.

Uploaded by

ADMIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views45 pages

V18739 Quiz

This document contains a series of CompTIA Network+ quiz questions covering various networking topics such as OSI model layers, IP addressing, network devices, cabling types, and troubleshooting techniques. It includes questions about protocols, network security, and tools used in network management. The quiz is designed to test knowledge relevant to networking concepts and practices.

Uploaded by

ADMIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 45

CompTIA Network+ Quiz Questions SME: Mike Meyers and Joe Ramm

Ch Question Answer Option


1
At which layer of the OSI model do routers
1.1 Layer 1
operate?
1.2 How many bytes can a frame hold? Approximately 1500 bytes
Which of the following is an example of a valid
1.3 GG:00:45:ZC:00:4F
MAC address?
1.4 On which layer of the OSI model do NICs operate? Layer 1

Which device is used to connect two computers


1.5 Hub
on two different networks?

1.6 Which of the following is a valid IP address? 303.10.4.3


2

Which network topology uses a central device to


2.1 Star
connect all hosts?

Which type of radio grade (RG) is the most


2.2 RG-59
common for coaxial cable?

Which cable listed below is an example of a


2.3 SPF
twinaxial cable?

Which of the following BEST describes an


2.4
At the company you work for, you got promoted Very easy to work with when installing
advantage of coaxial cable?
and moved to a different office that is about 200
meters from a switch. After the network tech
2.5 There is a break in cable
connected a CAT 6 UTP cable to your computer,
you could not access any resources on the
network. Why?

Several network techs are discussing replacing the


current cabling because they want to take
2.6 CAT 7
advantage of 40GBase-T. Which type of category
of cable would they need?

What is the main difference between multimode


2.7 Multimode uses LED and single-mode uses laser
and single-mode fiber?

2.8 Plenum grade


Single-mode uses a laser light which allows it t
3
Which of the following is NOT part of an Ethernet
3.1 FCS
frame?
What type of connector is used for terminating a
3.2 RJ-11
UTP cable?
3.3 What is the order of colors for the 568B standard? OrW, Or, GrW, B, BW, G, BrW, Br
3.4 Which tool is used to seal an RJ-45 connector onto Crimper
aWhat
cable?
is the MAIN difference between a hub and a
3.5 A hub puts all hosts in their own collision domain
switch?
Which technology is used for devices to listen and
3.6 ARP
see who is communicating?
4
Which of these would be an example of full
4.1 Using a CB radio
duplex?
A network tech can connect two switches with a
4.2 Today’s switches have auto-sensing ports
standard straight-through cable. Why?
4.3 Which of connected
switches the following standards
to each other.uses
A newfiber optic?
network 100Base-T
4.4 tech installs a third switch and connects it to the The network tech created a switching loop
Which
secondpiece of After
switch. hardware
this, can be installed
the whole networkinto a
4.5 RJ-11 converter
switch to allow a fiber connection?
5

Which of the following is NOT part of the


5.1 Horizontal runs
structured cabling system?

Which tool is used to connect UTP cable to a 110-


5.2 Punchdown tool
block?
You are talking to a network technician. He
The IDF is where the main equipment is stored
5.3 mentions
When the MDF and structured
troubleshooting the IDF. What is theyou
cabling, for your network
difference
notice thatbetween
you cannottheaccess
two ofany
them?
network
5.4 resources or get on the Internet. You cannot even The horizontal runs
ping another host on your subnet. What would be
5.5 the
HowMOSTmanylogical
inchesthing to check first?
is a “U?” 1.5”
A small company has a network and the techs
recently installed a new rack-mounted UPS in the
telecom room. The next day when employees
5.6 came to work, the entire HR department couldn’t The UPS is faulty
get on the company network or the Internet. The
rest of the departments were fine. What could be
aQuestion
possible7:problem?
Which tool would be used to test the
5.7 proper distance and continuity of a fiber-optic OTDR
cable?
6

6.1 What would 239 be in binary? 10101010

6.2 What is the broadcast address for ARP? FF:FF:FF:FF:FF:FF

6.3 Which command will show the ARP cache? ARP -v

What would the subnet mask be for network


6.4 255.255.0.0
172.16.3.0 /24?
When using class licenses, what is the range for a
6.5 0-126
Class A IP address?

What would the subnet mask be for a network


6.6 255.255.255.0
that is 194.55.4.3 /26?

A layman asks you about DHCP and wants to know DHCP allows hosts to obtain IP address
6.7 the purpose of it. What would be your BEST information automatically to avoid configuring
explanation? hosts individually
As a network tech, what would be an indicator
6.8 that a rogue DHCP server is connected to your Your IP address is in a different network
network?

6.9 Which of the following is a private IP address?


All of the hosts on your network use DHCP. You 202.9.54.2
recently installed a Windows server onto the
6.1 network and gave it a static IP address. However,
the server reports an error regarding its IP The server’s NIC could be bad
configuration. What could be a possible problem?
7
7.1 What is the main purpose of a router? It creates a table of MAC addresses

Which technology allows a private host to send


7.2 NAT
data out to the public Internet?

7.3 Which is a port that FTP uses? 80


7.4 Which command is equivalent to route print? netstat -a
Which type of general routing protocol routes
7.5 EGP
data
data between
between autonomous systems
ASes. IGP is interior (AS)?
and routes data
7.6 RIP
within
Which protocol is considered an Exteriorrouting
an AS. RIP and EIGRP are specific Gateway
7.7 RIP
Protocol (EGP)?
8
8.1 Which protocol uses UDP? TFTP
8.2 Which tool produced these results? Ping

Many users are complaining that they cannot get


on the Internet. You arrive at one user’s computer
8.3 and ping the company’s router and it’s successful. netstat
What would be the next command you should
type?

Elliot is a new network tech at a company, and he


8.4
is learning about Wireshark. He asks you the It is a tool that captures packets and frames and
general purpose of the program. What would you examines them at a more granular level
say is the BEST description of Wireshark?

8.5 Which tool produced this result? tracert

You are using netstat, and you want to show all


8.6 netstat -n
active ports. What would you type?
8.7 Which port does HTTP use? 20

8.8 Which port does FTP use? 20

8.9 Which protocol is used for sending e-mail? IMAP

8.10 What is the secure version of Telnet used today? SSH

8.11
Essentially, what is the BEST description for the It ensures that daylight savings time is always
use
NTPofis Network Time
valuable in theProtocol (NTP)?
sense that it can synchronize accurate
time based on much higher-level systems. While
daylight savings time plays a factor, this is not the Top-level devices get their time from the top of
8.12 TRUE
A purpose
network techofset
NTP.
up It cannotserver
a DHCP manage witha alocal
scope the hierarchy, and any other device’s time isn’t
clock if you areto
of 192.168.4.1 not connected to A
192.168.4.254. a network.
file serverWhile
that accurate
it can detect your time zone, NTP does much
is constantly accessed is included in this scope. more
than Another network tech changed the server’s IP to
8.13 After this.
a few days, users complained that they could
a static one
no longer connect to this file server. The network
tech is troubleshooting this to figure out what
9 went wrong. What do you think the problem is?

What is the proper name for a DNS server that can


9.1 respond to a query with their own DNS Authoritative
information?

9.2 Which type of record is used with IPv4? AAAA record

You type www.google.com and you receive an


9.3 error. However, if you type a known IP address for DHCP scope issue
Google, it works. What might be the problem?
You are using DHCP on your home network, but
9.4 you cannot access a website based on its host You have an APIPA address
name. What
Which tool isisused
MOSTforlikely theDNS
testing problem?
using a third-
9.5 dig
party tool?
10
10.1 What is an example of authentication? Accessing a folder you were granted rights to
What are the three methods of security access to
10.2 A user needs to enter a high clearance area that Identification, Authentication, and Authorization
a system?
10.3 requires a PIN on a touchpad and a retinal scan. Multi-factor authentication
Whichtype
10.4 What
would be an example of
of authentication role-based access
is this? Logging in with a username and password to
Your network contains Cisco routers and switches.
control? access a system
10.5 Which type of AAA method would your network RADIUS
Which type of authentication method uses a ticket
10.6 be using?
Chrome fails to load a web page and a message Kerberos
and token-based system?
10.7 comes up that says, “Your connection is not Self-signed certificate
private.” What might be generating this message?
11
11.1
Which BEST describes the benefits of managed Managed switches provide more options for
switches over you
switch. When unmanaged switches?
first log in and go to the VLAN configuring ports administrator already
Another network
11.2
screen, you notice there is already
Which Cisco command would produce a VLAN
this1. Why configured this VLAN
11.3 show running-config
output?
avoid a bridging loop. What STP feature prevents
11.4 across
someone them through
from a trunkplugging
accidentally port. However, more Port mirroring
in another
11.5 devices are on the VLAN and the trunk port is Port mirroring
Which type of device/feature
being weighed down by a lot of will actively
traffic. stop bad
What
11.6 IDS
traffic
address from
andcoming intoaccess
needs full the private
to thenetwork?
Internet, but An IPS
11.7
you also want your network to be safe from public
12
12.1
Which of the following is NOT a characteristic of It is a 128-bit address
IPv6?
12.2 Which of the following is a valid IPv6 address? FE90:0007:0230:0000:0000:FF22:2A4C:0020
Which of the following a valid shortening method
12.3 FE24::C511::EFF
for
Whatthedo
following IPv6to
routers use address?
provide the necessary
12.4 Router solicitation
information for IPv6 clients to get on the Internet?
13
13.1
single-mode fiber to carry multiple signals by Dense Wavelength Division Multiplexing
Which WANsignal
giving each technology creates
a different a secure,by
wavelength private
using (DWDM)
13.2 network within a city using fiber optic cabling and SONET
medium, high) where all three used a different
13.3 Ethernet technology? 4G
range
Which of frequencies
port does and the
Remote higher
Desktop the frequency
Protocol (RDP)
13.4 5900
use?
What is the MAIN difference between Remote Remote assistance uses an e-mail invitation
13.5
Assistance (remote help) and Remote Desktop? system
13.6 Which VPN security protocol is used by Cisco? PPTP
your office network. Your VPN client software will Virtual switch
13.7 What is a common mistake that network techs
create the first endpoint on your home system.
13.8 make when troubleshooting their network’s Checking the link light of a computer
connectivity to the Internet?
14 You need to purchase a wireless router that
14.1 operates on the 2.4 GHz AND 5.0 GHz band. Which 802.11a
standard
14.2 What is anwould cover this?
everyone inadvantage
the office of
canusing PoE+toover
connect the PoE?
wireless It uses 30 watts for more power
14.3 access point with a good signal so you are going to Omni
Which wireless security standard is the most
14.4 install it on the ceiling in the middle of the office. TKIP
secure?
wireless access point and names it ELLIOT. Other
14.5 Rogue DHCP server
users are accidentally connecting to this access It provides an overview of conditions that may
14.6 What is the purpose of a site survey?
yesterday. So, you, as the network tech, spoke to affect your wireless network
14.7 some of your colleagues and found out that some
The access point is faulty and needs to be
replaced
changes were made to the wireless access point
15
Which of the following is a benefit of
15.1 It allows you to create more efficient VPNs
virtualization?
Which type of hypervisor is a “bare metal”
15.2 Type 1
It removes the control plane and replaces it with
hypervisor?
What is meant by Network Function Virtualization
5.3 a network controller that dictates how physical
(NFV)?
What would be an example of Software Defined Creating
15.4 and virtual devices
a bare move
metal traffic
virtual machine
Networking (SDN)? Increasing or decreasing application instances
15.5 In cloud computing, what is meant by elasticity?
but you don’t want the hassle of setting up based on need
15.6 Software as a Service (SaaS)
servers, ACLs, backups, and managing them.
When discussing Infrastructure as Code (IaC), what Using code to provision and maintain systems in
15.7 You
doeswant to use amean?
automation cloud service that is limited to a consistent manner
15.8 your private organization. Which type of cloud Public
ownership do you want?
16

17
What network type connects multiple networks
17.1 Wide Area Network (WAN)
within
Which ais city range? of IoT using your wireless
an example Amazon Echo base connecting to your home
17.2 network. You recently
network to connect to purchased cameras for your router
IoT services?
17.3 house. What would be the BEST way to secure Place a physical lock on the cameras
With VoIP, which
your cameras port does
so nobody canSession Initiation
hack you and get the
17.4 3389
Protocol (SIP) use?
When discussing end of life for a device, what is an Asset tags
17.5
important thing to have within your organization?
18
Which policy describes what users can and cannot
18.1 agency. The art department is going to be going Acceptable Use Policy
do with company equipment?
18.2 from local installations of
What would be the MOST efficientAdobe products
methodtoofthe Statement of Work (SOW)
Adobe creative cloud. After the conversion,
18.3 installing Windows 10 updates on host systems which Configure a deployment server that will pass all
What would be an example external threat to updates down to hosts
18.4 that are on the network? Hackers
network
What would assets?
be the BEST example of a posture
18.5 Assessing possible threats from threat actors
assessment?
18.6 What
lookingis to
theoutsource
purpose of a virtualtoIP?
a service another It is used to create various virtual machines
18.7 company. You come up with an agreement
find out that a disgruntled employee sent out that
a Statement of Work (SOW)
18.8 threatening e-mail to every member of the of
defines duties and a time frame. What type Confiscate the laptop
disaster hits your company, and you need to be up
18.9 organization from his company laptop. What is the Cloud site
and
Whatrunning at the
is one of another location
BIGGEST as fast to
challenges as a BYOD
18.10 The length and depth of a BYOD agreement
policy?
19
The CIA model is a basic model for security. What
19.1 Confidentiality, Integrity, and Availability
does
WhichCIA standbefor?
would an example of a Denial of Service
19.2 Masquerading
(DoS) attack?
Which would be the BEST example of an on-path Listening in on a conversation between two
19.3
attack (man-in-the-middle)?
from what looks like her bank. It requests that she network administrators
19.4 Phishing
click
Which type ofto
on a link fix her account
malware information.
seems innocent until What
you
19.5 Which type of password attack uses a cracking Worm
perform a specific action?
19.6 tool to submit every possible letter combination Dictionary
What is one way to determine if you have a rogue
19.7 until it gets the right word?
A host has an IP address that isn’t in your
DHCP server?
to try and impress his friends by attempting to network
19.8 Script kiddie
hack into an FBI database. What would this person
19.9 What is a zero-day attack? An attack that takes less than a day to execute
What is one method of protecting against double
19.10 Don’t use VLANs at all
tagging?
What is the BEST description of the Defense in It is a layered system to define where specific
19.11
Depth model? networking actions take place
20
20.1
Which tool allows network administrators to ICMP
manage
Which is their network
the most remotely?
common tool used for network
20.2 Syslog
monitoring?
20.3 What might be an example of a network metric? Memory timings
A computer that needs to manage a printer on
20.4 What might be an example of an SNMP Agent?
the
It is network
a technology that handles all types of
20.5 What is the purpose of SIEM?
security monitoring and management
21 A user calls and says they cannot get onto the
21.1 Internet. Based on the troubleshooting model, What is the error that is coming up?
21.2
and
whattry to getbeonto
would www.totalsem.com.
the first question to ask?It doesn’t Reboot the DNS server
work. However, you type a known IP address for
Correct
Answer Option Answer Option Answer Option Answer

Layer 2 Layer 3 Layer 4 3


Approximately 1200
Approximately 1000 bytes Approximately 600 bytes 1
bytes
0A:24:D3:00:00:FF Z0:4F:9H:6F:22:00 99:00:FF:FF:FH:11 2
Layer 2 Layer 7 Layer 6 2

Switch Firewall Router 4

1024.5.9.0 10.44.89.5 199.256.67.6 3

Bus Ring Mesh 1

RG-8 RG-6 RG-32 4

VGA cable Cat 6 LC fiber cable 1

It is very inexpensive Highly resistant to EMI The BNC connector makes 3


termination much easier
UTP cable cannot
The network tech used the wrong The NIC in your computer is
travel further than 2
type of cable bad
100 meters

CAT 8 CAT 6a CAT 9 2

Multimode can
Multimode uses laser and single-
travel farther than There really is no difference 1
mode uses light
single-mode

STP grade Multimode fiber PVC grade 4


Source IP address Source MAC address Data type 2
RS-232 RJ-45 F-Type 3
GrW, Gr, OrW, B,
GrW, B, OrW, B, BrW, Br, BW, Gr OrB, BrW, Br, OrW, Gr, BW 1
BW, Or, BrW, Br
Wire
A hub cutter at
operates Punchdown tool Tone probe 1
A hub uses ARP, and a switch A switch puts all hosts in their
Layer 1 and a switch 4
doesn’t own collision domain
operates at Layer 4
CSMA/CD Full-duplex CSMA/CA 2

Talking on the phone Receiving a text message Pinging a device 2


This is not accurate. This cable looks like it works
The tech needs a The switch is malfunctioning because there is a link light, 1
crossover
1000Base-Tcable 10Base-T but it is the wrong cable
1000Base-LX 4
There was no router The switches were not Layer 3
Some ports have been disabled 1
installed switches
A fiber regenerator An RS-232 to USB convertor SPF 4

Wall jacks Equipment room Work area 2

Toner probe Crimper Screwdriver 1


The MDF is where the main
The MDF ALWAYS An IDF is another term for the
equipment is stored for your 3
houses the demarc work area
network
The configuration on If your computer has an IP
If the NIC has a link light 4
the router address
1.75” 1” .5” 2

The network techs forgot to


DHCP configurations The router was not plugged into
plug one of the switches back 4
are incorrect the UPS
into the UPS

TDR Wiremap Toner probe 1

11001111 11101111 11110011 3

00:00:00:00:00:00 1A:2B:3C:4D:5E:6F 11:11:11:11:11:11 1

ARP -q ARP -c ARP -a 4

255.255.255.0 255.0.0.0 2
128-191 192.223 224-239 1

255.255.255.128 255.255.255.192 255.255.0.255 3


DHCP allows hosts
within one subnet DHCP is a protocol that
DHCP only works when using 10
get an IP address resolves host names to IP 1
or more hosts
from a DHCP server addresses
in another subnet
In Device Manager, the
The host is receiving A virus was found on the
network adapter is suddenly 1
an APIPA address computer
disabled

10.44.4.2 3
141.88.5.3 11.6.77.129

4
Servers can only use The server’s static IP is in another The server has a duplicate IP addr

It uses a routing table to send


a host on one It acts as a bridge between two
data between hosts on the 2
network to a host on switches
same network
DHCP EIGRP NAS 1

3389 143 20 4
show route netstat -r netstat -f 3
IGP RIP EIGRP 1
EIGRP IS-IS OSPF 1
IS-IS BGP EIGRP 3

HTTP IMAP SNMP 1


Tracert NSLookup Netstat 2

nslookup net use tracert 3

It is a tool that can


It is an expensive tool that
figure out why hosts It is a tool that only works on
Linux systems, and it captures and provides a diagram of your 1
cannot reach a DHCP
analyzes frames larger than usual network
server

Ping nslookup netstat 2

netstat -o netstat -b netstat -a 4


80 143 53 2

80 3389 110 1

POP3 SMTP FTP 3

RDP TLS HTTPS 1


It manages the local
clock on your
It automatically detects your time It is used to synchronize the
computer when you 4
zone clocks of devices on a network
aren’t connected to
There is a hierarchy
a network
of devices where the
Only the devices at the top of the Only the devices at the top of
top devices dictate 2
The file server’s
the most IP hierarchy can use NTP
accurate
the hierarchy can use NTP
address
timelease
expired and got a The scope was not configured
The DHCP server completely failed 2
new one because it properly
didn’t have a
reservation

Administrative Authenticated Admissible 1

CNAME MX A record 4

Misconfigured IP
Incorrect default gateway DNS 4
address

You are not getting Your preferred DNS server isn’t


DNS settings from Your home router is failing 2
configured properly
DHCP
nslookup netstat ping 1

Proving through credentials that


Showing an ID
Identification, Using a retinal scanner 3
you
The have
“Threerights
P’s” to a system
– Proof, Proper
Automating, and 1
More than once Rights, and Proper Access
Authorization Multi-user authentication Single sign-on 1
Assigning rights to a
authentication Labeling a resource with a specific Placing an “Owner” label on a
folder based on a 2
name that would provide access user account
user
Kerberos EAP TACACS+ 4
RADIUS Single sign-on TACACS+ 1
The user has not authenticated
The website is down Expired certificate 3
with the web server
Managed switches Managed switches are usually
A managed switch can always
require switch.
a Ubiquiti little cheaper than
This is the unmanaged
native VLAN and all 1
perform routing
DHCP server to the switch and
configuration
Other switch switches
ports are members of this by 3
it automatically configured
manufacturer’s
show route default
enable show interface 1
BPDU guard Trunking BPDU defender 2
Add another VLAN Connect another switch Port bonding 4
Router Layer 3 Switch IPS 4
A Layer 3 switch DMZ A second router 3

It is a 64-bit address It uses hexadecimal


G400:0002:H111:00 IPv6 is self-configured 2
0001:C234:ABC0:1111:0000:0000: 0000:0000:0000:4411:0Q11:56
00:0000:0000:23AC: 1
FE24:0000:0000:C5:: 0000:2233:9900 AC:AC44:FFEE
This has already been
4H10 FE24::C511:0000:0000:0000:EFF 3
EFF shortened
Tunneling Stateful auto configuration Stateless auto configuration 4

SONET MPLS Metro Ethernet 1


Metro optical MPLS Metro Ethernet 2
GSM 5G CDMA 3
Remote 143
Desktop 3389 80 3
Remote Assistance requires Remote Assistance uses a 1
uses an e-mail
servers different port
invitation system
L2TP/IPSec SSTP EAP 2
Virtual NIC
Checking for a Endpoint 2 VPN headend 2
Not checking their internal 4
broken cable Not checking the ISP first
network first
somewhere

802.11b 802.11n 802.11g 3


It can support any It supports the 802.3af standard It provides better security 1
device
Patch Yagi/directional Parabolic 1
AES WEP Open 2
Man-in-the-middle EvilIt is twin
a tool that you can install on Rogue firewall 3
how secure your It is an overview of the signal
your phone to show where 1
wireless network will The network tech probably strength
settings onof the
antennas
There is interference concrete walls are in the building user’s computer 4
unplugged the WAP accidentally do not match the settings on the

Hardware It’s very expensive, but worth the It can run on very low-end
2
consolidation price computers
Type 2 Linux
It is a network architecture that Windows Server
It allows one 2019
switch to be 1
It is a type of
describe how physical network electronically
Remotely configuring down
broken a 3
hypervisor
Virtualizing network devices will be virtualized into several broadcast domains 4
machine using more Installing a hypervisor on a switch
devices
wireless access point using
Supporting multiple customers on resources as much as possible
another device
or less of the host’s 1
Platform as a Service the same device or infrastructure to support one virtual
resources based on Infrastructure as a Service (IaaS) Infrastructure as Code (IaC) 2
Creating pipelines
(PaaS) Automatically updating servers Running several instances of an
that automate using 1
using Windows Update application automatically
longerPrivate
sequences Hybrid Community 2

Local Area Network Metropolitan Area Network


Using your phone as Campus Area Network (CAN) 3
(LAN) (MAN)
Asking Siri a question and her Opening a garage door from
a hot spot to get a Contact your ISP and pay more 1
Place searching the Internet
SSID forfor
theyou your phone
smartthe cameras
bulb to workin Use a separate
money for another line to your 2
a separate VLAN cameras
5060/5061 143 house just for the cameras 80 2
An MSDS City ordinances A locker to place old items 1
Non-disclosure Memorandum of
BYOD policy 1
agreement
Service Level Understanding
Memorandum of
Change management Download the updates 3
Agreement (SLA)
first on a virtual Allow users to manually update Understanding (MOU) to a
USB stick and then manually 2
machine to ensure their own systems
Employees Water main break install them
A tropical on host computers
storm 1
Installing a firewall Configuring ACLs on a firewall Doing
It usesaawireless
single IPsite survey
address for 1
technology used to It uses a single IP address for 4
multiple servers to cluster all
prevent hosts from
Non-Disclosure multiple
Memorandum virtualof
servers
Understanding traffic
ServiceinLevel
case Agreement
of failover (SLA) 3
Go to the employee
Agreement (NDA) (MOU)
Delete the e-mail and inform Shut down the company e-mail
and shutdown his 1
upper management server
laptop
Cold site Warm site the difference Hot site 1
Determining
Onboarding and Managing problems with BYOD
between personal data versus 3
offboarding errors
company data
Central Intelligence Confidentiality, Intelligence, Computers, Intelligence,
Opening tons of web Accessibility 1
Agency Adaptibility
browser pages on a VLAN hopping Ping flood 4
to an computer
access point to Hacking into someone’s phone
A ping flood 2
sniff packets and while they use Apple Pay
Masquerading Should surfing Whaling 1
Trojan Virus Adware 2
Brute force Brute dictionary Common word attack 2
A web page takes The host computer has an APIPA The user loses complete access
1
too long to load address to any network resources
Noob hacker Black hat hacker Red hat hacker
An attack that is performed 1
It is a newer term for
Only use one port It is a type of malware based on an exploit that wasn’t 4
man-in-the-middle Always disable port 1 on any Place all devices in at least 2
for the native yet found by an organization 2
t is a VLAN switch It is a more in-depth method of
VLANs
for maintenance one system fails or a vulnerability
troubleshooting explaining the use of firewalls 3
is exploited, another system or
model for networks for a network

SNMP Netstat NSLookup 2


Performance
Event Viewer Resource Monitor 1
Monitor
Bandwidth use
A piece of software Dropped packets CPU usagethat needs to be
A printer 2
A network administrator with
that monitors managed from another 4
enforcing rights to manage network traffic
networkany policy
traffic It allows firewalls to use ACLs
It is a networking monitoring
computer 1
put in place for the tool built into Windows

Did you install When was the last time that


Ask other users What is your IP address? 1
anything new?if Establish a theory of why it is a you could get on the Internet?
they can access the Reboot the router 3
DNS problem
website
Explaination

The router operates at Layer 3 because it deals with IP addresses. Layer 2 is for MAC addresses. Layer 1 is for the ph
A frame is a max of 1514 bytes. There are frames that can be larger—up to 9000 bytes.
A MAC address uses hexadecimal and can use values of 0-9 and A-F
Layer 2 is the Data Link layer which contains the LLC and the MAC address. The MAC address is burned into a NIC. La

A router’s job is to use the IP address to forward packets to another network. A hub simply connects hosts to a cent
An IP address is a 32-bit number that uses four octets and the value of each octet can only be between 0-255.

A star topology has a centralized device such as a hub or a switch where all hosts connect. A bus topology connects
While RG-59 was used commonly years ago, the de facto standard RG used today is RG-6. RG-8 is a much older stan

An SPF cable uses two inner conductors that share an outer conductor. None of the other cables fall into the coaxial
Due to the many layers of coaxial cable, it is highly resistant to interference which is why it is more expensive and di

UTP has a max distance of 100 meters, or approximately 326 feet. A break in the cable could disrupt a connection, b

CAT 8 supports both 25 and 40 Gbps. CAT 7 goes up to 10 Gbps or more. CAT 6a is for 10GBase-T networks, and CAT

Single-mode uses a laser light which allows it to travel farther than multimode cable

PVC is not fire resistant and it burns very quickly and releases toxins. STP is not a grade, and fiber would not burn th
source/destination MAC address,
current UTP
data type, cable.
data, andRJ-11 is used
an FCS. IP
for phone cable. RS-232
Answer 1 is correct because is a
serial
Answer port
2 isconnector. F-Type is
the 568A standard.
CSMA/CD
The others do not exist. used
stripping is a
wires.technology
A punchdown
for
tooldevices
cannot totolisten
perform
is used this and see
UTPwho
function
connect
is communicating.
because it is merelyARP is a
a repeater.
method
Switchesused
also todoget
notthe MAC at
operate
address of hosts. Full-duplex is a
communication mode where two
devices can talk at the same
time. CSMA/CA is for collision
avoidance rather than detection.

Full duplex is when two devices can communicate at the same time. A CB radio operates at half-duplex where only o
Today’s switches have auto-sensing ports which allow a computer to connect to any port, and the switch’s auto-sen
LX is a fiber optic standard. The rest of the standards apply to twisted pair.
A switching loop occurs when multiple switches are connected back to each other. The network tech did not check t
The SPF can be installed in a switch to convert to fiber. There is no such thing as an RJ-11 converter, nor a fiber rege

Wall jacks are what you plug a UTP patch cable into. The horizontal runs go through the plenum space. The equipme

A punchdown tool cuts the cable as well as secure it to a 110-block. A toner probe tests cable continuity. A crimper
The MDF is also called the Main Distribution Frame. It houses most of your main equipment for the network. An IDF

The first thing to check when you cannot access anything at all is the link light. This light will verify that you have a c
A “U” is a measure of rack equipment, and it measures at 1.75 inches.

This question isolates one department while the others are fine. Therefore, it is most likely that the HR department
An optical time-domain reflectometer (OTDR) will test continuity, accuracy, and proper distance on fiber optic cable

If we take 128+64+32+8+4+2+1 we get 239. The key here is to see how many times 128 goes into 239. Once. So, we

The broadcast address is all F’s. The others here are just arbitrary MAC addresses.

ARP -a will show all entries in the ARP cache. ARP -v shows entries in verbose mode. ARP -q and ARP -c do not exist.

Biometric factors are related to human characteristics such as thumb prints, retina scans, weight sensors, facial recognition and so on.
0-126 is class A. 128-191 is class B. 192-223 is class C. 224-239 is class D and used for multicasting.

In this case, 26 bits are used for the subnet mask. Therefore, a typical Class C /24 would be 255.255.255.0. However

DHCP is a major convenience as it allows hosts to ask a DHCP server for IP address information and it is configured a

There are three private address ranges. 10.0.0.0 – 10.255.255.255. 172.16.0.0 to 172.31.255.255. 192.168.0.0 – 192

Usually, when Windows reports an error for IP configuration, there is a duplicate IP address. What probably happen

The main job of the router is to send data between two different hosts on two different networks. Answer 2 is incor

Network Address Translation (NAT) will allow a host with a private IP address to send data out on the public networ
Ports 20 and 21 are used for FTP. Port 80 is for HTTP. Port 3389 is for Remote Desktop Protocol (RDP). Port 143 is us
Netstat -r will show the routing table. Netstat -a will show all connections and listening ports. Show route is used on
EGP is an external gateway protocol that routes data between ASes. IGP is interior and routes data within an AS. RIP
RIP uses distance-vector. EIGRP can use both, so it isn’t specific to distance-vector. IS-IS and OSPF use link-state.
BGP is THE protocol for EGP. The rest are used for IGPs.

UDP is a connectionless-oriented protocol where there is little overhead. The data is just sent. TFTP uses this becaus
Tracert or traceroute (Linux) will show all the hops taken from a source host to a destination host. Ping will send an

Tracert is the best command to type next. This will determine if there is a problem once data leaves the company’s

Wireshark essentially grabs packets and frames and breaks them down so you can analyze them. It is definitely not l
Ping sends out an ICMP packet to see if a host if available, and the host will send a reply. Tracert shows the hop cou

Netstat -a will show all active ports. Netstat -n will show foreign addresses in a numerical format. Netstat -o will sho
HTTP uses port 80. 143 is for IMAP. 20 is for FTP. 53 is for DNS.

FTP can use port 20 or 21. 80 is for HTTP. 3389 is for Remote Desktop Protocol (RDP), and 110 is for POP3 (E-mail)

Simple Mail Transfer Protocol (SMTP) uses port 25 and is used for sending e-mail. IMAP and POP3 are used for recei

SSH is a secure way to connect to a remote host. RDP is the Remote Desktop Protocol, and it is not part of Telnet. TL

NTP is valuable in the sense that it can synchronize time based on much higher-level systems. While daylight savings

Clock strata is a hierarchy where the top tier devices like GPS or radio waves (Level 0) are the most accurate. As the

Certain hosts need to have the same IP address at all times for easy access. DHCP issues a leased IP address that can

Authoritative DNS servers have information readily available about their hosts. The rest are made up terms regardin
An A record is used with IPv4. An AAAA record is for IPv6. A CNAME is used as an alias, and an MX record is used for

DNS will resolve a host name to an IP address. If you can get to Google based on a known IP address for one of its se
DHCP can provide DNS settings. You need to ensure in your network adapter settings that it is receiving a DNS serve

Dig is a third-party tool used for DNS. NSlookup will work, but it is limited to Windows. Netstat shows TCP/IP connec

Authentication means gaining access to a system based on credentials. Accessing a folder would be authorization, a
Answer 1 is correct. First, you must prove who you are, then be sure that who you are has rights to access a system,
Answer 1 is correct. Multi-factor means authenticating using two different types. Single sign-on is authenticating wit
Answer 1 is correct. Role-based access control is assigning users and groups specific rights to specific resources. Ans
The key word in this question is Cisco. Cisco’s proprietary AAA method is TACACS+. RADIUS is an older AAA method
Kerberos uses a ticket-granting service and issues a TGT token to the host computer, and then an access token that
If a certificate has expired, this is a possible message that may come up because it sees your system as not having a

Managed switches have many configuration options for ports such as VLANs, port mirroring, and trunking. Therefor
The native VLAN is built into every switch and it is always VLAN 1 (Rarely is it VLAN 0). This is not limited to Ubiquiti.
The show running-config will give output of the current state of your switch. There is also show startup-config which
A BPDU guard will ensure that specific ports on switches do not negotiate using BPDUs (Bridge Protocol Data Units).
Port bonding takes the load off a single trunk port by adding another port to share the traffic, essentially making two
An Intrusion Prevention System (formerly called active IDS) can be an individual device or a feature of your firewall o
The DMZ (Demilitarized Zone) acts as a separate network that sits in between your edge firewall router and your pri

IPv6 is a 128-bit address, not 64-bit. It uses hexadecimal and it’s self-configured.
An IPv6 uses hexadecimal which are any characters from 0-9 and A-F. Also, there are 8 groups of 4 characters.
The rules are you can remove preceding zeros, and you can condense strings of zeroes to a double colon, but only in
Routers use stateless auto configuration in the router advertisement phase to provide IPv6 clients with the IPv6 add

DWDM does this, as does CWDM but at shorter distances. SONET is an older technology. MPLS is a router technolog
Metro optical is the term used for this on the Network+. SONET is an older technology. Metro Ethernet is the same
5G uses three bands to maximize speed. 4G had download speeds up to 300 Mbps but didn’t use 3 bands. GSM and
RDP uses port 3389. 5900 is used for TightVNC, another remote desktop application. Port 143 is used for IMAP. Port
When not using servers, Remote Assistance uses an invitation system through e-mail to make the connection. Remo
Cisco uses L2TP and IPSec. PPTP is mostly used by Microsoft, as is EAP. SSTP uses TLS (SSL) and it is not a Cisco propr
The first endpoint, on your end, will be the virtual NIC. A virtual switch is not always necessary for VPNs. The second
Never assume it is on the ISP when you cannot connect to the Internet. Try the basics first within your network—lin

The n standard can operate on both frequencies. 802.11a only operates at 5 GHz. 802.11b operates at 2.4 GHz. 802.
PoE+ falls under the 802.3at standard and can pump out 30 watts to support any PoE device. It can’t simply support
An omni antenna spreads out to all directions, so it is good to place in the center of the room, so it emanates to eve
AES with CCMP is used with WPA2. The exam may not always say WPA2, so know that AES is used. The same can be
An evil twin is nothing more than another WAP on your network that isn’t supposed to be there. While this scenario
The site survey will give you an overview of things that may or may not affect your wireless network. It cannot you w
Host computers save wireless networks into a profile. If anything changes on the access point that doesn’t match th
to do with efficient VPNs. It isn’t
expensive at all; in
host computer’s fact, it saves
physical
money on buying
hardware. Type 2 more
is systems.
a software-
description of a Software Defined
based hypervisor. Linux
Network (SDN). A hypervisor and is
great example.
software A barebetween
that resides metal
more
virtualormachine
less of the
is ahost’s
misnomer.
resources
software forbased
users onsuch
needasisAdobe
scalability. Supporting
Creative Cloud.Creating multiplean
IaaS provides
programmers. pipelines
entire
that network
use longer infrastructure.
sequences is
anyone. A hybrid cloud combines
orchestration. Neither
the benefits of private and Windows
public. A community cloud saves

A MAN connects multiple networks within a city range. A WAN connects larger networks using routers. A LAN is limi
IoT uses your wireless network because a device like the Echo must connect to your wireless network to connect to
The BEST way to secure cameras is to put them in a separate VLAN. A physical lock would only prevent theft. A sepa
SIP uses ports 5060 and 5061. 3389 is for Remote Desktop Protocol (RDP). 143 is for Internet Message Access Proto
Asset tags are THE most important way to track what devices are old, where they are being stored before disposal, a
The AUP defines what users can and cannot do with company equipment. A non-disclosure agreement states that a
Anytime you make any changes to the infrastructure of network (hardware or software) you must update you chang
The most efficient way is to test updates first, preferably on a virtual machine. Sure, you CAN configure a deploymen
External threats come from things outside of your company like hackers. Employees can be a possible internal threa
A posture assessment examines any possible security threat. The best example is looking at threats from actors. Inst
Servers can fail, so a virtual IP will cluster all traffic to one IP address in case things go wrong. You don’t need a virtu
An MOU defines an agreement between two parties such as duties and time frame. An SOW defines the scope of w
The first responder has a responsibility to the company to immediately confiscate any equipment that sends out thr
A cloud site keeps all your infrastructure in the cloud so if you must relocate you can access everything once you get
BYOD policies are great, but the biggest challenge is determining what to do with data when an employee leaves. M

While people can confuse CIA with the government CIA, it actually stands for confidentiality, integrity, and availabili
A ping flood will send continuous ping requests to a computer which will eventually crash it. Masquerading is a socia
The whole purpose of an on-path attack is to connect a device in the “middle” of two devices that need to connect.
Phishing is trying to get a standard user to click on a website and provide information for a bad person. Masqueradi
A Trojan malware acts like the story in mythology. It sits on your computer and doesn’t react until an action is perfo
This is called brute force because it uses a technique that tries every single possibility. A dictionary attack just search
The goal of a rogue DHCP server is to get a host to obtain an IP address from an unknown DHCP server so that rogue
A script kiddie’s goal is to gain recognition in the hacking world so he/she will try to perform a hack on a major orga
A zero-day attack is where an organization has zero days to recognize any vulnerabilities, which lead to exploits, and
The native VLAN should be used for maintenance only. Place anything else on other VLANs. Not using VLANs at all is
This is a layered model to prevent systems from failing should one system be exposed to a possible failure or vulner

SNMP is an invaluable tool that allows network administrators to use monitoring to troubleshoot or check in on the
While Performance Monitor, Event Viewer, and Resource Monitor are great tools, Syslog is the most efficient tool fo
Bandwidth usage is very important when determining if your network is running at optimal performance. Memory ti
An SNMP Agent is a device that can handle SNMP. The computer wouldn’t be the agent. It would be an SNMP Mana
SIEM is a technology that encompasses security monitoring and management. Enforcing any policy can be outlined

Getting answers from a user is key, so the first thing you want to do is find out the error. Asking if they installed any
The BEST solution is to figure out WHY you think it is a DNS problem. Rebooting the DNS server is premature becaus
es. Layer 1 is for the physical connection. And Layer 4 handles assembly and disassembly of packets.

is burned into a NIC. Layer 1 is the physical layer used for cables. Layer 7 is the Application layer, and Layer 6 is the Presentation

onnects hosts to a central location where they share bandwidth. A switch connects multiple hosts and uses frames within the sa
between 0-255.

bus topology connects multiple computers using a single trunk cable. A ring topology has data that gets passed around from on
-8 is a much older standard, and RG-32 doesn’t exist.

bles fall into the coaxial category.


more expensive and difficult to bend. Also, the BNC connector isn’t used anymore.

disrupt a connection, but it doesn’t apply in this cable. The network tech, even if using a different UTP cable, should know that

e-T networks, and CAT 9 doesn’t really exist yet.

ber would not burn the way PVC cable does.


alf-duplex where only one person can talk at a time. A text message is an example of half-duplex as well because two people ca
d the switch’s auto-sensing feature will recognize it as a proper connection and do the cross internally. A crossover cable was ne

ork tech did not check the ports and simply plugged one switch into another. A router would not help this situation. Even disabl
verter, nor a fiber regenerator. The old RS-232 to USB is used very rarely to console into a switch.

um space. The equipment room is usually where all devices eventually connect to. The work area is where an end-user would b

continuity. A crimper is used to secure an RJ-45 head to a cable, and a screwdriver…well…you should know what that is for.
or the network. An IDF is a smaller version of the MDF and usually sits in another location that eventually routes back to the M

erify that you have a connection. The horizontal runs are one of the later things to check because most problems occur in the w

at the HR department connects to this switch. If the UPS was faulty, then any device connected to it wouldn’t work. While inco
nce on fiber optic cables. A standard TDR tests cables that use electrical signals. A wiremap ensures that a cable was properly co

into 239. Once. So, we subtract and get 111. Then we see how many times 64 goes into 111. Once. We subtract again and get 4

nd ARP -c do not exist.

recognition and so on.


55.255.255.0. However, the example uses a custom subnet. Therefore, the fourth octet is using 2 extra bits at the beginning—1

n and it is configured automatically. Answer 2 is incorrect because the DHCP must reside in the same subnet as the host, else y

255. 192.168.0.0 – 192.168.255.255. All of the others are public IP addresses.

What probably happened is that the network tech did not check the documentation for the hosts and gave a static IP similar to

orks. Answer 2 is incorrect because that is what switches do when using ARP. A bridge between two switches is a misnomer. Sw

t on the public network by using a translation method. DHCP is for automatically assigning IP addresses. EIGRP is a routing prot
ol (RDP). Port 143 is used for IMAP.
Show route is used on routers to show all available routes on a router. Netstat -f will list FQDNs for foreign addresses.
data within an AS. RIP and EIGRP are specific routing protocols used for specific purposes.
OSPF use link-state.

. TFTP uses this because it is a simple way to transfer files. All the other protocols, as well as most protocols, use TCP.
host. Ping will send an ICMP packet to see if another host exists. NSLookup is used for DNS. Netstat shows current connections.

leaves the company’s router. Netstat would be used to view TCP/IP connections. Nslookup is useful if you are having issues wit

em. It is definitely not limited to a specific resource like DHCP. It is not just on Linux and it doesn’t only look at large frames. It i
ert shows the hop count from one host to another. NSlookup is for DNS, and Netstat shows current TCP/IP connections.

mat. Netstat -o will show the process ID. Netstat -b shows the executable for every connection.
0 is for POP3 (E-mail)

OP3 are used for receiving e-mail. FTP is used for transferring files.

s not part of Telnet. TLS (formerly called SSL) is used to provide security over networks. HTTPS is the secure version of HTTP.

While daylight savings time plays a factor, this is not the TRUE purpose of NTP. It cannot manage a local clock if you are not co

most accurate. As the hierarchy progresses down, devices are less in synch until they reach level 15 where they are not in sync

sed IP address that can expire, and then a new IP address is issued. This is usually the same IP address, but it can change. For ho

made up terms regarding DNS


n MX record is used for servers than need to deliver e-mail.

ddress for one of its servers, but cannot connect through their host name, then you have a DNS issue. Answer 2 is wrong becau
receiving a DNS server from DHCP. Answer 2 is wrong because getting an APIPA address isn’t limited to DNS. The preferred DN

at shows TCP/IP connections. Ping can test for DNS, but it isn’t a third-party tool.

uld be authorization, and Answers 3 and 4 are proof of identification.


hts to access a system, and then prove that you can access a system based on your credentials.
on is authenticating with one username and password.
specific resources. Answer 2 is a type of authentication. Answer 3 is mandatory access control and answer 4 is discretionary acc
an older AAA method that isn’t used much anymore. Kerberos and EAP are Microsoft’s authentication protocols.
n an access token that allows the host to access resources on other computers on the network. RADIUS is an older authenticatin
ystem as not having a valid certificate. If the certificate was self-signed, you would simply receive a warning message should yo

and trunking. Therefore, they DO require a lot of configuration. They are always more expensive than unmanaged switches due
not limited to Ubiquiti. All managed switches have this. No other devices are connected to this switch, or you would clearly see
w startup-config which will show the startup configuration. Show route is used for routers. The enable command puts you in p
e Protocol Data Units). These ports can only connect to specific devices. Port mirroring is copying any sending data coming in a
essentially making two ports logically act as one. Port mirroring is for listening to traffic on a specific port using another compu
ature of your firewall or router. Unlike an IDS which just detects bad traffic, the IPS will actually do something about it. While a
wall router and your private network. It still has protection, but not as robust as your internal network. An IPS works great for st

s of 4 characters.
ouble colon, but only in one area.
ents with the IPv6 address, subnet mask, default gateway, and DNS servers. Router solicitation is the packet that gets sent from

LS is a router technology that uses a labeling system to improve performance. Metro Ethernet is used to connect computers wi
o Ethernet is the same thing, but it is currently called Metro optical. Look out for this on the exam. MPLS is a router technology
use 3 bands. GSM and CDMA are transmission formats.
3 is used for IMAP. Port 80 is for HTTP.
the connection. Remote Desktop is more server-based. Both still use the same port—3389.
d it is not a Cisco proprietary protocol.
y for VPNs. The second endpoint is usually the VPN server on the other end. A VPN headend is the concentrator.
thin your network—link lights, other users, broken cables, and configurations. The ISP should be the last resort.

erates at 2.4 GHz. 802.11g runs on the 2.4 GHz band.


It can’t simply support ANY device, only devices that use PoE. The 802.3af standard is for standard PoE at around 15 watts. Sec
, so it emanates to every device on the floor. A patch antenna is meant to go on a wall and radiate in one direction. A Yagi ante
used. The same can be said with TKIP, which is used with WPA. WEP is not very secure as it uses a shared key that can be crack
ere. While this scenario can lead to a rogue DHCP server, there isn’t enough information to prove this. This evil twin COULD be
etwork. It cannot you with security details. While there are tools to install on your phone such as analyzers, this is not what a si
that doesn’t match the profile, they won’t be able to connect. While a WAP can be faulty, it is too early to assume this. Interfe

g routers. A LAN is limited to a small area like an office. A CAN is used to interconnect many networks on a campus, like a colleg
network to connect to services. Using your phone as a hot spot is a way to get around using your wireless network. Siri can be u
y prevent theft. A separate SSID is a great method too, but not the best method. Paying the ISP for another line isn’t necessary.
Message Access Protocol (IMAP), and port 80 is for HTTP.
ored before disposal, and the make and model. A Material Safety Data Sheet (MSDS) is useful to have, but it cannot track anyth
greement states that a person cannot disclose any company information. A BYOD policy discusses the parameters when bringin
must update you change management document. A SOW is an understanding of the work that needs to be done for consistenc
configure a deployment server as this is common practice, but only AFTER you test the updates. Never allow users to manually
possible internal threat. A water main break is a natural event. A tropical storm is a weather-based incident.
hreats from actors. Installing a firewall and configuring ACLs would be examples of preventative maintenance. A wireless site su
You don’t need a virtual IP to create various virtual machines. VLANs don’t use a virtual IP. Multiple virtual servers have their o
defines the scope of work to be performed. An NDA ensures that an employee does not reveal any company information to any
ment that sends out threats. Shutting down the laptop might erase any other incriminating information stored in memory. Deleti
verything once you get an Internet connection. A cold site could take weeks to bring equipment online. A warm site will take d
an employee leaves. Many companies will usually just wipe the company data, but other companies may wipe everything. The

ntegrity, and availability. The government agency is the Central Intelligence Agency, which is why CIA in networking is sometim
Masquerading is a social engineering tactic to get someone to give you personal information. Opening a bunch of web browser
that need to connect. Once connected, the attacker can intercept packets. Listening to people like network administrators is a
d person. Masquerading is when a social engineer pretends to be someone he/she is not to get a user to provide sensitive info
until an action is performed like installing software or opening a program. A worm is designed to slow down a network. A virus
onary attack just searches for words in the dictionary that people use as passwords. The other two don’t exist.
CP server so that rogue can sniff packets. Network techs should know their network address! If a web page takes too long to lo
a hack on a major organization to gain credit. A noob hacker isn’t really a term, but it could be called a green hat. A black hat ha
ch lead to exploits, and which lead to attacks. The attack doesn’t necessarily take less than a day, so this answer is a misnomer.
ot using VLANs at all is very dangerous. Disabling port 1 isn’t common practice because it can be used for maintenance. While y
ssible failure or vulnerability. The OSI defines a layered system for network actions and troubleshooting. Firewalls in a network

hoot or check in on their network. ICMP is a protocol used for ping. Netstat check current network connections. NSLookup is us
e most efficient tool for monitoring your network.
erformance. Memory timings and CPU usage is more of a local hardware issue. Dropped packets is something left for pinging an
ould be an SNMP Manager. A piece of software that monitors network traffic can be many things like Wireshark. A network adm
policy can be outlined in any document such as a BYOD or SLA. Firewalls already use ACLs. There are several network monitorin

ng if they installed anything seems accusatory. A common user certainly wouldn’t know their IP address. Asking about the last ti
er is premature because it could be limited to one website. Asking other users is an excellent option, but it would be part of fig
er 6 is the Presentation layer.

es frames within the same network. A firewall is used to filter out unwanted traffic.

passed around from one host to the next. A mesh topology connects all hosts to each other to provide fault tolerance.

ble, should know that 100 meters is the maximum distance. The NIC in the computer could be bad, but it doesn’t fit the narrati
because two people cannot text at the same time. Pinging a device can be considered a simplex way of communicating.
crossover cable was needed back in the day. Such is not the case anymore. If the switch was malfunctioning, it wouldn’t accep

s situation. Even disabled ports wouldn’t matter. A Layer 3 switch is just simply a switch with routing capabilities and wouldn’t

e an end-user would be.

ow what that is for.


y routes back to the MDF. The demarcation point can be anywhere in your organization. The work area is where a host comput

problems occur in the work area. Checking the router is too premature because the question mentions unsuccessful pings to ho

uldn’t work. While incorrect DHCP settings can cause problems, it wouldn’t be the case here since it is limited to one departme
a cable was properly constructed based on the TIA standards. A toner probe locates cables and can test for signals traveling wit

ubtract again and get 47. Then we see how many times 32 goes into 47. Once. Subtract again and get 15. Then, we see how ma
its at the beginning—128 and 64, which if we add up, equals 192. Answer 2 is the default Class C subnet mask. Answer 3 would

bnet as the host, else you need DHCP Relay. DHCP is not limited to several hosts so Answer 3 is incorrect. Answer 4 is incorrect

ve a static IP similar to another host on the network. The server’s NIC couldn’t be dead or else you couldn’t even configure an I

tches is a misnomer. Switches simply connect using a cable. Answer 4 is wrong because, while routers have routing tables, they

EIGRP is a routing protocol used mostly by Cisco. NAS is an attached storage system on your network.

ign addresses.

cols, use TCP.


ws current connections.

ou are having issues with DNS. Net use is for mapping to network shares.

ook at large frames. It isn’t expensive. It is free and open source.


/IP connections.
ure version of HTTP.

clock if you are not connected to a network. While it can detect your time zone, NTP does much more than this.

ere they are not in synch at all. Answer 2 is wrong, because it trickles down and time become only slightly less accurate; it isn’t

ut it can change. For hosts that need to access it all the time, set aside a DHCP reservation to ensure the host always gets the sa

nswer 2 is wrong because if you have a scope issue, you won’t even get a proper IP address. Answer 3 is wrong because if you a
DNS. The preferred DNS server can be configured manually, but not without using DHCP without using some exceptions. If the

er 4 is discretionary access control.

s an older authenticating method. Single sign-on allows a user to have one username and password to access various systems.
ning message should you want to proceed. If the web site was down, you would receive a different error indicating the site cou

managed switches due to their features. Managed switches can only perform routing abilities if they are Layer 3 switches.
r you would clearly see it.
ommand puts you in privileged mode. Show interface is for an individual port
nding data coming in and out of one port to another system. Trunking allows VLAN traffic on more than one switch to travel ba
rt using another computer. While adding another can break up traffic, it isn’t the most convenient solution. Connecting another
ething about it. While a router CAN have an IPS, the answer did not specifically state this. Keep an eye out for that. A Layer 3 sw
n IPS works great for stopping bad traffic, but it wouldn’t work because nobody would be able to access the web server. A Laye

cket that gets sent from clients to see if a router exists. Tunneling is an encapsulation method. In stateful auto configuration, th

connect computers within a city at a lower cost.


is a router technology that uses a labeling system to improve performance.

t around 15 watts. Security has nothing to do with PoE in this case.


e direction. A Yagi antenna is used to send a strong signal in one direction. A parabolic antenna is directional for long distances
d key that can be cracked. Open isn’t secure at all.
his evil twin COULD be used for a man in the middle attack, but there isn’t enough information in the scenario. A rogue firewall
ers, this is not what a site survey is. It also cannot provide the signal strength of antennas since you have no antennas installed a
to assume this. Interference will still allow users to connect, but their service will be spotty. The network tech COULD have acc

n a campus, like a college.


s network. Siri can be used through any service such as your cellular service. Opening a garage door could be using your wirele
her line isn’t necessary.

ut it cannot track anything you are planning to get rid of. It is important to know city ordinances, but they may not apply to the
rameters when bringing your own device to work. An MOU defines an agreement between two parties.
be done for consistency. An SLA defines the scope, quality, and terms of service to be provided. An MOU defines an agreement
allow users to manually update their systems as this can cause many problems. Downloading updates to a USB stick and manua

ance. A wireless site survey shows signal strength for access point placement.
ual servers have their own IP address on a network.
pany information to anyone outside the company. An SLA defines the scope, quality, and terms of service to be provided.
tored in memory. Deleting the e-mail would be considered tampering with evidence. Shutting down the server could be the sam
A warm site will take days to bring everything back online because there is some equipment. A hot site is efficient, but they are
y wipe everything. The BYOD agreement is long and involved, but it isn’t the BIGGEST problem. Onboarding and offboarding pro

networking is sometimes called the ICA. The other two answers are inaccurate.
bunch of web browser pages will simply crash a system that doesn’t have enough memory to handle it. VLAN hopping is more o
ork administrators is a social engineering technique called eavesdropping. Hacking into someone’s phone using Apple Pay migh
o provide sensitive information. Should surfing is looking over someone’s shoulder to see sensitive information. Whaling is a ph
own a network. A virus requires a host to attach itself to and replicate. Adware is just a bunch of popups.

ge takes too long to load, it has nothing to do with DHCP. An APIPA address CAN be a symptom, but it could also mean that the
een hat. A black hat hacker hacks for malicious reasons and is experiences. A red hat hacker can be considered a vigilante that
answer is a misnomer. This is not a man-in-the-middle attack. It also isn’t a type of malware.
r maintenance. While you should always use VLANs, you may not need at least 2 depending on your situation.
Firewalls in a network are only one aspect of defense in depth.

ctions. NSLookup is used with DNS.

thing left for pinging another device.


reshark. A network administrator with rights to manage network traffic is…well…a network administrator.
eral network monitoring tools built into Windows, but they really aren’t part of SIEM.

Asking about the last time they had Internet access is a good question, but not the first.
it would be part of figuring out if it is a DNS problem. Rebooting the router would cause problems with everyone on the netwo
ult tolerance.

t doesn’t fit the narrative of the question. The distance mentioned is key.
ommunicating.
ning, it wouldn’t accept any cable.

pabilities and wouldn’t stop this.

s where a host computer resides.

nsuccessful pings to hosts on the same subnet. While checking for an IP address is an earlier step, it isn’t the MOST logical one

mited to one department. It cannot be the router because then every department would be unable to connect to the Internet.
or signals traveling within the cable.

. Then, we see how many times 16 goes into 15. It doesn’t so that gets a zero. Continue this and you will get 11101111.
mask. Answer 3 would be correct if we had a /25 network. Answer 4 is an invalid subnet mask.

. Answer 4 is incorrect because that is the definition of DNS.

n’t even configure an IP address and there would be no link light. Answer 3 is wrong because servers aren’t limited to DHCP. An

ave routing tables, they don’t send data between hosts on the same network—only different networks.
y less accurate; it isn’t only limited to Tier 0. Answer 3 is wrong because all devices can use NTP. Answer 4 is wrong because NT

host always gets the same IP. Answer 2 is wrong because, while a static IP may work, it doesn’t address the question since the

wrong because if you are using DHCP, you wouldn’t even configure the IP address. Answer 4 is wrong for the same reasons.
ome exceptions. If the home router is failing, then DHCP would be failing too.

ccess various systems. TACACS+ is Cisco’s proprietary AAA method.


indicating the site couldn’t be found.

Layer 3 switches.
one switch to travel back and forth. There is no term called BPDU defender.
on. Connecting another switch would not solve this problem.
ut for that. A Layer 3 switch doesn’t provide this feature.
the web server. A Layer 3 switch is just a managed switch with routing capabilities. Adding a second router could possibly be PA

l auto configuration, the hosts get their IPv6 address from a server.

onal for long distances such as between buildings.

nario. A rogue firewall really isn’t a thing.


no antennas installed at this point.
k tech COULD have accidentally unplugged the WAP, but then the wireless network wouldn’t show up at all.

ld be using your wireless network, but the answer is too vague to suggest Wi-Fi is being used.

ey may not apply to the device you are disposing. It is definitely important to store end of life devices in a secure place, but a lo
U defines an agreement between two parties.
a USB stick and manually installing them is not practical at all and would take forever in a large organization.

e to be provided.
server could be the same.
s efficient, but they are very expensive.
ng and offboarding procedures vary from company to company, so it is too ambiguous to be the biggest challenge. BYOD error

VLAN hopping is more of a way to access data rather than crash a system. Remember, the point of DoS is to deny service to reso
e using Apple Pay might be a man in the middle, but the difference is that the attack didn’t join to a network. A ping flood is a D
mation. Whaling is a phishing technique, but it targets high profile people. The question mentions a standard user.

ould also mean that the host cannot reach any DHCP server. Losing access to network resources doesn’t necessarily mean there
idered a vigilante that goes after black hats.

everyone on the network and it is premature.


t the MOST logical one based on the problem.

nnect to the Internet.

get 11101111.
en’t limited to DHCP. Answer 4 could be a possibility, but the error would manifest itself differently, especially when using ping.
4 is wrong because NTP is not an encryption method.

the question since the server is already using DHCP. Answer 3 is wrong because if the DHCP server failed, then nobody would g

r the same reasons.


er could possibly be PART of the DMZ setup, but it is not the correct answer.

a secure place, but a locker would be too small if you are removing devices in bulk.
challenge. BYOD errors are usually handled by the company’s technology department and it is usually outlined in the policy ag

to deny service to resources.


work. A ping flood is a DoS attack.

necessarily mean there’s anything wrong with DHCP configurations.


cially when using ping.
d, then nobody would get a proper IP. They would get an APIPA address. Answer 4 is wrong because the scope WAS configured
utlined in the policy agreement in most places, so it isn’t really a major concern.
scope WAS configured properly based on scope settings, it just didn’t include reservations.

You might also like