N10 006
N10 006
N10 006
QUESTION NO: 1
A technician needs to limit the amount of broadcast traffic on a network and allow different
segments to communicate with each other. Which of the following options would satisfy these
requirements?
A.
Add a router and enable OSPF.
B.
Add a layer 3 switch and create a VLAN.
C.
Add a bridge between two switches.
D.
Add a firewall and implement proper ACL.
Answer: B
Explanation:
We can limit the amount of broadcast traffic on a switched network by dividing the computers into
logical network segments called VLANs.
A virtual local area network (VLAN) is a logical group of computers that appear to be on the same
LAN even if they are on separate IP subnets. These logical subnets are configured in the network
switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN
will receive broadcast traffic.
To allow different segments (VLAN) to communicate with each other, a router is required to
establish a connection between the systems. We can use a network router to route between the
VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of
the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP)
addresses in the network layer protocol header as well.
Answer: A
Explanation:
The question states that the traffic being transported is a mixture of multicast and unicast signals.
There are three basic types of network transmissions: broadcasts, which are packets transmitted
to every node on the network; unicasts, which are packets transmitted to just one node; and
multicasts, which are packets transmitted to a group of nodes. Multicast is a layer 3 feature of IPv4
& IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2
switches that can only read the contents of the data-link layer protocol header in the packets they
process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.
QUESTION NO: 3
Which of the following network devices use ACLs to prevent unauthorized access into company
systems?
A.
IDS
B.
Firewall
"Pass Any Exam. Any Time." - www.actualtests.com
Answer: B
Explanation:
QUESTION NO: 4
Which of the following is used to define how much bandwidth can be used by various protocols on
the network?
A.
Traffic shaping
B.
High availability
C.
Load balancing
D.
Fault tolerance
Answer: A
Explanation:
QUESTION NO: 5
Which of the following is used to authenticate remote workers who connect from offsite? (Select
TWO).
A.
OSPF
B.
VTP trunking
C.
Virtual PBX
D.
RADIUS
E.
802.1x
Answer: D,E
Explanation:
D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of
user accounts and passwords used as a central authentication database for users requiring
network access. RADIUS servers are commonly used by ISPs to authenticate their customers
Internet connections.
Remote users connect to one or more Remote Access Servers. The remote access servers then
forward the authentication requests to the central RADIUS server.
QUESTION NO: 6
Which of the following provides accounting, authorization, and authentication via a centralized
privileged database, as well as, challenge/response and password encryption?
A.
Multifactor authentication
B.
ISAKMP
C.
TACACS+
D.
Network access control
Answer: C
Explanation:
TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that handles
authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a
centralized authentication solution used to provide access to network resources. TACACS+
separates the authentication, authorization, and accounting services enabling you to host each
service on a separate server if required.
Answer: D
Explanation:
A reservation is used in DHCP to ensure that a computer always receives the same IP address.
To create a reservation, you need to know the hardware MAC address of the network interface
card that should receive the IP address.
For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always
get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address
to configure reservation.
QUESTION NO: 8
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following
options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment
using dynamic IP addresses, to be able to access the Internet and internal company servers?
(Select THREE).
A.
Default gateway
B.
"Pass Any Exam. Any Time." - www.actualtests.com
Answer: A,B,F
Explanation:
The question states that the client computers need to access the Internet as well as internal
company servers. To access the Internet, the client computers need to be configured with an IP
address with a subnet mask (answer B) and the address of the router that connects the company
network to the Internet. This is known as the default gateway (answer A).
To be able to resolve web page URLs to web server IP addresses, the client computers need to
be configured with the address of a DNS server (answer F).
QUESTION NO: 9
A technician just completed a new external website and setup access rules in the firewall. After
some testing, only users outside the internal network can reach the site. The website responds to
a ping from the internal network and resolves the proper public address. Which of the following
could the technician do to fix this issue while causing internal users to route to the website using
an internal address?
A.
Configure NAT on the firewall
B.
"Pass Any Exam. Any Time." - www.actualtests.com
Answer: B
Explanation:
Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply
different DNS query results depending on the source of the request. This can be done by
hardware-based separation but is most commonly done in software.
In this question, we want external users to be able to access the website by using a public IP
address. To do this, we would have an external facing DNS server hosting a DNS zone for the
website domain. For the internal users, we would have an internal facing DNS server hosting a
DNS zone for the website domain. The external DNS zone will resolve the website URL to an
external public IP address. The internal DNS server will resolve the website URL to an internal
private IP address.
QUESTION NO: 10
When configuring a new server, a technician requests that an MX record be created in DNS for the
new server, but the record was not entered properly. Which of the following was MOST likely
installed that required an MX record to function properly?
A.
Load balancer
B.
FTP server
C.
Firewall DMZ
D.
Mail server
"Pass Any Exam. Any Time." - www.actualtests.com
A mail exchanger record (MX record) is a DNS record used by email servers to determine the
name of the email server responsible for accepting email for the recipients domain.
For example a user sends an email to [email protected]. The sending users email
server will query the somedomain.com DNS zone for an MX record for the domain. The MX record
will specify the hostname of the email server responsible for accepting email for the
somedomain.com domain, for example, mailserver.somedomain.com. The sending email server
will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address.
The sending mail server will then forward the email to the destination mail server.
QUESTION NO: 11
Which of the following protocols uses label-switching routers and label-edge routers to forward
traffic?
A.
BGP
B.
OSPF
C.
IS-IS
D.
MPLS
Answer: D
Explanation:
In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made
solely on the contents of this label, without the need to examine the packet itself.
"Pass Any Exam. Any Time." - www.actualtests.com
10
QUESTION NO: 12
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP
using a POTS line?
A.
Multilayer switch
B.
Access point
C.
Analog modem
D.
DOCSIS modem
Answer: C
Explanation:
11
QUESTION NO: 13
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9
connector. Which of the following protocols was MOST likely used on this cable?
A.
RS-232
B.
802.3
C.
ATM
D.
Token ring
Answer: A
Explanation:
A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines
the functions of the 9 pins in a DB-9 connector. The RS-232 standard was around long before
computers. Its rare to see a new computer nowadays with a serial port but they were commonly
used for connecting external analog modems, keyboards and mice to computers.
12
QUESTION NO: 14
Which of the following connection types is used to terminate DS3 connections in a
telecommunications facility?
A.
66 block
B.
BNC
C.
F-connector
D.
RJ-11
Answer: B
Explanation:
A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s.
DS3 uses 75 ohm coaxial cable and BNC connectors.
QUESTION NO: 15
An F-connector is used on which of the following types of cabling?
A.
CAT3
B.
Single mode fiber
C.
CAT5
D.
"Pass Any Exam. Any Time." - www.actualtests.com
13
Answer: D
Explanation:
An F connector is a coaxial RF connector commonly used for terrestrial television, cable television
and universally for satellite television and cable modems, usually with RG-6/U cable or, in older
installations, with RG-59/U cable.
QUESTION NO: 16
A network technician must utilize multimode fiber to uplink a new networking device. Which of the
following Ethernet standards could the technician utilize? (Select TWO).
A.
1000Base-LR
B.
1000Base-SR
C.
1000Base-T
D.
10GBase-LR
E.
10GBase-SR
F.
10GBase-T
Answer: B,E
Explanation:
1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber with a
"Pass Any Exam. Any Time." - www.actualtests.com
14
Explanation:
15
A Cable Certifier provides Pass or Fail information in accordance with industry standards but
can also show detailed information when a Fail occurs. This includes shorts, the wire pairs
involved and the distance to the short. When a short is identified, at the full length of the cable it
means the cable has not been crimped correctly.
QUESTION NO: 18
A network engineer needs to set up a topology that will not fail if there is an outage on a single
piece of the topology. However, the computers need to wait to talk on the network to avoid
congestions. Which of the following topologies would the engineer implement?
A.
Star
B.
Bus
C.
Ring
D.
Mesh
"Pass Any Exam. Any Time." - www.actualtests.com
16
Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite
being called a Ring topology, the ring is logical and the physical network structure often forms a
star topology with all computers on the network connecting to a central multistation access unit
(MAU). The MAU implements the logical ring by transmitting signals to each node in turn and
waiting for the node to send them back before it transmits to the next node. Therefore, although
the cables are physically connected in a star, the data path takes the form of a ring. If any
computer or network cable fails in a token ring network, the remainder of the network remains
functional. The MAU has the intelligence to isolate the failed segment.
To ensure that the computers need to wait to talk on the network to avoid congestions, a Token
Ring network uses a token. The token continually passes around the network until a computer
needs to send data. The computer then takes the token and transmits the data before releasing
the token. Only a computer in possession of the token can transmit data onto the network.
QUESTION NO: 19
A network topology that utilizes a central device with point-to-point connections to all other devices
is which of the following?
A.
Star
B.
Ring
C.
Mesh
D.
Bus
Answer: A
Explanation:
17
QUESTION NO: 20
Which of the following network topologies has a central, single point of failure?
A.
Ring
B.
Star
C.
Hybrid
D.
Mesh
Answer: B
Explanation:
A Star network is the most common network in use today. Ethernet networks with computers
connected to a switch (or a less commonly a hub) form a star network.
The switch forms the central component of the star. All network devices connect to the switch. A
network switch has a MAC address table which it populates with the MAC address of every device
connected to the switch. When the switch receives data on one of its ports from a computer, it
looks in the MAC address table to discover which port the destination computer is connected to.
The switch then unicasts the data out through the port that the destination computer is connected
to.
"Pass Any Exam. Any Time." - www.actualtests.com
18
QUESTION NO: 21
Which of the following refers to a network that spans several buildings that are within walking
distance of each other?
A.
CAN
B.
WAN
C.
PAN
D.
MAN
Answer: A
Explanation:
CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often
implement CANs to link the buildings in a network. The range of CAN is 1KM to 5KM. If multiple
buildings have the same domain and they are connected with a network, then it will be considered
as a CAN.
QUESTION NO: 22
Which of the following network infrastructure implementations would be used to support files being
transferred between Bluetooth-enabled smartphones?
"Pass Any Exam. Any Time." - www.actualtests.com
19
Answer: A
Explanation:
PAN stands for Personal Area Network. It is a network of devices in the area of a person typically
within a range of 10 meters and commonly using a wireless technology such as Bluetooth or IR
(Infra-Red).
QUESTION NO: 23
Which of the following describes an IPv6 address of ::1?
A.
Broadcast
B.
Loopback
C.
Classless
D.
Multicast
Answer: B
Explanation:
20
QUESTION NO: 24
Which of the following is an example of an IPv4 address?
A.
192:168:1:55
B.
192.168.1.254
C.
00:AB:FA:B1:07:34
D.
::1
Answer: B
Explanation:
An IPv4 address is notated as four decimal numbers each between 0 and 255 separated by dots
(xxx.xxx.xxx.xxx). Each number is known as an octet as it represents eight binary bits. All four
octets make up a 32-bit binary IPv4 address.
In this question, 192.168.1.254 is a valid IPv4 address.
21
QUESTION NO: 25
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local
loopback address. Which of the following is a valid IPv4 loopback address?
A.
10.0.0.1
B.
127.0.0.1
C.
172.16.1.1
D.
192.168.1.1
Answer: B
Explanation:
The loopback address is a special IP address that is designated for the software loopback
interface of a computer. The loopback interface has no hardware associated with it, and it is not
physically connected to a network. The loopback address causes any messages sent to it to be
returned to the sending system. The loopback address allows client software to communicate with
server software on the same computer. Users specify the loopback address which will point back
to the computer's TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1
QUESTION NO: 26
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on
connected routers. In order to conserve address space, which of the following subnet masks
should Joe use for this subnet?
"Pass Any Exam. Any Time." - www.actualtests.com
22
Answer: E
Explanation:
An IPv4 address consists of 32 bits. The first x number of bits in the address is the network
address and the remaining bits are used for the host addresses. The subnet mask defines how
many bits form the network address and from that, we can calculate how many bits are used for
the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for
network addressing and the remaining 2 bits are used for host addressing. The formula to
calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula represents the
number of bits used for host addressing. If we apply the formula (22 2), a /30 subnet mask will
provide 2 IP addresses.
23
After accommodating each department, identify the unused portion of the subnet by responding to
the question on the graphic. All drop downs must be filled.
Instructions: When the simulation is complete, please select the Done button to submit.
24
Answer:
"Pass Any Exam. Any Time." - www.actualtests.com
25
Explanation:
An IPv4 address consists of 32 bits. The first x number of bits in the address is the network
address and the remaining bits are used for the host addresses. The subnet mask defines how
many bits form the network address and from that, we can calculate how many bits are used for
the host addresses.
The formula to calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula
represents the number of bits used for host addressing. If we apply the formula (22 2), we can
determine that the following subnets should be configured:
Sales network /26 This will provide up to 62 usable IP addresses (64-2 for subnet and
broadcast IP)
HR network - /27 This will provide for up to 30 usable IPs (32-2)
IT - /28 This will provide for up to 14 usable IPs (16-2)
Finance - /26 Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and
broadcast IPs and cant be used for hosts.
"Pass Any Exam. Any Time." - www.actualtests.com
26
QUESTION NO: 28
A host has been assigned the address 169.254.0.1. This is an example of which of the following
address types?
A.
APIPA
B.
MAC
C.
Static
D.
Public
Answer: A
Explanation:
APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems.
When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class
B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is
unavailable.
When a client computer configured to use DHCP boots up, it first looks for a DHCP server to
provide the client with IP address and subnet mask. If the client is unable to contact a DHCP
server, it uses APIPA to automatically configure itself with an IP address from a range that has
been reserved especially for Microsoft. The client also configures itself with a default class B
subnet mask of 255.255.0.0. The client will use the self-configured IP address until a DHCP server
becomes available.
"Pass Any Exam. Any Time." - www.actualtests.com
27
QUESTION NO: 29
A company wants to create highly available datacenters. Which of the following will allow the
company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at
one site goes down?
A.
Load balancer
B.
VRRP
C.
OSPF
D.
BGP
Answer: D
Explanation:
A collection of networks that fall within the same administrative domain is called an autonomous
system (AS). In this question, each datacenter will be an autonomous system.
The routers within an AS use an interior gateway protocol, such as the Routing Information
Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information
among themselves. At the edges of an AS are routers that communicate with the other ASs on
the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).
If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links
are available.
QUESTION NO: 30
An organization requires a second technician to verify changes before applying them to network
devices. When checking the configuration of a network device, a technician determines that a
coworker has improperly configured the AS number on the device. This would result in which of
"Pass Any Exam. Any Time." - www.actualtests.com
28
Answer: D
Explanation:
BGP (Border Gateway Protocol) is used to route data between autonomous systems (ASs)
A collection of networks that fall within the same administrative domain is called an autonomous
system (AS).
The routers within an AS use an interior gateway protocol, such as the Routing Information
Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information
among themselves. At the edges of an AS are routers that communicate with the other ASs on
the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).
QUESTION NO: 31
When convergence on a routed network occurs, which of the following is true?
A.
All routers are using hop count as the metric
B.
All routers have the same routing table
C.
All routers learn the route to all connected networks
"Pass Any Exam. Any Time." - www.actualtests.com
29
Answer: C
Explanation:
Routers exchange routing topology information with each other by using a routing protocol. When
all routers have exchanged routing information with all other routers within a network, the routers
are said to have converged. In other words: In a converged network all routers "agree" on what the
network topology looks like.
QUESTION NO: 32
An administrator has a virtualization environment that includes a vSAN and iSCSI switching.
Which of the following actions could the administrator take to improve the performance of data
transfers over iSCSI switches?
A.
The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.
B.
The administrator should configure each vSAN participant to have its own VLAN.
C.
The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
D.
The administrator should set the MTU to 9000 on the each of the participants in the vSAN.
Answer: D
Explanation:
When using an iSCSI SAN (with iSCSI switching), we can improve network performance by
enabling jumbo frames. A jumbo frame is a frame with an MTU of more than 1500. By setting the
MTU to 9000, there will be fewer but larger frames going over the network. Enabling jumbo frames
"Pass Any Exam. Any Time." - www.actualtests.com
30
QUESTION NO: 33
Which of the following would be used in an IP-based video conferencing deployment? (Select
TWO).
A.
RS-232
B.
56k modem
C.
Bluetooth
D.
Codec
E.
SIP
Answer: D,E
Explanation:
The term "codec" is a concatenation of "encoder" and "decoder. In video conferencing, a codec is
software (or can be hardware) that compresses (encodes) raw video data before it is transmitted
over the network. A codec on the receiving video conferencing device will then decompress
(decode) the video signal for display on the conferencing display.
The Session Initiation Protocol (SIP) is a protocol for initiating an interactive user session that
involves multimedia elements such as voice, chat, gaming, or in this case video.
31
Answer: B
Explanation:
People use many methods of communication nowadays such as voice, email, video and instant
messaging. People also use many different devices to communicate such as smart phones, PDAs,
computers etc. Unified Communications (UC) enables people using different modes of
communication, different media, and different devices to communicate with anyone, anywhere, at
any time.
Many communication methods use digital signals. To send a digital signal over the analog PSTN,
you need a gateway (in this case a UC Gateway) to convert the digital signals into an analog
format that can be sent over the PSTN.
QUESTION NO: 35
A technician is connecting a NAS device to an Ethernet network. Which of the following
technologies will be used to encapsulate the frames?
A.
HTTPS
B.
"Pass Any Exam. Any Time." - www.actualtests.com
32
Answer: C
Explanation:
A NAS or a SAN will use either iSCSI or Fiber Channel. In this question, the NAS is connected to
an Ethernet network. Therefore, iSCSI will most likely be used (Fiber Channel over Ethernet
(FCoE) can be used but is less common). ISCSI means Internet SCSI. ISCSI uses TCP
(Transmission Control Protocol) which enables it to be used over TCP/IP networks such as
Ethernet.
For Fiber channel, a separate Fiber Channel network would be required unless FCoE is used.
QUESTION NO: 36
A SQL server needs several terabytes of disk space available to do an uncompressed backup of a
database. Which of the following devices would be the MOST cost efficient to use for this backup?
A.
iSCSI SAN
B.
FCoE SAN
C.
NAS
D.
USB flash drive
Answer: C
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
33
QUESTION NO: 37
A company has a new offering to provide access to their product from a central location rather
than clients internally hosting the product on the client network. The product contains sensitive
corporate information that should not be accessible from one client to another. This is an example
of which of the following?
A.
Public SaaS
B.
Private SaaS
C.
Hybrid IaaS
D.
Community IaaS
Answer: B
Explanation:
SaaS stands for Software as a Service. This is a cloud model whereby a service provider provides
a software service and makes the service available to customers over the Internet.
Examples of Saas include Microsoft Office 365, Microsoft Exchange Online, Microsoft Lync Online
etc.
Advantages of Saas include ease of administration: no need to install and configure local servers,
"Pass Any Exam. Any Time." - www.actualtests.com
34
QUESTION NO: 38
A technician is helping a SOHO determine where to install the server. Which of the following
should be considered FIRST?
A.
Compatibility requirements
B.
Environment limitations
C.
Cable length
D.
Equipment limitations
Answer: B
Explanation:
SOHO stands for Small Office / Home Office. A SOHO network is typically a small network. Being
a small network, it is unlikely that it will have a datacenter or even a dedicated server room. Any
servers installed in the network will still have the same environmental requirements as servers in a
large network. The servers should be in a secure isolated area if required. The servers also need
to be kept cool and dry. Therefore, the first consideration in a SOHO office is Environment
limitations: where the servers and other network hardware will be located.
35
QUESTION NO: 39
A technician has been given a list of requirements for a LAN in an older building using CAT6
cabling. Which of the following environmental conditions should be considered when deciding
whether or not to use plenum-rated cables?
A.
Workstation models
B.
Window placement
C.
Floor composition
D.
Ceiling airflow condition
Answer: D
Explanation:
In a large building, the plenum is the space between floors used to circulate air through the
building. This space is also an ideal place to run computer network cabling. However, in the event
of fire in the building, the network cables can be very hazardous because when they burn, the
cable insulation gives off a poisonous smoke that gets circulated around the building. Furthermore,
the burning cables help to spread the fire.
Plenum-rated cables are designed to be cabled through the plenum in a building. Plenum-rated
cables are covered in fire-retardant plastic jacket to avoid the risk of toxic smoke being circulated
around the building.
QUESTION NO: 40
A VLAN with a gateway offers no security without the addition of:
A.
"Pass Any Exam. Any Time." - www.actualtests.com
36
Answer: A
Explanation:
A gateway in a VLAN connects to another network. The other network can be the Internet, another
subnet on the network or another VLAN. The gateway will be a router and for security, it should
also be a firewall.
A firewall is a system designed to prevent unauthorized access to or from a private network.
Firewalls are frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists)
to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet
passes through the firewall, which examines each message and blocks or allows the message
depending on rules specified in the ACL. The rules in the ACL specify which combinations of
source IP address, destination address in IP port numbers are allowed.
QUESTION NO: 41
A company is experiencing accessibility issues reaching services on a cloud-based system. Which
of the following monitoring tools should be used to locate possible outages?
A.
Network analyzer
"Pass Any Exam. Any Time." - www.actualtests.com
37
Answer: A
Explanation:
A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on
the network.
QUESTION NO: 42
Company policies require that all network infrastructure devices send system level information to a
centralized server. Which of the following should be implemented to ensure the network
administrator can review device error information from one central location?
A.
TACACS+ server
B.
Single sign-on
C.
SYSLOG server
D.
Wi-Fi analyzer
Answer: C
Explanation:
38
QUESTION NO: 43
After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
A.
Event log
B.
Syslog
C.
SIEM
D.
SNMP
Answer: C
Explanation:
Using a Security information and event management (SIEM) product, the security logs can be
analyzed and aggregated.
SIEM is a term for software products and services combining security information management
(SIM) and security event management (SEM). SIEM technology provides real-time analysis of
security alerts generated by network hardware and applications. SIEM is sold as software,
appliances or managed services, and are also used to log security data and generate reports for
compliance purposes.
SIEM capabilities include Data aggregation; Log management aggregates data from many
sources, including network, security, servers, databases, applications, providing the ability to
consolidate monitored data to help avoid missing crucial events.
39
QUESTION NO: 44
A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
A.
Regression test
B.
Speed test
C.
Baseline
D.
Statement of work
Answer: C
Explanation:
In networking, baseline can refer to the standard level of performance of a certain device or to the
normal operating capacity for your whole network. High-quality documentation should include a
baseline for network performance, because you and your client need to know what normal looks
like in order to detect problems before they develop into disasters.
A network baseline delimits the amount of available bandwidth available and when. For networks
and networked devices, baselines include information about four key components:
Processor
Memory
Hard-disk (or other storage) subsystem
Network adapter or subsystem
QUESTION NO: 45
"Pass Any Exam. Any Time." - www.actualtests.com
40
Answer: B
Explanation:
Network processors (CPUs) are used in the manufacture of many different types of network
equipment such as routers. Such a CPU on a router could become bottleneck for the network
traffic. The routing through that device would then slow down.
QUESTION NO: 46
A network technician receives the following alert from a network device:
"High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54"
Which of the following is being monitored to trigger the alarm?
A.
Speed and duplex mismatch
B.
Wireless channel utilization
"Pass Any Exam. Any Time." - www.actualtests.com
41
Answer: E
Explanation:
This is an error message that indicates that threshold of high utilization of network interface, in this
case interface gi1/0/24, has been exceeded. The message has been triggered on the interface link
status.
Note: gi1/0 would be a gigabyte interface.
QUESTION NO: 47
The administrator's network has OSPF for the internal routing protocol. One port going out to the
Internet is congested. The data is going out to the Internet, but queues up before sending. Which
of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
"Pass Any Exam. Any Time." - www.actualtests.com
42
Answer: D
Explanation:
From the output we see that the half-duplex is configured. This would not use the full capacity of
ports on the network. By changing to full duplex the throughput would be doubled.
Note: All communications are either half-duplex or full-duplex. During half-duplex communication,
a device can either send communication or receive communication, but not both at the same time.
In full-duplex communication, both devices can send and receive communication at the same time.
This means that the effective throughput is doubled and communication is much more efficient.
QUESTION NO: 48
The RAID controller on a server failed and was replaced with a different brand. Which of the
following will be needed after the server has been rebuilt and joined to the domain?
A.
Vendor documentation
B.
Recent backups
"Pass Any Exam. Any Time." - www.actualtests.com
43
Answer: B
Explanation:
If the RAID controller fails and is replaced with a RAID controller with a different brand the RAID
will break. We would have to rebuild a new RAID disk, access and restore the most recent backup
to the new RAID disk.
Note: RAID controller is a hardware device or software program used to manage hard disk drives
(HDDs) or solid-state drives (SSDs) in a computer or storage array so they work as a logical unit.
In hardware-based RAID, a physical controller is used to manage the RAID array.
QUESTION NO: 49
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop
to the new user, the administrator documents the new location, the user of the device and when
the device was reassigned. Which of the following BEST describes these actions?
A.
Network map
B.
Asset management
C.
Change management
D.
Baselines
Answer: B
Explanation:
44
QUESTION NO: 50
A network technician is diligent about maintaining all system servers' at the most current service
pack level available. After performing upgrades, users experience issues with server-based
applications. Which of the following should be used to prevent issues in the future?
A.
Configure an automated patching server
B.
Virtualize the servers and take daily snapshots
C.
Configure a honeypot for application testing
D.
Configure a test lab for updates
Answer: D
Explanation:
To prevent the service pack issues make sure, before going ahead and applying a new Service
Pack in your production environment, to validate them in a test/lab environment first.
QUESTION NO: 51
"Pass Any Exam. Any Time." - www.actualtests.com
45
Answer: A
Explanation:
Environments are controlled areas where systems developers can build, distribute, install,
configure, test, and execute systems that move through the Software Development Life Cycle
(SDLC). The enhancements can be deployed and tested in a test environment before they are
installed in the production environment.
QUESTION NO: 52
A system administrator wants to update a web-based application to the latest version. Which of
the following procedures should the system administrator perform FIRST?
A.
Remove all user accounts on the server
B.
Isolate the server logically on the network
C.
Block all HTTP traffic to the server
"Pass Any Exam. Any Time." - www.actualtests.com
46
Answer: D
Explanation:
We should test the new version of the application in a test/lab environment first. This way any
potential issues with the new software would not affect the production environment.
Set up a test lab on an isolated network in your organization. Do not set up your test lab in your
production environment.
QUESTION NO: 53
Network segmentation provides which of the following benefits?
A.
Security through isolation
B.
Link aggregation
C.
Packet flooding through all ports
D.
High availability through redundancy
Answer: A
Explanation:
47
QUESTION NO: 54
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab
equipment connected to her PC. The technician contacts the vendor and determines there is an
incompatibility with the latest IO drivers. Which of the following should the technician perform so
that Ann can get back to work as quickly as possible?
A.
Reformat and install the compatible drivers.
B.
Reset Ann's equipment configuration from a backup.
C.
Downgrade the PC to a working patch level.
D.
Restore Ann's PC to the last known good configuration.
E.
Roll back the drivers to the previous version.
Answer: E
Explanation:
By rolling back the drivers Ann would be able to use her lab equipment again.
To roll back a driver in Windows means to return the driver to the version that was last installed for
the device. Rolling back a driver is an easy way to return a driver to a working version when a
driver update fails to fix a problem or maybe even causes a new problem. Think of rolling back a
driver as a quick and easy way to uninstall the latest driver and then reinstall the previous one, all
automatically.
"Pass Any Exam. Any Time." - www.actualtests.com
48
QUESTION NO: 55
Which of the following requires the network administrator to schedule a maintenance window?
A.
When a company-wide email notification must be sent.
B.
A minor release upgrade of a production router.
C.
When the network administrator's laptop must be rebooted.
D.
A major release upgrade of a core switch in a test lab.
Answer: B
Explanation:
During an update of a production router the router would not be able to route packages and the
network traffic would be affected. It would be necessary to announce a maintenance window.
In information technology and systems management, a maintenance window is a period of time
designated in advance by the technical staff, during which preventive maintenance that could
cause disruption of service may be performed.
QUESTION NO: 56
A company has implemented the capability to send all log files to a central location by utilizing an
encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit
has caused the company's encryption to become unsecure. Which of the following would be
required to resolve the exploit?
A.
Utilize a FTP service
"Pass Any Exam. Any Time." - www.actualtests.com
49
Answer: B
Explanation:
If the encryption is unsecure then we must look for encryption software updates or patches. If they
are available we must install them.
As vulnerabilities are discovered, the vendors of the operating systems or applications often
respond by releasing a patch. A patch is designed to correct a known bug or fix a known
vulnerability in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one
or more features to the software being updated.
QUESTION NO: 57
An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?
A.
Ensure patches are deployed
B.
Install an IDS on the network
C.
Configure the firewall to block traffic on port 443
D.
Implement a VPN for employees
"Pass Any Exam. Any Time." - www.actualtests.com
50
As vulnerabilities are discovered, the vendors of the operating systems or applications often
respond by releasing a patch. A patch is designed to correct a known bug or fix a known
vulnerability, such as in this case to be able to read SSL traffic, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one
or more features to the software being updated.
QUESTION NO: 58
A company has had several virus infections over the past few months. The infections were caused
by vulnerabilities in the application versions that are being used. Which of the following should an
administrator implement to prevent future outbreaks?
A.
Host-based intrusion detection systems
B.
Acceptable use policies
C.
Incident response team
D.
Patch management
Answer: D
Explanation:
As vulnerabilities are discovered, the vendors of the operating systems or applications often
respond by releasing a patch. A patch is designed to correct a known bug or fix a known
vulnerability, such as in this case to be vulnerable to virus infections, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one
"Pass Any Exam. Any Time." - www.actualtests.com
51
QUESTION NO: 59
Which of the following protocols must be implemented in order for two switches to share VLAN
information?
A.
VTP
B.
MPLS
C.
STP
D.
PPTP
Answer: A
Explanation:
The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to
other switches in a group of switches (that is, a VTP domain).
QUESTION NO: 60
A technician is setting up a new network and wants to create redundant paths through the
network. Which of the following should be implemented to prevent performance degradation?
A.
Port mirroring
"Pass Any Exam. Any Time." - www.actualtests.com
52
Answer: B
Explanation:
The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any
bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the
broadcast radiation that results from them. Spanning tree also allows a network design to include
spare (redundant) links to provide automatic backup paths if an active link fails, without the danger
of bridge loops, or the need for manual enabling/disabling of these backup links.
QUESTION NO: 61
A training class is being held in an auditorium. Hard-wired connections are required for all laptops
that will be used. The network technician must add a switch to the room through which the laptops
will connect for full network access. Which of the following must the technician configure on a
switch port, for both switches, in order to create this setup?
A.
DHCP
B.
Split horizon
C.
CIDR
D.
TRUNK
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com
53
We should use trunk ports to set up a VLAN for the laptops that will be used in the auditorium.
A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a
specific switch, a process known as trunking. Trunk ports mark frames with unique identifying tags
either 802.1Q tags or Interswitch Link (ISL) tags as they move between switches. Therefore,
every single frame can be directed to its designated VLAN.
QUESTION NO: 62
A desktop computer is connected to the network and receives an APIPA address but is unable to
reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the
Internet. Which of the following is MOST likely the source of the problem?
A.
802.1q is not configured on the switch port
B.
APIPA has been misconfigured on the VLAN
C.
Bad SFP in the PC's 10/100 NIC
D.
OS updates have not been installed
Answer: A
Explanation:
APIPA addresses are self-configured and are used when the client is unable to get proper IP
configuration from a DHCP server. One possible source of this problem is that switch port, to
which the computer is connected, is misconfigured. The 802.1q protocol is used to configure
VLAN trunking on switch ports.
54
QUESTION NO: 63
Which of the following communication technologies would MOST likely be used to increase
bandwidth over an existing fiber optic network by combining multiple signals at different
wavelengths?
A.
DWDM
B.
SONET
C.
ADSL
D.
LACP
Answer: A
Explanation:
QUESTION NO: 64
When two or more links need to pass traffic as if they were one physical link, which of the following
would be used to satisfy the requirement?
A.
Port mirroring
B.
802.1w
"Pass Any Exam. Any Time." - www.actualtests.com
55
Answer: C
Explanation:
The Link Aggregation Control Protocol (LACP) enables you to assign multiple physical links to a
logical interface, which appears as a single link to a route processor.
QUESTION NO: 65
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following
should the technician enable?
A.
PoE
B.
Port bonding
C.
VLAN
D.
Trunking
Answer: A
Explanation:
Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards.
PoE allows an Ethernet switch to provide power to an attached device (for example, a wireless
access point, security camera, or IP phone) by applying power to the same wires in a UTP cable
"Pass Any Exam. Any Time." - www.actualtests.com
56
QUESTION NO: 66
A technician has finished configuring AAA on a new network device. However, the technician is
unable to log into the device with LDAP credentials but is able to do so with a local user account.
Which of the following is the MOST likely reason for the problem?
A.
Username is misspelled is the device configuration file
B.
IDS is blocking RADIUS
C.
Shared secret key is mismatched
D.
Group policy has not propagated to the device
Answer: C
Explanation:
AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch
could cause login problems.
Authentication, authorization, and accounting (AAA) allows a network to have a single repository
of user credentials. A network administrator can then, for example, supply the same credentials to
log in to various network devices (for example, routers and switches). RADIUS and TACACS+ are
protocols commonly used to communicate with an AAA server.
QUESTION NO: 67
"Pass Any Exam. Any Time." - www.actualtests.com
57
Answer: D
Explanation:
You can set a limit of how many virtual terminals that can simultaneously be connected to a
switch. Here the limit is set to one, and we should increase it.
For a Cisco network device:
You can use virtual terminal lines to connect to your Cisco NX-OS device, for example a switch.
Secure Shell (SSH) and Telnet create virtual terminal sessions. You can configure an inactive
session timeout and a maximum sessions limit for virtual terminals.
session-limit sessions
Example:
switch(config-line)# session-limit 10
Configures the maximum number of virtual sessions for the Cisco NX-OS device. The range is
from 1 to 64.
QUESTION NO: 68
"Pass Any Exam. Any Time." - www.actualtests.com
58
Answer: D
Explanation:
One way 802.11n achieves superior throughput is through the use of a technology called multiple
input, multiple output (MIMO). MIMO uses multiple antennas for transmission and reception.
QUESTION NO: 69
A network technician must create a wireless link between two buildings in an office park utilizing
the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal
weight as it will be mounted on the outside of the building. Which of the following antenna types is
BEST suited for this solution?
A.
Yagi
B.
Omni-directional
C.
Parabolic
D.
"Pass Any Exam. Any Time." - www.actualtests.com
59
Answer: D
Explanation:
A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat
surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a
limited angle pattern.
QUESTION NO: 70
Which of the following concepts are MOST important for a company's long term health in the event
of a disaster? (Select TWO).
A.
Redundancy
B.
Implementing acceptable use policy
C.
Offsite backups
D.
Uninterruptable power supplies
E.
Vulnerability scanning
Answer: A,C
Explanation:
60
QUESTION NO: 71
An organization notices a large amount of malware and virus incidents at one satellite office, but
hardly any at another. All users at both sites are running the same company image and receive
the same group policies. Which of the following has MOST likely been implemented at the site with
the fewest security issues?
A.
Consent to monitoring
B.
Business continuity measures
C.
Vulnerability scanning
D.
End-user awareness training
Answer: D
Explanation:
Users should have security awareness training and should have all accepted and signed
acceptable use policy (AUP) agreements. User awareness training is one of the most significant
countermeasures the company can implement.
61
QUESTION NO: 72
Which of the following technologies is designed to keep systems uptime running in the event of a
disaster?
A.
High availability
B.
Load balancing
C.
Quality of service
D.
Caching engines
Answer: A
Explanation:
If a network switch or router stops operating correctly (meaning that a network fault occurs),
communication through the network could be disrupted, resulting in a network becoming
unavailable to its users. Therefore, network availability, called uptime, is a major design
consideration.
QUESTION NO: 73
A network technician is assisting the company with developing a new business continuity plan.
Which of the following would be an appropriate suggestion to add to the plan?
A.
Build redundant links between core devices
B.
Physically secure all network equipment
"Pass Any Exam. Any Time." - www.actualtests.com
62
Answer: A
Explanation:
The business continuity plan focuses on the tasks carried out by an organization to ensure that
critical business functions continue to operate during and after a disaster.
By keeping redundant links between core devices critical business services can be kept running if
one link is unavailable during a disaster.
QUESTION NO: 74
Which of the following describes a smurf attack?
A.
Attack on a target using spoofed ICMP packets to flood it
B.
Intercepting traffic intended for a target and redirecting it to another
C.
Spoofed VLAN tags used to bypass authentication
D.
Forging tags to bypass QoS policies in order to steal bandwidth
Answer: A
Explanation:
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet
Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are
"Pass Any Exam. Any Time." - www.actualtests.com
63
QUESTION NO: 75
A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of
the following attacks is the user MOST likely using?
A.
DNS poisoning
B.
ARP poisoning
C.
Reflection
D.
SYN attack
Answer: B
Explanation:
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker
changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the
target computer's ARP cache with a forged ARP request and reply packets. This modifies the
layer -Ethernet MAC address into the hacker's known MAC address to monitor it. Because the
ARP replies are forged, the target computer unintentionally sends the frames to the hacker's
computer first instead of sending it to the original destination. As a result, both the user's data and
privacy are compromised.
64
QUESTION NO: 76
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
A.
Smurf attack
B.
VLAN hopping
C.
Bluesnarfing
D.
Spear phishing
Answer: B
Explanation:
The VoIP phone port can be used to attack a VLAN on the local network.
VLAN hopping is a computer security exploit, a method of attacking networked resources on a
Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host
on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.
QUESTION NO: 77
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without
any response from the server. Which of the following is the BEST explanation that describes this
scenario?
A.
Compromised system
B.
"Pass Any Exam. Any Time." - www.actualtests.com
65
Answer: A
Explanation:
As the extra unexplainable traffic comes from an internal host on your network we can assume
that this host has been compromised.
If your system has been compromised, somebody is probably using your machine--possibly to
scan and find other machines to compromise
QUESTION NO: 78
A technician needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted?
A.
DWDM
B.
MIMO
C.
TEMPEST
D.
DOCSIS
Answer: C
Explanation:
66
QUESTION NO: 79
A company has decided to update their usage policy to allow employees to surf the web
unrestricted from their work computers. Which of the following actions should the IT security team
implement to help protect the network from attack as a result of this new policy?
A.
Install host-based anti-malware software
B.
Implement MAC filtering on all wireless access points
C.
Add an implicit deny to the core router ACL
D.
Block port 80 outbound on the company firewall
E.
Require users to utilize two-factor authentication
Answer: A
Explanation:
To protect the computers from employees installing malicious software they download on the
internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware),
the attacker can then use that single computer to proceed further into the internal network using
the compromised host as a pivot point. The malware may have been implemented by an outside
attacker or by an inside disgruntled employee.
67
QUESTION NO: 80
Which of the following would be the result of a user physically unplugging a VoIP phone and
connecting it into another interface with switch port security enabled as the default setting?
A.
The VoIP phone would request a new phone number from the unified communications server.
B.
The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
C.
The VoIP phone would be able to receive incoming calls but will not be able to make outgoing
calls.
D.
The VoIP phone would request a different configuration from the unified communications server.
Answer: B
Explanation:
Without configuring any other specific parameters, the switchport security feature will only permit
one MAC address to be learned per switchport (dynamically) and use the shutdown violation
mode; this means that if a second MAC address is seen on the switchport the port will be
shutdown and put into the err-disabled state.
QUESTION NO: 81
A network technician has been tasked to configure a new network monitoring tool that will examine
interface settings throughout various network devices. Which of the following would need to be
configured on each network device to provide that information in a secure manner?
A.
S/MIME
B.
"Pass Any Exam. Any Time." - www.actualtests.com
68
Answer: D
Explanation:
The network monitoring need to use a network management protocol. SNMP has become the de
facto standard of network management protocols. The security weaknesses of SNMPv1 and
SNMPv2c are addressed in SNMPv3.
QUESTION NO: 82
A technician wants to securely manage several remote network devices. Which of the following
should be implemented to securely manage the devices?
A.
WPA2
B.
IPv6
C.
SNMPv3
D.
RIPv2
Answer: C
Explanation:
69
QUESTION NO: 83
A technician needs to secure web traffic for a new e-commerce website. Which of the following will
secure traffic between a web browser and a website?
A.
SSL
B.
DNSSEC
C.
WPA2
D.
MTU
Answer: A
Explanation:
Secure Sockets Layer (SSL) provides cryptography and reliability for upper layers (Layers 57) of
the OSI model. SSL (and TLS) provide secure web browsing (web traffic) via Hypertext Transfer
Protocol Secure (HTTPS).
QUESTION NO: 84
A company has seen an increase in ransomware across the enterprise. Which of the following
should be implemented to reduce the occurrences?
"Pass Any Exam. Any Time." - www.actualtests.com
70
Answer: C
Explanation:
Ransomware is a type of malware which restricts access to the computer system that it infects,
and demands a ransom paid to the creator(s) of the malware in order for the restriction to be
removed.
The best way to avoid ransomware include proactive measures like the following:
Dont click on any URL or open an attachment you are not expecting.
Implement an email content filtering service
Install a web content filtering service
Invest in leading end point security software solutions
QUESTION NO: 85
A company wants to make sure that users are required to authenticate prior to being allowed on
the network. Which of the following is the BEST way to accomplish this?
A.
802.1x
B.
802.1p
"Pass Any Exam. Any Time." - www.actualtests.com
71
Answer: A
Explanation:
For security purposes, some switches require users to authenticate themselves (that is, provide
credentials, such as a username and password, to prove who they are) before gaining access to
the rest of the network. A standards-based method of enforcing user authentication is IEEE
802.1X.
QUESTION NO: 86
A wireless network technician for a local retail store is installing encrypted access points within the
store for real-time inventory verification, as well as remote price checking capabilities, while
employees are away from the registers. The store is in a fully occupied strip mall that has multiple
neighbors allowing guest access to the wireless networks. There are a finite known number of
approved handheld devices needing to access the store's wireless network. Which of the following
is the BEST security method to implement on the access points?
A.
Port forwarding
B.
MAC filtering
C.
TLS/TTLS
D.
IP ACL
Answer: B
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
72
QUESTION NO: 87
A network technician has set up an FTP server for the company to distribute software updates for
their products. Each vendor is provided with a unique username and password for security.
Several vendors have discovered a virus in one of the security updates. The company tested all
files before uploading them but retested the file and found the virus. Which of the following could
the technician do for vendors to validate the proper security patch?
A.
Use TFTP for tested and secure downloads
B.
Require biometric authentication for patch updates
C.
Provide an MD5 hash for each file
D.
Implement a RADIUS authentication
Answer: C
Explanation:
If we put an MD5 has for each file we can see if the file has been changed or not.
MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message
digest from data input (which may be a message of any length) that is claimed to be as unique to
that specific data as a fingerprint is to the specific individual.
73
Answer: C,D,E
Explanation:
Physical security is the protection of personnel, hardware, programs, networks, and data from
physical circumstances and events that could cause serious losses or damage to an enterprise,
agency, or institution. This includes protection from fire, natural disasters, burglary, theft,
vandalism, and terrorism.
C: A mantrap is a mechanical physical security devices for catching poachers and trespassers.
They have taken many forms, the most usual being like a large foothold trap, the steel springs
being armed with teeth which met in the victim's leg.
D: Biometric authentication is a type of system that relies on the unique biological characteristics
of individuals to verify identity for secure access to electronic systems. Biometric authentication is
a physical security device.
E: Cipher locks are used to control access to areas such as airport control towers, computer
rooms, corporate offices, embassies, areas within financial institutions, research and development
laboratories, and storage areas holding weapons, controlled substances, etc. Cipher locks are
"Pass Any Exam. Any Time." - www.actualtests.com
74
QUESTION NO: 89
Which of the following physical security controls prevents an attacker from gaining access to a
network closet?
A.
CCTVs
B.
Proximity readers
C.
Motion sensors
D.
IP cameras
Answer: B
Explanation:
A proximity card is a physical card which used to get access to a physical area such as a network
closet.
It is a "contactless" smart card which can be read without inserting it into a reader device, as
required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards. The
proximity cards are part of the Contactless card technologies. Held near an electronic reader for a
moment they enable the identification of an encoded number.
Note: Physical security is the protection of personnel, hardware, programs, networks, and data
from physical circumstances and events that could cause serious losses or damage to an
enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary,
theft, vandalism, and terrorism.
75
Answer: C
Explanation:
A host-based firewall is a computer running firewall software that can protect the computer itself.
For example, it can prevent incoming connections to the computer and allow outbound
communication only.
QUESTION NO: 91
A technician is setting up a computer lab. Computers on the same subnet need to communicate
with each other using peer to peer communication. Which of the following would the technician
MOST likely configure?
A.
Hardware firewall
B.
Proxy server
C.
Software firewall
"Pass Any Exam. Any Time." - www.actualtests.com
76
Answer: C
Explanation:
A host-based firewall is a computer running firewall software that can protect the computer itself. A
software firewall would be the most cost effective in a lab scenario.
QUESTION NO: 92
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the
DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the
10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners
would meet the company's objectives?
A.
11, 10, 12, 13
B.
12, 10, 11, 13
C.
13, 10, 12, 11
D.
13, 12, 11, 10
77
ACL are processed in TOP DOWN process in routers or switches. This means that when a
condition in the ACL is met, all processing is stopped.
We start by allowing any protocol on the 10.200.0.0/16 subnet:11. Allow 10.200.0.0/16 to Any
DMZ eq to Any
We then deny any traffic on TCP port 22:10. Deny Any Trust to Any DMZ eq to TCP port 22
We allow browsing (port 80 and 443) on the 10.0.0.0/8 subnet:Allow 10.0.0.0/8 to Any DMZ eq to
TCP ports 80, 443
Finally we deny all other traffic:13. Deny Any Trust to Any DMZ eq to Any
QUESTION NO: 93
A technician is installing a surveillance system for a home network. The technician is unsure which
ports need to be opened to allow remote access to the system. Which of the following should the
technician perform?
A.
Disable the network based firewall
B.
Implicit deny all traffic on network
C.
Configure a VLAN on Layer 2 switch
D.
Add the system to the DMZ
Answer: D
Explanation:
78
QUESTION NO: 94
The ability to make access decisions based on an examination of Windows registry settings,
antivirus software, and AD membership status is an example of which of the following NAC
features?
A.
Quarantine network
B.
Persistent agents
C.
Posture assessment
D.
Non-persistent agents
Answer: C
Explanation:
Network Admission Control (NAC) can permit or deny access to a network based on
characteristics of the device seeking admission, rather than just checking user credentials. For
example, a clients OS, Windows Registry settings, AD membership status, and version of
antivirus software could be checked against a set of requirements before allowing the client to
access a network.
This process of checking a clients characteristics is called posture assessment.
79
QUESTION NO: 95
Which of the following types of network would be set up in an office so that customers could
access the Internet but not be given access to internal resources such as printers and servers?
A.
Quarantine network
B.
Core network
C.
Guest network
D.
Wireless network
Answer: C
Explanation:
A wireless guest network could be set up so that it has limited access (no access to local
resources) but does provide Internet access for guest users.
QUESTION NO: 96
Which of the following is a security benefit gained from setting up a guest wireless network?
A.
Optimized device bandwidth
B.
Isolated corporate resources
C.
Smaller ACL changes
D.
"Pass Any Exam. Any Time." - www.actualtests.com
80
Answer: B
Explanation:
A wireless guest network could be set up so that it has limited access (no access to local
resources) but does provide Internet access for guest users. The corporate resources would be
inaccessible (isolated) from the guest network.
QUESTION NO: 97
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep
within the directory structure. To ensure the virus has not infected the .mp4 files in the directory,
she views one of the files and believes it contains illegal material. Which of the following forensics
actions should Ann perform?
A.
Erase the files created by the virus
B.
Stop and escalate to the proper authorities
C.
Check the remaining directories for more .mp4 files
D.
Copy the information to a network drive to preserve the evidence
Answer: B
Explanation:
Computer forensics is about legal evidence found in computers and digital storage.
A plan should include first responders securing the area and then escalating to senior
management and authorities when required by policy or law.
"Pass Any Exam. Any Time." - www.actualtests.com
81
QUESTION NO: 98
A network technician was tasked to respond to a compromised workstation. The technician
documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which
of the following steps of incident handling has been incorrectly performed?
A.
Document the scene
B.
Forensics report
C.
Evidence collection
D.
Chain of custody
Answer: D
Explanation:
To verify the integrity of data since a security incident occurred, you need to be able to show a
chain of custody.
A chain of custody documents who has been in possession of the data (evidence) since a security
breach occurred. A well-prepared organization will have process and procedures that are used
when an incident occurs.
A plan should include first responders securing the area and then escalating to senior
management and authorities when required by policy or law. The chain of custody also includes
documentation of the scene, collection of evidence, and maintenance, e-discovery (which is the
electronic aspect of identifying, collecting, and producing electronically stored information),
transportation of data, forensics reporting, and a process to preserve all forms of evidence and
data when litigation is expected. The preservation of the evidence, data, and details is referred to
as legal hold.
Topic 4, Troubleshooting
"Pass Any Exam. Any Time." - www.actualtests.com
82
Answer: D
Explanation:
The technician has already identified the symptom: Loss of connectivity on a specific network
segment. The next step in identifying the problem is to Determine if anything has changed.
Common troubleshooting steps and procedures:
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
Determine if anything has changed.
2. Establish a theory of probable cause.
Question the obvious.
3. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.
If theory is not confirmed, re-establish a new theory or escalate.
4. Establish a plan of action to resolve the problem and identify potential effects.
"Pass Any Exam. Any Time." - www.actualtests.com
83
Answer: C
Explanation:
The user has already provided you with the information relevant to the first step in the 7-step
troubleshooting process. The next step is to Question the obvious. The user has stated: his
colleagues are able to print their documents to the same shared printer. The obvious question in
this instance is whether the user can access any network resources.
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
"Pass Any Exam. Any Time." - www.actualtests.com
84
Answer: B
Explanation:
85
86
Answer: C,E
Explanation:
WPA2 makes use of the Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol (CCMP) encryption protocol, which is an AES based protocol.
The output shows that the wireless network operates on channel 149, which is a channel in the
5GHz band.
87
Answer: D
Explanation:
The ipconfig command displays the TCP/IP configuration of a Windows system. The ipconfig /all
command displays the systems TCP/IP configuration in detail. This output includes whether
DHCP is enabled or not.
88
Answer: C
Explanation:
Tracert makes use of ICMP echo packets to trace the route between two hosts. For the command
to be successful, the firewall has to allow incoming echo replies and outgoing echo requests.
89
The tracert command is used to determine the amount of hops a packet takes to reach a
destination. It makes use of ICMP echo packets to report information at every step in the journey.
This is how the path taken across the network is obtained.
Answer: B
Explanation:
Address Resolution Protocol (ARP) is used to resolve IP addresses to MAC addresses. The arp
s command adds a static permanent address to the ARP cache. This will allow the administrator
"Pass Any Exam. Any Time." - www.actualtests.com
90
Answer: B
Explanation:
The show mac address-table command is used to view the ageing timer, and also the unicast and
multicast MAC addresses stored in the MAC address table by the switch. Furthermore, you can
view all of the addresses in the table or only the addresses learned or specified on a particular port
or VLAN.
91
Answer: D
Explanation:
Toner probes are specifically used to trace cables hidden in floors, ceilings, or walls. They can
also be used to track cables from the patch panels to their destinations.
92
The user is connecting to an SSID assigned to a different subnet. Therefore, the user has access
to SMB shares and printers that are not recognizable.
Answer: D
Explanation:
A rogue access point is when a wireless access point is located on a network without the
administrator being aware of it. Therefore, if the device was not installed by the networking team,
the administrator would not know about it being there.
93
Answer: D
Explanation:
The signal between the access point and Anns wireless device is being bounced off walls,
windows, glass mirrors, carpeted floors, and many other objects. This results in the slow
connection. The radio waves are travelling at the same rate, but as a result of signal bounce, it's
taking longer to reach its destination.
94
95
96
Explanation:
Since we know that the network was running perfectly before replacing AP2 we should start by
looking at this new device that was used to replace the old one. Here we see that the other APs
"Pass Any Exam. Any Time." - www.actualtests.com
97
Answer: C
98
The sporadic wireless connectivity is being caused by interference. Moving the access point to a
different location would solve the problem.
Answer: B
Explanation:
When cables are installed near electrical devices the signal within the cable might become corrupt.
The cable connecting the control station to the switch port is now surrounded by the production
machinery. Electromagnetic interference could occur when the machinery is running, causing the
intermittent operation.
99
Answer: D
Explanation:
The question states that the device worked on a different port. This indicates that the wiring is
faulty.
100
Answer: A
Explanation:
A multiplexer (or mux) is a device that selects one of several analog or digital input signals and
forwards the selected input into a single line. A demultiplexer (or demux) is a device taking a
single input signal and selecting one of many data-output-lines, which is connected to the single
input. Since the signal going in is good, the problem must be with the signal output. If the correct
wavelength was demultiplexed, the interface will be displayed on the router.
Answer: D
Explanation:
101
Answer: A
Explanation:
A missing or incorrect default gateway parameter limits communication to the local segment.
The question states: All users on the new access point and the main network can ping each other
and utilize the network printer, but all users on the new router cannot get to the Internet.
102
Answer: C
Explanation:
If a DHCP server fails, the workstations are assigned an address from the 169.254.0.0 address
range by Automatic Private IP Addressing (APIPA). APIPA also configures a suitable subnet
mask, but it doesnt configure the system with a default gateway address. This allows
communication on the local network, but not externally.
103
Answer: D
Explanation:
The output appears to be a result of running the netstat r command. If the default gateway was
present, the first line would show the Network Destination as 0.0.0.0 and the Netmask as 0.0.0.0.
104
Answer: E,F
Explanation:
According to the IP Address Range Calculator, for the given subnet mask and the IP range
address range assigned by the ISP, the first host address should be 10.10.150.17 and the
broadcast address should be 10.10.150.31. Therefore, the router interface is configured with the
incorrect IP address and the default gateway is configured incorrectly.
105
106
107
108
109
Explanation:
The default gateway must be on the same network as the nodes that use it. Therefore, the subnet
on PC3 and the default gateway on PC4 must be modified.
References:
Dulaney, Emmett and Mike Harwood, CompTIA Network+ Authorized Exam Cram, Fourth Edition,
Pearson, Indianapolis, 2012, p 101.
http://www.subnetonline.com/pages/subnet-calculators/ip-subnet-calculator.php
"Pass Any Exam. Any Time." - www.actualtests.com
110
Answer: C
Explanation:
If a port is accidentally assigned to the wrong VLAN in a switch, its as if that client was magically
transported to another place in the network. This would explain the inability to communication with
the printer, as it is on a different VLAN.
111
Answer: A
Explanation:
Proxy servers act as an intermediary for requests from clients seeking resources from other
servers. If the DNS server is not communicating with the proxy server, these requests are not
forwarded. Therefore, updating the DNS server with the proxy server information will solve the
problem.
Answer: B
Explanation:
112
Answer: D
Explanation:
Devices of different types are connected with a straight through cable (patch cable). In this case, it
is used to connect two devices of the same type. It is for this reason that the interface will display
the line protocol down status.
113
Answer: D
Explanation:
Routing loops occur when the routing tables on the routers are slow to update and a redundant
communication cycle is created between routers. Split horizon, which prevents the router from
advertising a route back to the other router from which it was learned, can be used to resist routing
loops. Poison reverse, also known as split horizon with poison reverse, is also used to resist
routing loops.
Answer: C
"Pass Any Exam. Any Time." - www.actualtests.com
114
The local hosts file is a text file that contains hostname-to-IP address mappings. By default, host
to IP address mappings that are configured in the Hosts file supersede the information in DNS. If
there is an entry for a domain name in the Hosts file, then the server will not attempt to query DNS
servers for that name. Instead, the IP address that is configured in the Hosts file will be used. If the
IP address corresponding to a name changes and the Hosts file is not updated, you may be
unable to connect to the host.
Answer: B
Explanation:
Latency in this instance is the time it takes for the signal to and from the satellite. Since signal has
to travel to the satellite, then from the satellite to the ground station, and then out to the Internet (or
IP WAN). Not forgetting the return trip, and processing delays.
115
Answer: B
Explanation:
The bottom layer of the OSI reference model is Layer 1, the physical layer.
The physical layer is the layer that defines the hardware elements of a network.
These elements include:
Network Interface Cards
Network topology
Network cabling
The type of signals used for data transmissions
When troubleshooting a network connectivity issue, the first thing you would check is the
computers network cabling, the network card etc. In other words, the computers physical
connection to the network.
116
Answer: A
Explanation:
The bottom layer of the OSI reference model is Layer 1, the physical layer.
The physical layer is the layer that defines the hardware elements of a network.
These elements include:
Network Interface Cards
Network topology
Network cabling
The type of signals used for data transmittions
In this question, the network engineer flipped the laptop's wireless switch on to resolve the issue.
The laptop was unable to connect to the wireless network because the wireless network interface
card was switched off. Switching the wireless network interface card on enabled the laptop to
connect to the wireless network. The wireless network interface card is a physical layer device.
"Pass Any Exam. Any Time." - www.actualtests.com
117
Answer: A,E
Explanation:
Layer 2 of the OSI reference model is the data-link layer. Components of the data-link layer
include frame-format, Media Access Control (MAC) addressing, protocol identification and error
detection.
When data is being sent, it is split into protocol data units (PDUs) as it passes through the layers
of the OSI model. The PDUs have different names as they are passed through the layers of the
OSI model. In layer 2, the PDU is called a Frame.
The most common protocol specified in the data-link layer is Ethernet and the most common
network component in the data-link layer is a network switch.
In this question, problems are discovered with Ethernet frames by examining the logs in a network
switch. Therefore, for this question, we are working in Layer 2, the data-link layer.
118
Answer: A
Explanation:
If we look at the Source Mac column, we can see two different MAC addresses. Every network
interface card has a unique MAC address. These are the network cards in the two separate
computers.
If we look in the Source IP column, we can see that the two network cards have been assigned the
same IP address (192.168.1.10). This is the problem in this question. The error message on the
screens will be saying that An IP conflict exists. Every network card connected to the network
needs to be configured with a different IP address.
As the problem is with the IP address configuration of the two computers, we know that the
problem is occurring at the Network layer (layer 3) of the OSI model. The network layer is
"Pass Any Exam. Any Time." - www.actualtests.com
119
Answer: A
Explanation:
120
Answer: C
Explanation:
121
Answer: A
Explanation:
In this question, we need a wireless network that operates at a frequency higher than the 2.4GHz
frequency.
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The
802.11 standards commonly used today to provide wireless connectivity in home or office wireless
networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
The 802.11a standard supports speeds up to 54Mbps and uses the 5-GHz band.
122
Answer: C
Explanation:
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The
802.11 standards commonly used today to provide wireless connectivity in home or office wireless
networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
802.11b supports speeds up to 11Mbps and uses the 2.4GHz frequency.
In this question, the user is using an 802.11n WLAN card. Although the 802.11n WLAN card can
support speeds up to 300Mbps, the user is only able to connect at 11Mbps because the user is
connected to a wireless network configured to use 802.11b.
123
In this question, we need a wireless network capable of supporting HD video streaming to multiple
devices. We therefore need the fastest wireless network speed available.
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The
802.11 standards commonly used today to provide wireless connectivity in home or office wireless
networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
The 802.11ac standard is the fastest wireless network supporting speeds of over 3Gbps and uses
the 5-GHz band.
Answer: A
Explanation:
124
Answer: B
Explanation:
The question states that the equipment is old and that CAT3 cabling is being used.
10BaseT Ethernet networks are old and slow by todays standards. 10BaseT Ethernet networks
use CAT3 UTP cabling and offer a maximum bandwidth of just 10Mpbs.
A new host computer nowadays will have a network card that supports 1000Mpbs to be used with
CAT5, CAT5e or CAT6 network cables in a 1000BaseT network. In this question, we need to
check that the network card on the new host computer is backward-compatible with the old
10BaseT network.
"Pass Any Exam. Any Time." - www.actualtests.com
125
Answer: C
Explanation:
AUP stands for Acceptable Use Policy. An Acceptable Use Policy defines what a user can or
cannot do with his or her computer during business hours. For example, using the companys
Internet connection to look at the sports scores on a sports website may be deemed inappropriate
or unacceptable during business hours. Other examples include the use of social media websites
such as Facebook or using Instant Messaging clients to chat to your friends.
126
Answer: B
Explanation:
SLA stands for Service Level Agreement. This is a common document in business used to define
a minimum standard of service that a customer can expect from a supplier. SLAs are particularly
common in the I.T. sector where a service provider is offering a service to a customer. As a
customer, you want your hosted services and Internet or WAN connections to be available all the
time. SLAs often guarantee 99.9% uptime for a service.
In this question, the service provider is providing WAN links to remote sites with a guaranteed
bandwidth on the WAN links. A failure to maintain the connectivity to the remote sites would be a
violation of the Service Level Agreement (SLA).
127
SOW stands for Statement of Work. When a company has been hired for a project that involves
many tasks, a statement of work is often issued at the start of the project.
The SOW will outline the tasks or activities in a project, their costs and the timelines for
deliverables within the project. In an IT project, the SOW would define what tasks will be
performed (hardware and software upgrades etc.), why the work is being done and how long each
stage of the project will take.
Answer: B
Explanation:
MSDS stands for Material Safety Data Sheet. An MSDS is a health and safety document that
contains information on the potential hazards of working with a chemical product and how to work
safely with the chemical product.
In this question, the thermal compound is a chemical product so the MSDS will provide information
"Pass Any Exam. Any Time." - www.actualtests.com
128
Answer: A
Explanation:
Fire suppression systems are often deployed in server rooms to prevent a fire destroying all the
I.T. equipment. Different fire suppression systems work in different ways. Obviously a fire
suppression system that sprays water onto the fire is no good for a server room as the water
would do as much damage as the fire. A common fire suppression system used in server rooms is
one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from
the server room is to fill the server room with an inert gas such as carbon dioxide.
129
Answer: B
Explanation:
MDF stands for Main Distribution Frame. A Main Distribution Frame is a commonly a long steel
rack accessible from both sides. On one side of the rack is cabling that connects the service
providers network. The other side of the rack is for the connections to the customers equipment.
130
Answer: C,E
Explanation:
By labeling each wall plate (where the plotters network cables plug in to) and the patch panel
ports (where the cables connecting to each wall plate terminate), well be able to see which device
is connected to which port. If equipment moves are required, we will be able to easily see which
patch cables need to be moved in the patch panel.
Answer: D
Explanation:
The building in this question has several floors and the floors are large enough to be identified by
area such as west side etc. It is likely that a logical diagram of the network in such a building
would be quite complicated and the network is likely to have several switches.
"Pass Any Exam. Any Time." - www.actualtests.com
131
Answer: D
Explanation:
132
Answer: D
Explanation:
HTTPS stands for HTTP over SSL or HTTP Secure. It is used for secure access to websites. Port
80 web sessions are HTTP (HyperText Transfer Protocol) sessions which offers no security. Port
443 web sessions use HTTPS. HTTPS uses SSL or TLS to encrypt the HTTP traffic.
HTTPS provides authentication of the website and associated web server that you are
communicating with, which protects against man-in-the-middle attacks. Additionally, it provides
bidirectional encryption of communications between a client and server, which protects against
eavesdropping and tampering with and/or forging the contents of the communication.
133
Answer: B
Explanation:
Transmission Control Protocol (TCP) is a connection-oriented transport protocol. Connectionoriented transport protocols provide reliable transport. When a computer wants to send data to
another computer, TCP will first establish a connection between the two computers. When a
sending computer sends data segments, the receiving computer acknowledges receipt of the
segments. If the receiving computer does not receive an expected segment, the sending computer
will send it again.
User Datagram Protocol (UDP) is a connectionless transport protocol. Connectionless transport
protocols provide unreliable transport. With UDP, there is no connection establishment between
the sending and receiving computers. If a data segment is lost in transit, the sending computer will
not know about it so it will not resend the segment.
TCP uses control messages to manage the process of contact and communication. TCP uses a
set of control flags in the TCP header to indicate whether a segment is being used for control
purposes or just to carry data.
134
Answer: D
Explanation:
UDP is a connectionless transport protocol that operates in the transport layer of the OSI model.
UDP stands for User Datagram Protocol. PDUs (Protocol Data Units) used by UDP are known as
Datagrams.
135
Answer: A,B
Explanation:
FTP (File Transfer Protocol) is used for transferring files between an FTP client and an FTP
server. FTP uses TCP Ports 20 and 21.
Answer: D
Explanation:
The question states that the TFTP server is installed on the administrative segment of the
network. This implies that the network has multiple segments (subnets) and TFTP server is on a
different network segment to other computers.
For a computer on one subnet to connect to a computer on a different subnet, a router is required
"Pass Any Exam. Any Time." - www.actualtests.com
136
Answer: B
Explanation:
RDP (Remote Desktop Protocol) is used for connecting to a remote Windows computer. When
using RDP to connect to a remote Windows computer, you can view and control the desktop of the
remote computer. RDP uses TCP port 3389.
137
138
139
Answer:
Explanation:
140
141
Answer:
Explanation:
142
After you fix AP2, you must click on the switch, which will bring up the switch interface. Type in the
two commands that they show there, to prove the fix. Do not worry that interface 4 is down, there
is no interface 4 for you to do
143
Answer:
Explanation:
144
145
Answer:
Explanation:
146
Answer:
147
Answer:
148
Explanation:
149
Answer:
150
Explanation:
151
Answer:
Explanation:
152
Complete the network by dragging the required objects into the diagram
"Pass Any Exam. Any Time." - www.actualtests.com
153
Answer:
Explanation:
154
155
Explanation:
This simulation is still under construction. On the first exhibit, the layout should be as follows
Access Point Name AP1
IP Address 192.168.1.3
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes
Mode G
Channel 1
Speed Auto
Duplex Auto
WPA
Passphrase S3cr3t!
"Pass Any Exam. Any Time." - www.actualtests.com
156
157
Answer: B
Explanation:
158
Answer: A
Explanation:
Answer: D
Explanation:
159
Answer: C
Explanation:
160
Answer: D
Explanation:
161
Answer: B
Explanation:
Answer: D
162
Answer: B
Explanation:
163
Answer: D
Explanation:
Answer: C
Explanation:
164
Answer: D
Explanation:
165
Answer: B
Explanation:
166
Answer: B,C
Explanation:
Answer: C
Explanation:
167
Answer: C
Explanation:
168
Answer: D,E
Explanation:
Answer: B
Explanation:
169
Answer: D
Explanation:
170
Answer: A
Explanation:
Answer: D
Explanation:
171
Answer: C
Explanation:
172
Answer: C
Explanation:
Answer: B
Explanation:
173
Answer: B
Explanation:
PC 1 cannot connect to Server A. PC 1 and Server A are on different subnets that are connected
by Router A. PC 1 can connect to Router A; therefore there is no problem with the link or IP
address configuration between PC 1 and Router A.
PC 2, which is on the same subnet as Server A, can connect to Server A; therefore Server A is up.
As PC 1 can connect to Router A but cannot connect to Server A, and Server A is up; the problem
must be the connection (link) between Router A and Server A.
174
Answer: B
Explanation:
Answer: C
Explanation:
175
Answer: B
Explanation:
176
Answer: A
Explanation:
Answer: A
Explanation:
177
Answer: E
Explanation:
178
Answer: D
Explanation:
179
Answer: C
Explanation:
180
Answer: D
Explanation:
Answer: B
Explanation:
181
Answer: A,F
Explanation:
182
Answer: A
Explanation:
Answer: B
Explanation:
183
Answer: A
Explanation:
184
Answer: A
Explanation:
185
Answer: D,F
Explanation:
186
Answer: C
Explanation:
187
Answer: A
Explanation:
188
Answer: C
Explanation:
Answer: D
Explanation:
189
Answer: D
Explanation:
190
Answer: B
Explanation:
Answer: D
Explanation:
191
Answer: A
Explanation:
Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
192
Answer: C
Explanation:
193
Answer: B
Explanation:
Answer: D
Explanation:
194
Answer: B
Explanation:
195
Answer: A,B
Explanation:
Answer: B
Explanation:
196
Answer: B
Explanation:
197
Answer: B
Explanation:
198
Answer: D
Explanation:
Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
199
Answer: C
Explanation:
200
Answer: E
Explanation:
Answer: A
Explanation:
201
Answer: C
Explanation:
202
Answer: C
Explanation:
Answer: C
Explanation:
Answer: B
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
204
Answer: C
Explanation:
205
Answer: C
Explanation:
Answer: B
Explanation:
206
Answer: D
Explanation:
A.
Wavelength mismatch
B.
Distance limitations
C.
Connector mismatch
D.
Attenuation/Db loss:
"Pass Any Exam. Any Time." - www.actualtests.com
207
A.
Warrant
B.
Legal document
C.
Chain of custody
D.
Forensic report
E.
Documentation of the scene
Answer: C
Explanation:
208
Answer: B,C
Explanation:
A.
IGRP
B.
IS-IS
C.
RIPv1
D.
STP
Answer: B
Explanation:
209
Answer: D
Explanation:
210
Answer: B
Explanation:
Answer: D
Explanation:
211
Answer: D
Explanation:
212
Answer: C
Explanation:
213
Answer: A
Explanation:
Answer: D
Explanation:
214
Answer: D
Explanation:
215
Answer: B
Explanation:
Answer: C
Explanation:
216
Answer: D
Explanation:
217
Answer: A
Explanation:
Answer: A
Explanation:
218
Answer: A
Explanation:
219
Answer: C
Explanation:
220
Answer: C
Explanation:
Answer: B
Explanation:
221
Answer: D
Explanation:
222
Answer: C
Explanation:
Answer: A
Explanation:
223
Answer: D
Explanation:
Answer: B
"Pass Any Exam. Any Time." - www.actualtests.com
224
Answer: D
Explanation:
225
Answer: A
Explanation:
Answer: C
Explanation:
226
Answer: C
Explanation:
227
Answer: A
Explanation:
Answer: A
Explanation:
228
Answer: B
Explanation:
Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
229
Answer: A,F
Explanation:
230
Answer: B
Explanation:
Answer: D
Explanation:
231
Answer: C
Explanation:
232
Answer: D
Explanation:
Answer: D
Explanation:
233
Answer: B
Explanation:
234
Answer: B
Explanation:
Answer: D
Explanation:
235
Answer: E
Explanation:
236
Answer: D
Explanation:
Answer: B,C
Explanation:
237
Answer: A
Explanation:
238
Answer: A
Explanation:
239
Answer: A
Explanation:
240
Answer: D
Explanation:
241
Answer: A
Explanation:
Answer: A
Explanation:
242
Answer: A
Explanation:
243
Answer: B
Explanation:
Answer: D
Explanation:
244
Answer: A
Explanation:
Answer: D
Explanation:
245
Answer: C
Explanation:
246
Answer: C
Explanation:
Answer: A
Explanation:
247
Answer: B
Explanation:
Answer: D
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
248
Answer: A
Explanation:
249
Answer: A
Explanation:
Answer: B
Explanation:
250
Answer: C
Explanation:
251
Answer: A
Explanation:
Answer: C
Explanation:
253
Answer: C
Explanation:
254
Answer: B
Explanation:
Answer: B
"Pass Any Exam. Any Time." - www.actualtests.com
255
Answer: D
Explanation:
Answer: D
Explanation:
257
258