Test Out Final Test Practice
Test Out Final Test Practice
sharing and printing roles. Other hosts access those resources, but they don't host
services of their own.
Which type of network do you have?
Answer
Intranet
Correct Answer:
Client-server
Peer-to-peer
Extranet
Explanation
In a client-server network, hosts have specific roles. For example, some hosts are
assigned server roles, which allow them to provide network resources to other hosts.
Other hosts are assigned client roles, which allow them to consume network
resources.
In a peer-to-peer network, each host can provide network resources to other hosts or
access resources located on other hosts, and each host is in charge of controlling
access to those resources.
An intranet is a private network that uses internet technologies. Services on an
intranet are only available to hosts that are connected to the private network.
An extranet is a private network that uses internet technologies, but whose
resources are made available to external (but trusted) users. For example, you might
create a website on a private network that only users from a partner company can
access.
References
Question 2:
Correct
Which of the following geographic network types is typically managed by a city as a
public utility?
Answer
Explanation
A metropolitan area network (MAN) is a network that can cover an entire city. A city
typically owns and manages a MAN as a public utility.
A PAN is a small network for communication between personal devices. A LAN is
contained to an office and managed by a business.
A WAN is a collection of LANs that are connected together to form a large
internetwork. WAN connections are typically managed by an ISP.
References
•
2.1.4 Networking Facts
q_intro_network_man_np6.question.fex
Question 3:
Correct
You've implemented a network where each device provides all other devices on the
network with access to shared files.
Which type of network do you have?
Answer
Polling
Client-server
Multiple access
Correct Answer:
Peer-to-peer
Explanation
In a peer-to-peer network, each host can provide network resources to other hosts or
access resources located on other hosts, and each host is in charge of controlling
access to those resources.
In a client/server network, hosts have specific roles. For example, some hosts are
assigned server roles, which allow them to provide network resources to other hosts.
Other hosts are assigned client roles, which allow them to consume network
resources.
Polling is a media access method where a single device grants permission to other
devices to access the network.
Multiple access describes a media access method where each device determines
when the medium is free.
References
Question 4:
Correct
You have a network that uses a logical bus topology. How do messages travel
through the network?
Answer
Messages travel from one device to the next until they reach the destination device.
Correct Answer:
Messages are broadcast to all devices connected to the network.
Messages are sent to a central device that forwards them to the destination devices.
Explanation
Messages sent using a physical bus topology are broadcast to all devices on the
network.
The device in the middle of a star topology, which is typically a hub, receives the
message and forwards it on to all other devices.
In a ring topology, messages travel from one device to the next until they reach the
destination device.
References
Question 5:
Correct
You have a network that uses a logical ring topology. How do messages travel
through the network?
Answer
Messages are sent to a central device that forwards them to the destination devices.
Correct Answer:
Messages travel from one device to the next until they reach the destination device.
Explanation
In a logical ring topology, messages travel to each device in turn. If the message isn't
intended for that device, the message is forwarded to the next device on the
network.
Messages sent using a physical bus topology are broadcast to all devices on the
network.
The device in the middle of the star topology, which is typically a hub, receives the
message and forwards it on to all other devices.
References
Question 6:
Correct
Your manager has asked you to implement a wired network infrastructure that will
accommodate failed connections. You don't have a large budget, so you decide to
provide redundancy for only a handful of critical devices.
Which of the following network topologies should you implement?
Answer
Full mesh
Correct Answer:
Partial mesh
Bus
Star
Explanation
In a partial mesh topology, only some redundant paths exist. A partial mesh topology
is more practical and less expensive than a full mesh topology.
In a full mesh topology, every device has a point-to-point connection with every other
device. This provides full redundancy, but it's expensive and impractical.
A star topology connects network devices to the network with a single patch cable. A
patch cable failure makes the connected device unavailable.
A bus topology has a single point of failure. If there's a break in the network media,
the network becomes unavailable.
References
Question 7:
Correct
Which of the following topologies connects all devices to a trunk cable?
Answer
Star
Ring
Correct Answer:
Bus
Mesh
Explanation
References
Question 8:
Correct
Your manager has asked you to implement a network infrastructure that will
accommodate failed connections.
Which of the following network topologies provides redundancy for a failed link?
Answer
Correct Answer:
Mesh
Ring
Star
Bus
Explanation
In a mesh topology, each network device is interconnected with all other network
nodes. This creates multiple data paths. If a link fails, the data has an alternate route
to its destination.
A star topology connects network devices to the network with a single patch cable. A
patch cable failure makes the connected device unavailable.
A bus topology has a single point of failure. If there's a break on the network
medium, the network becomes unavailable.
A single break on a physical ring topology disables the network.
References
Question 9:
Correct
Which of the following topologies connects each device to a neighboring device?
Answer
Star
Correct Answer:
Ring
Mesh
Bus
Explanation
References
Question 10:
Correct
You have a small network that uses a switch to connect multiple devices. Which
physical topology are you using?
Answer
Correct Answer:
Star
Bus
Mesh
Ring
Explanation
A switch creates a network with a physical star topology. The physical star topology
uses a logical bus topology and sends messages to all the devices connected to the
hub.
A mesh topology is a series of point-to-point links between devices.
A ring topology uses a central device called an MSAU.
A bus topology connects all devices to a trunk cable.
References
Explanation
The Application layer enables network services and integrates network functionality
into the host operating system. Applications actually run above the OSI Application
layer.
The setup, maintenance, and teardown of communication happens at the Session
layer.
The Data Link layer controls the rate of data transmission between hosts (flow
control).
The Physical layer sets standards for sending and receiving electrical signals
between devices.
References
Question 2:
Correct
Which of the following are included as part of the Data Link layer specifications?
(Select two.)
Answer
Physical topology
Correct Answer:
Data transmission between hosts
Cable and connector specifications
Correct Answer:
Physical network device identification
Explanation
The Data Link layer controls device identification on networks, as well as how
messages travel through the network (the logical topology).
The other functions listed here are performed by the Physical layer.
References
Question 3:
Correct
In the OSI model, what is the primary function of the Network layer?
Answer
Correct Answer:
Route messages between networks.
Explanation
References
Question 4:
Correct
What is the basic purpose of the OSI Physical layer?
Answer
Correct Answer:
Coordinate rules for sending and receiving electrical signals.
Explanation
The OSI Physical layer sets standards for sending and receiving electrical signals
between devices.
The Data Link layer defines how physical network devices are identified on a
network and when devices have access to the LAN.
The Network layer maintains a list of known networks and neighboring routers.
References
Question 5:
Correct
In the OSI model, which of the following functions are performed at the Presentation
layer? (Select two.)
Answer
Correct Answer:
Data encryption and compression
Network services
Correct Answer:
Data format specifications
Explanation
The Presentation layer encrypts data, changes and converts character sets, and
compresses data. File formats (such as .jpg, .wmv, and .wav) are part of the
Presentation layer.
The Application layer provides network services.
End-to-end flow control is provided by the Transport layer.
Frame transmission occurs at the Physical layer.
References
Question 6:
Correct
Which of the following tasks is associated with the Session layer?
Answer
IP address assignment
Explanation
References
Question 7:
Correct
During TCP/IP communication between two network hosts, information is
encapsulated on the sending host and decapsulated on the receiving host using the
OSI model.
Match the information format on the left with the appropriate layer of the OSI model
on the right.
Transport layer
Segments
correct answer:
Network layer
Packets
correct answer:
Data Link layer
Frames
correct answer:
Physical layer
Bits
correct answer:
Keyboard Instructions
Explanation
References
Question 8:
Correct
Which of the following functions are performed by the OSI Transport layer? (Select
three.)
Answer
Packet formatting for delivery through the medium
Correct Answer:
End-to-end flow control
Explanation
The Transport layer is responsible for breaking upper-layer data into segments and
allowing reliable communication through end-to-end flow control, error detection, and
error correction.
Message transmission through a medium is performed at the Physical layer.
Media access, logical topology, and device identification occur at the Data Link layer.
Path identification and selection is a function of the Network layer.
Data formatting is performed at the Presentation layer.
References
Question 9:
Correct
Match each networking function or device on the left with its associated OSI model
layer on the right.
Application layer
HTTP
correct answer:
Presentation layer
Translates data
correct answer:
Session layer
Session ID number
correct answer:
Transport layer
Port number
correct answer:
Network layer
Router
correct answer:
Data Link layer
Switch
correct answer:
Physical layer
Modem
correct answer:
Keyboard Instructions
Explanation
The following table describes how devices function at different layers of the OSI
model:
HTTP functions at the Application layer.
Encapsulation happens at the Presentation layer.
Session IDs are assigned at the Session layer.
Port numbers are assigned at the Transport layer.
Routers function at the Network layer.
Switches function at the Data Link layer.
Modems function at the Physical layer.
References
Question 10:
Correct
Match each layer of the TCP/IP model on the left with the corresponding layer of the
OSI model on the right. Each option on the left can be used more than once.
Presentation layer
Application
correct answer:
Data Link layer
Network
correct answer:
Application layer
Application
correct answer:
Session layer
Application
correct answer:
Network layer
Internetwork
correct answer:
Transport layer
Transport
correct answer:
Keyboard Instructions
Explanation
References
Sequencing
Segmentation
Transformation
Correct Answer:
Encapsulation
Explanation
References
Question 2:
Correct
What is the purpose of a frame check sequence (FCS) footer?
Answer
Control information
Explanation
The Link layer converts packets into frames, adding physical device addressing
information and a frame check sequence footer for error detection. It also converts
the frames into bits (0s and 1s) for transmission across the transmission media.
Control information is added at the Transport layer.
The Transport layer breaks the data into pieces called segments.
The Internet layer converts the segments into packets, adding logical network and
device addresses.
References
Question 3:
Correct
Which term does the OSI model use that's different from the TCP/IP model in
reference to the terms frame, packet, and segment?
Answer
Presentation
HTTP
Session
Correct Answer:
Protocol data unit (PDU)
Explanation
The OSI model uses the term protocol data unit (PDU) instead of the terms frame,
packet, and segment.
The Presentation and Session layers are Layers 5 and 6 of the OSI model,
respectively, and do not correspond to the use of frame, packet, and segment in the
TCP/IP model.
HyperText Transfer Protocol (HTTP) is the protocol in the Application layer that
supports web requests.
References
Question 4:
Correct
Match each TCP/IP layers with its function.
Breaks the data into pieces.
Transport
correct answer:
Prepares the data to be sent.
Application
correct answer:
Adds physical addresses.
Link
correct answer:
Adds logical addresses.
Internet
correct answer:
Keyboard Instructions
Explanation
References
Question 5:
Correct
Workstation2 needs to send data to Workstation3. Identify the Layer 2 and Layer 3
addresses Workstation2 will use to send the data by dragging the corresponding
address from the list on the left to its location on the right.
Layer 2 source address
080046987654
correct answer:
Layer 3 source address
192.168.10.12
correct answer:
Layer 2 destination address
000b5f2a2222
correct answer:
Layer 3 destination address
192.168.11.11
correct answer:
Keyboard Instructions
Explanation
References
Question 6:
Correct
000b5f2a2222
correct answer:
Layer 3 source address
192.168.11.11
correct answer:
Layer 2 destination address
080046987654
correct answer:
Layer 3 destination address
192.168.10.12
correct answer:
Keyboard Instructions
Explanation
The Cisco 2600 router is the default gateway. When it receives a frame from
Workstation3, it examines the Layer 3 address in the packet to locate the destination
device. Then it creates a new frame and modifies the source and destination Layer 2
addresses (MAC addresses) as follows:
• The source Layer 2 address is the gateway's own MAC address on the
same segment as the destination device, which is 000b5f2a2222.
• The destination Layer 2 address is the MAC address of the destination
device, which is 080046987654.
The source and destination Layer 3 addresses (IP addresses) do not change.
• The source IP address is the IP address of Workstation3, which is
192.168.11.11.
• The destination IP address is the IP address of Workstation2, which is
192.168.10.12.
References
Question 7:
Correct
When does a router use ARP?
Answer
Correct Answer:
When the router's routing table doesn't contain the MAC addresses of devices on the
local LAN that they need to forward frames to.
If a router knows a destination host's MAC and IP address, it sends an ARP request
to update the other routers' routing tables.
ARP does not play any role in the routing process. Switches use ARP to map IP
addresses to MAC addresses in collision domains.
Explanation
Question 8:
Correct
Routing data between computers on a network requires several mappings between
different addresses. Which of the following statements is true?
Answer
ICMP lets routers bypass the general network broadcast by providing a dynamic
table of IP-to-MAC address mappings.
Correct Answer:
Hosts use ARP to resolve known IP addresses into MAC addresses.
Explanation
ARP lets hosts resolve known IP addresses into MAC addresses by broadcasting
requests to the network.
DNS is used to map hostnames to IP addresses. ARP is used to map IP addresses
to MAC addresses.
Diskless workstations use BOOTP to discover their IP address, the server's IP
address, and the boot files they should use.
ICMP notifies routers of problems on the network and undeliverable packets.
References
Question 9:
Correct
During network transmission, data is transferred to various routers, which forward
the data to the appropriate network. If the source and destination network addresses
reside on the same network, which protocol is used to determine the destination IP's
MAC address?
Answer
Correct Answer:
ARP
HTTP GET
TCP
UDP
Explanation
Address Resolution Protocol (ARP) is used to determine the host's MAC address
using the destination IP address.
An HTTP GET requests web page information from a web server.
UDP and TCP are both Transport layer protocols.
References
Question 10:
Correct
TCP is a connection-oriented protocol that uses a three-way handshake to establish
a connection to a system port. Computer 1 sends a SYN packet to Computer 2.
Which packet does Computer 2 send back?
Answer
RST
SYN/RST
Correct Answer:
SYN/ACK
ACK
Explanation
If Computer 1 sends a SYN packet to Computer 2, Computer 2 receives the packet
and sends a SYN/ACK packet to Computer 1. Computer 1 receives the SYN/ACK
packet and replies back with an ACK packet, and the connection is complete.
A SYN flag is used to start a connection between hosts.
An ACK acknowledges the receipt of a packet.
An RST resets a connection.
References
DHCP
TFTP
Correct Answer:
ICMP
IGMP
Explanation
References
Question 2:
Correct
You have a large TCP/IP network and want to keep a host's real-time clock
synchronized. Which protocol should you use?
Answer
SMTP
Correct Answer:
NTP
FTP
SNMP
Explanation
References
Question 3:
Correct
Your company has just acquired another company in the same city. You need to
integrate the two email systems so that messages can be exchanged between email
servers. Currently, each network uses an email package from a different vendor.
Which TCP/IP protocol enables message exchange between systems?
Answer
POP3
ICMP
Correct Answer:
SMTP
IMAP4
Explanation
Simple Mail Transfer Protocol (SMTP) specifies how messages are exchanged
between email servers. Email clients use POP3 and IMAP4 to download email
messages from email servers.
ICMP (Internet Control Message Protocol) is used with ping and traceroute to
communicate network information.
References
Question 4:
Correct
You're an application developer, and you're writing a program for exchanging video
files through a TCP/IP network. You need to select a transport protocol that will
guarantee delivery.
Which TCP/IP protocol provides this capability?
Answer
UDP
SIP
Correct Answer:
TCP
FTP
Explanation
In this scenario, you should write the application to use Transmission Control
Protocol (TCP). TCP guarantees delivery through error checking and
acknowledgments.
FTP provides a generic method for transferring files. It can protect access to files by
requiring usernames and passwords.
UDP is a host-to-host protocol like TCP, but it doesn't acknowledge that each packet
was transmitted.
SIP is an open-source VoIP protocol.
References
Packet acknowledgement
Explanation
UDP is a connectionless protocol used by applications that need low overhead and
don't require guaranteed delivery.
TCP provides data packet sequencing, packet acknowledgement, and lost packet
retransmission.
References
Question 6:
Correct
You've recently installed a new Windows server. To ensure system time accuracy,
you've loaded an application that synchronizes the hardware clock on the server with
an external time source on the internet. Now you must configure your network
firewall to allow time synchronization traffic through.
Which of the following ports are you MOST LIKELY to open on the firewall?
Answer
Correct Answer:
123
119
80
110
Explanation
TCP/IP port 123 is assigned to Network Time Protocol (NTP). NTP is used to
communicate time synchronization information between systems on a network.
HyperText Transfer Protocol (HTTP) uses TCP/IP port 80. HTTP is the protocol used
to send requests to a web server and retrieve web pages from the web server.
TCP/IP port 119 is used by the Network News Transfer Protocol (NNTP). NNTP is
used to access and retrieve messages from newsgroups.
TCP/IP port 110 is used by Post Office Protocol version 3 (POP3). POP3 is used to
download email from mail servers.
References
•
2.4.1 TCP/IP Protocols
•
2.4.3 Explore Network Services
•
2.4.4 Network Port and Protocol Facts
•
2.4.5 Common Ports
q_common_ports_123_np6.question.fex
Question 7:
Correct
Which port number is used by SNMP?
Answer
25
110
119
Correct Answer:
161
Explanation
References
Question 8:
Correct
You're configuring a network firewall to allow SMTP outbound email traffic and POP3
inbound email traffic.
Which of the following TCP/IP ports should you open on the firewall? (Select two.)
Answer
443
Correct Answer:
25
Correct Answer:
110
21
143
Explanation
Simple Mail Transfer Protocol (SMTP) uses TCP/IP port 25. Post Office Protocol
version 3 (POP3) uses TCP/IP port 110.
File Transfer Protocol (FTP) uses TCP/IP port 21.
Internet Message Access Protocol version 4 (IMAP4) uses TCP/IP port 143.
Secure Sockets Layer (SSL) uses TCP/IP port 443.
References
•
2.4.1 TCP/IP Protocols
•
2.4.3 Explore Network Services
•
2.4.4 Network Port and Protocol Facts
•
2.4.5 Common Ports
q_common_ports_25_10_np6.question.fex
Question 9:
Correct
Which port does Telnet use?
Answer
53
Correct Answer:
23
25
80
Explanation
References
•
2.4.1 TCP/IP Protocols
•
2.4.3 Explore Network Services
•
2.4.4 Network Port and Protocol Facts
•
2.4.5 Common Ports
q_common_ports_53_np6.question.fex
Question 10:
Correct
Which of the following network services or protocols uses TCP/IP port 69?
Answer
NNTP
Correct Answer:
TFTP
POP3
SMTP
Explanation
Trivial File Transfer Protocol (TFTP) uses TCP/IP port 69. TFTP is a connectionless
service for downloading files from a remote system. It's often used for downloading
firmware to networking devices.
Network News Transfer Protocol (NNTP) is used to access and download messages
from newsgroup servers. NNTP uses TCP/IP port 119.
Simple Mail Transfer Protocol (SMTP) is used to send and receive email. SMTP
uses TCP/IP port 25.
Post Office Protocol version 3 (POP3) is used to download email from a remote
system. POP3 uses TCP/IP port 110.
References
Yes. You can use Cat 3 cabling as a substitute for Cat 5e cabling since they're
electrically identical.
No. The sheath surrounding Cat 5e cabling is much thicker than the Cat 3 sheath,
creating an extra layer of shielding that reduces crosstalk and supports higher data
rates.
No. Cat 5e cabling uses a thicker copper wire than Cat 3 cabling, enabling higher
data transmission rates.
Correct Answer:
No. Cat 5e cabling has more twists per inch than Cat 3 cabling, reducing crosstalk
and supporting higher data rates.
Explanation
While Cat 3 and Cat 5e cabling may appear physically similar, they're electrically
different. Cat 5e cabling is twisted much more tightly than Cat 3 cabling. This
reduces crosstalk and enables Cat 5e wiring to support much faster data
transmission rates.
References
Question 2:
Correct
Which of the following cable types often includes a solid plastic core that keeps the
twisted pairs separated?
Answer
Cat 5e
Cat 5
Cat 3
Correct Answer:
Cat 6
Explanation
Cat 6 cables include a solid plastic core that keeps the twisted pairs separated and
prevents the cable from being bent too tightly.
Cat 3, Cat 5, and Cat 5e don't include a solid plastic core that keeps the twisted pairs
separated.
References
Question 3:
Correct
You're adding new wires in your building for some new offices. The building has a
false ceiling that holds the lights and provides an air path for heating and air
conditioning. You'd like to run your Ethernet cables in this area.
Which type of cable must you use?
Answer
Correct Answer:
Plenum-rated cable
STP cables
Explanation
Plenum-rated cable is fire resistant and non-toxic. You must use plenum-rated cable
to wire in air spaces used by heating and air conditioning systems.
Cat 5e cables provide better EMI protection than Cat 5 cables, and Cat 6a cables
are an improvement over Cat 6 specifications. However, neither of these qualities
are a requirement for use in a ceiling area.
If an area has a lot of EMI, you might consider using STP or fiber optic cables, but
this isn't a requirement in a ceiling area. Typically, you can avoid EMI sources by re-
routing cables.
References
Question 4:
Correct
Why might you use an RJ11 connector?
Answer
You want to connect a 10GBaseT network to a switch card using a Cat 6 cable.
Correct Answer:
You want to connect your computer to the internet with a DSL modem.
Explanation
References
Question 5:
Correct
Which of the following connectors is used with Ethernet 100BaseTX networks?
Answer
GG45
Correct Answer:
RJ45
BNC
ST
Explanation
References
Question 6:
Correct
Which of the following connector types would you most likely use to connect to a T1
WAN service?
Answer
RJ11
GG45
RJ45
Correct Answer:
RJ48c
Explanation
References
Question 7:
Correct
You're working with an older 10Base2 Ethernet network. Which of the following
connector types will you MOST LIKELY encounter?
Answer
F-type
ST
RJ11
Correct Answer:
BNC
Explanation
A 10Base2 Ethernet network (also called a thinnet) is an older type of network that
uses coaxial cables with BNC connectors for communication.
F-type connectors are used for cable and satellite TV connections as well as
broadband cable connections. RJ11 connectors are typically used for dial-up and
DSL connections. ST connectors are used with fiber optic cables.
References
Question 8:
Correct
Which of the following are characteristics of a coaxial network cable? (Select two.)
Answer
The conductors within the cable are twisted around each other to eliminate crosstalk.
Correct Answer:
It uses two concentric metallic conductors.
Explanation
References
Question 9:
Correct
You have a small home network connected to the internet using an RG-6 cable. You
need to move the router, but you can't find anymore RG-6 cabling. Which cable type
could you use instead?
Answer
Cat 5e
Correct Answer:
RG-59
Cat 3
RG-58
Explanation
RG-6 has an impedance rating of 75 ohms. It's important to use coaxial cables with
the same impedance rating, and only RG-59 is rated for 75 ohms.
Connecting coaxial cables with Cat 3 and Cat 5e cables requires a media converter.
References
Question 10:
Correct
You've just signed up for a broadband home internet service that uses coaxial
cabling. Which connector type will you MOST LIKELY use?
Answer
RJ11
RJ45
Correct Answer:
F-type
BNC
Explanation
Use an F-type connector for broadband cable connections that use coaxial cabling.
Use a BNC connector for 10Base2 Ethernet networks.
Use an RJ11 connector for modem connections to a phone line.
Use an RJ45 connector for an Ethernet network that uses twisted pair cabling.
References
Explanation
Compared to other types of cabling, fiber optic cabling allows greater cable distances
without a repeater and is immune to electromagnetic interference. However, it is
more costly, difficult to work with, and specialized training and equipment is required
for installation.
References
Question 2:
Correct
Which of the following connectors are used with fiber optic cables and include both
cables in a single connector? (Select two.)
Answer
ST
BNC
Correct Answer:
LC
SC
Correct Answer:
MTRJ
Explanation
LC and MTRJ connectors have both fiber optic cables in a single connector.
ST and SC connectors hold a single strand of fiber optic cabling. A cable using either
one has two connectors on each end.
A BNC connector is used with coaxial cable.
References
Question 3:
Correct
Which of the following cables offers the best protection against EMI?
Answer
Cat 5
Correct Answer:
Single-mode fiber optic
Cat 5e
RG-6
Explanation
Fiber optic cables offer the best protection against electromagnetic interference
(EMI).
References
Question 4:
Correct
Which of the following are characteristics of an LC fiber optic connector? (Select
two.)
Answer
Explanation
LC fiber optic connectors are small, at about half the size of other fiber optic
connectors. Their appearance is similar to a typical RJ45 connector used with UTP
wiring. Like an RJ45 connector, an LC fiber optic connector uses a small latch to lock
the connector in a jack.
ST uses a one-piece bayonet connecting system.
References
Question 5:
Correct
Which of the following connectors is used with fiber optic cables and requires that
you use a twisting motion to connect it?
Answer
BNC
Correct Answer:
ST
F-type
SC
Explanation
An ST connector is used with fiber optic cables and uses a twist-type connector. Use
the mnemonic Set and Twist.
An SC connector is used with fiber optic cables, but you plug it in instead of twist it
in.
F-type and BNC connectors employ a twist to connect, but they're used with coaxial
cables.
References
Explanation
MTRJ connectors can be used with either multi-mode or single-mode fiber optic
cabling. The connector is made from plastic and uses metal guide pins to ensure that
it's properly aligned in the jack.
ST has a keyed bayonet connector and is called a push-in-and-twist connector.
References
Question 7:
Correct
Multi-mode fiber is designed to operate at which of the following wavelengths?
Answer
Correct Answer:
850 nm and 1300 nm
Explanation
Multi-mode fiber is designed to operate at 850 nm and 1300 nm.
Single-mode fiber is optimized for 1310 nm and 1550 nm.
References
Question 8:
Correct
Which of the following connectors usually require polishing as part of the assembly
process? (Select two.)
Answer
Correct Answer:
SC
F-type
RJ45
BNC
Correct Answer:
ST
Explanation
The fiber optic cable assembly process is more complex than other assemblies. It's
necessary to polish the exposed fiber tip to ensure that light is passed from one
cable to the next with minimal dispersion.
References
Question 9:
Correct
Which of the following is true about single-mode fiber optic network cabling?
Answer
Explanation
Single-mode fiber optic cabling provides one path (or mode) for light to travel. It
supports longer transmission distances than multi-mode fiber optic cabling, and it's
also more expensive.
Single-mode cabling also has a central core that's much smaller than the standard
multi-mode fiber optic cabling core.
Single-mode fiber cabling is optimized for 1310 nanometer (nm) and 1550 nm light
sources.
References
Question 10:
Correct
Which type of optical fiber is normally used to connect two buildings that are several
kilometers apart?
Answer
Correct Answer:
Single-mode fiber
Multi-mode fiber
Coaxial cable
Explanation
In this scenario, you would use single-mode fiber optic cables. Fiber optic is graded
as single-mode or multi-mode. Single-mode consists of a very thin singular core,
which produces fewer reflections. This provides greater effective bandwidth over
greater distances.
Multi-mode is less costly than single-mode fiber. Multi-mode is used to transmit over
shorter distances, as the rays tend to disperse as the transmission distance
increases.
Coaxial and shielded twisted pair are not suitable for long distances between
buildings.
References
Solid orange
correct answer:
Pin 3
Solid blue
correct answer:
Pin 5
Solid green
correct answer:
Pin 7
Solid brown
correct answer:
Keyboard Instructions
Explanation
The T568B wiring standard specifies the following pinout for RJ45 connectors:
• Pin 1: White with orange stripe
• Pin 2: Solid orange
• Pin 3: White with green stripe
• Pin 4: Solid blue
• Pin 5: White with blue stripe
• Pin 6: Solid green
• Pin 7: White with brown stripe
• Pin 8: Solid brown
References
Question 2:
Correct
Which of the following describes the point where the service provider's responsibility
to install and maintain wiring and equipment ends and the customer's begins?
Answer
IDF
Correct Answer:
Demarc
Explanation
When you contract with a local exchange carrier (LEC) for data or telephone
services, they install a physical cable and a termination jack on your premises. The
demarcation point (demarc) is the line that marks the boundary between the Telco
equipment and the private network or telephone system. Typically, the LEC is
responsible for all the equipment on one side of the demarc, and the customer is
responsible for all the equipment on the other side of the demarc.
A punch down block is a block used to connect individual copper wires together.
While the demarc might terminate in a punch down block, punchdown blocks are
used within other locations at the customer site.
An intermediate distribution frame (IDF) is a smaller wiring distribution point within a
building. IDFs are typically located on each floor directly above the main distribution
frame (MDF), although additional IDFs can be added on each floor as necessary. A
vertical cross connect connects the IDF to the MDF on a different floor.
References
Question 3:
Correct
You have a network that occupies all three floors of a building. The WAN service
provider has installed the line in a wiring closet on the main floor. You have a wiring
closet on the two remaining floors directly above the wiring closet on the main floor.
What would you use to connect the wiring closets together?
Answer
Correct Answer:
Vertical cross connect
Smart jack
Demarc extension
Explanation
A vertical cross connect joins the main distribution frame (MDF) on the main floor to
intermediate distribution frames (IDFs) on upper floors. Cabling runs vertically (up
and down) between the MDF and the IDFs.
A horizontal cross connect joins IDFs on the same floor. Cabling runs horizontally
(sideways) between the IDFs. A smart jack is a special loopback plug installed at the
demarcation point for a WAN service. Technicians at the central office can send
diagnostic commands to the smart plug to test connectivity between the central office
and the demarc.
A demarc extension extends the demarcation point from its original location to
another location within the building. The demarc extension typically consists of a
single wire bundle that attaches to the existing demarc and supplies a termination
point to a different location. You might need a demarc extension if your network
occupies an upper floor of a building. The LEC typically installs the demarc on the
MDF on the bottom floor, and you'll need to install an extension to place the demarc
on the IDF on your floor.
References
Question 4:
Correct
Which recommendation should you follow while using 110 blocks for connecting
Cat5 and higher data cables?
Answer
Explanation
When you use Cat5 (or higher) wiring, preserve the twists in each wire pair to within
one half of an inch of the connecting block.
Use C-4 connectors to connect four pairs of wires. When connecting data wires on a
110 block, you typically connect wires in the following order:
•
White wire with a blue stripe followed by the solid blue wire.
•
White wire with an orange stripe followed by the solid orange wire.
•
White wire with a green stripe followed by the solid green wire.
•
White wire with a brown stripe followed by the solid brown wire.
T568A and T568B are used to connect wires within an RJ45 connector when making
drop cables.
References
•
3.3.5 Wiring Distribution Facts
q_wire_distribution_110_01_np6.question.fex
Question 5:
Correct
Which of the following uses metal clips placed over plastic slots to connect individual
copper wires?
Answer
100 pair
66 block
Correct Answer:
110 block
25 pair
Explanation
A 110 block is a punch down block that uses metal clips fitted over plastic pins. To
connect wires using a 110 block, place the wires in the plastic slots, attach the metal
clip, and then punch down the connecting cable on the top of the clip.
A 66 block uses metal pins to connect wires. Wires are placed in the pins, and pins
within a row are electrically connected.
25 pair and 100 pair are cable bundles that include multiple pairs of copper wires
(either 25 pairs of wires or 100 pairs of wires).
References
Question 6:
Correct
You are preparing to attach wires in a 110 block. You want to connect the wires and
trim off the excess at the same time.
Which of the following should you do? (Select two.)
Answer
Correct Answer:
Point the cut side of the tool towards the wire end.
Point the cut side of the tool toward the connected end of the wire.
Correct Answer:
Use a punch down tool with a notched blade.
Explanation
Use a punch down tool to connect wires to a 110 or 66 block. When using a punch
down tool, choose the right blade for the job:
• Use a notched blade for a 110 block.
• Use a straight blade for a 66 block.
• For both blade types, you can use the end without a cutting blade if you
want to punch down without cutting the wire.
When using the cutting blade, point the cut side of the punch down tool toward the
wire's end that you want to trim.
References
Question 7:
Correct
Which of the following terms identifies the wiring closet in the basement or ground
floor that typically includes the demarcation point?
Answer
IDF
110 block
Correct Answer:
MDF
Explanation
The main distribution frame (MDF) is the main wiring point for a building. The MDF is
typically located on the bottom floor or basement. The LEC typically installs the
demarc to the MDF. An intermediate distribution frame (IDF) is a smaller wiring
distribution point within a building. IDFs are typically located on each floor directly
above the MDF, but you can place additional IDFs on each floor as necessary.
A horizontal cross connect joins wiring closets on the same floor. A smart jack is a
special loopback plug installed at the demarcation point for a WAN service.
Technicians at the central office can send diagnostic commands to the smart plug to
test connectivity between the central office and the demarc.
Use 66 and 110 blocks to connect individual wires within a wiring closet.
References
Question 8:
Correct
Which of the following terminates individual wires from a 25-pair or 100-pair cable
using female RJ45 ports?
Answer
110 block
Explanation
A patch panel is a device that typically connects individual stranded wires into female
RJ45 connectors. For example, you might connect four pairs of wires from a punch
down block to a port on the patch panel. On the patch panel, you then connect drop
cables (cables with RJ45 connectors) to the patch panel on one end and a computer
on the other end.
Use 66 and 110 blocks to connect individual wires within a wiring closet. These
punch down blocks connect the individual wires together, but they do not terminate
in RJ45 connectors.
A horizontal cross connect connects IDFs on the same floor.
References
Question 9:
Correct
Which tool should you use to extend network services beyond the demarc?
Answer
Patch panel
Crimper
Tone generator
Correct Answer:
Punch down tool
Explanation
A demarc is the location where the local network ends and the telephone company's
network begins. This location is usually at a punchdown block in a wiring closet. You
use a punch down tool to attach wires to the punchdown block.
A tone generator sends a signal on the wire.
A crimping tool is used to attach connectors to wires.
Patch panels permit circuits to be arranged and rearranged by plugging and
unplugging respective patch cords on a mounted hardware assembly.
References
Question 10:
Correct
You are making Ethernet drop cables using Cat5e cables and RJ45 connectors. You
need to remove the plastic coating over the cable to expose the individual wires.
Which tool should you use?
Answer
Crimping tool
Snips
Explanation
Use a cable stripper to remove a cable's plastic jacket or sheath. When you make
drop cables or use punch down blocks, do not remove the plastic covering for
individual wires.
Use snips to cut cables. Use a punchdown tool to push wires into 66 or 110 blocks
and cut the wires at the same time.
A crimping tool is designed for RJ45 connectors to attach connectors to UTP cables.
References
A short
Impedance
Collisions
Explanation
References
Question 2:
Correct
You have a cable internet connection at home. The installer had connected the
router near the outside wall of your house with RG6 cable. You move the cable
router a distance of 50 meters using RG8 cables and special connector adapters.
Which condition are you MOST LIKELY to experience?
Answer
Correct Answer:
Echo
EMI
FEXT
NEXT
Explanation
An impedance mismatch (manifested by echo) occurs when you connect cables and
devices that have a different impedance (resistance) rating. RG6 cables have a
rating of 75 ohms, while RG8 cables have a rating of 50 ohms.
Near-end crosstalk (NEXT) is crosstalk measured on the same end as the
transmitter.
Far-end crosstalk (FEXT) is crosstalk measured on the opposite end from the
transmitter.
Electromagnetic interference (EMI) and radio frequency interference are external
signals that interfere with normal network communications.
References
Question 3:
Correct
While viewing the status of interfaces on a Cisco switch, you see an abnormally
large number of CRC errors on one interface. This interface is connected to a user's
workstation that is located in a cubicle on the second floor.
What could cause this to happen?
Answer
Explanation
The most likely cause is EMI or crosstalk on the UTP cabling, which can corrupt
frames transmitted on the wire and cause a CRC error. On a hub-based Ethernet
network, these errors are usually caused by collisions. However, because a switch is
being used in this scenario, collisions can't occur.
CRC errors are almost always Layer 1 errors.
Duplicate MAC addresses would result in a Layer 2 error.
Incorrect protocol or IP addressing configurations result in Layer 3 errors.
References
Question 4:
Correct
You need to replace a fiber optic cable that's connecting two switches together. You
inspect the existing cable and determine that it uses LC connectors. You also notice
that the cable's ferrule has a slight slant to it.
Which polish grade should you use to replace the existing cable?
Answer
Explanation
A slight slant to the fiber ferrule indicates an Angled Physical Contact (APC) polish.
Using a non-angled connector will cause excessive insertion loss.
A Physical Contact (PC) polish is polished with a slight curvature.
An Ultra Physical Contact (UPC) polish uses a higher grade polish and is slightly
more curved than a PC polish.
A Flat Physical Contact connector has little to no curvature and suffers from the most
insertion loss.
References
Question 5:
Correct
You're building a new network for a small financial services startup company.
Security is paramount, so each organization within the company will have its own
network segment separated by a router. However, funds are limited, and you've
been asked to keep costs to a minimum.
You've acquired a used fiber optic switch, and you want to use it to create a fiber
optic backbone that interconnects all of the routers. You've purchased several used
single-mode GBIC modules on eBay that you'll install on each router to allow them to
connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You connect each
module to the switch with 1-meter multimode patch cables.
Will this implementation work?
Answer
Yes. All of the requirements for implementing a fiber optic network have been met.
No. You should purchase fiber optic equipment that use FC connectors.
No. You shouldn't use standard fiber optic switches to create a backbone network for
routers.
Correct Answer:
No. You shouldn't use multi-mode patch cables with single-mode GBIC modules.
Explanation
Some GBIC/SFP modules use multi-mode fiber, while others use single-mode. You
must use the correct type of fiber optic cable and connector required by the specific
adapter. You can't mix and match different types of cable. In this scenario,
connecting a single-mode GBIC to multi-mode fiber will introduce a catastrophic
signal loss of up to 99%.
References
Question 6:
Correct
You're building a new network for a small financial services startup company.
Security is paramount, so each organization within the company will have their own
network segments separated by routers. Funds are limited, and you've been asked
to keep costs to a minimum.
You've acquired a used fiber optic switch, and you want to use it to create a fiber
optic backbone that interconnects all of the routers. You've purchased several used
multi-mode GBIC modules on eBay that you'll install on each router to allow them to
connect to the switch.
Both the switch and the GBIC modules use MTRJ connectors. You've purchased
several used 1-meter, multi-mode patch cables from Amazon. But when they arrived,
you noticed that they use LC connectors. Fortunately, with some force, you found
that you're able to get the LC connectors on the cables to lock into the MTRJ
connectors on the GBIC modules and on the switch.
Will this implementation work?
Answer
No. You should use single-mode patch cables to connect a GBIC module to a
switch.
Correct Answer:
No. You should purchase patch cables that use MTRJ connectors.
Yes. All of the requirements for implementing a fiber optic network have been met.
No. You should use a specialized backbone fiber optic switch to create a backbone
network for routers.
Explanation
For light to pass through a fiber optic connector, the fiber within the jack must line up
perfectly with the fiber in the connector. Using the wrong connector will result in
misaligned fibers. This will disrupt the light signal, even if you're able to successfully
lock the connector into the jack. In this scenario, you should purchase patch cables
that use MT-RJ connectors.
References
Question 7:
Correct
You want to measure the voltage, amps, and ohms of various devices.
Which tool should you use?
Answer
Toner probe
Correct Answer:
Multimeter
Certifier
Explanation
A multimeter is a device that tests various electrical properties. For example, most
multimeters can measure:
• AC and DC voltage
• Current (amps)
• Resistance (ohms)
• Capacitance
• Frequency
A voltage event recorder tracks voltage conditions on a power line. Basic recorders
keep track of the occurrence of under- or over-voltage conditions, while more
advanced devices track conditions over time and create a graph, saving data from a
program running on a computer.
A toner probe is two devices used to trace the end of a wire from a known endpoint
onto the termination point in the wiring closet.
A cable certifier is a multi-function tool that verifies or validates that a cable or an
installation meets the requirements for a specific architectural implementation.
References
Question 8:
Correct
You're working with an existing fiber optic installation in your building. You want to
know the length of each cable that runs through the walls.
Which tool should you use?
Answer
Toner probe
Correct Answer:
OTDR
Smartjack
Multimeter
Explanation
An optical time domain reflector (OTDR) sends light pulses on a cable to discover
information about the cable. The results of this test can be used to:
• Estimate a wire's length.
• Measure a cable's impedance.
• Identify locations of splices and connectors on a wire.
• Identify shorts, open circuits, and fault locations.
Use a toner probe to locate the end of a wire from a wall jack to the punchdown
block.
Use a multimeter to measure a device's electrical properties, such as voltage, amps,
and resistance.
A smartjack is a special loopback plug installed at a WAN service's demarcation
point.
References
Question 9:
Correct
Users report that the internet is no longer accessible. You suspect that the line
connecting your building to the internet isn't working properly.
Which of the following allows the service provider to remotely test the local loop?
Answer
Demarc
Demarc extension
Correct Answer:
Smartjack
Explanation
References
Question 10:
Correct
You've connected a cable certifier to an RJ45 wall jack, and the output shown below
is displayed on the device. What does this output indicate? (Select two.)
Answer
Explanation
In this display, the cable being tested is a correctly wired crossover cable.
Output with (x) characters between pins indicates that they're shorted.
Straight-through connections are displayed using (-) characters in the cable certifier's
output.
Open connections are displayed with no characters or lines between pin numbers.
References
ICMP
DNS
Explanation
References
•
2.3.3 Address Resolution Protocol (ARP)
•
2.3.5 Network Communication Process Facts
•
3.5.2 Network Adapter Facts
q_network_adapter_arp_np6.question.fex
Question 2:
Correct
You have a server that has a 100BaseFX network interface card you need to
connect to a switch. The switch only has 100BaseTX switch ports.
Which device should you use?
Answer
Hub
Repeater
Correct Answer:
Media converter
Bridge
Explanation
Use a media converter to convert from one media type to another within the same
architecture.
Use a bridge to connect two devices that use different network architectures. For
example, you can use a bridge to connect a wired network to wireless clients.
A hub or repeater connects devices using the same media type.
References
Question 3:
Correct
At which OSI model layer does a media converter operate?
Answer
Correct Answer:
Layer 1
Layer 2
Layer 3
Layer 4
Explanation
A media converter operates at Layer 1 of the OSI model, which is the Physical layer.
The media converter translates frames into bits and transmits them on the
transmission medium.
At Layer 2, the MAC address is added to make the data into a frame.
At Layer 3, the IP address is added to the packet.
At Layer 4, the port and socket number are assigned.
References
Question 4:
Correct
Which of the following is a valid MAC address?
Answer
Correct Answer:
AB.07.CF.62.16.BD
95ABC2F4.ABC5.569D.43BF
FABC.875E.9BG6
145.65.254.10
Explanation
MAC addresses are comprised of 12 hexadecimal digits (ranging from 0-9 and A-F).
They're typically represented as three sets of four hexadecimal digits or six sets of
two hexadecimal digits, separated with periods. Regardless of the grouping and
separator values, you look for 12 hex digits to determine whether a MAC address is
valid.
References
Question 5:
Correct
Which of the following is a valid MAC address?
Answer
Correct Answer:
C0-34-FF-15-01-8E
83-5A-5B-0B-31-55-F1
34-9A-86-1G-B3-24
73-99-12-61-15
Explanation
A MAC address is a unique identifier hard coded onto every network adapter card. A
valid MAC address has a total of 12 hexadecimal numbers. Hexadecimal numbers
contain the numbers 0 to 9 and the letters A to F. Valid values for each octet in a
MAC address range anywhere from 00 to FF.
Note that one of the answers would be a valid MAC address except it uses a G
value, which is beyond the hexadecimal range.
References
Question 6:
Correct
Which of the following are true about a MAC address? (Select two.)
Answer
Correct Answer:
It is typically represented by hexadecimal numbers.
It is a 32-bit address.
Correct Answer:
It is a 48-bit address.
It is a 64-bit address.
Explanation
A MAC address identifies a network adapter's physical address. It's a 12-digit (48-bit)
hexadecimal number with each number ranging from 0-9 or A-F. The address is
often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC. However, dashes,
periods, and colons can be used to divide it as well.
An IPv4 address is 32 bits and uses octets of decimal numbers between 0-255.
An IPv6 address is a 64-bit address that uses 32 hexadecimal numbers.
References
Question 7:
Correct
Which of the following statements accurately describe how a modem works? (Select
two.)
Answer
It modulates digital data from a telephone network into analog data that a PC can
use.
Correct Answer:
It modulates digital data from a PC into analog data and transmits it on a telephone
network.
Correct Answer:
It demodulates analog data from a telephone network into digital PC data.
It demodulates analog PC data into digital data that can be transmitted through a
telephone network.
Explanation
References
•
3.5.2 Network Adapter Facts
q_network_adapter_modem_np6.question.fex
Question 8:
Correct
Which network component connects a device to transmission media and allows the
device to send and receive messages?
Answer
Client
Correct Answer:
Network interface card
Protocol
Server
Explanation
A network interface card (NIC) allows a device to send and receive messages over a
transmission media.
A client doesn't provide network services but instead consumes network services.
Server operating systems are designed to do one thing, and that's to provide network
resources.
Protocols are rules or standards that describe how hosts communicate and
exchange data.
References
•
3.5.2 Network Adapter Facts
q_network_adapter_nic_np6.question.fex
Question 9:
Correct
You want a switch to have the ability to modify the media type the switch port
supports. Which type of module might you use to make this possible? (Select two.)
Answer
Correct Answer:
GBIC
ARP
Correct Answer:
SFP
CRC
MAC
Explanation
Older network adapters used an external transceiver that matched the media type.
While nearly all current network adapters come with a built-in transceiver type, new
devices, such as switches and routers, use transceiver modules that allow you to
modify a port's media type by changing the transceiver. There are several types of
transceiver modules.
• A GBIC (gigabit interface converter) is a large transceiver that fits in a port
slot. GBICs are used for Gigabit media, including copper and fiber optic.
• An SFP (small form-factor pluggable) is similar to a GBIC but is smaller in
size. An SFP is sometimes called a mini-GBIC.
• An XFP transceiver is similar in size to an SFP, but it's used for 10-gigabit
networking.
• QSFP (a quad, or 4-channel, small form-factor pluggable) is a compact
hot-pluggable transceiver that's also used for data communication
applications.
A Media Access Control (MAC) address is a unique identifier burned into the ROM of
every Ethernet NIC.
A host uses ARP to discover a device's MAC address from its IP address.
Cyclic redundancy check (CRC) is used to detect frames that have been corrupted
during transmission.
References
Question 10:
Correct
Which device sends signals from a computer onto a network?
Answer
Cable
Router
Correct Answer:
Transceiver
Gateway
Explanation
References
•
3.5.2 Network Adapter Facts
q_network_adapter_transceiver_np6.question.fex
Which of the following hardware devices regenerate a signal out of all connected
ports without examining the frame or packet contents? (Select two.)
Answer
Correct Answer:
Hub
Router
Correct Answer:
Repeater
Switch
Bridge
Explanation
A hub and a repeater send received signals out of all other ports. These devices do
not examine the frame or packet contents.
Switches and bridges use the MAC address in a frame for forwarding decisions.
A router uses the IP address in a packet for forwarding decisions.
References
Question 2:
Correct
How do switches and bridges learn where devices are located on a network?
Answer
Correct Answer:
When a frame enters a port, the source MAC address is copied from the frame
header.
When a frame enters a port, the source IP address is copied from the frame header.
When a frame enters a port, the destination IP address is copied from the frame
header.
When a frame enters a port, the destination MAC address is copied from frame
header.
Explanation
Bridges and switches learn addresses by copying the MAC address of the source
device and placing it into the MAC address table. The port number that the frame
entered is also recorded in the table and associated with the source MAC address.
The switch or the bridge cannot record the destination MAC address because it does
not know the port that is used to reach the destination device.
References
Question 3:
Correct
At which OSI layer does a router operate to forward network messages?
Answer
Transport
Correct Answer:
Network
Physical
Data Link
Explanation
A router uses the logical network address specified at the Network layer to forward
messages to the appropriate LAN segment.
A bridge, on the other hand, uses the MAC address and works at the Data Link
layer.
References
Question 4:
Correct
At which layer of the OSI model do hubs operate?
Answer
Internet
Correct Answer:
Physical
Layer 3
Data Link
Explanation
References
Question 5:
Correct
Which of the following BEST describes how a switch functions?
Answer
It connects multiple cable segments (or devices) and broadcasts frames to all of its
ports.
Explanation
Switches have multiple ports and can connect multiple segments or devices. The
switch forwards frames to the appropriate port. They function similarly to a hub,
except instead of sending packets to all ports, switches send packets only to the
destination computer's port.
A bridge is a device that connects two (or more) media segments on the same
subnet. It filters traffic between both segments based on the MAC address in the
frame.
References
Switch
Router
Hub
Explanation
References
Question 7:
Correct
Which of the following hardware devices links multiple networks and directs traffic
between networks?
Answer
Repeater
Bridge
Hub
Correct Answer:
Router
Explanation
A router is a device that links multiple networks and directs traffic between networks.
Each network linked by routers has its own unique identifier called the network
number or network address.
A hub and a repeater send received signals out all other ports. These devices do not
examine the frame or the packet contents.
Bridges learn addresses by copying the MAC address of the source device and
placing it into the MAC address table.
References
Question 8:
Correct
Which of the following creates a visual representation of physical components along
with a clearly defined set of principles and procedures?
Answer
Rack diagram
Correct Answer:
Floor plan
Wiring diagram
Explanation
References
Question 9:
Correct
Rack heights vary from a few rack units to many rack units. The most common rack
heights are 24U and 42U. How tall is a 24U rack?
Answer
48 inches
Correct Answer:
42 inches
36 inches
30 inches
Explanation
A 24U rack is 42 inches tall. A single rack unit (1U) is 1.75 inches tall and represents
one slot in the rack. Rack heights vary from a few rack units to many rack units. The
most common rack heights are 24U and 42U.
References
Question 10:
Correct
A rack's height is measured in rack units (Us). How tall is a single rack unit?
Answer
Correct Answer:
1.75 inches tall
Explanation
A single rack unit (1U) is 1.75 inches tall and represents one slot in the rack.
References
10101100.00010001.00000001.00000001
11000000.10101000.00000010.00000001
Correct Answer:
11000000.10101000.00000001.00000001
00001010.10101000.00000001.00000001
Explanation
References
Question 2:
Correct
What is the decimal form of the following binary IP address?
11001101.00111001.10101001.01000010
Answer
206.58.170.67
Correct Answer:
205.57.169.66
238.90.202.99
190.42.154.51
Explanation
References
Question 3:
Correct
Your network uses a network address of 137.65.0.0 with a subnet mask of
255.255.0.0.
How many IP addresses are available to assign to network hosts on this network?
Answer
16777214
254
Correct Answer:
65534
Explanation
Given a network address and subnet mask, you can have 2 to the n power - 2 (2
hosts per subnet). Begin by converting the subnet mask to a binary number. To find
the number of valid hosts, n = the number of unmasked bits in the mask. In this
example, there are 16 unmasked bits. So, the number of available hosts is 2 to the
16th power - 2, which equals 65534.
References
Question 4:
Correct
Which of the following best describes the purpose of using subnets?
Answer
Explanation
Subnets divide an IP network address into multiple network addresses. This allows
you to have several smaller networks while using only one network address.
With supernetting, multiple smaller subnets are combined into a single larger subnet.
With modern switched networks, each switch port represents its own collision
domain.
Network Address Translation (NAT) allows you to connect a private network to the
internet.
References
Question 5:
Correct
You have a small network with three subnets, as shown in the exhibit. IP addresses
for each router interface are also indicated in the exhibit.
How many IP addresses that you can assign to hosts remain on each subnet?
Answer
Correct Answer:
SubnetA = 125, SubnetB = 0, SubnetC = 13
Explanation
The scenario asks you how many addresses remain that can be assigned to hosts.
In this scenario, remember to remove the following addresses from each range:
• The subnet address
• The broadcast address
• Addresses assigned to the router interfaces (For SubnetA and SubnetC,
one address is assigned. For SubnetB, two addresses have been
assigned.)
The following mask values provide for the following number of hosts:
• A mask of /25 provides 126 host addresses, with one of those being used
by the router.
• A mask of /30 provides for two host addresses, with both addresses being
used by routers.
• A mask of /28 provides for 14 host addresses, with one of those being
used by the router.
References
Question 6:
Correct
Your network has a network address of 172.17.0.0 with a subnet mask of
255.255.255.0.
Which of the following are true concerning this network? (Select two.)
Answer
Explanation
You can subnet a Class B address to provide additional subnet addresses. (Notice
how, by using a custom subnet mask, the Class B address looks like a Class C
address.)
• Network address: 172.17.0.0
• Subnet mask: 255.255.255.0
• Number of subnets: 256
• Number of hosts per subnet: 254
• Subnet addresses: 172.17.1.0, 172.17.2.0, 172.17.3.0, and so on
• Host address ranges: 172.17.1.1 to 172.17.1.254, 172.17.2.1 to
172.17.2.254, 172.17.3.1 to 172.17.3.254, and so on
References
Question 7:
Correct
You have a small network with a single subnet connected to the internet, as shown
in the exhibit. The router has been assigned the two addresses shown.
You need to manually configure the workstation to connect to the network. The
workstation should use RouterA as the default gateway and DNS1 as the DNS
server address.
From the drop-down menu options, select the appropriate parameters to configure
the workstation's TCP/IP settings.
IP address
192.168.12.46
Subnet mask
255.255.255.240
Default gateway
192.168.12.34
DNS server
198.162.1.22
Explanation
References
Question 8:
Correct
A host has an address of 100.55.177.99/16. Which of the following is the broadcast
address for the subnet?
Answer
255.255.255.0
255.255.0.0
Correct Answer:
100.55.255.255
100.255.255.255
Explanation
The broadcast address for the subnet is the last address on the subnet. In this
example, the address uses 16 bits in the subnet mask (255.255.0.0), meaning that
the first two octets indicate the subnet address (100.55.0.0), and the last two octets
are used for host addresses. The last possible address on this subnet is
100.55.255.255.
References
Question 9:
Correct
Which organization is responsible for allocating public IP addresses?
Answer
Correct Answer:
IANA
IETF
IEEE
CompTIA
Explanation
References
Question 10:
Correct
Which of the following devices is MOST LIKELY to be assigned a public IP address?
Answer
A database server that's used by your company's website for storing customer
information.
Correct Answer:
A router that connects your home network to the internet.
A router on your company network that segments your LAN into two subnets.
Explanation
To connect a private network, home, or business to the internet, you must have a
router with a public IP address. The public address allows hosts on the internet to
send packets to the router.
When you connect a private network to the internet, only the router interface
connected to the internet needs a public address. You can then use Network
Address Translation (NAT) and assign private addresses to hosts on your private
network (including all the routers on the private network). The NAT router translates
your private addresses into public addresses.
You can even use NAT to place publicly available hosts, such as web servers, on a
private network (although these servers are often placed on a special subnet that's
connected to the internet and assigned public addresses). With port address
translation, incoming messages sent to the publicly available servers are relayed to
the private network. Servers that hold confidential data, such as database servers,
are normally placed on a private network. Generally, they can only be contacted
directly by the necessary devices (such as a web server).
References
169.255.0.0
Correct Answer:
169.254.0.0
255.255.255.0
Correct Answer:
255.255.0.0
255.0.0.0
169.0.250.0
Explanation
References
Question 2:
Correct
Which of the following IP address ranges is reserved for Automatic Private IP
Addressing (APIPA)?
Answer
192.168.0.0 - 192.168.255.254
169.192.0.0 - 169.192.254.255
Correct Answer:
169.254.0.1 - 169.254.255.254
169.168.0.1 - 169.168.255.255
Explanation
The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.1 through
169.254.255.254 for Automatic Private IP Addressing (APIPA).
APIPA also sets the subnet mask on the network to 255.255.0.0.
References
Question 3:
Correct
CorpServ is a small company with 14 client systems and a network printer. Because
there are only a limited number of network systems, you decide to use APIPA
addressing. With APIPA configured, all the systems are able to communicate with
each other, but you're having trouble configuring internet access.
What is the MOST LIKELY cause of the problem?
Answer
Explanation
APIPA assigns private addresses that are designed for use on single-subnet
networks that do not use routers. If you require internet access, APIPA cannot be
used to provide clients direct access to the internet. APIPA is enabled by default and
will assign an address if the DHCP server is unavailable.
APIPA assigns only an IP address and subnet mask.
A default gateway and DNS server are not required to access network resources.
References
Question 4:
Correct
Which of the following is a valid APIPA address?
Answer
Correct Answer:
169.254.32.50
169.0.0.50
192.168.0.50
10.23.0.50
Explanation
References
Question 5:
Correct
Which of the following are configured when a device receives its IP configuration
from APIPA? (Select two.)
Answer
DNS server
Correct Answer:
Subnet Mask
Correct Answer:
IP address
Default gateway
IP lease time
Explanation
References
Question 6:
Correct
Which protocol is used by a device to ensure that an APIPA address is not already in
use on the network?
Answer
Correct Answer:
ARP
DHCP
TCP
IP
Explanation
When a host uses APIPA, it randomly picks an address from the APIPA range and
sends out an Address Resolution Protocol (ARP) message to ensure that the
address is not currently in use.
Transmission Control Protocol (TCP) provides services that ensure accurate and
timely delivery of network communications between two hosts. It is not used to verify
if an IP address is currently in use on the network.
Internet Protocol (IP) allows devices to communicate across different networks. It is
not used to verify if an IP address is currently in use on the network.
Dynamic Host Configuration Protocol (DHCP) is used to pass out IP addresses and
other IP configuration information to network clients.
References
Question 7:
Correct
You are the network administrator for a small consulting firm. The office network
consists of 30 computers, one server, two network printers, and a switch. Due to
security concerns, there is no wireless network available in the office.
One of your users, Bob, travels to client sites and is generally not in the office. When
Bob goes to client sites, he typically just connects to their wireless networks. When
he's in the office, Bob connects his laptop to the network with an Ethernet cable.
You need to make sure that Bob's laptop is setup so that when he plugs the Ethernet
cable into his laptop, no further configuration is needed. Which of the following would
be the BEST option to achieve this?
Answer
Set up a separate computer for Bob to use when he's in the office
Correct Answer:
Configure an alternate IP configuration.
Explanation
In this scenario, you would want to configure an alternate IP configuration for the
office network. An alternate IP configuration is a method you can use to assign a
static IP address that can be used when there's no access to a DHCP server.
You wouldn't want to set up and configure a wireless network or DHCP server in this
scenario. That would require too many resources and is not necessary.
Setting up a separate computer wouldn't be feasible since this would require too
many resources and could lead to other issues for the user.
References
Question 8:
Correct
You are the network administrator for a large hospital. One of your users, Suzie,
calls you stating that she is unable to access any network resources. After some
initial troubleshooting, you realize that her computer is using the IP address
169.254.0.52.
You've performed the following troubleshooting steps so far:
• Verified physical network connection
• Attempted to renew the IP address
• Discovered other devices are experiencing the same issue
Which of the following is the MOST likely cause for Suzie's issue?
Answer
Correct Answer:
The DHCP server is misconfigured or down.
The computer is assigned a static IP address.
Explanation
In this scenario, the most likely cause is that the DHCP server is down or
misconfigured. The fact that other computers are experiencing the same issue
shows that this is a network-wide issue. This would indicate an issue with the DHCP
server.
The DNS server or gateway router would have no bearing on this issue.
The computer has most likely not been assigned a static IP address. While this could
be an issue, the fact that all the other devices are experiencing the same problem
indicates that this is not the problem.
References
Question 9:
Correct
You are the network administrator for a small consulting firm. Users are complaining
that they are unable to reach network resources. After some troubleshooting, you've
confirmed that the DHCP server is down.
Your network devices should be receiving an APIPA address so that they can at
least communicate on the internal network, but many devices are not receiving this
address.
Which of the following is the MOST likely reason the devices are not receiving their
APIPA addresses?
Answer
Explanation
In this scenario, the most likely reason that some devices are not receiving an APIPA
address is because their DHCP lease is still active. Many devices retain their DHCP
assigned address until their current lease expires.
DNS would not be applicable to this scenario.
APIPA does not need to be enabled.
An alternate IP address does not need to be configured for APIPA.
References
Question 10:
Correct
You are the network administrator for a large hospital. One of your users, Suzie,
calls you stating that she is unable to access any network resources. After some
initial troubleshooting, you realize that her computer is using the IP address
169.254.0.52.
You've confirmed that the network's physical connection is connected properly.
Which of the following should you do next?
Answer
Explanation
In this scenario, the first step would be to attempt to renew the IP address. If the
device is unable to pull a new IP address on the subnet, that might indicate an issue
with the DHCP server itself or the DHCP configuration.
Rebooting the DHCP server is not an appropriate next step in this scenario. This
would take down the entire network. You need to perform more troubleshooting
before getting to this step.
Rebooting the DNS server would not be appropriate in this scenario as DNS has
nothing to do with APIPA addressing.
Pinging the gateway would not be appropriate in this scenario. As this is a large
network, the gateway device is most likely not responsible for handing out IP
addresses.
References
• 4.2.3 APIPA and Alternate IP Addressing Facts
q_conf_alt_address_renew_np6.question.fex
Which of the following statements about Dynamic Host Configuration Protocol
(DHCP) are true? (Select two.)
Answer
It cannot be configured to assign the same IP address to the same host each time it
boots.
Correct Answer:
It can deliver other configuration information in addition to IP addresses.
Explanation
References
Question 2:
Correct
You have a TCP/IP network with 50 hosts. There have been inconsistent
communication problems between these hosts. You run a protocol analyzer and
discover that two of them have the same IP address assigned.
Which protocol can you implement on your network to help prevent problems such
as this?
Answer
SNMP
IGMP
Correct Answer:
DHCP
TCP
Explanation
You can use Dynamic Host Configuration Protocol (DHCP) to set up a DHCP server
that will assign IP addresses automatically to network hosts. DHCP servers do not
assign the same IP address to two different hosts.
TCP provides services that ensure accurate and timely delivery of network
communications between hosts.
SNMP (Simple Network Management Protocol) lets network hosts exchange
configuration and status information.
IGMP (Internet Group Management Protocol) defines host groups.
References
Question 3:
Correct
Due to wide network expansion, you've decided to upgrade your network by
configuring a DHCP server. The network uses Linux, Windows, and Mac OS X client
systems.
You configure the server to distribute IP addresses from 192.168.2.1 to
192.168.2.100. You use the subnet mask of 255.255.255.0.
After you make all the setting changes on the DHCP server, you reboot each client
system, but they are not able to obtain an IP address from the DHCP server.
Which of the following explains the failure?
Answer
Explanation
Once a DHCP server has been configured for the network, each client system has to
be told to look for the server to obtain its IP addressing. Selecting DHCP to obtain IP
addressing information is typically as easy as selecting a radio button. If the client is
not set to DHCP, it will look for a statically assigned IP address.
The DHCP service is supported by all major operating systems today.
Using DHCP among different client systems would not be a problem.
Rebooting the DHCP server would not be helpful if the client systems aren't
configured to use the DHCP service.
References
Question 4:
Correct
Which of the following strategies do we use to prevent duplicate IP addresses from
being used on a network? (Select two.)
Answer
Explanation
References
Question 5:
Correct
You are creating a DHCP scope for a new network segment for the Development
department. The department has several printers and servers that need to have a
static IP address assigned to them that will not be changed by the DHCP server.
Which of the following DHCP scope setting do you need to configure to avoid DHCP
assigned IP addresses to these devices?
Answer
Correct Answer:
Exclusions
Subnet mask
IP range
Reservations
Explanation
You would configure Exclusions. Exclusions are IP addresses that the DHCP server
will not assign, and are typically used for devices such as servers, printers, routers,
or other network devices that must have a static IP address.
The IP range defines the range of IP addresses that the DHCP server can assign.
When a new device connects to the network, the DHCP server assigns the next
available address.
The subnet mask defines the network ID and host ID. The subnet mask must be
defined.
Reservations are static IP addresses that are not dynamically assigned by the DHCP
server.
References
Question 6:
Correct
After you install a new DHCP server on your network, you need to verify that the
network devices are receiving IP addressing via DHCP. You reboot a Windows 10
client system and, using the ipconfig /all command, receive the following
information:
Ethernet adapter Local Area Connection 1:
Description . . . . . . . . . . . : Intel(R) Ethernet Connection
Physical Address. . . . . . . . . : 02-00-4C-4F-3F-50
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Autoconfiguration IPv4 Address. . : 169.254.25.129
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DNS Servers . . . . . . . . . . . :
Explanation
A system configured as a DHCP client will attempt to locate a DHCP server during
the boot process. If the client system is unable to locate the DHCP server and obtain
IP information, an APIPA address is used. The client also configures itself with a
Class B subnet mask of 255.255.0.0.
The output from the ipconfig command shows that the client system has been
configured to receive IP information from a DHCP server. As such, the client system
attempted to locate the DHCP server. When it couldn't, it received the APIPA
address of 169.254.25.129 and a subnet mask of 255.255.0.0. The default gateway
does not have to be present to access a DHCP server.
References
Question 7:
Correct
You've configured your organization's DHCP server to dynamically assign IP
addresses and changed the default lease time from eight to four days.
What impact, if any, will this have on the network?
Answer
No impact
Explanation
Decreasing lease time does slightly increase network traffic because clients have to
continually renew their IP addresses. But decreasing the lease time also makes it so
that you use your addresses more efficiently.
There is no correlation to bandwidth increase or router performance increase.
References
Question 8:
Correct
When a device renews its DHCP lease, which two steps in the DHCP process are
skipped?
Answer
Correct Answer:
Discover
Correct Answer:
Offer
Request
ACK
Renew
Explanation
References
Exclusion
Correct Answer:
Reservation
Default gateway
IP range
Explanation
Reservations are static IP addresses that are not dynamically assigned by the DHCP
server. Reservations are assigned by the DHCP server using the device's MAC
address. Whenever the device with the specified MAC address connects to the
network, the DHCP server assigns it the reserved static IP configuration.
Exclusions are IP addresses that the DHCP server does not assign.
The IP range defines the range of IP addresses that the DHCP server can assign.
The default gateway defines where data packets that are leaving the network should
go.
References
Question 10:
Correct
You have a network with 50 workstations. You want to automatically configure the
workstations with the IP address, subnet mask, and default gateway values.
Which device should you use?
Answer
Correct Answer:
DHCP server
Router
DNS server
Gateway
Explanation
References
You need to configure a Cisco RFC 1542-compliant router to forward any received
DHCP frames to the appropriate subnet. The remote DHCP server's address is
172.16.30.1.
Which of the following commands would you use to configure the router?
Answer
host 172.16.30.1
ifconfig 172.16.30.1
Explanation
To configure a Cisco router to listen for DHCP traffic and route any received DHCP
frames to the appropriate subnet, use the following command:
ip helper-address [server_address]
The ifconfig command is used on a Linux computer to display TCP/IP configuration
information.
The host command is used to query a specified host's A records.
The ip address dhcp command is used to configure a Cisco switch to obtain its IP
address from a DHCP server.
References
• 4.4.3 DHCP Relay Facts
q_dhcp_relay_1542_np6.question.fex
Question 2:
Correct
Which port is a DHCP Discover packet sent out on when a device first connects to a
network?
Answer
53
Correct Answer:
67
68
80
Explanation
When a device first connects to a network, it sends out a DHCP Discover packet.
This packet is a UDP broadcast sent out on port 67 to all devices on the network,
asking if there's a DHCP server available.
Port 68 is used by the DHCP relay agent to send out a DHCP broadcast packet to a
client.
Port 80 is used for HTTP.
Port 53 is used by DNS.
References
Question 3:
Correct
Which port does the relay agent use when it sends DHCP information back to the
client?
Answer
67
Correct Answer:
68
80
53
Explanation
When a DHCP server receives the DHCP Discover packet from the relay agent, the
server sends back a DHCP Offer packet. The relay agent puts the DHCP information
into a DHCP broadcast packet and sends it to the client on UDP port 68 on the local
network.
When a device first connects to a network, it sends out a DHCP Discover packet.
This packet is a UDP broadcast sent out on port 67 to all the devices on the network,
asking if there's a DHCP server available.
Port 80 is used for HTTP.
Port 53 is used by DNS.
References
Question 4:
Correct
You are configuring the DHCP relay agent role on a Windows server.
Which of the following is a required step for the configuration?
Answer
Configure the Windows server to be on the same subnet as the DHCP server.
Explanation
When you configure the DHCP relay agent role, you need to specify which server
network interface the agent will listen on for DHCP messages.
The ip helper-address command is used to configure DHCP relay on Cisco routers,
not Windows servers.
An RFC 1542-compliant router is not necessary for DHCP relay when you use a
Windows server DHCP relay agent.
Configuring the Windows server to be on the same subnet as the DHCP server
would prevent it from being able to relay DHCP messages from a different subnet.
References
• 4.4.3 DHCP Relay Facts
q_dhcp_relay_agent_np6.question.fex
Question 5:
Correct
What is the first thing a device does when it connects to a network?
Answer
Explanation
When a device first connects to a network, it sends out a DHCP Discover packet.
This packet is a UDP broadcast sent out on port 67 to all the devices on the network,
asking if there's a DHCP server available.
All the other answers occur later in the DHCP process.
References
Question 6:
Correct
On a typical network, what happens if a client attempts to receive DHCP
configuration from a DHCP server that's located on a different subnet?
Answer
Correct Answer:
The router drops the DHCP request.
Explanation
When a DHCP server is on a different network, the router drops the packet because
routers do not forward broadcast packets to other networks.
DHCP requests are not automatically forwarded to another network. You need to
configure a DHCP relay agent for this.
Clients still send out DHCP requests even if they do not know where the DHCP
server is.
DHCP requests are not manually forwarded.
References
Question 7:
Correct
Which of the following does the DHCP relay agent use to tell the DHCP server which
pool of addresses to use?
Answer
DHCP scope
DHCP ACK
Correct Answer:
GIADDR
Subnet mask
Explanation
The relay agent adds the Gateway IP Address (GIADDR) field to the DHCP request
that defines the gateway, or network, that the client belongs to. The GIADDR tells
the DHCP server the pool of addresses to use when assigning an IP address to the
client.
The DHCP scope is configured on the DHCP server. The scope defines the DHCP
information for the network. The DHCP scope is not used by the relay agent to tell
the DHCP server which pool of addresses to use.
The DHCP ACK is the final step in the DHCP process. The DHCP ACK is not used
by the relay agent to tell the DHCP server which pool of addresses to use.
The subnet mask is configured on the DHCP scope and defines which network the
client belongs to. The subnet mask is not used by the relay agent to tell the DHCP
server which pool of addresses to use.
References
NTP helper
Correct Answer:
IP helper
Explanation
The IP helper performs the same actions as a DHCP relay agent for other UDP-
based protocols, such as NTP. As with DHCP relay, the IP helper forwards to
servers that are located on different networks or subnets. The process that takes
place is identical when forwarding UDP packets.
References
Question 9:
Correct
You have a Windows Server 2016 system that you want to use as a DHCP relay
agent.
Which Windows Server 2016 service would you use to do this?
Answer
Correct Answer:
Routing and Remote Access
SMB
DNS
Explanation
On Windows Server 2016, you configure and enable the DHCP relay agent role with
the Routing and Remote Access service. Before you can use a Windows server as a
DHCP relay agent, you must install the Routing and Remote Access service (RRAS).
IIS is a commonly used web server that runs on Windows.
A DNS server resolves easy-to-use domain names, such as google.com or
amazon.com, into numerical IP addresses that computers understand.
An SMB (Server Message Block) server provides shared resources, like folders,
files, and printers, to network hosts.
References
Question 10:
Correct
Which of the following protocols does DHCP use when it sends out IP configuration?
Answer
TCP
SMTP
IP
Correct Answer:
UDP
Explanation
DHCP uses User Datagram Protocol (UDP) when it sends out configuration
information to clients.
Transmission Control Protocol (TCP) provides services that ensure accurate and
timely delivery of network communications between hosts. It is not used to verify if
an IP address is currently in use on the network.
Internet Protocol (IP) allows devices to communicate across different networks. It is
not used to verify if an IP address is currently in use on the network.
Simple Mail Transfer Protocol (SMTP) is used to send outgoing emails.
References
Explanation
Dynamic DNS (DDNS) enables clients or the DHCP server to update records in the
zone database automatically. Dynamic updates occur when:
• A network host's IP address is added, released, or changed.
• The DHCP server changes or renews an IP address lease.
• The client's DNS information is manually changed using the ipconfig
/registerdns command.
Clearing a browser's cache has no effect on DNS records.
Because you need to manually add and create MX and CNAME records, they have
no effect on DDNS.
References
Question 2:
Correct
Which of the following services automatically creates and deletes host records when
an IP address lease is created or released?
Answer
Correct Answer:
Dynamic DNS
Dynamic NAT
Forward lookup
DHCP Relay
Explanation
Dynamic DNS (DDNS) enables clients or the DHCP server to update records in the
zone database automatically. This occurs whenever an IP address lease is created
or renewed.
A forward lookup is the process of resolving a hostname to an IP address.
A DHCP relay is used to forward DHCP requests to a DHCP server on a different
subnet.
Dynamic NAT automatically maps internal IP addresses with a dynamic port
assignment.
References
Question 3:
Correct
You are the network administrator for a small consulting firm. The firm has recently
rolled out a new intranet site, and you are responsible for configuring the DNS.
You are able to connect to the intranet site by using the IP address, but you cannot
connect when you use the hostname.
Which of the following do you need to configure so that the site can be accessed
with the hostname?
Answer
Correct Answer:
Forward lookup zone
Dynamic DNS
CNAME record
Explanation
In this scenario, you would most likely need to configure the forward lookup zone.
The forward lookup zone matches the hostname to the IP address.
You wouldn't need to configure the reverse lookup zone since you can access the
intranet site using the IP address. A reverse lookup zone matches the IP address to
the hostname.
Dynamic DNS (DDNS) enables clients or the DHCP server to update records in the
zone database automatically. This occurs whenever an IP address lease is created
or renewed. This is not necessary in this scenario.
The CNAME record provides alternate names (or aliases) to hosts that already have
a host record. Using a single A record with multiple CNAME records means that
when the IP address changes, only the A record needs to be modified. This is not
necessary in this scenario.
References
Question 4:
Correct
Which of the following is the top-level domain in www.testout.com.'s fully qualified
domain name (FQDN)?
Answer
. (period)
www
testout
Correct Answer:
com
Explanation
com is the top-level domain (TLD) in this example. The TLD is the second level in
the DNS hierarchy. TLDs have extensions such as com, edu, org, and others.
www is the FQDN's hostname.
testout is this FQDN's domain name.
The .(period) at the end of the FQDN is the root level.
References
Question 5:
Correct
Which of the following is the first place a computer looks at during the name
resolution process?
Answer
DNS server
Explanation
The HOSTS file is a local text file on each computer that maps hostnames to IP
addresses. The HOSTS file was used previously for smaller networks, but it is too
complicated to use on networks or the internet. Even though the HOSTS file is rarely
used today, it is still the first place that a computer looks at during the name
resolution process.
A computer contacts the DNS server if it is unable to find a match in the local
HOSTS file.
The forward lookup zone matches the hostname to the IP address. This is not the
first place a computer looks at during the name resolution process.
A reverse lookup zone matches the IP address to the hostname. This is not the first
place a computer looks at during the name resolution process.
References
Question 6:
Correct
You want to implement a protocol on your network that allows computers to find a
host's IP address from a logical name. Which protocol should you implement?
Answer
Correct Answer:
DNS
Telnet
DHCP
ARP
Explanation
References
Question 7:
Correct
Listed below are several DNS record types. Match each record type on the left with
its function on the right.
Points a hostname to an IPv4 address
A
correct answer:
Provides alternate names to hosts that already have a host record
CNAME
correct answer:
Points an IP address to a hostname
PTR
correct answer:
Points a hostname to an IPv6 address
AAAA
correct answer:
Identifies servers that can be used to deliver mail
MX
correct answer:
Keyboard Instructions
Explanation
Records are used to store entries for hostnames, IP addresses, and other
information in the zone database. Below are some common DNS record types:
• The A record maps an IPv4 (32-bit) DNS hostname to an IP address. This
is the most common resource record type.
• The AAAA record maps an IPv6 (128-bit) DNS hostname to an IP
address.
• The PTR record maps an IP address to a hostname. In essence, it points
to an A record.
• The MX record identifies servers that can be used to deliver email.
• The CNAME record provides alternate names (or aliases) to hosts that
already have a host record. Using a single A record with multiple CNAME
records means that when the IP address changes, only the A record
needs to be modified.
References
Question 8:
Correct
What is the process of a DNS server asking other DNS servers to perform name
resolution known as?
Answer
Dynamic DNS
Correct Answer:
Recursive lookup
Explanation
References
Question 9:
Correct
You need to enable hosts on your network to find the IP address of logical names,
such as srv1.myserver.com. Which device should you use?
Answer
IPS
Bandwidth shaper
IDS
Correct Answer:
DNS server
Explanation
References
Question 10:
Correct
You are the network administrator for a consulting firm. A website that users on your
network visit has a habit of frequently changing its IP address. When these IP
mappings change, users are unable to connect until you clear the DNS cache.
Which of the following settings should you configure so that the cache does not need
to be manually cleared every time?
Answer
CNAME record
Explanation
Because IP mappings can change frequently, you should configure the DNS time to
live (TTL). When the TTL expires, the recursive server clears its cache. The next
time the site is requested, the recursive process repeats.
The forward lookup zone matches the hostname to the IP address. This is not
necessary in this scenario.
A reverse lookup zone matches the IP address to the hostname. This is not
necessary in this scenario.
The CNAME record provides alternate names (or aliases) to hosts that already have
a host record. Using a single A record with multiple CNAME records means that
when the IP address changes, only the A record needs to be modified. This is not
necessary in this scenario.
References
21
Correct Answer:
123
443
80
Explanation
References
Question 2:
Correct
Which of the following works as an authoritative time device?
Answer
Digital clock
System clock
Correct Answer:
Atomic clock
Analog clock
Explanation
References
Question 3:
Correct
Which of the following will not function properly if there is a time mismatch error?
Answer
Program installation
Windows login
Event logging
Correct Answer:
Security certificates
Explanation
If there is a time mismatch error, security certificates suspect malicious behavior and
block connections.
Event logging still functions properly if a system's time is off.
Program installation and logging into Windows are not affected by time mismatch
errors.
References
Question 4:
Correct
What is it called when a system's clock begins to be off by a few seconds or even
minutes?
Answer
Dispersion
Slew
Slam
Correct Answer:
Time drift
Explanation
Time drift is when a system's clock begins to be off by a few seconds or minutes.
Using Network Time Protocol (NTP) can help reduce the risk of time drift.
Slewing is an NTP correction method where the time is adjusted a few milliseconds
at a time until it's correct again.
Slamming is an NTP correction method where the time is hard reset to the correct
time.
Dispersion measures how scattered the time offsets (in seconds) are from a given
time server.
References
Question 5:
Correct
Which of the following best describes NTP efficiency?
Answer
One packet per second is necessary to sync two machines to an accuracy of within a
millisecond of one another.
One packet every five minutes is necessary to sync two machines to an accuracy of
within a millisecond of one another.
Correct Answer:
One packet per minute is necessary to sync two machines to an accuracy of within a
millisecond of one another.
Four packets per minute are necessary to sync two machines to an accuracy of
within a millisecond of one another.
Explanation
NTP is very efficient. Only one packet per minute is necessary to synchronize two
machines to an accuracy of within a millisecond of one another.
References
Question 6:
Correct
What are the small, rapid variations in a system clock called?
Answer
Drift
Dispersion
Skew
Correct Answer:
Jitter
Explanation
References
Question 7:
Correct
You are the network administrator for a small consulting firm. You've set up an NTP
server to manage the time across all the machines in the network.
You have a computer that's experiencing a slight time drift of just a few seconds.
Which time correction should you use to fix the system's clock?
Answer
Skew
Correct Answer:
Slew
Slam
Jitter
Explanation
If time is off by just a few seconds, slewing is better for putting it back on track.
Slewing is a slower, methodical method of correcting the time, but the risk of
problems occurring is much less.
Slamming is used if the time is off by quite a bit and slewing will take too long. While
this is a quick and immediate fix, slamming can cause some programs to function
improperly.
Jitter refers to small, rapid variations in a system's clock.
Skew measures the difference (in hertz) between a clock's actual frequency and the
frequency necessary to keep a more accurate time.
References
Question 8:
Correct
Which of the following is the highest stratum level allowed?
Answer
10
20
Correct Answer:
15
Explanation
Question 9:
Correct
Which stratum level does the authoritative time device fall under?
Answer
Correct Answer:
0
Explanation
Stratum 0 is the highest level in the hierarchy. Stratum 0 is the authoritative time
device itself, such as a GPS time source or atomic clock. The higher the stratum
number, the lower it is on the stratum hierarchy, and the less precedence it has in
relation to other time providers with a lower number.
References
Question 10:
Correct
Which of the following time standards does NTP use?
Answer
EDT
PDT
CDT
Correct Answer:
UTC
Explanation
Network Time Protocol (NTP) uses Coordinated Universal time (UTC) instead of time
zones. Each device is responsible for converting the time to the local time zone.
The other options are United States time zones:
• EDT = Eastern Time
• PDT = Pacific Time
• CDT = Central Time
References
127.0.0.1
Correct Answer:
141:0:0:0:15:0:0:1
165.15.78.53.100.1
Correct Answer:
6384:1319:7700:7631:446A:5511:8940:2552
343F:1EEE:ACDD:2034:1FF3:5012
192.168.2.15
Explanation
References
Question 2:
Correct
Consider the following IPv6 address: FD01:0001:0001:005::7/64
Drag the component parts of this address on the left to the corresponding
descriptions on the right.
Global routing prefix
FD01:0001:0001:005
correct answer:
Subnet ID
:005
correct answer:
Interface ID
::7
correct answer:
Prefix length
/64
correct answer:
Unique local unicast prefix
FD
correct answer:
Keyboard Instructions
Explanation
References
Question 3:
Correct
You manage a network with two locations (Portland and Seattle). Both locations are
connected to the internet.
The computers in both locations are configured to use IPv6. You'd like to implement
an IPv6 solution to meet the following requirements:
• Hosts in each location should be able to use IPv6 to communicate with
hosts in the other location through the IPv4 internet.
• You want to use a site-to-site tunneling method instead of a host-to-host
tunneling method.
Which IPv6 solution should you use?
Answer
4to6 tunneling
Teredo tunneling
Correct Answer:
6to4 tunneling
ISATAP
Explanation
Use 6to4 tunneling to create a router-to-router tunnel between two sites through an
IPv4 network.
Use Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) to enable IPv6 hosts
to communicate over a private IPv4 network within a site. ISATAP doesn't work
between sites.
Use Teredo tunneling to configure a host-to-host tunnel between two hosts
separated by symmetric NAT.
Use 4to6 tunneling to allow IPv4 traffic on an IPv6 network.
References
Question 4:
Correct
You have a server at work with a custom application installed. Connections to the
server that use the custom application must use IPv6, but the server is currently
running IPv4.
You're the only person who connects to the server, and you always use your Linux
laptop for the connection. Your laptop supports both IPv4 and IPv6, but the rest of
your company network runs only IPv4.
You need a cost-effective solution to allow your laptop to connect to the server. Your
solution must also support communication through NAT servers.
Which client software should you use to connect to the server?
Answer
Correct Answer:
Miredo
6to4
4to6
ISATAP
Explanation
References
Question 5:
Correct
Which of the following are characteristics of Teredo tunneling? (Select three.)
Answer
Correct Answer:
Has dual-stack hosts
Correct Answer:
Can be used to send data over the internet
Explanation
References
Question 6:
Correct
Based on the address prefix for each IPv6 address on the right, identify the address
type from the list on the left. (Addresses may not represent actual addresses used in
production.)
2001:6789:9078::ABCE:AFFF:FE98:0001
Global unicast
correct answer:
FD00::8907:FF:FE76:ABC
Unique local
correct answer:
FEA0::AB89:9FF:FE77:1234
Link-local
correct answer:
FF00:98BD:6532::1
Multicast
correct answer:
FF02::1:2
Multicast
correct answer:
Keyboard Instructions
Explanation
Based on previous standards, global unicast addresses start with 20, but they can
now include any prefix that isn't reserved. Addresses beginning with FC or FD are
unique local addresses. Addresses beginning with FE8, FE9, FEA, or FEB are link-
local addresses. Addresses beginning with FF are multicast addresses. There are no
broadcast addresses in IPv6.
References
Question 7:
Correct
Which of the following IPv6 addresses is used by a host to contact a DHCP server?
Answer
FE80::2
FE80::1:2
FF02::2
Correct Answer:
FF02::1:2
Explanation
References
Question 8:
Correct
You need to design an IPv6 addressing scheme for your network. The following are
key requirements for your design:
• Infrastructure hosts, such as routers and servers, are assigned static
interface IDs. However, workstations, notebooks, tablets, and phones are
assigned interface IDs dynamically.
• Internet access must be available to all hosts through an ISP.
• Site-to-site WAN connections are created using leased lines.
Which type of IPv6 addressing is most appropriate for hosts on this network?
Answer
Link-local addressing
Anycast addressing
Correct Answer:
Global unicast addressing
Explanation
You should use global unicast addressing in this scenario because internet access is
required by network hosts. Global unicast addressing uses registered addresses and
is equivalent to public addressing in IPv4. Because the addresses are registered with
IANA, no other organization can use them on any public network, including on the
internet.
Unique local unicast addresses are private addresses used for communication within
a site or between a limited number of sites. These addresses aren't registered with
IANA and can't be used on a public network without address translation.
Link-local addresses are assigned to all IPv6 interfaces on the network by default,
but they can only be used on the local subnet. Routers never forward packets
destined for local-link addresses to other subnets.
Anycast addresses are used to locate the nearest server of a specific type. For
example, this could be the nearest DNS or network time server.
References
Question 9:
Correct
Which of the following IPv6 addresses is equivalent to the IPv4 loopback address of
127.0.0.1?
Answer
Correct Answer:
::1
::
FF02::1
FE80::1
Explanation
The IPv6 loopback address is ::1. The local loopback address isn't assigned to an
interface. It can be used to verify that the TCP/IP protocol stack has been properly
installed on the host.
:: is the unspecified address (also identified as ::/128). The unspecified address is
used when there's no IPv6 address. It's typically used during system startup, or
when the host hasn't yet configured its address. The unspecified address shouldn't
be assigned to an interface.
Multicast addresses have an FF00::/8 prefix. FF02::/8 is the multicast prefix for all
nodes on the local link.
References
Question 10:
Correct
You manage a network that uses IPv6 addressing. When clients connect devices to
the network, they generate an interface ID and use NDP to learn the subnet prefix
and default gateway.
Which IPv6 address assignment method is being used?
Answer
Stateful DHCPv6
Explanation
References
Half-duplex
Broadcast
Correct Answer:
Multicast
Unicast
Explanation
References
Question 2:
Correct
Which type of address is the IP address 232.111.255.250?
Answer
Private
Unicast
Broadcast
Correct Answer:
Multicast
Explanation
The address 232.111.255.250 is a multicast address. A multicast address is an
address that identifies a group of computers. Members of the group share the same
multicast address, and multicast addresses are in the range of 224.0.0.0 to
239.255.255.255.
A unicast address is an address that identifies a single host. A broadcast address is
an address that is sent to all hosts. Broadcast addresses are the last possible
address on a subnet (typically ending in 255).
The private IPv4 address ranges are:
• 10.0.0.1 to 10.255.255.254
• 172.16.0.1 to 172.31.255.254
• 192.168.0.1 to 192.168.255.254
References
Question 3:
Correct
Which address type do people use to support video conference calls consisting of
multiple participants?
Answer
Unicast
Correct Answer:
Multicast
Anycast
Loopback
Explanation
References
Question 4:
Correct
Which of the following BEST describes the special MAC address that multicast traffic
frames are sent to?
Answer
Begins with a form of the router's IP address and ends with 01-00-5E
Begins with a form of the IP multicast group address and ends with 01-00-5E
Begins with 01-00-5E and ends with a form of the router's IP address
Correct Answer:
Begins with 01-00-5E and ends with a form of the IP multicast group address
Explanation
Frames that contain multicast traffic are sent to a special MAC address. The MAC
address begins with 01-00-5E. The last portion is a form of the IP multicast group
address.
References
Question 5:
Correct
Which of the following allows the same IPv6 address to be assigned to multiple
interfaces?
Answer
Broadcast
Unicast
Correct Answer:
Anycast
Multicast
Explanation
The anycast address is a unicast address that's assigned to more than one interface,
typically ones that belong to different hosts. An anycast packet is routed to the
nearest interface, having that address based on routing protocol decisions.
Unicast transmissions are one-to-one communication between two devices. Unicast
does not allow the same IPv6 address to be assigned to multiple interfaces.
Multicast is used to send a message to a specific group of devices. Multicast does
not allow the same IPv6 address to be assigned to multiple interfaces.
A broadcast message sends data to all the hosts on the subnet. This does not allow
the same IPv6 address to be assigned to multiple interfaces.
References
Question 6:
Correct
Which of the following gives the same IP address to multiple servers and manually
defines different routes on an IPv4 network?
Answer
Correct Answer:
BGP
IGMP
Anycast
Multicast
Explanation
Anycast only works on IPv6 networks. We can use Border Gateway Protocol (BGP)
on an IPv4 network to give the same IP address to multiple servers and manually
define different routes.
Anycast only works on IPv6 networks.
The Internet Group Management Protocol (IGMP) is used to identify multicast group
members. It can also forward multicast packets to the segments where group
members reside.
Multicast is used to send a message to a specific group of devices.
References
Question 7:
Correct
Which IP address do broadcast messages use?
Answer
224.0.0.1
224.0.0.0
Explanation
We use broadcast messages to send data to all the hosts on the subnet. The last IP
address on the subnet is reserved for broadcast messages.
The first valid IP address on a subnet is reserved for the network ID.
224.0.0.1 is used for the query messages from routers.
The 224.0.0.0 address range is reserved for local subnets.
References
Question 8:
Correct
Which protocol does an IP host use to inform a router that it wants to receive specific
multicast frames?
Answer
SMTP
ICMP
Correct Answer:
IGMP
SNMP
Explanation
References
Question 9:
Correct
Which type of address identifies which single host to send a packet to?
Answer
Simplex
Correct Answer:
Unicast
Broadcast
Multicast
Explanation
References
•
4.8.2 Multicast Facts
q_mutlicast_unicast_01_np6.question.fex
Question 10:
Correct
Which type of address is the IP address 198.162.12.254/24?
Answer
Broadcast
Private
Multicast
Correct Answer:
Unicast
Explanation
References
Explanation
In this example, the IP address assigned to the host is on the wrong subnet. The
host address is on the 192.168.2.0/24 subnet, but the other devices are using
addresses on the 192.168.1.0 subnet (the scenario states that you're connecting the
workstation to this subnet).
References
Question 2:
Correct
You administer a network with Windows Server 2016, UNIX servers, and Windows
10 Professional, Windows 8, and Macintosh clients. A Windows 8 computer user
calls you one day and says that he is unable to access resources on the network.
You type ipconfig on the user's computer and receive the following output:
0 Ethernet adapter:
IP address. . . . . . . . . : 169.254.1.17
Subnet Mask . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . :
You also check your NIC and see that the link light is on.
What might the problem be in this scenario?
Answer
A bad NIC
Explanation
If a Windows 8 client computer is configured to use DHCP and can't locate one to
receive IP addressing information, it assigns itself an IP address from the APIPA
(Automatic Private IP Addressing) range of IP addresses. APIPA addresses include
IP addresses from 169.254.0.0 to 169.254.255.254 and are reserved for this
purpose. A lit link light on your NIC indicates a connection to the network.
References
Question 3:
Correct
You are a network technician for a small consulting firm. One of your users is
complaining that they are unable to connect to the local intranet site.
After some troubleshooting, you've determined that the intranet site can be
connected to by using the IP address but not the hostname.
Which of the following would be the MOST likely reason for this?
Answer
Correct Answer:
Incorrect DNS settings
Explanation
In this scenario, the most likely cause would be incorrect DNS settings. Since you
can connect to the intranet site using the IP address but not the hostname, this
points to a DNS issue.
None of the other options would be an issue here since you're able to connect to the
intranet site with the IP address.
References
Question 4:
Correct
Which two commands do you use to force a new IP configuration? (Select two.)
Answer
Correct Answer:
ipconfig /renew
ipconfig /all
ipconfig
Correct Answer:
ipconfig /release
ipconfig /flushdns
Explanation
References
Question 5:
Correct
You are a network technician for a small consulting firm. One of your responsibilities
is to manage the intranet site and configuration. You recently had to update the site's
IP mapping due to a server upgrade.
A user is having an issue with connecting to the intranet site now. When the user
attempts to connect through their web browser, they receive a message that the
page cannot be displayed. If you type in the IP address, the page loads fine.
Which of the following commands should you use to fix this issue?
Answer
ipconfig /release
Correct Answer:
ipconfig /flushdns
ipconfig /registerdns
ipconfig /displaydns
Explanation
In this scenario, the best option is to run the ipconfig /flushdns command. This will
remove all entries from the device's DNS resolver cache and force the computer to
update the DNS mappings the next time the user attempts to connect to the intranet
site.
ipconfig /registerdns refreshes all DHCP leases and re-registers DNS names. This
command would not fix this user's issue.
ipconfig /displaydns displays the contents of the DNS resolver cache. This
command would not fix this user's issue.
ipconfig /release clears the current IP configuration. This command would not fix
this user's issue.
References
Question 6:
Correct
You manage a network that has multiple internal subnets. You connect a workstation
to the 192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not
with other hosts. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : mydomain.local
Description . . . . . . . : Broadcom network adapter
Physical Address. . . . . . : 00-AA-BB-CC-74-EF
DHCP Enabled . . . . . . . : No
Autoconfiguration Enabled. . . : Yes
IPv4 Address . . . . . . . : 192.168.1.102(Preferred)
Subnet Mask . . . . . . . : 255.255.255.0
Default Gateway. . . . . . . . . : 192.168.2.1
DNS Servers. . . . . . . . . . . : 192.168.2.20
Incorrect IP address
Correct Answer:
Incorrect default gateway
Explanation
In this example, the default gateway address is incorrect. The default gateway
address must be on the same subnet as the IP address for the host. The host
address is on the 192.168.1.0/24 subnet, but the default gateway address is on the
192.168.2.0 subnet.
References
Question 7:
Correct
You are the network administrator for a consulting firm. Your network consists of:
• 40 desktop computers
• Two servers
• Three network switches
• Two network printers
You've been alerted to an issue with two desktop computers that are having
problems communicating with the network. When only one computer is on,
everything is fine. But when both computers are connected, the network connection
is randomly dropped or interrupted.
Which of the following would be the MOST likely cause for this?
Answer
Correct Answer:
Duplicate MAC Addresses
Explanation
The most likely cause for the issue in this scenario is that both computers have the
same MAC address. This address is unique, so there shouldn't be duplicate
addresses on a network. However, it is possible for two hosts to have the same MAC
address due to spoofing, a mistake during manufacturing, or if users choose a self-
assigned address instead of the vendor-assigned hardware address. If two
computers have the same MAC address, reaching either host will be inconsistent
and can cause other problems as well.
DNS is responsible for translating hostnames to IP addresses. A rogue DNS server
would not cause the issues experienced in this scenario.
Exhausted DHCP scope means that all the addresses within the DHCP scope were
depleted. Consequently, a legitimate user is denied an IP address requested through
DHCP and isn't able to access the network. This would not cause the issues
experienced in this scenario.
The gateway is responsible for routing traffic between networks. This would not
cause the issues experienced in this scenario.
References
Question 8:
Correct
You manage a network that has multiple internal subnets. You connect a workstation
to the 192.168.1.0/24 subnet.
This workstation can communicate with some hosts on the private network, but not
with other hosts. You run ipconfig /all and see the following:
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . : mydomain.local
Description . . . . . . . : Broadcom network adapter
Physical Address. . . . . . : 00-AA-BB-CC-74-EF
DHCP Enabled . . . . . . . : No
Autoconfiguration Enabled. . . : Yes
IPv4 Address . . . . . . . : 192.168.1.102(Preferred)
Subnet Mask. . . . . . . . : 255.255.0.0
Default Gateway . . . . . . : 192.168.1.1
DNS Servers . . . . . . . : 192.168.1.20
192.168.1.27
Incorrect IP address
Correct Answer:
Incorrect subnet mask
Explanation
In this example, the network is using a mask of 255.255.255.0 (24-bits), but the
workstation is configured to use a mask of 255.255.0.0.
References
Question 9:
Correct
You are a network technician for a small consulting firm. Many users have reported
issues with accessing the network.
After some initial troubleshooting, you discover that many devices have the same IP
address assigned or incorrect IP configurations.
Which of the following would be the MOST likely cause for this?
Answer
Explanation
In this scenario, a rogue DHCP server would be the most likely cause for the
duplicate and incorrect IP configurations. A rogue DHCP server is an unauthorized
DHCP server. When a rogue DHCP server exists on a network, some hosts will
receive configuration information from the correct DHCP server and others from the
rogue one. This will lead to conflicting and incorrect IP configurations.
Exhausted DHCP scope means that all the addresses within the DHCP scope were
depleted. Consequently, a legitimate user is denied an IP address requested through
DHCP and isn't able to access the network. This would not cause duplicate or
incorrect IP configurations.
The gateway is responsible for routing traffic between networks. This would not
cause duplicate or incorrect IP configurations.
DNS is responsible for translating hostnames to IP addresses. This would not cause
duplicate or incorrect IP configurations.
References
APIPA
On-path attack
Explanation
The network is most likely experiencing a DHCP starvation attack. This attack
exhausts all addresses in the DHCP scope, which leads to users being unable to
receive their IP configurations. This attack might be a denial-of-service mechanism,
or it may be used together with a rogue server to redirect traffic to a malicious
computer.
DNS is responsible for translating hostnames to IP addresses. A rogue DNS server
would not lead to devices not receiving their IP configurations.
If a host cannot contact the DHCP server, it's assigned an IP address using
Automatic Private IP Addressing (APIPA). This would be a consequence to devices
affected by the DHCP starvation attack, but it would not be the cause.
An on-path attack occurs when a malicious user intercepts traffic between two
devices. This would not lead to devices not receiving their IP configurations.
References
Windows 10
Explanation
The output shown is from the ifconfig command run on a Linux system. Keep in
mind that while you can still use ifconfig, the ip command has essentially
replaced ifconfig as the Linux tool for configuring network adapters.
The equivalent command on Windows 10, Windows 2019, and Windows Server
2016 is ipconfig.
References
Question 2:
Correct
You've been called in to troubleshoot a connectivity problem on a newly installed
Windows Server system. The system is operating well and is able to communicate
with other systems on the local network. However, it's unable to access any systems
on other segments of the corporate network.
You suspect that the system's default gateway parameter hasn't been configured or
may be configured incorrectly. Which of the following utilities are you MOST likely to
use to view the system's default gateway information?
Answer
tcpdump
netstat
ifconfig
Correct Answer:
ipconfig
Explanation
Use the ipconfig utility to view the TCP/IP configuration of a Windows Server
system. The information displayed by ipconfig includes default gateway information.
tcpdump is a packet analyzer that runs in a command line utility.
Use the ifconfig command to view the TCP/IP configuration on a Linux, Unix, or
Macintosh system. Keep in mind that while you can still use ifconfig,
the ip command has essentially replaced ifconfig as the Linux tool for configuring
network adapters.
Use the netstat command to view TCP connection statistics.
References
•
4.10.3 Network Communication Troubleshooting Facts
q_trouble_network_comm_ipconfig_01_np6.question.fex
Question 3:
Correct
Examine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
Answer
tracert
Correct Answer:
ping
ifconfig
nslookup
Explanation
The output shown was produced by the ping utility. Specifically, the information
output was created using the ping -t command. The -t switch causes packets to be
sent to the remote host continuously until you stop it manually. ping is a useful tool
for testing connectivity between devices on a network. Using the -t switch
with ping can be useful in determining whether the network is congested. If it is,
there will be sporadic failures in the ping stream.
tracert is similar to ping in that it tests connectivity between two hosts on a network.
The difference is that tracert reports information on all intermediate devices between
the host system and the target system. ping, on the other hand, doesn't report
information on intermediate devices.
nslookup is a tool provided on Linux, Unix, and Windows systems that allows
manual name resolution requests to be made to a DNS server. This is useful when
you troubleshoot name resolution problems.
ifconfig is a tool for Unix, Linux, and Macintosh systems that's used to view the
configuration of network interfaces, including TCP/IP network settings.
References
Question 4:
Correct
ifconfig
Correct Answer:
ping
ipconfig
arp -a
Explanation
The output of the ping command shows you the results of four echo request/reply
contacts with a destination host.
The arp -a command shows the current entries in a computer's ARP cache.
Use the ifconfig command to view the TCP/IP configuration on a Linux, Unix, or
Macintosh system. Keep in mind that while you can still use ifconfig,
the ip command has essentially replaced ifconfig as the Linux tool for configuring
network adapters.
Use the ipconfig utility to view the TCP/IP configuration of a Windows Server
system.
References
Question 5:
Correct
While working on a Linux server, you're unable to connect to your Windows Server
system across the internet. You're able to ping the default gateway on your own
network, so you suspect that the problem lies outside of the local network.
Which utility would you use to track the route a packet takes as it crosses the
network?
Answer
Correct Answer:
traceroute
ipconfig
ifconfig
tracert
Explanation
traceroute is a Linux utility that allows you to track a packet's route as it traverses
the network. The traceroute utility is used on Linux systems, while tracert is used
on Windows systems.
ipconfig and ifconfig are utilities used to obtain TCP/IP configuration on Windows
and Linux systems, respectively.
References
•
4.10.3 Network Communication Troubleshooting Facts
q_trouble_network_comm_traceroute_np6.question.fex
Question 6:
Correct
Which TCP/IP utility gives you the following output?
Interface: 192.168.4.101 on Interface 0x3
Internet Address Physical Address Type
192.168.1.23 00-d1-b6-b7-c2-af dynamic
Answer
Correct Answer:
arp
ipconfig
tracert
nslookup
Explanation
This output is displayed when you use the arp -a command to look at the ARP
cache.
Use the nslookup utility to perform manual DNS lookups on Windows.
Use ipconfig to view network configuration information on Windows systems.
The tracert utility allows you to track a packet's route as it traverses the network.
References
•
4.10.4 Use arp and netstat
•
4.10.5 arp and netstat Facts
•
14.3.1 Command Line Troubleshooting Utilities
•
14.3.2 Command Line Troubleshooting Utility Facts
q_arp_netstat_arp_01_np6.question.fex
Question 7:
Correct
Which of the following tools would you use to view the MAC addresses associated
with IP addresses that the local workstation has contacted recently?
Answer
nbtstat
Correct Answer:
arp
netstat
arping
Explanation
Use the arp command to view the MAC addresses associated with IP addresses that
the local workstation has contacted recently. When a workstation uses arp to find an
IP address's MAC address, it places that information in its ARP table.
Use the arping command to send an ARP request to a specified IP
address. arping works much like ping in that the host with the specified IP address
responds. netstat shows IP-related statistics (like incoming and outgoing
connections) and active sessions, ports, and sockets. nbtstat displays the NetBIOS
name tables for both the local and remote computers and the NetBIOS name cache.
References
Question 8:
Correct
netstat -a
netstat
Correct Answer:
netstat -r
netstat -s
Explanation
References
Question 9:
Correct
Your computer is sharing information with a remote computer using the TCP/IP
protocol. Suddenly, the connection stops working and appears to hang. Which
command can you use to check the connection?
Answer
ipconfig
ping
arp
Correct Answer:
netstat
Explanation
References
Question 10:
Correct
Examine the following output:
Active Connections
Proto Local Address Foreign Address State
TCP SERVER1:1036 localhost:4832 TIME_WAIT
TCP SERVER1:4798 localhost:1032 TIME_WAIT
TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT
TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED
TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED
TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED
Which of the following utilities produced this output?
Answer
dig
Correct Answer:
netstat
ifconfig
nslookup
Explanation
The output shown is produced by the netstat command. netstat reports the open
TCP/IP ports on the local system, and it also identifies the protocol and remote host
connected to that port. This information can be very useful when you're looking for
security weaknesses, as a TCP/IP port that's open to traffic represents an
unnecessary security risk.
ifconfig is a tool used on Unix, Linux, and Macintosh systems to view the
configuration of network interfaces, including TCP/IP network settings.
The dig command allows you to perform manual DNS lookups from a Linux or Unix
system. This can be very useful when you troubleshoot name resolution issues.
In addition to Linux and Unix systems, nslookup allows you to perform manual DNS
lookups from a Windows system.
References
traceroute
Correct Answer:
dig
Correct Answer:
nslookup
tracert
arp
Explanation
The dig and nslookup commands allow you to perform manual DNS lookups from a
Linux or Unix system. This can be very useful when you're troubleshooting name
resolution issues.
Use tracert and traceroute to track the route that a packet takes as it crosses a
network. You wouldn't typically use these commands to troubleshoot a name
resolution problem, though they may be useful if you're unable to connect to the DNS
server.
The arp command displays a network host's MAC address.
References
Question 2:
Correct
Consider the following output.
;; res options: init recurs defnam dnsrch
;;got answer:
;;->>HEADER<<-opcode:QUERY, status; NOERROR,id:4
;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2,
ADDITIONAL:0
;;QUERY SECTION:
;; westsim111.com, type = A, class = IN
;;ANSWER SECTION:
westsim111.com. 7h33m IN A 76.141.43.129
;;AUTHORITY SECTION:
westsim111.com. 7h33m IN NS dns1.deriatct111.com.
westsim111.com. 7h33m IN NS dns2.deriatct222.com.
;;Total query time: 78 msec
;;FROM: localhost.localdomain to SERVER: default --
202.64.49.150
;;WHEN: Tue Feb 16 23:21:24 2005
;;MSG SIZE sent: 30 rcvd: 103
Which of the following utilities produced this output?
Answer
ping
nbtstat
Correct Answer:
dig
nslookup
Explanation
The output shown is from the dig command that was run on a Linux system.
Although nslookup and dig provide some of the same information, you can tell that
this output came from dig because this command produces significantly more detail
in its default usage.
Use nbtstat to view information on NetBIOS over TCP/IP (NetBT) name resolutions.
Use ping to test connectivity between network systems.
References
Question 3:
Correct
Consider the following output from a dig command run on a Linux system.
; <<>> DiG 8.2 <<>> westsim111.com
;;res options:init recurs defnam dnsrch
;;got answer:
;;->>HEADER<<-opcode:QUERY, status: NOERROR, id:4
;;flags: qr rd ra; QUERY:1, ANSWER:1, AUTHORITY:2,
ADDITIONAL:0
;;QUERY SECTION:
;; westsim111.com, type = A, class = IN
;;ANSWER SECTION:
westsim111.com. 7h33m IN A 76.141.43.129
;;AUTHORITY SECTION:
westsim111.com. 7h33m IN NS dns1.deriatct111.com.
westsim111.com. 7h33m IN NS dns2.deriatct222.com.
;;Total query time: 78 msec
;;FROM: localhost.localdomain to SERVER:default --
202.64.49.150
;;WHEN: Tue Feb 16 23:21:24 2005
;;MSG SIZE sent: 30 rcvd:103
What is the IP address of the DNS server that performed this name resolution?
Answer
16.23.21.24
Correct Answer:
202.64.49.150
192.168.1.100
76.141.43.129
Explanation
When you use the dig command to perform a manual DNS lookup, a range of
information is provided to you. The IP address of the DNS server that performed the
name resolution is shown at the bottom area of the output on the end of
the ;;FROM line.
The IP address shown in the answer section denotes the resolved IP address for the
domain or host that the resolution was requested for. In this case, that address is
76.141.43.129.
The other two answers are invalid.
References
Question 4:
Correct
Which of the following can you append to the end of the dig command to run a query
for all the records in the zone?
Answer
-a
Correct Answer:
-axfr
-ns
-mx
Explanation
You can use the dig command to query a host for more information. You can change
the default search by appending a switch to the end of the command. To run a query
for all the records in the zone, you add -axfr to the dig command.
Adding -a to the dig command queries address records.
Adding -mx to the dig command queries mail exchange records.
Adding -ns to the dig command queries name server records.
References
Question 5:
Correct
A user reports that they cannot browse to a specific website on the internet.
From the user's computer, a computer tech finds that a ping test to the web server
succeeds. A traceroute test shows 17 hops to the destination web server.
What is the MOST likely cause of the problem?
Answer
Correct Answer:
Incorrect DNS server address
Duplicate IP addresses
Explanation
In this scenario, a ping test to the website succeeds, while accessing the website
through the browser does not work. Users type hostnames in the browser to go to
websites, but hostnames must be translated into IP addresses by a DNS server.
Either the workstation is using the wrong address for the DNS server, the DNS
server is not available, or the DNS server does not have an entry for the website.
Because the ping and traceroute tests work, you know that the IP address, subnet
mask, and default gateway values are correct.
References
Question 6:
Correct
Which of the following commands do you use to clear the local DNS cache?
Answer
Correct Answer:
ipconfig /flushdns
ipconfig /release
dig -x
Explanation
You use the ipconfig /flushdns command to clear the local DNS cache. Local
computers have a cache of recently resolved DNS names that holds the names and
matching IP addresses. This is the first place a computer looks to find a DNS name.
If the host's IP address has changed, clearing the local DNS cache forces the record
to be updated.
The ipconfig /release command clears the current IP configuration. This does not
clear the local DNS cache.
The dig -x command finds the hostname for the queried IP address.
The nslookup set type=PTR command specifies a computer name if the query is an
IP address. Otherwise, it specifies the pointer to other information.
References
Question 7:
Correct
Mary calls to tell you that she can't connect to an intranet server called WebSrv1.
From her computer, you ping the server's IP address. The ping test is successful.
Which tool would you use on her workstation next to troubleshoot the problem?
Answer
Correct Answer:
nslookup
arp
tracert
netstat
Explanation
Use nslookup to troubleshoot name resolution problems. Because the ping test was
successful, you know that both the client and the server can communicate using
TCP/IP with IP addresses. This tells you that the problem is related to name
resolution.
Use tracert to track the route that a packet takes as it crosses a network. You
wouldn't typically use these commands to troubleshoot a name resolution problem,
though they may be useful if you're unable to connect to the DNS server.
The arp command displays a network host's MAC address.
netstat is used to view protocol connections that have been established by the
system as well as which incoming TCP/IP ports are in use by the system.
References
•
4.11.2 DNS Troubleshooting Facts
q_trouble_dns_nslookup_01_np6.question.fex
Question 8:
Correct
Examine the following output:
Server: to.xct.mirrorxhq.net
Address: 209.53.4.130
Name: westxsim.com
Address: 64.78.193.84
Which of the following utilities produced this output?
Answer
tracert
netstat
ipconfig
Correct Answer:
nslookup
Explanation
References
Question 9:
Correct
You are using Linux and need to perform a reverse lookup of the IP address
10.0.0.3. Which command would you use to accomplish this?
Answer
arp 10.0.0.3
nslookup 10.0.0.3
Correct Answer:
dig -x 10.0.0.3
nbtstat -a 10.0.0.3
Explanation
To perform a reverse lookup of the IP address 10.0.0.3 on Linux use the dig -x
10.0.0.3 commands.
The ipconfig command is used to perform a forward or reverse DNS lookup.
The arp 10.0.0.3 command displays the MAC address of the network host with an IP
address of 10.0.0.3.
The nbtstat -a 10.0.0.3 command displays the NETBIOS name of the host assigned
an IP address of 10.0.0.3.
References
• 4.11.2 DNS Troubleshooting Facts
q_trouble_dns_reverse_np6.question.fex
Question 10:
Correct
Which of the following commands should you use to check the route a packet takes
between a workstation and the DNS server?
Answer
dig
ping
nslookup
Correct Answer:
tracert
Explanation
The tracert command is used to test the route between a workstation and the DNS
server. Running this command shows you each stop, or hop, a packet takes to reach
its destination.
ping is used to test the connectivity between two devices, but it does not show the
route the packet will take.
dig is used to query a host. Dig does not show the route a packet will take.
nslookup queries a host's IP address. It does not show the route a packet will take.
References
Explanation
References
Question 2:
Correct
Which of the following physical topologies are used with Ethernet networks? (Select
two.)
Answer
Token
Correct Answer:
Bus
Ring
Correct Answer:
Star
Mesh
Explanation
Ethernet networks use either a physical bus or physical star topology. Hubs can also
be cascaded to form a tree topology.
References
• 5.1.2 Ethernet Facts
q_ethernet_topology_np6.question.fex
Question 3:
Correct
Which Gigabit Ethernet standard can support long network segments up to a
maximum of 5 km when used with single-mode fiber optic cable?
Answer
1000BaseT
1000BaseCX
Correct Answer:
1000BaseLX
1000BaseSX
Explanation
References
Question 4:
Correct
Which Gigabit Ethernet standard uses multimode fiber optic cabling and supports
network segments up to a maximum of 550 meters long?
Answer
Correct Answer:
1000Base-SX
1000Base-CX
1000Base-T
1000Base-ZX
Explanation
The 1000Base-SX standard uses multimode fiber optic cable with a maximum
segment length of 550 meters. However, to implement segments this long, you must
use 50-micron 500MHz/km multimode fiber optic cabling. Other types of cabling will
shorten the maximum segment length. 1000Base-FX also supports lengths up to 550
meters using multimode cabling. 1000Base-FX supports distances up to 10
kilometers using single-mode cabling.
1000Base-ZX has a maximum segment length of up to 100 km. 1000Base-CX and
1000BaseT use copper cabling instead of fiber optic.
References
Question 5:
Correct
Which type of cabling do Ethernet 100BaseFX networks use?
Answer
Coaxial
Correct Answer:
Fiber optic
Explanation
References
Question 6:
Correct
Your network follows the 100Base-FX specifications for Fast Ethernet and uses half-
duplex multimode cable. What is the maximum cable segment length allowed?
Answer
100 meters
Correct Answer:
412 meters
550 meters
1,000 meters
Explanation
References
Question 7:
Correct
Your network follows the 100Base-TX specifications for Fast Ethernet. What is the
maximum cable segment length allowed?
Answer
2,000 meters
1,000 meters
500 meters
Correct Answer:
100 meters
Explanation
References
10Base-FL
10GBase-T
Correct Answer:
1000Base-SX
1000Base-T
Correct Answer:
10GBase-SR
Explanation
10GBase-SR and 1000Base-SX can operate within these parameters. Both support
segment lengths 300 meters long and can use multimode fiber optic cabling.
10Base-FL isn't a good choice because its data transmission rate is relatively slow.
10GBase-T and 1000Base-T both use copper wiring.
References
Question 9:
Correct
You want to implement an Ethernet network at very long distances using fiber optic
cables. Which standard and cable type would you choose? (Select two.)
Answer
Correct Answer:
Single-mode fiber
Mutimode fiber
Correct Answer:
1000BaseLX
1000BaseCX
1000BaseSX
Explanation
Of the standards listed in this question, 1000BaseLX provides the greatest cable
length (think of the "L" in 1000BaseLX as "Long"). When using fiber optic across long
distances, use single-mode fiber.
Multimode fiber is cheaper, but it has a shorter maximum distance than single-mode
fiber. 1000BaseSX stands for short fiber optic, and 1000BaseCX uses short copper
within a wiring closet.
References
Question 10:
Correct
You would like to implement 10 Gbps Ethernet over a distance of 1 kilometer or
greater. Which of the following would be the minimum requirement for this
implementation? (Select two.)
Answer
10GBaseSR standards
Multimode fiber
Correct Answer:
Single-mode fiber
Correct Answer:
10GBaseLR standards
10GBaseER standards
Explanation
References
• 5.1.4 Ethernet Specifications Facts
q_ethernet_spec_fiber_04_np6.question.fex
You want to create a loopback plug using a single RJ45 connector. How should you
connect the wires in the connector?
Answer
Correct Answer:
Connect pin 1 to pin 3 and pin 2 to pin 6.
Explanation
To create a loopback plug or a crossover cable, connect pin 1 (Tx+) to pin 3 (Rx+)
and pin 2 (Tx-) to pin 6 (Rx-).
Connecting each pin to the opposite pin (1 to 8, 2 to 7, and so on) creates a rollover
cable.
References
Question 2:
Correct
You need to connect two switches using their uplink ports. The switches do not
support auto-MDI.
Which type of cable should you use?
Answer
Correct Answer:
Crossover
Rollover
Straight-through
Loopback
Explanation
Use a crossover cable to connect two switches through their uplink ports or to
connect two switches through regular ports.
Use a straight-through cable to connect the uplink port on one switch to a regular
port on another switch. Use a rollover cable to connect a workstation to a switch's
console port. Use a loopback plug connected to a single port for troubleshooting.
References
Question 3:
Correct
You want to connect the LAN port on a router to the uplink port on a switch. The
switch does not support auto-MDI.
Which type of cable should you use?
Answer
Straight-through
Rollover
Loopback
Correct Answer:
Crossover
Explanation
References
Question 4:
Correct
You need to transfer data from one laptop to another, and you would like to use an
Ethernet cable. You do not have a hub or a switch.
Which type of cable should you use?
Answer
Rollover
Correct Answer:
Crossover
Loopback
Straight-through
Explanation
References
•
5.2.2 Device Connection Facts
q_connect_devices_crossover_04_np6.question.fex
Question 5:
Correct
Which of the following connectors is typically used for the ends of a rollover cable?
(Select two.)
Answer
Correct Answer:
RJ45
RJ11
Correct Answer:
Serial
F-type
BNC
Explanation
A rollover cable has a serial connector on one end and an RJ45 connector on the
other end. Alternatively, a rollover cable might have an RJ45 connector on both ends
and use a serial converter to convert from the RJ45 connector to a serial connector.
BNC and F-type connectors are used with coaxial cables.
RJ11 connectors are used for telephones.
References
Question 6:
Correct
Which of the following standards does a rollover cable typically use?
Answer
RG58
Correct Answer:
RS232
RJ11
RG6
Explanation
A rollover cable typically has a serial connector on one end and an RJ45 connector
on the other end. RS232 is the standard for serial communications.
RJ11 connectors are used for analog telephone lines. RG6 and RG58 are coaxial
cable standards.
References
Question 7:
Correct
You have purchased a new router that you need to configure. You need to connect a
workstation to the router's console port to complete the configuration tasks.
Which type of cable would you most likely use?
Answer
Straight-through
RG6
Crossover
Correct Answer:
Rollover
Explanation
References
Question 8:
Correct
You want to create a rollover cable that has an RJ45 connector on both ends. How
should you connect the wires within the connectors?
Answer
Connect each pin on one end to the same pin on the other end (pin 1 to pin 1, pin 2
to pin 2, etc.).
Correct Answer:
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5.
Use the T568A standard on one end and the T568B standard on the other end.
Explanation
When terminated with an RJ45 connector on both ends, the wires within the
connectors are rolled over to the opposite connectors as follows:
• Pin 1 connects to pin 8.
• Pin 2 connects to pin 7.
• Pin 3 connects to pin 6.
• Pin 4 connects to pin 5.
A crossover cable uses the T568A standard on one end and the T568B standard on
the other end. The crossover cable connects pin 1 to pin 3 and pin 2 to pin 6.
Connecting each pin to the same pin on the other end creates a straight-through
cable.
References
Question 9:
Correct
You need to connect a workstation to a switch using a regular port on the switch (not
an uplink port). The switch does not support auto-MDI.
Which type of cable should you use?
Answer
Loopback
Correct Answer:
Straight-through
Rollover
Crossover
Explanation
References
Question 10:
Correct
Which of the following connections would you use a straight-through cable for?
Answer
Hub to hub
Router to the uplink port on a hub
Correct Answer:
Router to a regular port on a switch
Workstation to workstation
Explanation
References
All devices except the device connected with the drop cable will be able to
communicate.
Devices on one side of the break will be able to communicate with each other, while
devices on the other side will not be able to communicate.
Only devices on one side of the break will be able to communicate with each other,
while only devices on the other side of the break will be able to communicate with
each other.
Explanation
A break in the network bus means that the end of the network bus is no longer
terminated. For this reason, a break in the bus typically means that no devices can
communicate. Identifying the location of the break is difficult on a true bus network.
References
Question 2:
Correct
You have just connected four new computer systems to an Ethernet switch using
spare patch cables. After the installation, only three systems are able to access the
network. You verify all client network settings and replace the network card in the
failed system. The client is still unable to access the network.
Which of the following might you suspect is the real cause of the problem?
Answer
Faulty IP stack
Explanation
Bent and damaged patch cables prevent client systems from accessing the network.
In this scenario, a faulty patch cable is the most likely cause of the connection
failure. The easiest way to test this is to simply swap out the cable and try a known
good UTP patch cable.
References
Question 3:
Correct
You are moving a client to a new location within an Ethernet network. Previous to the
move, the client system did not have difficulty accessing the network.
During the relocation, you attach patch cables from the client system to the wall jack
and from the patch panel to the switch. Once connected, you do not get a link light
on the network card or the switch. You swap out the cable running between the
patch panel and the switch with a known good one, but you still cannot connect.
Which of the following might you suspect is the problem?
Answer
Failed switch
Faulty termination
Correct Answer:
Failed patch cable between the client system and the wall jack
Explanation
Because the client system previously worked in a different location, the issue is not
likely related to the client system. The NIC and switch LEDs' failure to light indicates
that there isn't an end-to-end connection between the client and the switch. This
means that either the patch cable between the wall jack and the client is faulty or the
cable between the patch panel and the switch is faulty. The cable connecting the
switch and the patch panel was verified, leaving the cable between the wall jack and
the client system.
It is unlikely that the issue is a failed network card, as the system was functioning in
a different location, eliminating the possibility of hardware or software on the client
system being the problem. The failure is limited to a connection issue between a
single client and a switch. If the switch failed, all clients connected to that switch
would not be able to connect. Incorrect duplex settings would not prevent NIC and
switch LEDs from lighting.
References
Question 4:
Correct
You have a network that's connected using a full physical mesh topology. The link
between Device A and Device B is broken.
Which of the following BEST describes the effect that this will have on network
communications?
Answer
Correct Answer:
Device A will be able to communicate with all other devices.
Device A will be able to communicate with any device except for Device B.
Explanation
References
Explanation
In this scenario, you are most likely to replace the network card in the user's
computer.
As there is only one user experiencing the problem, you are unlikely to replace the
network card in the server or replace the Ethernet switch. For the same reason, you
are also unlikely to replace the network card drivers on the server. If more than one
user were experiencing the problem, any of these options could be a valid
troubleshooting step.
References
Question 6:
Correct
You have a network that's connected using a physical star topology. One of the drop
cables connecting a workstation has been removed.
Which of the following BEST describes the effect that this will have on network
communications?
Answer
Devices on one side of the missing cable will be able to communicate with each
other, while devices on the other side of the missing cable will not be able to
communicate.
Explanation
A cable break in a star topology means that the device connected to the central
device (hub or switch) through that cable can no longer communicate on the
network. All other hosts will be able to communicate with all other devices.
References
Question 7:
Correct
You are implementing a SOHO network for a local business. The ISP has already
installed and connected a cable modem for the business.
The business has four computers that need to communicate with each other and the
internet. The ISP's cable modem has only one RJ45 port. You need to set up the
network within the following parameters:
• You must spend as little money as possible.
• You must not purchase unnecessary equipment.
• Computers need to have a gigabit connection to the network.
• New devices should not require management or configuration.
You examine each computer and notice that only one of the four computers has a
wireless NIC. They all have Ethernet NICs.
What should you purchase?
Answer
Explanation
You should purchase an unmanaged switch and CAT 5e cabling. Switches offer
guaranteed bandwidth to each switch port and full-duplex communication.
Unmanaged switches are autonomous in their function, requiring no port
management or configuration. CAT 5e cabling supports transfer speeds up to 1,000
Gbps.
Purchasing a new cable modem with a built-in switch would be more expensive than
an unmanaged switch. Additionally, CAT 6a cabling is unnecessary for this type of
network. Because all of the computers already have wired NICs, purchasing a
wireless AP and three new wireless NICs would introduce new costs. The wireless
AP would also require additional management and configuration. Hubs suffer from
collisions, so only half-duplex communication is possible. This also wouldn't support
1,000 Gbps speeds. A small business with four computers doesn't need the
additional features that a managed switch provides.
References
Question 8:
Correct
Angela is the network administrator for a rapidly growing company with a 100BaseT
network. Users have recently complained about slow file transfers. While checking
network traffic, Angela discovers a high number of collisions.
Which connectivity device would BEST reduce the number of collisions and allow
future growth?
Answer
Router
Hub
Correct Answer:
Switch
Bridge
Explanation
A switch would be the best choice in this situation. A bridge would segment traffic
and reduce collisions, but it would be harder to maintain and harder to add new
bridges as the network grows. A router would also allow growth and reduce
collisions, but switches can provide those benefits at a lower cost per port and offer
more administration options. A hub is not a good choice in this scenario.
References
Question 9:
Correct
During a network infrastructure upgrade, you replaced two 10 Mbps hubs with
switches and upgraded from a Category 3 UTP cable to a Category 5e. During the
process, you accidentally cut the Cat 5e patch cable that stretches from the network
printer to the upgraded switch.
What is the impact on your network?
Answer
All network nodes authenticated by the same server as the printer will be
unavailable.
All network nodes on the same subnet as the printer will be unavailable.
Explanation
UTP cable and switches are associated with a star network topology. In a star
topology, each device is attached to the network using its own patch cable. If a cable
were to fail for any reason, only the device connected by that cable would be
unavailable.
References
Question 10:
Correct
Upon conducting a visual inspection of the server room, you see that a switch
displays LED collision lights that are continually lit. You check the LED on the
corresponding workstation and see that it is flashing rapidly even though it is not
sending or receiving network traffic at that time.
What is the cause of the network collisions?
Answer
Faulty switch
Explanation
Sometimes when a NIC fails, it doesn't just stop working, but it begins to flood the
network with transmissions. This is called jabbering. A single network card can slow
down an entire network by continually transmitting signals. You can identify a
jabbering network card by slower than normal speeds, high occurrences of collisions
displayed on the hub or switch, and LEDs on the network card, indicating a high level
of transmissions even though a user is not accessing the network.
References
Lab Report
Time Spent: 01:33
TASK SUMMARY
Required Actions
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.1.6 Connect a Cable Modem
Lab Report
Time Spent: 01:52
TASK SUMMARY
Required Actions
Connect the cable modem to the internet using the RG-6 cable
Connect the computer to the cable modem using the Ethernet cable
EXPLANATION
Lab Report
Time Spent: 01:41
TASK SUMMARY
Required Actions
Disconnect the Ethernet cable from the CorpiSCSI server Show Details
EXPLANATION
To determine which network components to use, examine the ports on the switch and the CorpiSCSI server.
The fiber optic NIC installed in the CorpiSCSI server uses ST connectors.
The ST to LC fiber cable is the only cable that can be used to connect the switch and the server.
LC connectors have two connectors linked together. LC connectors can only be inserted one way.
ST connectors twist on using a BNC connector. An ST cable has two color-coded ST connectors. They have
one for transmit (Tx) and one for receive (Rx).
3. Disconnect the Cat6a RJ45 cable from the CorpiSCSI server and switch.
a. Drag the RJ45 connector from the back of the server to the Shelf.
b. Above the rack, select Front to view the front of the rack.
c. Drag the highlighted RJ45 connector from the switch to the Shelf.
4. Verify that the CorpiSCSI server is connected to the network.
a. On the CorpiSCSI's monitor, select Click to view Windows Server 2019.
b. Right-click Start and select Settings.
c. Select Network & Internet.
d. Verify that Ethernet 3 is connected to CorpNet.local.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.3.6 Connect Patch Panel Cables 1
Lab Report
Time Spent: 03:40
TASK SUMMARY
Required Actions
In the Networking Closet, connect an Ethernet twisted-pair cable between the Off 1 port on the
patch panel and port 3 on the switch
In Office 1, connect an Ethernet twisted-pair cable between the workstation and the wall outlet
In Office 1, configure the workstation to obtain IP and DNS addresses automatically Show
Details
EXPLANATION
1. From the Networking Closet, connect the patch panel and switch.
a. Under Shelf, expand Cables.
b. Select the Cat6a Cable, RJ45 cable.
c. From the Selected Component pane:
Drag an RJ45 Shielded Connector to the Off 1 (Office 1) port on the patch panel.
Drag the other RJ45 Shielded Connector to port 3 on the Cisco switch (top row, third port from the
left).
3. Configure the workstation to obtain IP and DNS addresses automatically from the server on the network.
a. On the Office1 monitor, select Click to view Windows 10.
b. From the Windows taskbar, right-click Start and then select Settings.
c. Select Network & Internet.
The Settings windows should indicate there is no connection to the internet.
d. Select Ethernet and then select Change adapter options.
e. Right-click Ethernet and then select Properties.
f. Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
g. Select Obtain an IP address automatically.
h. Select Obtain DNS server address automatically.
i. Select OK.
j. Select Close.
k. Close the Network connections window.
l. Select Status.
The Settings window should now indicate there is an active connection to the local network and the
internet.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.3.7 Connect Patch Panel Cables 2
Lab Report
Time Spent: 02:50
TASK SUMMARY
Required Actions
In the Networking Closet, connect a patch cable between the Exec 1 port on the patch panel and
port 1 on the switch
In the Networking Closet, connect a patch cable between the support port on the patch panel and
port 6 on the switch
In the Networking Closet, connect a patch cable between the lobby port on the patch panel and
port 8 on the switch
EXPLANATION
Exec 1 Port 1
Supp Port 6
Lobby Port 8
1. From the Networking Closet, attach an Ethernet cable from the patch panel to the switch port.
a. Under Shelf, expand Cables.
b. Select the Cat6a Cable, RJ45.
c. From the Selected Component pane:
Drag an RJ45 Shielded Connector to the Exec 1 port on the patch panel.
Drag the other RJ45 Shielded Connector to the correct port on the Cisco switch (top row).
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.5.3 Select and Install a Network Adapter
Lab Report
Time Spent: 00:58
TASK SUMMARY
Required Actions
Verify that the Exec workstation can communicate with the internet using the new NIC Show
Details
EXPLANATION
2. Move the Ethernet cable from the computer's built-in network adapter to the new PCIe network card.
a. Above the computer, select Back to switch to the back view of the computer.
b. Drag the Ethernet cable from the built-in port to the port on the PCIe network adapter.
3. Confirm that the computer is connected to the local network and the internet.
a. Above the computer, select Front to switch to the front view of the computer.
b. Select the power button on the computer case to turn on the computer.
Wait for the operating system to load.
c. Right-click Start and then select Windows PowerShell (Admin).
d. From the PowerShell prompt, type ping 192.168.0.10 and then press Enter to test connectivity to the
local network server.
e. From the PowerShell prompt, type ping 198.28.2.254 and then press Enter to test connectivity to the
internet.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.5.4 Connect a Media Converter
Lab Report
Time Spent: 05:34
TASK SUMMARY
Required Actions
Move the Ethernet cable from the wall outlet to the media converter's Ethernet port
Connect the SC to LC cable to ports 23 and 24 on the fiber patch panel Show Details
EXPLANATION
4. Attach the power adapter to the media converter and plug it into the wall outlet.
a. From the Shelf, drag the Power Adapter, AC to DC to the DC power port on the media converter.
b. From the Select Connector pane, select DC Power Connector.
c. Above the rack, select Back to switch to the back view of the rack.
d. From the Selected Component pane, drag the AC Power Adapter connector to an open outlet on the
rack UPS.
The lights on the media converter should turn on.
5. Navigate to any workstation on Floor 1 to confirm internet connectivity.
a. From the top left, select Building A.
b. Under Building A, select Floor 1.
c. Select a workstation (such as Office1).
d. From the notification area, right-click the Network icon and select Open Network & Internet settings.
e. Verify that the workstation has internet connectivity.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.6.3 Install a Hub
Lab Report
Time Spent: 03:29
TASK SUMMARY
Required Actions
Use a Cat5e cable to connect both computers to the hub Show Details
Confirm that the two computers are properly connected to the internet Show Details
EXPLANATION
You can also switch the hub to the front view to use the link lights to verify connectivity to the hub.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.6.4 Install a Switch
Lab Report
Time Spent: 04:17
TASK SUMMARY
Required Actions
Use Cat5e cables to connect both computers to the managed switch Show Details
Confirm that the two computers are properly connected to the local network and the
internet Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
3.6.7 Configure a Home Router
Lab Report
Time Spent: 02:18
TASK SUMMARY
Place the Ethernet router with the firewall on the Bench and provide power Show Details
Connect the computers to the Ethernet router with Cat5e cables Show Details
Connect the Ethernet router to the RJ45 jack on the wall plate using a Cat5e cable
Confirm that the computers are properly connected to the internet Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
10.2.4 Connect to a DSL Network
Lab Report
Time Spent: 02:47
TASK SUMMARY
Required Actions
Add a filter between the phone and the phone cable connected to the outlet
EXPLANATION
Complete this lab as follows:
4. When implementing DSL, install a filter between the phone port and each phone.
a. Above the phone, select Back.
b. Under Shelf, expand Filters.
c. Drag the DSL Filter to the phone port.
d. Under Shelf, expand Cables.
e. Select UTP Cable, 2-pair, RJ-11.
f. From the Selected Component pane:
Drag an RJ-11 Connector to the RJ11 port on the filter.
Drag the unconnected RJ-11 Connector to the phone port on the wall outlet.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
10.4.3 Configure a Remote Access VPN
Lab Report
Time Spent: 05:54
TASK SUMMARY
Required Actions
EXPLANATION
While completing this lab, use the following information:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
10.4.5 Configure a VPN Connection iPad
Lab Report
Time Spent: 03:02
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.3.6 Configure Logging on pfSense
Lab Report
Time Spent: 05:04
TASK SUMMARY
Q2: What is the maximum number of logs that can be displayed after configuring the system log
settings?
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.3.8 Auditing Device Logs on a Cisco Switch
Lab Report
Time Spent: 02:32
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.6.9 Configure NIC Teaming
Lab Report
Time Spent: 06:36
TASK SUMMARY
EXPLANATION
1. Move the network cable from the onboard adapter in the CorpServer to the 4-port NIC in CorpServer.
a. Above the rack, select Back to switch to the back view of the rack.
b. Drag the network cable from the onboard network adapter on CorpServer (the 1U server) to a free port
on the 4-port NIC in CorpServer.
c. Above the rack, select Front to switch to the front view of the rack.
d. Move the other end of the network cable to port 22 on the switch.
2. Connect network cables from the 4-port NIC on CorpServer, to the switch ports 19, 20, and 21.
a. Under Shelf, expand Cables.
b. Select Cat6a Cable, RJ45.
c. From the Selected Component pane, drag an unconnected RJ45 cable to port 19, 20, or 21.
d. Repeat steps 2b-2c for two more cables. Use a port not previously used.
e. Above the rack, select Back.
f. From Partial Connections:
Drag a cable to an open port on the 4-port NIC in CorpServer.
Repeat the previous step until there are no more cables in Partial Connections.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.7.6 Back Up Files with File History
Lab Report
Time Spent: 02:08
TASK SUMMARY
Required Actions
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.7.8 Recover a File from File History
Lab Report
Time Spent: 03:20
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Lab Report
Time Spent: 01:43
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.3.3 Implement Physical Security
Lab Report
Time Spent: 00:51
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.4.5 Respond to Social Engineering Exploits
Lab Report
Time Spent: 02:00
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Microsoft
Windows
Notice the various spelling errors and that the
Update Center Phishing Delete
link does not direct you to a Microsoft website.
New Service
Pack
Grandma White
FW: FW: FW: Any email that asks you to forward it to everyone
Hoax Delete
Virus Attack you know is probably a hoax.
Warning
Activities
Committee This email doesn't ask you to click on anything or
Safe Keep
Pumpkin run any attachments.
Contest
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.1.7 Configure a Host Firewall
Lab Report
Time Spent: 08:07
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
On Dorm-PC:
On Dorm-PC2:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.2.5 Configure Network Security Appliance Access
Lab Report
Time Spent: 03:36
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.2.6 Configure a Security Appliance
Lab Report
Time Spent: 01:44
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.2.8 Configure a Perimeter Firewall
Lab Report
Time Spent: 04:24
TASK SUMMARY
Required Actions
Create and configure a firewall rule to pass HTTP traffic from the internet to the web
server Show Details
Create and configure a firewall rule to pass HTTPS traffic from the internet to the web
server Show Details
Create and configure a firewall rule to pass all traffic from the LAN network to the screened subnet
(DMZ) network Show Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.3.4 Configure a Screened Subnet (DMZ)
Lab Report
Time Spent: 05:08
TASK SUMMARY
Required Actions
Configure pfSense's DHCP server for the DMZ interface Show Details
EXPLANATION
Complete this lab as follows:
3. Add a firewall rule to the DMZ interface that allows all traffic from the DMZ.
a. From the pfSense menu bar, select Firewall > Rules.
b. Under the Firewall breadcrumb, select DMZ. (Notice that no rules have been created.)
c. Select Add (either one).
d. For the Action field, make sure Pass is selected.
e. For the Interface field, make sure DMZ is selected.
f. For the Protocol, use the drop-down menu to select Any.
g. Under Source, use the drop-down menu to select DMZ net.
h. Under Destination, make sure it is configured for any.
i. Under Extra Options, enter Allow DMZ to any rule as the description.
j. Scroll to the bottom and select Save.
k. Select Apply Changes.
4. Configure pfSense's DHCP server for the DMZ interface.
a. From the menu bar, select Services > DHCP Server.
b. Under the Services breadcrumb, select DMZ.
c. Select Enable to enable DHCP server on the DMZ interface.
d. Configure the Range field as follows:
From: 172.16.1.100
To: 172.16.1.200
e. Scroll to the bottom and select Save.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.4.4 Implement Intrusion Prevention
Lab Report
Time Spent: 05:15
TASK SUMMARY
Required Actions
Configure the Snort Interface settings for the WAN interface Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.1.6 Secure a Switch
Lab Report
Time Spent: 04:31
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Lab Report
Time Spent: 02:10
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
1. Configure the IP address and subnet mask for the VLAN 1 interface.
a. Select Switch.
b. From the switch terminal, press Enter to get started.
c. At the Switch> prompt, type enable and press Enter.
d. At the Switch# prompt, type configure terminal and press Enter.
e. At the Switch(config)# prompt, type interface vlan1 and press Enter.
f. At the Switch(config-if)# prompt, type ip address 192.168.11.250 255.255.255.0 and press Enter.
g. Type exit and press Enter.
2. Configure the default gateway.
a. At the Switch(config)# prompt, type ip default-gateway 192.168.11.254 and press Enter.
b. At the prompt, type exit and press Enter.
3. Verify the configuration changes.
a. At the prompt, type show run and press Enter.
b. Press the space bar as needed to verify that the correct changes were made.
c. Type any key to exit show command.
4. Save your changes to the startup-config file.
a. At the Switch# prompt, type copy run start and press Enter.
b. Press Enter to begin building the configuration.
c. Press Enter to return to the prompt.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.2.4 Configure Switch IP and VLAN - GUI
Lab Report
Time Spent: 03:21
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.2.6 Create VLANs - GUI
Lab Report
Time Spent: 06:08
TASK SUMMARY
Required Actions
Connect the IP cameras to the VLAN and mount the IP cameras to the wall Show Details
Launch the IP camera-monitoring software and confirm that the IP cameras are online
EXPLANATION
Complete this lab as follows:
To verify that all components are connected, you can change the location to the Network
Closet hardware view. You should see green link/activity lights on ports 18 - 21 of the switch.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.2.9 Configure Switch IP Settings - CLI
Lab Report
Time Spent: 05:18
TASK SUMMARY
Q1: What is the IP address assigned to the FastEthernet0/0 interface on the SFO router?
EXPLANATION
Complete this lab as follows:
1. Find the IP address assigned to the FastEthernet0/0 interface on the SFO router.
a. Select the Branch1 switch.
b. From the Terminal, press Enter to get started.
c. Type enable and press Enter to change to the EXEC or Global Configuration mode.
d. Type show cdp neighbors detail and press Enter.
e. Find the IP address for the SFO router.
f. From the top right, select Answer Questions.
g. Answer the question.
h. Move the question dialog to the side and keep working.
2. Configure the IP address and subnet mask for the Branch1 switch.
a. At the Branch1# prompt, type config t and press Enter.
b. At the Branch1(config)# prompt, type interface vlan1 and press Enter.
c. At the Branch1(config-if)# prompt, type ip address 192.168.11.250 255.255.255.0 and press Enter.
d. At the Branch1(config-if)# prompt, type exit and press Enter.
3. Configure the switch to use the FastEthernet0/0 interface on the SFO router as the default gateway.
a. At the Branch1(config)# prompt, type ip default-gateway routers_IP_address and press Enter.
b. At the Branch1(config)# prompt, type exit and press Enter.
4. Save your changes to the startup-config file.
a. At the Branch1# prompt, type copy run start and press Enter.
b. Press Enter to begin building the configuration.
c. When you see OK, press Enter.
d. From the question dialog, select Score Lab.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.12 Configure Port Mirroring
Lab Report
Time Spent: 01:55
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.14 Configure PoE
Lab Report
Time Spent: 01:32
TASK SUMMARY
Q1: How many watts of power is the security camera currently using?
Q2: How many watts of power are available in the switch for PoE devices?
Save the changes to the switch's startup configuration file Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.4 Configure Trunking
Lab Report
Time Spent: 10:30
TASK SUMMARY
Leave ports GE27 and GE28 set to Trunk, but set the PVID to 2 Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.6 Configure Port Aggregation
Lab Report
Time Spent: 04:56
TASK SUMMARY
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.8 Enable Jumbo Frame Support
Lab Report
Time Spent: 02:07
TASK SUMMARY
Q1: How many combined Undersize Packets, Oversize Packets, Fragments, Jabbers, and Collisions
are there?
Q2: True or False: Now that Jumbo Frames is enabled, network devices should also be configured
to use Jumbo Frames or have a frame size larger than 1500 bytes.
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.4.10 Secure Access to a Switch 2
Lab Report
Time Spent: 04:25
TASK SUMMARY
Required Actions
EXPLANATION
While completing this lab, use the following information:
Configure the GameConsoles MAC-based access control entry (ACE) settings as follows:
Destination
Priority Action Source MAC Address
MAC Address
Value: 00041F111111
1 Deny Any
Mask: 000000111111
Value: 005042111111
2 Deny Any
Mask: 000000111111
Value: 000D3A111111
3 Deny Any
Mask: 000000111111
Value: 001315111111
4 Deny Any
Mask: 000000111111
Value: 0009BF111111
5 Deny Any
Mask: 000000111111
Value: 00125A111111
6 Deny Any
Mask: 000000111111
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.4.6 Disable Switch Ports - GUI
Lab Report
Time Spent: 01:30
TASK SUMMARY
Required Actions
Disable port 15
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.4.8 Harden a Switch
Lab Report
Time Spent: 03:11
TASK SUMMARY
Required Actions
Configure Port Security settings for the used ports Show Details
EXPLANATION
While completing this lab, use the following information:
GE2 GE1
GE7 GE3-GE6
GE9-GE20 GE8
GE25 GE21-GE24
GE27-GE28 GE26
Lab Report
Time Spent: 04:11
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Lab Report
Time Spent: 15:41
TASK SUMMARY
Use the Traffic Shaper wizard for dedicated links using one WAN connection
Change the port number used for the MSRDP outbound rule
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.6.4 Configure NAT
Lab Report
Time Spent: 06:28
TASK SUMMARY
Required Actions
Configure NAT port forwarding for the Kali Linux server Show Details
Configure NAT port forwarding for the web server Show Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.1.3 Configure an iSCSI Target
Lab Report
Time Spent: 02:42
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
To view the iSCSI virtual disk and target you just created, expand the Server Manager window.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.1.4 Configure an iSCSI Initiator
Lab Report
Time Spent: 02:58
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.2.3 Connect VoIP 1
Lab Report
Time Spent: 05:49
TASK SUMMARY
Required Actions
Plug the Exec workstation and monitor into the surge protector
Ensure that the workstation in the Executive Office is connected to the network and the internet
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.2.4 Connect VoIP 2
Lab Report
Time Spent: 01:16
TASK SUMMARY
Required Actions
Disconnect the AC adapter from the IP phone in the Lobby and place it on the Shelf Show Details
Disconnect the AC adapter from the IP phone in the Executive Office and place it on the
Shelf Show Details
EXPLANATION
1. From the Lobby, disconnect the AC/DC adapter from the IP phone and the wall.
a. Under Lobby, select Hardware.
b. Above the IP phone, select Back to switch to the back view of the phone.
c. Drag the DC power connector from the phone to the Shelf.
d. Drag the AC power plug from the wall outlet to the Shelf.
e. Above the IP phone, select Front to switch to the front view of the phone and confirm it is on.
2. From the Executive Office, disconnect the AC/DC adapter from the IP phone and the wall.
a. From the top left, select Floor 1 Overview.
b. Under Executive Office, select Hardware.
c. Above the IP phone, select Back to switch to the back view of the phone.
d. Drag the DC power connector from the phone to the Shelf.
e. Drag the AC power plug from the wall outlet to the Shelf.
f. Above the IP phone, select Front to switch to the front view of the phone and confirm it is on.
3. From the Support Office, connect an IP phone.
a. From the top left, select Floor 1 Overview.
b. Under Support Office, select Hardware.
c. Under Shelf, expand Phones.
d. Drag the IP Phone to the Workspace.
e. Above the IP phone, select Back to switch to the back view of the phone.
f. Above the workstation, select Back to switch to the back view of the workstation.
g. Drag the RJ45 Ethernet cable from the workstation to the LAN port (top port) on the IP phone.
h. Under Shelf, expand Cables and then select Cat5e Cable, RJ45.
i. From the Selected Component pane:
Drag an RJ45 Connector to the PC port on the phone.
Drag the other unconnected RJ45 Connector to the NIC on the workstation.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.6.4 Configure Smart Devices
Lab Report
Time Spent: 12:27
TASK SUMMARY
Required Actions
Install and configure the thermostat in the Main Hall Show Details
EXPLANATION
While completing this lab, use the following information:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.6.7 Scan for IoT Devices
Lab Report
Time Spent: 01:28
TASK SUMMARY
Scan 192.168.0.54
Q1: What is the name of the IoT device with the IP address of 192.168.0.54?
Q2: How many issues exist for the device with the IP address of 192.168.0.54?
Q3: In the IP address range of 192.168.0.60 through 192.168.0.69, which IP addresses had issues?
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.2.5 Create a Home Wireless Network
Lab Report
Time Spent: 05:20
TASK SUMMARY
Required Actions
Connect the wireless access point to the existing router on the rack using a Cat 5e cable
On the laptop, slide the wireless switch to turn the integrated wireless network interface card on
EXPLANATION
Complete this lab as follows:
3. Connect the Ethernet cable to the wireless access point and existing router.
a. Under Shelf, select the Cat6a Cable, RJ45 Ethernet cable.
b. From the Selected Component pane:
Drag an RJ45 Ethernet connector to the back of the access point.
Drag the unconnected RJ45 Ethernet connector to one of the free LAN ports on the router.
To confirm the connection, right-click the wireless networking icon in the notification area again
and select Open Network & Internet settings. The image on the Status page shows a
connection to the internet.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.2.6 Secure a Home Wireless Network
Lab Report
Time Spent: 05:03
TASK SUMMARY
Required Actions
Change the wireless access point's default administrator authentication credentials Show Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.2.7 Configure Wireless Profiles
Lab Report
Time Spent: 01:05
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.3.7 Design an Indoor Wireless Network
Lab Report
Time Spent: 01:44
TASK SUMMARY
Required Actions
EXPLANATION
Only three WAPs are required to complete this lab (one omnidirectional WAP and two directional WAPs).
The following WAP configuration provides adequate coverage and reduces signal emanation.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.3.8 Design an Outdoor Wireless Network
Lab Report
Time Spent: 02:23
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.4.4 Implement an Enterprise Wireless Network
Lab Report
Time Spent: 02:29
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.10 Configuring a Captive Portal
Lab Report
Time Spent: 07:13
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.12 Creating a Guest Network for BYOD
Lab Report
Time Spent: 10:30
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.13 Configure a Secure Email Account on Mobile Device
Lab Report
Time Spent: 02:04
TASK SUMMARY
Required Actions
Secure IMAP network communications and authenticate to CorpNet-Wireless Wi-Fi Show Details
EXPLANATION
Complete this lab as follows:
1. Set the email account to use SSL and the secure port 993.
a. Select Settings.
b. From the left menu, select Accounts & Passwords. (You may need to scroll down to see this option.)
c. Under Accounts & Passwords, select Gmail.
d. Under Gmail, select [email protected].
e. Select Advanced.
f. Slide the button to enable Use SSL.
g. Make sure the server port is set to 993.
h. At the top, select Account.
i. Click Done.
2. Connect to CorpNet Wi-Fi.
a. From the left menu, select Wi-Fi.
b. Select CorpNet.
c. In the Password field, enter @CorpNetWeRSecure!& as the password.
d. Select Join.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.7 Secure an Enterprise Wireless Network
Lab Report
Time Spent: 04:55
TASK SUMMARY
Required Actions
EXPLANATION
To complete this lab, use the following MAC addresses:
00:18:DE:01:34:67
00:18:DE:22:55:99
00:02:2D:23:56:89
00:02:2D:44:66:88
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.8 Enable Wireless Intrusion Prevention
Lab Report
Time Spent: 00:58
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.6.6 Optimize a Wireless Network
Lab Report
Time Spent: 22:21
TASK SUMMARY
Required Actions
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.6.7 Explore Wireless Network Problems
Lab Report
Time Spent: 04:51
TASK SUMMARY
Q2: What is the passphrase used for the WLAN security key?
On Exec-Lap, slide the wireless switch to ON and connect to the CorpNet wireless network Show
Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.6.8 Troubleshoot Wireless Network Problems
Lab Report
Time Spent: 02:19
TASK SUMMARY
Required Actions
On Exec-Lap, slide the wireless switch to ON and connect to the CorpNet wireless network Show
Details
EXPLANATION
Complete this lab as follows:
1. Check to see if the ITAdmin computer can connect to the wireless network.
a. Under IT Administration, select ITAdmin.
b. In the Notification Area, select the wireless network icon to view the available networks in order to see
what is being shown on a working computer.
c. Select the CorpNet wireless network.
d. Select Connect.
e. Enter @CorpNetWeRSecure!& for the security key and then select Next.
ITAdmin is now connected to the CorpNet wireless network. Because this computer can connect to the
wireless network, the problem may be limited to only the Exec-Laptop laptop in the Executive Office.
2. Troubleshoot and fix the wireless networking on Exec-Laptop.
a. From the top left, select Floor 1 Overview to switch to Exec-Laptop.
b. Under Executive Office, select Exec-Laptop.
c. In the Notification Area, select the wireless network icon to view the available networks.
Note that there are no wireless networks shown as available for this laptop. Possible causes for this
include:
The wireless network interface card is not turned on (the wireless switch on the exterior of the
laptop is in the OFF position). Since no wireless networks are shown in the list, you must take
additional steps.
The wireless network's SSID is not broadcasting. However, from Step 1, you know that the wireless
access point is broadcasting the SSID.
The wireless access point is not powered on. However, from Step 1, you know that the wireless
access point is powered on.
d. From the top left, select Executive Office to switch to the devices found in the executive office.
e. On the front of the Exec-Laptop, check to see if the switch for the wireless network interface card is in
the On position.
Notice that it is in the OFF position instead.
f. Slide the wireless switch to the On position to turn the wireless network interface card on.
g. On the laptop monitor, select Click to view Windows 10.
h. In the Notification Area, select the wireless network icon to view the available networks. The CorpNet
wireless network is now displayed in the list of available networks.
i. Select the CorpNet wireless network.
j. Select Connect.
k. Enter @CorpNetWeRSecure!& for the security key and then select Next.
Exec-Laptop is now connected to the CorpNet wireless network.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
Which of the following is true about a firewall?
Answer
Implicit deny is used to deny permissions to a specific user even when the rest of the
user's group is allowed access.
Explanation
By default, most firewalls deny all traffic, which is called implicit deny. You must
manually specify which traffic you want to allow through the firewall. Everything else
is blocked.
Explicit deny is used to deny permissions to a specific user even when the rest of the
user's group is allowed access.
You can use a host-based firewall in addition to a network-based firewall to provide
multiple layers of protection.
Firewalls do not offer protection against all attacks (such as email spoofing attacks).
References
Question 2:
Correct
Which options are you able to set on a firewall? (Select three.)
Answer
Sequence number
Correct Answer:
Packet destination address
Checksum
Correct Answer:
Port number
Digital signature
Acknowledgement number
Correct Answer:
Packet source address
Explanation
Firewalls allow you to set filters by source or destination IP address and port
number. They do not filter by checksum, acknowledgement number, sequence
number, or digital signature.
References
Question 3:
Correct
You have been given a laptop to use for work. You connect the laptop to your
company network, use the laptop from home, and use it while traveling.
You want to protect the laptop from internet-based attacks.
Which solution should you use?
Answer
VPN concentrator
Proxy server
Network-based firewall
Correct Answer:
Host-based firewall
Explanation
References
Question 4:
Correct
Which of the following is true about a network-based firewall?
Answer
Correct Answer:
A network-based firewall is installed at the edge of a private network or network
segment.
Explanation
References
Question 5:
Correct
How does a proxy server differ from a packet-filtering firewall?
Answer
Correct Answer:
A proxy server operates at the Application layer, while a packet-filtering firewall
operates at the Network layer.
A proxy server includes filters for the session ID as well as the IP address and port
number.
A proxy server can prevent unknown network attacks, while a packet-filtering firewall
can only prevent known attacks.
Explanation
References
Question 6:
Correct
Based on the diagram, which type of proxy server is handling the client's request?
Answer
Explanation
A reverse proxy server handles requests from the internet to an internal network.
Instead of requests for a server going directly to the server, they first go to the
reverse proxy server.
A forward proxy server handles requests from an internal network out to the internet.
An open proxy server is accessible to any user on the internet and is used to forward
requests to and from anywhere on the internet.
A circuit-level proxy server is typically used as a stateful firewall to allow or deny
sessions.
References
Question 7:
Correct
Which of the following are true about reverse proxy? (Select two.)
Answer
Correct Answer:
Can perform load balancing, authentication, and caching.
Correct Answer:
Handles requests from the internet to a server on a private network.
Explanation
A reverse proxy server handles requests from the internet to a server located inside
a private network. Reverse proxies can perform load balancing, authentication, and
caching.
Reverse proxies often work transparently, meaning clients don't know they are
connected to a reverse proxy.
References
Question 8:
Correct
Which device combines multiple security features, such as anti-spam, load-
balancing, and antivirus, into a single network appliance?
Answer
Correct Answer:
Unified Threat Management (UTM)
Circuit-level gateway
Packet-filtering firewall
Explanation
A Unified Threat Management device combines multiple security features into a
single network appliance. A single UTM device can provide several security features,
including firewall, VPN, anti-spam, antivirus, and load balancing.
A NGFW combines a traditional firewall with an application firewall.
A circuit-level gateway makes decisions about which traffic to allow based on virtual
circuits or sessions.
A packet-filtering firewall allows and blocks network traffic by examining information
in the IP packet.
References
Question 9:
Correct
Which of the following chains is used for incoming connections that aren't delivered
locally?
Answer
Reject
Drop
Correct Answer:
Forward
Output
Explanation
Forward is a chain that's used for incoming connections that aren't delivered locally.
An example is iptables used on a router. The traffic is not destined for the router, but
the router forwards the traffic to the destination device.
Drop is an action that drops the connection.
Reject is an action that does not allow the connection but does send a response
back.
Output is a chain for outgoing connections.
References
Question 10:
Correct
Which of the following does the sudo iptables -F command accomplish?
Answer
Explanation
References
A host-based firewall
Correct Answer:
A network-based firewall
An IDS
An IPS
Explanation
You should use a network-based firewall to create a screened subnet between two
servers.
A host-based firewall inspects traffic that's received by a host. It is not designed for
use on a screened subnet.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. You cannot use an IDS to create a screened subnet.
An active IDS (also called an intrusion protection system, or IPS) performs the
functions of an IDS, but it can also react when security breaches occur.
References
•
6.2.2 Unified Threat Management (UTM) Appliances Facts
q_utm_devices_network_np6.question.fex
Question 2:
Correct
Which of the following combines several layers of security services and network
functions into one piece of hardware?
Answer
Firewall
Circuit-level gateway
Correct Answer:
Unified Threat Management (UTM)
Explanation
A Unified Threat Management (UTM) appliance combines several layers of security
services and network functions into one piece of hardware.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity.
A circuit-level gateway makes decisions about which traffic to allow based on virtual
circuits or sessions.
A firewall is a software- or hardware-based network security system that allows or
denies network traffic according to a set of rules.
References
Question 3:
Correct
Which of the following are specific to extended Access control lists? (Select two.)
Answer
Explanation
Standard ACLs:
• Identify traffic based on the destination address.
• Are used by route maps and VPN filters.
• Use the number ranges 1-99 and 1300-1999.
• Should be placed as close to the destination as possible.
Extended ACLs:
• Are the most used type of ACL.
• Are used for access rules that permit or deny traffic through a device.
• Can filter by multiple factors including source protocol, source host name,
destination host name, etc.
• Use the number ranges 100-199 and 2000-2699.
• Should be placed as close to the source as possible.
References
Question 4:
Correct
Which of the following describes how access control lists can improve network
security?
Answer
Correct Answer:
An access control list filters traffic based on the IP header information, such as
source or destination IP address, protocol, or socket number.
An access control list identifies traffic that must use authentication or encryption.
An access control list filters traffic based on the frame header, such as source or
destination MAC address.
An access control list looks for patterns of traffic between multiple packets and takes
action to stop detected attacks.
Explanation
An access control list filters traffic based on the IP header information, such as
source or destination IP address, protocol, or socket number. Access control lists are
configured on routers, and they operate on Layer 3 information.
Port security is configured on switches, which filter traffic based on the MAC address
in the frame.
An intrusion detection system (IDS) or intrusion prevention system (IPS) examines
patterns detected across multiple packets. An IPS can take action when a suspicious
pattern of traffic is detected.
References
Question 5:
Correct
Your Cisco router has three network interfaces configured.
• S0/1/0 is a WAN interface that is connected to an ISP.
• F0/0 is connected to an Ethernet LAN segment with a network address of
192.168.1.0/24.
• F0/1 is connected to an Ethernet LAN segment with a network address of
192.168.2.0/24.
You have configured an access control list on this router using the following rules:
• deny ip 192.168.1.0 0.0.0.255 any
• deny ip 192.168.2.0 0.0.0.255 any
These rules will be applied to the WAN interface on the router. Your goal is to block
any IP traffic coming in on the WAN interface that has a spoofed source address that
makes it appear to be coming from the two internal networks.
However, when you enable the ACL, you find that no traffic is being allowed through
the WAN interface.
What should you do?
Answer
Use the out parameter instead of the in parameter within each ACL rule.
Apply the access list to the Fa0/1 interface instead of the S0/1/0 interface.
Correct Answer:
Add a permit statement to the bottom of the access list.
Apply the access list to the Fa0/0 interface instead of the S0/1/0 interface.
Explanation
The problem with this access list is that it only contains deny statements. On Cisco
devices, there is an implicit deny any at the end of every access list. You need to
add a permit statement and identify the type of traffic that is allowed.
References
Question 6:
Correct
Which of the following are true about routed firewalls? (Select two.)
Answer
Correct Answer:
Counts as a router hop.
Correct Answer:
Supports multiple interfaces.
Operates at Layer 2.
Easily introduced to an existing network.
Explanation
On a routed firewall, the firewall is also a Layer 3 router. In fact, many hardware
routers include firewall functionality. Transmitting data through this type of firewall
counts as a router hop. A routed firewall usually supports multiple interfaces, each
connected to a different network segment.
A transparent firewall (which is also called a virtual firewall) works differently. It
operates at Layer 2 and is not seen as a router hop by connected devices. Both the
internal and external interfaces on a transparent firewall connect to the same
network segment. Because it is not a router, you can easily introduce a transparent
firewall into an existing network.
References
Question 7:
Correct
Which of the following is a firewall function?
Answer
Frame filtering
Encrypting
Correct Answer:
Packet filtering
FTP hosting
Explanation
Firewalls often filter packets by checking each one against a set of administrator-
defined criteria. If a packet is not accepted, it is simply dropped.
References
Question 8:
Correct
You have used firewalls to create a screened subnet. You have a web server that
needs to be accessible to internet users. The web server must communicate with a
database server to retrieve product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select
two.)
Answer
Explanation
Publicly accessible resources (servers) are placed inside the screened subnet.
Examples of publicly accessible resources include web, FTP, and email servers.
Devices that should not be accessible to public users are placed on the private
network. If you have a public server that communicates with another server (such as
a database server) and that server should not have direct contact with public hosts,
place the server on the private network and allow only traffic from the public server to
cross the inner firewall.
References
Question 9:
Correct
Which of the following BEST describes a stateful inspection?
Answer
Offers secure connectivity between many entities and uses encryption to provide an
effective defense against sniffing.
Designed to sit between a host and a web server and communicate with the server
on behalf of the host.
Allows all internal traffic to share a single public IP address when connecting to an
outside entity.
Correct Answer:
Determines the legitimacy of traffic based on the state of the connection from which
the traffic originated.
Explanation
References
Question 10:
Correct
Which of the following are characteristics of a stateless firewall? (Select two.)
Answer
Explanation
A stateless firewall controls traffic using access control lists, or ACLs. Instead of
analyzing the state of network traffic, stateless firewalls inspect the information
contained in IP packets and compare it to a static list of rules in the ACL. These rules
determine whether to accept or reject IP packets based on the defined criteria. This
criteria can include IP addresses,
port numbers, services, and traffic direction
A stateful firewall allows or denies traffic based on virtual circuits of sessions. A
stateless firewall is also known as a circuit-level proxy or a circuit-level gateway.
Standard ACL:
• Identify traffic based on the destination address.
• Are used by route maps and VPN filters.
• Use the number ranges 1-99 and 1300-1999.
• Should be placed as close to the destination as possible.
References
Circuit proxy
Correct Answer:
Bastion
Multi-homed
Kernel proxy
Explanation
A bastion, or sacrificial, host is one that's unprotected by a firewall. The term bastion
host is used to describe any device fortified against attack (such as a firewall). A
sacrificial host might be a device intentionally exposed to attack, such as a honeypot.
Circuit proxies and kernel proxies are types of firewall devices.
Multi-homed describes a device with multiple network interface cards.
References
Question 2:
Correct
How many network interfaces does a dual-homed gateway typically have?
Answer
one
Correct Answer:
three
four
two
Explanation
A dual-homed gateway is a firewall device that typically has three network interfaces.
One is connected to the internet, one is connected to the public subnet, and one is
connected to the private network.
References
Question 3:
Correct
You have a company network that is connected to the internet. You want all users to
have internet access, but you need to protect your private network and users. You
also need to make a web server publicly available to the internet users.
Which solution should you use?
Answer
Use a single firewall. Put the server and the private network behind the firewall.
Use a single firewall. Put the web server in front of the firewall and the private
network behind the firewall.
Use firewalls to create a screened subnet. Place the web server and the private
network inside the screened subnet.
Correct Answer:
Use firewalls to create a screened subnet. Place the web server inside the screened
subnet and the private network behind the screened subnet.
Explanation
A screened subnet is a buffer network (or subnet) that sits between a private network
and an untrusted network, such as the internet. A common configuration uses two
firewalls, with one connected to the public network and one connected to the private
network. Publicly accessible resources (servers) are placed inside the screened
subnet. Examples of publicly accessible resources include web, FTP, or email
servers. Private resources that are not accessible from the internet are placed
behind the screened subnet (behind the inner firewall).
Placing the web server inside the private network would mean opening ports on the
firewall that lead to the private network, which could expose other devices to attacks.
Placing the web server outside the firewall would leave it unprotected.
References
Question 4:
Correct
You are managing a network and have used firewalls to create a screened subnet.
You have a web server that internet users need to access. It must communicate with
a database server to retrieve product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select
two.)
Answer
Correct Answer:
Put the web server inside the screened subnet.
Put the database server and the web server inside the screened subnet.
Correct Answer:
Put the database server on the private network.
Explanation
Publicly accessible resources (servers) are placed inside the screened subnet.
Examples of publicly accessible resources include web, FTP, or email servers.
Devices that should not be accessible to public users are placed on the private
network. If you have a public server that communicates with another server (such as
a database server), and that server shouldn't have direct contact with public hosts,
place it on the private network and only allow traffic from the public server to cross
the inner firewall. Placing the database server and the web server inside the
screened subnet would not provide the necessary traffic flow.
References
Question 5:
Correct
In which of the following situations would you MOST likely implement a screened
subnet?
Answer
Correct Answer:
You want to protect a public web server from attack.
You want to encrypt data sent between two hosts using the internet.
You want users to see a single IP address when they access your company network.
Explanation
A screened subnet is a network placed between a private, secured network and the
internet to grant external users access to internally controlled services. In essence, it
serves as a buffer zone for your network.
An intranet is a private network that happens to employ internet information services.
An extranet is a division of a private network that's accessible to a limited number of
users, such as business partners, suppliers, and certain customers.
A padded cell is an intrusion detection countermeasure that's used to delay intruders
enough to record meaningful information about them for discovery and prosecution.
References
Question 6:
Correct
Which of the following can serve as a buffer zone between a private, secured
network and an untrusted network?
Answer
Padded cell
Correct Answer:
Screened subnet
Extranet
Intranet
Explanation
References
• 6.2.12 Firewall Design and Configuration Facts
• 6.3.1 Screened Subnets
• 6.3.2 Configure a Screened Subnet
• 6.3.3 Screened Subnet Facts
• 12.1.1 Security Concepts
• 12.1.2 Security Concepts Facts
• 12.1.7 Defense in Depth
• 12.1.8 Defense in Depth Facts
q_screened_subnet_fact_04_np6.question.fex
Question 7:
Correct
What do you need to configure on a firewall to allow traffic directed to the public
resources on the screened subnet?
Answer
Correct Answer:
Packet filters
Subnet
VPN
FTP
Explanation
Packet filters on a firewall allow traffic directed to the public resources inside the
screened subnet. Packet filters also prevent unauthorized traffic from reaching the
private network.
A subnet is used to segment a network.
A VPN (virtual private network) provides a secure outside connection to an internal
network's resources. A VPN does not need to be configured on the firewall to allow
traffic to the public resources on the screened subnet.
FTP (File Transfer Protocol) is a protocol that's used to transfer files. You do not
need to configure this on the firewall to allow traffic to the public resources on the
screened subnet.
References
Question 8:
Correct
Which of the following is another name for a firewall that performs router functions?
Answer
Screened subnet
Correct Answer:
Screening router
Screened-host gateway
Dual-homed gateway
Explanation
References
Question 9:
Correct
Which of the following uses access control lists (ACLs) to filter packets as a form of
security?
Answer
Dual-homed gateway
Screened subnet
Correct Answer:
Screened router
Screened-host gateway
Explanation
A screening router is the router that is most external to the network and closest to
the internet. It uses access control lists (ACLs) to filter packets as a form of security.
A dual-homed gateway is a firewall device that typically has three network interfaces.
One is connected to the internet, one is connected to the public subnet, and one is
connected to the private network.
A screened-host gateway resides within the screened subnet, requiring users to
authenticate to access resources within the screened subnet or the intranet.
A screened subnet uses two firewalls. The external firewall is connected to the
internet and allows access to public resources. The internal firewall connects the
screened subnet to the private network.
References
Question 10:
Correct
Which of the following is the BEST solution to allow access to private resources from
the internet?
Answer
Correct Answer:
VPN
Packet filters
FTP
Subnet
Explanation
References
• 6.3.3 Screened Subnet Facts
q_screened_subnet_vpn_np6.question.fex
Which IDS method defines a baseline of normal network traffic and then looks for
anything that falls outside of that baseline?
Answer
Misuse detection
Correct Answer:
Anomaly-based
Pattern matching
Dictionary recognition
Explanation
Anomaly-based detection defines a baseline of normal network traffic and then looks
for anything that falls outside of that baseline.
Dictionary recognition is a detection method. However, this method does not define a
baseline of normal network traffic and then look for anything that falls outside of that
baseline.
Pattern matching is a detection method. However, this method does not define a
baseline of normal network traffic and then look for anything that falls outside of that
baseline.
Misuse detection is a detection method. However, this method does not define a
baseline of normal network traffic and then look for anything that falls outside of that
baseline.
References
Question 2:
Correct
Which of the following describes the worst possible action by an IDS?
Answer
The system detected a valid attack and the appropriate alarms and notifications were
generated.
Explanation
The worst possible action an IDS can perform is identifying harmful traffic as
harmless and allowing it to pass without generating any alerts. This condition is
known as a false negative.
Positive traffic assessment means that the system detected a valid attack and the
appropriate alarms and notifications were generated. Negative traffic assessment
means that the system correctly deemed harmless traffic as inoffensive and let it
pass. False positive traffic assessment means that the system identified harmless
traffic as offensive and triggered an alarm.
References
Question 3:
Correct
Which IDS traffic assessment indicates that the system identified harmless traffic as
offensive and generated an alarm or stopped the traffic?
Answer
Positive
Negative
Correct Answer:
False positive
False negative
Explanation
A false positive traffic assessment means that the system identified harmless traffic
as offensive and generated an alarm or stopped the traffic.
A positive traffic assessment means that the system detected an attack and the
appropriate alarms and notifications were generated or the correct actions were
performed to prevent or stop the attack.
A negative traffic assessment means that the system deemed the traffic harmless
and let it pass.
A false negative traffic assessment means that harmful traffic passed without any
alerts being generated or any actions being taken to prevent or stop it. This is the
worst possible scenario.
References
Question 4:
Correct
As a security precaution, you've implemented IPsec to work between any two
devices on your network. IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted
traffic to prevent any malicious attacks.
Which solution should you implement?
Answer
Correct Answer:
Host-based IDS
Protocol analyzer
Network-based IDS
Port scanner
VPN concentrator
Explanation
A host-based IDS is installed on a single host and monitors all traffic coming into the
host. A host-based IDS can analyze encrypted traffic because the host operating
system decrypts that traffic as it's received.
A network-based IDS is a dedicated device installed on the network. It analyzes all
traffic on the network. It cannot analyze encrypted traffic because the packet's
contents are encrypted so that only the recipient can read them.
A protocol analyzer examines packets on the network, but it cannot look at the
contents of encrypted packets.
A port scanner probes a device to identify open protocol ports.
A VPN concentrator is a device used to establish remote access VPN connections.
References
Question 5:
Correct
Which of the following is true about an intrusion detection system?
Answer
An intrusion detection system maintains an active security role within the network.
Correct Answer:
An intrusion detection system monitors data packets for malicious or unauthorized
traffic.
Explanation
References
Question 6:
Correct
You're concerned about attacks directed at your network firewall. You want to be
able to identify and be notified of any attacks. In addition, you want the system to
take immediate action to stop or prevent the attack, if possible.
Which tool should you use?
Answer
Correct Answer:
IPS
IDS
Port scanner
Packet sniffer
Explanation
Use an intrusion prevention system (IPS) to both detect and respond to attacks.
An intrusion detection system (IDS) can detect attacks and send notifications, but it
cannot respond to attacks.
Use a port scanner to check for open ports on a system or a firewall.
Use a packet sniffer to examine packets on your network.
References
Question 7:
Correct
Which of the following is true about an NIDS?
Answer
Correct Answer:
It detects malicious or unusual incoming and outgoing traffic in real time.
Explanation
References
Question 8:
Correct
Which IDS type can alert you to trespassers?
Answer
NIDS
HIDS
Correct Answer:
PIDS
VMIDS
Explanation
A PIDS (perimeter intrusion detection system) can alert you to physical trespassers.
VMIDS, NIDS, and HIDS are IDS types. However, they cannot alert you to physical
trespassers.
References
Question 9:
Correct
Which IDS method searches for intrusion or attack attempts by recognizing patterns
or identifying entities listed in a database?
Answer
Correct Answer:
Signature-based IDS
Heuristics-based IDS
Explanation
Question 10:
Correct
You've just installed a new network-based IDS system that uses signature
recognition. What should you do on a regular basis?
Answer
Explanation
References
In-band management
correct answer:
Uses a dedicated communication channel.
Out-of-band management
correct answer:
Must be encrypted to protect communications from sniffing.
In-band management
correct answer:
Does not compete with normal network traffic for bandwidth.
Out-of-band management
correct answer:
Affected by network outages.
In-band management
correct answer:
Keyboard Instructions
Explanation
You can perform switch management tasks through a network connection by using
the management utilities. This is called in-band management because it uses a
normal network switch connection to perform these tasks. Tools such as Telnet or
SSH provide in-band management. Using the same network connection for both
data and management has several drawbacks. For example:
• You must compete with normal network traffic for bandwidth.
• The network traffic created by the management utilities must be protected
from sniffing to ensure that hackers cannot capture sensitive configuration
information.
• If the network connection is unavailable or if the switch is unresponsive,
you can't perform management tasks.
Out-of-band management, on the other hand, overcomes these problems by using
dedicated communication channels that separate server management traffic from
normal network traffic. With network switches (and routers), you can use console
redirection to redirect console output to a built-in serial or USB console port.
References
• 7.1.4 Switching Facts
q_switching_bands_np6.question.fex
Question 2:
Correct
Which level of the OSI model does a Layer 2 switch operate at?
Answer
Correct Answer:
Data Link layer
Transportation layer
Network layer
Session layer
Explanation
A Layer 2 switch operates at the second layer of the OSI model, which is the Data
Link layer.
A Layer 2 switch does not operate at the fourth or fifth layer of the OSI model, which
are the Transportation and Session layers.
A Layer 3 switch can operate at the second and third layers of the OSI model, which
are the Data Link and Network layers.
References
Question 3:
Correct
Which of the following is a device that can send and receive data simultaneously?
Answer
Managed
Unmanaged
Correct Answer:
Full-duplex
Honeypot
Explanation
A full-duplex device can send and receive data simultaneously.
A honeypot is a security system used to decoy attackers.
A managed device is a network device that can receive instructions and return
responses to various components.
An unmanaged switch is a simple plug-and-play device that needs no configuration
to work.
References
Question 4:
Correct
On your network, you have a VLAN for the sales staff and a VLAN for the production
staff. Both need to be able to communicate over the network. Which of the following
devices would work BEST for communication between VLANs?
Answer
Load balancer
Repeater
Correct Answer:
Layer 3 switch
Layer 2 switch
Explanation
References
Question 5:
Correct
As a network administrator, you have 10 VLANs on your network that need to
communicate with each other. Which of the following network devices is the BEST
choice for allowing communication between 10 VLANs?
Answer
Correct Answer:
Layer 3 switch
Layer 2 switch
Load balancer
Repeater
Explanation
References
Question 6:
Correct
Match each type of switch on the left with its corresponding characteristics on the
right. Each switch type may be used once, more than once, or not at all.
Commonly sold at retail stores.
Unmanaged switch
correct answer:
Provides port security features.
Managed switch
correct answer:
Supports VLANs.
Managed switch
correct answer:
Provides very few configuration options.
Unmanaged switch
correct answer:
Can be configured over a network connection.
Managed switch
correct answer:
Can be configured over a dedicated communication channel.
Managed switch
correct answer:
Keyboard Instructions
Explanation
You cannot configure the low-end switches available from many retail stores. These
are called unmanaged switches. To implement an unmanaged switch, you simply
plug it in to a power outlet and connect your network devices with UTP cables. While
unmanaged switches are convenient and easy to implement, they lack many of the
advanced management and security features available on managed switches. For
example, managed switches provide port security and support VLANs.
References
Question 7:
Correct
Which of the following is required to establish a new network switch and configure its
IP address for the first time?
Answer
Client-to-site VPN
Correct Answer:
Out-of-band management
Site-to-site VPN
In-band management
Explanation
Out-of-band management is required when you establish a new network switch and
configure its IP address for the first time.
A client-to-site VPN is a connection where remote clients connect to the server
through the internet and to a LAN behind a server.
In-band management can only be used after the switch has been configured with an
IP address and authentication information through out-of-band management.
A site-to-site VPN is a connection between networks that creates a secure link
through VPN gateways.
References
Question 8:
Correct
Which of the following methods is best to have when a network goes down?
Answer
Site-to-site VPN
Correct Answer:
Out-of-band management
Client-to-site VPN
In-band management
Explanation
References
Router
Hub
Correct Answer:
Switch
Access point
Explanation
References
Question 10:
Correct
Which of the following is true about an unmanaged switch?
Answer
Correct Answer:
It can connect to all devices in a small area.
An unmanaged switch is faster and more economical than a managed switch and
can connect all devices within a small area, like a home or small office.
Managed switches allow VLAN creation for segmentation; unmanaged switches do
not.
Managed switches support link aggregation; unmanaged switches do not.
Managed switches allow port configuration; unmanaged switches do not.
References
RFC1918
NDP
Correct Answer:
802.1q
ARP
Explanation
802.1q is the open standard for tagging Layer 2 frames and is used for implementing
trunk porting.
RFC1918 is used to create IP addresses on a private network.
ARP (Address Resolution Protocol) works at Layer 3 to establish the MAC address
that's linked to the gateway's IP address.
NDP (Neighbor Discovery Protocol) works for address resolution with IPv6.
References
Question 2:
Correct
Which of the following protocols prescribes what to do when a data channel is in use
on a half-duplex device?
Answer
ARP
Correct Answer:
CSMA/CD
Auto-MDI-X
NDP
Explanation
References
Question 3:
Correct
A switch receives a frame with a destination MAC address that is not found in its
MAC address table. What happens next?
Answer
The frame stops at the switch and is not forwarded until the destination MAC
address is manually added to the MAC address table.
Correct Answer:
The frame is replicated and sent to every active port on the switch except the source
port.
The frame is replicated and sent to every active port on the switch.
Explanation
When a switch receives a frame with a destination MAC address that is not found in
its MAC address table, the switch replicates the frame and sends it to every active
port on the switch except the source port.
The frame is replicated, but it is not sent to every active port on the switch. It is sent
to every one except the port the frame came from.
The frame is not rejected and returned.
The frame does not stop at the switch until the destination MAC address is manually
added to the table.
References
ARP
Correct Answer:
NDP
Auto-MDIX
CSMA/CD
Explanation
Neighbor Discovery Protocol (NDP) is the protocol that replaced ARP in IPv6 and is
used for address resolution.
Address Resolution Protocol (ARP) is used for address resolution with IPv4.
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is a protocol used to
prescribe what to do when a data channel is in use on a half-duplex device.
Auto-MDIX, or auto-medium dependent crossover, is a line-sensing port that
automatically decides which type of cable configuration is needed for a connection.
References
Question 5:
Correct
In which type of device is a MAC address table stored?
Answer
Router
Correct Answer:
Switch
Repeater
Hub
Explanation
A Layer 2 switch stores MAC addresses in a table, which the switch uses to know
where to forward frames.
A router is a Layer 3 device and stores ARP tables, not MAC address tables.
A hub cannot learn or store MAC addresses. They are Layer 1 devices.
A repeater is a Layer 1 device that boosts a signal by electrically amplifying it. A
repeater does not store MAC address tables.
References
Question 6:
Correct
You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch,
but you still need to access the network through the computer.
Which of the following should you use in this situation?
Answer
Spanning Tree
VPN
Correct Answer:
VLAN
Port security
Explanation
You should define virtual LANs (VLANs) on the switch. With a VLAN, a switch port is
associated with a VLAN, and only devices connected to ports that are members of
the same VLAN can communicate with each other. You can use routers to allow
communication between VLANs if necessary.
Use a virtual private network (VPN) to connect two hosts securely through an
unsecure network (such as the internet). VPN tunneling protocols protect data as it
travels through the unsecure network.
Spanning Tree is a switch feature that allows redundant paths between switches.
Port security is a method of requiring authentication before a network connection is
allowed.
References
•7.2.2 VLAN Facts
q_vlan_vlan_01_np6.question.fex
Question 7:
Correct
For which of the following devices does a voice VLAN prioritize traffic?
Answer
Hub
Layer 3 switch
Bridge
Correct Answer:
VoIP phone
Explanation
A VoIP phone is a phone that transmits sound over the internet. It works best when a
voice VLAN is created to prioritize its traffic.
A hub is a device that broadcasts data to every computer that is connected to it.
A Layer 3 switch is a device that can provide all the functions of a Layer 2 switch
along with routing.
A bridge is a device that creates a single network from multiple network segments.
References
Question 8:
Correct
What does the ip address dhcp command allow you to do?
Answer
Correct Answer:
Configure a switch to obtain an IP address from a DHCP server.
You can use the ip address dhcp command to configure a switch or router to get its
IP address from a DHCP server. You can configure the DHCP server to deliver the
default gateway and DNS server addresses to a Cisco device as well. A manually
configured default gateway address overrides any address received from the DHCP
server.
References
Question 9:
Correct
Which command would you use on a switch to enable management from a remote
network?
Answer
ip address dhcp
no shutdown
Correct Answer:
ip default-gateway 192.168.10.185
Explanation
References
Question 10:
Correct
You are configuring a switch so that you can manage it using PuTTY from the same
network segment. On the switch, you enter the following commands:
switch#config terminal
switch(config)#interface vlan 1
switch(config-if)#ip address 192.168.1.10 255.255.255.0
Will this configuration work?
Answer
Correct Answer:
No. The no shutdown command needs to be entered.
No. The switch needs to obtain an IP address from the DHCP server using the ip
address dhcp command.
Yes. The switch can now be accessed by PuTTY using the IP address 192.168.1.10.
Explanation
References
In the learning state, the MAC address table cannot be populated because the port is
blocked.
Correct Answer:
In the learning state, the MAC address table can be populated, but frames are not
forwarded.
Explanation
References
Question 2:
Correct
You manage a single subnet with three switches. The switches are connected to
provide redundant paths between themselves.
Which feature prevents switching loops and ensures that there is only a single active
path between any two switches?
Answer
Trunking
Correct Answer:
Spanning Tree
802.1x
PoE
Explanation
References
Question 3:
Correct
You manage a network with two switches. The switches are connected together
through their Gigabit Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN
1 needs to communicate with a device on the second switch in VLAN 1.
What should you configure to allow communication between these two devices
through the switches?
Answer
Layer 3 switching
Spanning Tree
Correct Answer:
Trunking
Bonding
Explanation
References
Question 4:
Correct
Computers A and B are on the same VLAN and are separated by two switches as
shown in the exhibit. Computer A sends a frame to Computer B.
Which of the following BEST describes the frame's composition as it travels from A
to B?
Answer
Computer A sends a normal frame. The first switch forwards the frame to the second
switch, where the VLAN ID is appended to the frame and forwarded to Computer B.
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame.
The VLAN ID remains on the frame through the second switch up to Computer B.
Computer A appends a VLAN ID to the frame. It travels from switch to switch and
arrives at Computer B, where it removes the VLAN ID.
Correct Answer:
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame.
The second switch removes the VLAN ID before forwarding it to Computer B.
Explanation
Only switches understand VLAN IDs, who use the IDs for inter-switch traffic. The first
switch appends the VLAN ID, and the second switch removes it.
References
Question 5:
Correct
Which of the following BEST describes port aggregation?
Answer
Correct Answer:
Multiple ports linked together and used as a single logical port.
Explanation
Multiple ports linked together and used as a single logical port is called link
aggregation.
Multiple VLANs traveling through a single port is called port tagging or port trunking.
The 802.3 IEEE network standard refers to an 802.3 Ethernet network.
The IEEE standard for prioritized flow control is 802.1Qbb. It is not port aggregation
itself.
References
•7.3.10 Switch Port Feature Facts
q_switch_ports_features_aggregation_01_np6.question.fex
Question 6:
Correct
Which of the following BEST describes Ethernet flow control?
Answer
A configuration that allows frames larger than 1,500 bytes to pass through the port
without fragmentation.
Explanation
Ethernet flow control is a configuration that sends a pause frame to the transmitting
device when the receiving device cannot keep up with the volume of data being sent.
Port tagging is a configuration that allows traffic from multiple VLANs on a single
port.
Setting your network devices' MTU to 9,000 is a configuration that allows frames
larger than 1,500 bytes (known as jumbo frames) to pass through the ports without
fragmentation.
Spanning Tree Protocol is a protocol designed to prevent looping in network traffic.
References
Question 7:
Correct
Which of the following must each device's MTU be set to for jumbo frames to
transverse the network without risk of fragmentation?
Answer
6,000
1,500
3,000
Correct Answer:
9,000
Explanation
The MTU of each device in the network must be set to 9,000 for jumbo frames to
transverse the network without fragmentation.
If a device's MTU is set to 1,500, 3,000, or 6,000, a jumbo frame could be
fragmented.
References
Question 8:
Correct
Your organization's management wants to monitor all the customer services calls.
The calls are taken on VoIP phones. Which of the following configurations would
BEST help you set up a way to monitor the calls?
Answer
Correct Answer:
Port mirroring
LACP
Explanation
Port mirroring provides copies of packets from a selected port for monitoring and
analysis.
LACP is Link Aggregation Control Protocol. It allows you to link up to eight ports
together to act as a single logical port.
Spanning Tree Protocol is a protocol designed to prevent looping in network traffic.
Priority-based flow control is protocol that allows you to prioritize traffic on your
network by category.
References
PoE++ Type 3
PoE+
PoE
Explanation
You would need PoE++ Type 4, which provides up to 71. 3 watts of power.
PoE provides up to 15.4 watts of power and would not be sufficient to power the flat
screen.
PoE+ provides up to 25.5 watts of power and would not be sufficient to power the flat
screen.
PoE++ Type 3 provides up to 51 watts of power and would not be sufficient to power
the flat screen.
References
Question 10:
Correct
Which of the following switch features allows you to configure how the switch's MAC
address table is filled?
Answer
Auto-negotiation
Port mirroring
Explanation
Port security allows you to choose from dynamic locking, static locking, or a
combination of both to fill the MAC address table. This is done to protect the switch
from MAC flooding and other vulnerabilities.
Port mirroring provides copies of packets from a selected port for monitoring and
analysis.
Auto-negotiation is a default setting on Ethernet devices in which connected devices
communicate to select the speed, duplex, and flow control parameters for their
transmissions.
References
Explanation
References
Question 2:
Correct
You have two switches connected together as shown in the following diagram. How
many broadcast domains are in the network?
Answer
Zero
One
Correct Answer:
Two
Four
Five
Explanation
There are two broadcast domains. Each VLAN is in its own broadcast domain.
When you connect devices to a switch, each switch port connection is in its own
collision domain. In this graphic, there are five collision domains.
References
Question 3:
Correct
You are the network administrator for a city library. Throughout the library are
several groups of computers that provide public access to the internet. Supervision
of these computers has been difficult. You've had problems with patrons bringing
personal laptops into the library and disconnecting the network cables from the
library computers to connect their laptops to the internet.
The library computers are in groups of four. Each group of four computers is
connected to a hub that's connected to the library network through an access port on
a switch. You want to restrict access to the network so that only library computers
are permitted connectivity to the internet.
What can you do?
Answer
Correct Answer:
Configure port security on the switch.
Remove the hub and place each library computer on its own access port.
Create static MAC addresses for each computer and associate each address with a
VLAN.
Explanation
Configuring port security on the switch can restrict access so that only specific MAC
addresses can connect to the configured switch port. This would prevent the laptop
computers from connecting.
Placing each library computer on its own access port would have no effect.
VLANs are used to group broadcast traffic and do not restrict device connectivity as
needed in this scenario.
References
Question 4:
Correct
Which of the following BEST describes an ARP spoofing attack?
Answer
Explanation
An ARP spoofing attack associates an attacker's MAC address with the IP address
of a victim's device.
MAC flooding is an attack in which a switch is flooded with packets, each containing
a different source MAC address.
MAC spoofing is an attack that changes the source MAC address on frames.
Double tagging is a VLAN hopping attack where a frame is manipulated to contain
two tags.
References
Question 5:
Correct
Which of the following is a method of VLAN hopping?
Answer
MAC flooding
ARP spoofing
Correct Answer:
Double tagging
MAC spoofing
Explanation
References
Question 6:
Correct
Drag each description on the left to the appropriate switch attack type on the right.
ARP spoofing/poisoning
The source device sends frames to the attacker's MAC address instead of to the
correct device.
correct answer:
Dynamic Trunking Protocol
Should be disabled on the switch's end user (access) ports before implementing
the switch configuration in to the network.
correct answer:
MAC flooding
Causes packets to fill up the forwarding table and consumes so much of the
switch's memory that it enters a state called fail open mode.
correct answer:
MAC spoofing
Can be used to hide the identity of the attacker's computer or impersonate another
device on the network.
correct answer:
Keyboard Instructions
Explanation
Common attacks that are perpetrated against switches are MAC flooding, ARP
spoofing/poisoning, and MAC spoofing.
MAC flooding overloads the switch's MAC forwarding table to make the switch
function like a hub. MAC flooding works in the following manner:
• The attacker floods the switch with packets, each containing a different
source MAC address.
• The flood of packets fills up the forwarding table and consumes so much
of the memory in the switch that it causes it to enter in to fail open mode.
While in this mode, all incoming packets are broadcast out of all ports (as
with a hub) instead of just to the correct ports, as per normal operations.
• The attacker captures all the traffic with a protocol analyzer/sniffer.
ARP spoofing/poisoning associates the attacker's MAC address with the IP address
of the victim's device. ARP spoofing works in the following manner:
•When computers send an ARP request for a known IP address's MAC
address, the attacker's system responds with its own MAC address.
• The source device sends frames to the attacker's MAC address instead of
to the correct device.
• Switches are indirectly involved in the attack because they do not verify
the MAC address/IP address association.
MAC spoofing changes the source MAC address on frames sent by the attacker.
• MAC spoofing is typically used to bypass 802.1x port-based security.
• MAC spoofing can be used to bypass wireless MAC filtering.
• MAC spoofing can be used to hide the identity of the attacker's computer
or to impersonate another device on the network.
Dynamic Trunking Protocol (DTP) switches have the ability to automatically detect
trunk ports and negotiate the trunking protocol used between devices. DTP is not
secure and allows unauthorized devices to possibly modify configuration information.
You should disable DTP services on a switch's end user (access) ports before
implementing the switch configuration on the network.
References
DTP attack
Explanation
References
Question 8:
Correct
You have just connected four switches as shown in the Exhibit.
Assuming the default switch configuration, how can you force switch C to become
the root bridge?
Answer
Explanation
To force a specific switch to become the root bridge, configure a priority number
lower than the default (32768). The switch with the lowest bridge ID becomes the
root bridge. The bridge ID is composed of two parts, a bridge priority number and the
MAC address assigned to the switch. When the default priority is used for all
switches, the switch with the lowest MAC address becomes the root bridge.
References
Question 9:
Correct
Which of the following switch attacks bypasses the normal functions of a router to
communicate between VLANs and gain unauthorized access to traffic on another
VLAN?
Answer
ARP spoofing
MAC spoofing
Explanation
Switch spoofing, also known as VLAN spoofing, is an attack that bypasses the
normal functions of a router to communicate between VLANs and gain unauthorized
access to traffic on another VLAN. It does this by taking advantage of a switch's
default setting called dynamic auto or dynamic desirable. The attacker uses this
function to imitate a trunking switch and gain access to the traffic on multiple VLANs.
VLAN, or switch, spoofing is a method of VLAN hopping.
MAC spoofing is changing the source MAC address on frames. The attacker's
system sends frames with the spoofed MAC address. The switch reads the source
address contained in the frames and associates the MAC address with the port
where the attacker is connected.
ARP spoofing/poisoning associates the attacker's MAC address with the IP address
of a victim's device.
Switches have the ability to automatically detect trunk ports and negotiate the
trunking protocol used between devices. Dynamic Trunking Protocol is not secure
and allows unauthorized devices to modify configuration information.
References
Question 10:
Correct
Which of the following attacks manipulates a switch's auto-negotiation setting to
access a virtual local area network that's connected to the same switch as the
attacker's virtual local area network?
Answer
ARP spoofing
MAC spoofing
Correct Answer:
VLAN spoofing
Explanation
References
Explanation
References
Question 2:
Correct
Jake is a network administrator for a hospital. There is medical equipment that relies
on having uninterrupted internet connectivity. Which of the following types of routing
protocols should Jake focus on to ensure that the hospital's network connectivity
remains reliable?
Answer
Explanation
References
Question 3:
Correct
Which of the following has the least default administrative distance?
Answer
Correct Answer:
Static route to an IP address
External BGP
OSPF
RIP
Explanation
References
• 7.5.4 Routing Protocol Characteristics Facts
q_rounting_admin_distance_np6.question.fex
Question 4:
Correct
Under which of the following circumstances might you implement BGP on your
company network and share routes with internet routers?
Answer
Explanation
Very large networks can use BGP internally, but they typically only share routes on
the internet if the AS (autonomous system) has two or more connections to the
internet through different ISPs.
If your network has over 15 hops, use a routing protocol other than RIP.
Use OSPF or IS-IS to divide your network into areas.
Private networks that use public IP addresses do not need to share routes with
internet routers. It is typically the ISP's responsibility to configure routes on the
private network, even when public addressing is being used.
A single route out of the private network is all that's required if the network has a
single connection to the internet.
References
Question 5:
Correct
A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The
router is configured to use RIP and has learned both networks.
The next hop router for network 192.168.3.0 has changed. You need to make the
change with the least amount of effort possible.
What should you do?
Answer
Stop and restart the RIP protocol on the router.
Manually reconfigure the default route to point to the new next hop router.
Explanation
When you use a routing protocol, changes in routing information take some time to
be propagated to all routers on the network. The term convergence is used to
describe the condition when all routers have the same (or correct) routing
information.
Static routes in a routing table must be updated manually.
Restarting RIP might actually increase the time required for changes to be learned.
Forcing an update (if the router supports it) is not a requirement, as the periodic
sharing of routes will eventually update the routing table entry.
References
Question 6:
Correct
Which of the following routing protocols is a hybrid that uses a composite number for
its metric based on bandwidth and delay?
Answer
RIP
BGP
Correct Answer:
EIGRP
OSPF
Explanation
Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid protocol that uses
a composite number for its metric based on bandwidth and delay.
RIP uses hop count as its metric and is for networks with 15 or less hops.
OSPF is a link state routing protocol used for routing within an AS and uses relative
link cost as its metric.
BGP is an advanced distance vector protocol (also called a path vector protocol) that
uses path, rules, and policies instead of a metric to make routing decisions.
References
Question 7:
Correct
Which of the following are true of the IS-IS routing protocol? (Select two.)
Answer
It is a classful protocol.
Explanation
References
Question 8:
Correct
What are the main differences between the OSPF and IS-IS routing protocols?
Answer
Correct Answer:
OSPF requires an area 0, while IS-IS does not.
Explanation
Like OSPF, IS-IS uses areas when designing the network. However, IS-IS does not
require an area 0 like OSPF does. Because IS-IS was originally designed for non-IP
protocols, it can more easily support IPv6 routing.
Both OSPF and IS-IS have the following characteristics:
• Both are link state protocols.
• Both are classless protocols, supporting CIDR and VLSM.
• Both are interior gateway protocols that are used within an AS.
References
Question 9:
Correct
What is the main difference between RIP and RIPv2?
Answer
RIP use hop count for the metric, while RIPv2 uses a relative link cost.
RIP has a limit of 15 hops, while RIPv2 increases the hop count limit.
Correct Answer:
RIP is a classful protocol, while RIPv2 is a classless protocol.
Explanation
RIPv1 is a classful protocol, meaning that the subnet mask is not included in routing
updates. With RIP, only the default subnet mask is used to identify networks. RIPv2
is a classless protocol, meaning that the subnet mask is included in routing updates.
RIPv2 supports variable-length subnet masks (VLSM).
Both RIP and RIPv1 are distance vector protocols and use hop count for the metric.
RIP and RIPv2 have a limit of 15 hops between any two networks.
References
Question 10:
Correct
You have only one physical interface but want to connect two IP networks. Which of
the following would allow you to do so?
Answer
A loopback address
Correct Answer:
Subinterfaces
Virtual IPs
Explanation
You can use subinterfaces to connect two IP networks through one parent physical
interface. Each subinterface is given its own IP information and data can then be
routed from one network to the other through the physical interface.
A loopback address is a special IP address used for diagnostics and for
troubleshooting the TCP/IP stack.
Virtual IPs (VIPs) are IP addresses that are not associated with a single device.
Multiple devices with an internet connection can share a VIP. They are used for one-
to-many Network Address Translation, mobility, and fault tolerance.
The sticky feature is a Cisco port security command that you can enable to
automatically add MAC addresses to the Content Addressable Memory (CAM) table,
or MAC address table.
References
Explanation
Hosts on a private network share the IP address of the NAT router. NAT works by
translating private addresses NAT supports up to 5,000 concurrent connections. This
can consume processor and memory resources, but allows one NAT router to
translate for a large network.
Network address translation can forward DNS requests to the internet.
NAT does not provide end-device to end-device traceability, but this also provide
some security to hosts within the private network as their IP addresses are not
shared publicly.
NAT does not allow external hosts to initiate communication with internal hosts. All
communication is through the NAT router.
References
Question 2:
Correct
Which of the following allows incoming traffic addressed to a specific port to move
through the firewall and be transparently forwarded to a specific host on the private
network?
Answer
Correct Answer:
DNAT
IP masquerade
Dynamic NAT
OSPF
Explanation
DNAT (Destination Network Address Translation) is also called port forwarding and
allows incoming traffic addressed to a specific port to move through the firewall and
be transparently forwarded to a specific host on the private network. Dynamic NAT
automatically maps internal IP addresses with a dynamic port assignment. In this
implementation, many internal private IP addresses are mapped to one public IP
address on the NAT router.
IP masquerade is another name for Dynamic NAT and many-to-one NAT.
OSPF (Open Shortest Path First) is a link-state routing protocol used for routing
within an autonomous system.
References
Question 3:
Correct
Which device is NAT typically implemented on?
Answer
AD server
RADIUS server
ISP router
Correct Answer:
Default gateway router
Explanation
References
Question 4:
Correct
Which of the following NAT implementations maps a single private IP address to a
single public IP address on the NAT router?
Answer
Dynamic NAT
IP masquerade
Many-to-one NAT
Correct Answer:
Static NAT
Explanation
Static NAT maps a single private IP address to a single public IP address on the
NAT router.
IP masquerade and many-to-one NAT are simply different names for Dynamic NAT.
Dynamic NAT automatically maps internal IP addresses with a dynamic port
assignment. In this implementation, many internal private IP addresses are mapped
to one public IP address on the NAT router.
References
Question 5:
Correct
Which of the following do hosts on a private network share if the network utilizes a
NAT router?
Answer
A virtual IP address
Explanation
Hosts on a private network share the NAT router's physical IP address. The NAT
router allows the hosts to share its physical IP address when connecting to the
internet.
Hosts on a private network do not share virtual or physical MAC addresses on a
network that utilizes a NAT router. Each host retains its own MAC address.
Hosts on a private network do not share a virtual IP address on a network that
utilizes a NAT router.
References
Question 6:
Correct
Which of the following is a method that allows you to connect a private network to
the internet without obtaining registered addresses for every host?
Answer
EIGRP
BGP
OSPF
Correct Answer:
NAT
Explanation
References
Question 7:
Correct
Kate, a network administrator, has been tasked with staying within the company
budget. She has a large network and doesn't want to spend more than she needs to
on purchasing and registering multiple public IP addresses for each of the hosts on
her network.
Which of the following methods could help her provide internet access but also keep
costs low and limit the number of registered IP addresses her organization needs to
purchase?
Answer
Explanation
Using NAT will allow the hosts on Kate's network to be private and to utilize just one
registered public IP address.
Using Layer 2 switches will not impact the public IP address situation.
Using Layer 3 switches would only improve the public IP address situation if NAT
were implemented on them.
Using PoE (Power over Ethernet) devices will not impact the public IP address
situation.
References
Question 8:
Correct
Which of the following is NOT one of the IP address ranges defined in RFC 1918
that are commonly used behind a NAT server?
Answer
172.16.0.1 to 172.31.255.254
10.0.0.1 to 10.255.255.254
192.168.0.1 to 192.168.255.254
Correct Answer:
169.254.0.1 to 169.254.255.254
Explanation
169.254.0.1 to 169.254.255.254 is the IP address range assigned to Windows DHCP
clients (if a DHCP server does not assign the client an IP address). This range is
known as the Automatic Private IP Addressing (APIPA) range.
The other three ranges listed in this question are defined as private IP addresses in
RFC 1918, which are commonly used behind a NAT server.
References
Question 9:
Correct
You are the network administrator for a small company that implements NAT to
access the internet. However, you recently acquired five servers that must be
accessible from outside your network. Your ISP has provided you with five additional
registered IP addresses to support these new servers, but you don't want the public
to access these servers directly. You want to place these servers behind your
firewall on the inside network, yet still allow them to be accessible to the public from
the outside.
Which method of NAT translation should you implement for these servers?
Answer
Restricted
Overloading
Correct Answer:
Static
Dynamic
Explanation
References
Question 10:
Correct
In which of the following tables does a NAT router store port numbers and their
associated private IP addresses?
Answer
Routing table
ARP table
Explanation
A NAT router stores port numbers and their associated private IP addresses in a
translation table. NAT uses this table to know which host to send the incoming traffic
to.
A routing table is for routing packets from one network to another.
A MAC address table is used by Ethernet switches to know where to forward traffic
within a network segment.
An ARP table associates MAC addresses with IP addresses.
References
When a DHCP snooping technique is used to drop packets from untrusted DHCP
servers.
When an attacker adds a second DHCP server to a network and offers IP addresses
to clients wanting to join the network.
Explanation
A denial of service from a lack of IP addresses in a DHCP server's pool is one form
of DHCP scope exhaustion. Another form comes from inefficient IP address
management in which the IP address pool is depleted faster than it can be refilled.
A rogue DCHP server occurs when an attacker adds a second DHCP server to a
network and offers IP addresses to client wanting to join the network. If the network
administrator does not have control over a DHCP server, it is considered a rogue
DHCP server.
Shortening IP address lease times on a DHCP server can help prevent DHCP scope
exhaustion.
DHCP snooping techniques can help protect against rogue DHCP servers.
References
Question 2:
Correct
You have just connected a new computer to your network. The network uses static
IP addressing.
You find that the computer can communicate with hosts on the same subnet, but not
with hosts on a different subnet. No other computers are having issues.
Which of the following configuration values would you MOST likely need to change?
Answer
DNS server
Correct Answer:
Default gateway
Subnet mask
IP address
Explanation
You should check the computer's default gateway setting; this value is used to send
packets to other subnets. If it's incorrect, packets won't be sent to the correct router.
In this scenario, the host can communicate with other hosts on the same subnet,
meaning that the IP address and subnet mask are correctly configured.
The DNS server address is likely not the problem, as name resolution is not
mentioned in the scenario. In addition, if name resolution were a problem, it could
affect access to both local and remote hosts.
References
Question 3:
Correct
A workstation's network board is currently configured as follows:
• Network Speed = Auto
• Duplexing = Auto
The workstation is experiencing poor network performance, and you suspect that the
network board is incorrectly detecting the network speed and duplex settings. Upon
investigation, you find that it's running at 10 Mbps half-duplex. You know that your
network switch is capable of much faster throughput. To fix this issue, you decide to
manually configure these settings on the workstation.
Before you do so, you need to verify the switch port configuration for the connected
workstation. Given that it's a Cisco switch, which commands can you use on the
switch to show a list of all switch ports and their current settings? (Select two.)
Answer
To view the speed and duplex settings of interfaces on a Cisco switch, you can use
one of the following commands:
• show running-config interface (displays concise summary information)
• show interface (displays extended information)
The show interface capabilities command displays information about interface
capabilities, not the current switch configuration.
The show interface ethernet counters command displays interface statistics.
The show interface switchport command displays VLAN information regarding
switch interfaces.
References
•
7.7.4 Switching and Routing Troubleshooting Facts
q_trouble_switching_routing_interface_np6.question.fex
Question 4:
Correct
Which of the following utilities would you use to view the routing table?
Answer
traceroute
mtr
tracert
dig
Correct Answer:
route
Explanation
Use the route command to display the routing table contents and to add or remove
static routes.
The tracert command uses ICMP packets to test connectivity between devices and
display the path between them. Responses from each hop on the route are
measured three times to provide an accurate representation of how long a packet
takes to reach and be returned by that host.
The mtr command on Linux is a combination of the ping and traceroute commands.
The dig command resolves (looks up) a hostname's IP address.
References
Question 5:
Correct
You are unsure if the gateway address is correct for one of your subnetworks
because traffic is not leaving the network. Which of the following tables could you
look at to check if the gateway address is correct?
Answer
ARP table
State table
Explanation
References
Question 6:
Correct
Which of the following scenarios would cause a problem in asymmetric routing?
Answer
Explanation
When you have asymmetrical routing, the outbound traffic would go through one
stateful firewall and the inbound traffic would come through the second stateful
firewall. The second firewall would drop the packets because it wouldn't have any
record of them in its state table. That information would be recorded in the first
firewall.
Unless you've specifically programmed a hub as stateful, it would not have problems
with asymmetrical routing.
In general, routers do not have problems with asymmetric routing, regardless of
number.
Switches do not have problems with asymmetric routing, regardless of number.
References
Question 7:
Correct
You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms?
Answer
Explanation
References
Question 8:
Correct
Which of the following can cause broadcast storms?
Answer
Duplicate IP addresses
Routing loops
Explanation
Switching loops can cause broadcast storms. The broadcast packets are forwarded
to each port on each switch. The switches will then rebroadcast the packets
endlessly and flood the network.
Duplicate MAC addresses, duplicate IP addresses, and routing loops do not cause
broadcast storms.
References
Question 9:
Correct
You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch,
but you still need to access the network through the computer.
What should you use for this situation?
Answer
Port security
VPN
Spanning Tree
Correct Answer:
VLAN
Explanation
You should define virtual LANs (VLANs) on the switch. To do so, a port on the switch
is associated with a specific VLAN. Only devices connected to ports that are
members of the same VLAN can communicate with each other. Routers are used to
allow communication between VLANs if necessary.
Use a virtual private network (VPN) to connect two hosts securely through an
unsecure network (such as the internet). VPN tunneling protocols protect data as it
travels through the unsecure network.
Spanning Tree is a switch protocol that allows redundant paths between switches.
Port security is a method of requiring authentication before allowing a network
connection.
References
A top-of-rack switch
Explanation
A storage attached network (SAN) is a block-level storage solution built for speed
and ease of sharing.
A top-of-rack switch connects devices to a network.
A mid-tier speed switch is also known as a Distribution or Aggregation layer switch.
A Core layer switch is the backbone of a three-tier data center.
References
Question 2:
Correct
You manage a network with three dedicated storage devices, as shown in the
diagram. Users on the network see only a single file server.
Which network-based storage technology is being used?
Answer
NAS
Explanation
Question 3:
Correct
Which of the following are the components of a SAN?
Answer
Explanation
Storage attached networks have hosts (hypervisors), storage on the target servers,
and SAN fabric that consists of the cabling.
Access switches are part of the data center architecture. All SAN storage devices
are called targets. Hosts are servers that have a hypervisor installed. SAN fabric
consists of the cabling and networking hardware that provides the connectivity
between host components and storage components. Distribution layer switches are
mid-tier speed switches. Core layer switches are large modular appliances. The
servers that connect to the shared storage device are called initiators.
References
•
8.1.5 SAN Facts
q_san_components_np6.question.fex
Question 4:
Correct
Match the SAN technology on the left with it's specialization on the right. (Items may
be once, used more that once or not at all.)
iSCSI
Explanation
References
Question 5:
Correct
Brett has been tasked with creating a new SAN. The company currently has Gigabit
internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN.
Brett tells the CTO that this will not work. Which of the following BEST describes the
problem?
Answer
Explanation
References
Question 6:
Correct
What BEST describes the designed purpose of InfiniBand?
Answer
Cloud platforms
Jumbo frames
Explanation
References
Question 7:
Correct
You are in the process of configuring an iSCSI storage area network (SAN) for your
network.
You want to configure a Windows Server system to connect to an iSCSI target
defined on a different server system. You also need to define iSCSI security settings,
including CHAP and IPsec.
Which tool should you use?
Answer
Correct Answer:
iSCSI Initiator
Multipath I/O
Explanation
Run the iSCSI Initiator to connect to an iSCSI target defined somewhere on the SAN
fabric. You can also use this utility to define iSCSI security settings, including CHAP
and IPsec.
Internet Storage Name Service (iSNS) servers provide discoverability and zoning for
SAN resources.
Multipath I/O (MPIO) provides support for a storage device's multiple data paths.
Use the iSCSI option under File and Storage Services in Server Manager to define
an iSCSI target on a server.
References
Question 8:
Correct
Within an SDN, what is commonly referred to as the brains?
Answer
Initiators
Fabric
Hosts
Correct Answer:
Controllers
Explanation
Controllers are what operate at the control plane and run an SDN.
An initiator is a client that sends iSCSI commands to storage devices within the SAN.
Hosts can refer to many items, such as servers that allow access to the SAN.
Fabric is a layer within a SAN.
References
Question 9:
Correct
Which option BEST describes the third layer in the SDN architecture?
Answer
Control
Management
Correct Answer:
Infrastructure
Application
Explanation
The third layer of SDN is the Infrastructure, or Physical, layer. This is where the
network hardware is located.
The Control layer is the second layer and functions as the brains of the network.
The Application layer is the first layer and contains the applications needed to
program and monitor the network.
The management plane is the interface that admins use to set network parameters.
References
Question 10:
Correct
What are the three layers of an SDN?
Answer
Explanation
The three layers of an SDN are the Application, Control, and Infrastructure layers.
The control plane deals with software and management.
Physical is not correct since the top layer deals with applications, and virtualized is
an incorrect term for infrastructure, as some components may be physical.
SaaS, IaaS, and PaaS are cloud service models.
References
Explanation
The codec's main purpose is to compress and decompress data to save bandwidth.
External calls are controlled through other hardware, not the codec.
While the codec does help with sound and transmission quality, this is not its main
purpose.
References
Question 2:
Correct
Which of the following BEST describes VoIP (Voice over Internet Protocol)?
Answer
A series of protocols optimized for voice (telephone calls) and digital data
transmission through a packet-switched IP network.
A protocol optimized for voice data transmission (telephone calls) through a wireless
network.
Explanation
References
Question 3:
Correct
Which of the following are considered VoIP endpoints?
Answer
Correct Answer:
Hard phones and soft phones
Explanation
Hard phones and soft phones are endpoints for VoIP since both can take calls over
Ethernet cable.
A hardline is a traditional phone that does not use the internet. Cell phones work
through different technology.
A satellite phone uses signals from satellites, not from the internet.
PBX (private branch exchange) is a different piece of equipment; it is not considered
an endpoint.
References
Question 4:
Correct
Larry is tasked with implementing a VoIP system in the office. He presents his
research to his boss, who wants to use the current traditional hard phones to save
money. What BEST explains why this is not possible?
Answer
Traditional hard phones don't provide conferencing, but VoIP hard lines do.
Regular hard phones only work with SNMP, and VoIP hard phones use UDP and
TCP.
Explanation
VoIP requires a computer to work. VoIP hard phones are, in essence, computers
that understand network protocols.
VoIP hard phones must conform to IEEE 802.3.
Traditional hard phones are not capable of understanding any network protocols,
including SNMP.
Traditional business hard phones have included conferencing for a long time. It is not
a unique feature to VoIP hard phones.
References
Question 5:
Correct
Amber, a network administrator, is conducting VoIP training for other IT team
members. Melanie, a new team member, is confused about the difference between
latency and jitter. What is the BEST way to explain the difference?
Answer
Explanation
References
Question 6:
Correct
Dan, a network administrator, gets an email from the CEO. She is upset because
people keep talking over each other on conference calls. Which option BEST
describes Dan's first step to remedy this problem?
Answer
Explanation
You can give VoIP traffic priority on your network. Latency is recommended to be set
between 75 and 150 milliseconds.
Latency should always be below 250 milliseconds. Any higher and call quality
becomes unacceptable.
While having a VoIP server hosted in the cloud increases latency, this doesn't
change the basic problem of the current latency configuration.
Holding a telephone etiquette training course is not within Dan's purview, even
though it is probably warranted.
References
Question 7:
Correct
Dan, a network administrator, has noticed a consistent increase in bandwidth
consumption since installing a new VoIP system. The increase is outside of the
parameters given by the vendor. What is MOST likely the issue Dan needs to
address?
Answer
Explanation
References
Question 8:
Correct
VoIP uses several protocols. Which layer of the OSI model do these protocols reside
on?
Answer
Data Link
Presentation
Physical
Correct Answer:
Transport
Explanation
References
Question 9:
Correct
What is the MOST common Transport layer protocol that VoIP uses?
Answer
FTP
TCP
SMTP
Correct Answer:
UDP
Explanation
UDP continues a session even if there is some data loss. On a phone call, data loss
is minimal.
TCP requires that all packets be received in order. If not, retransmission is
attempted, creating latency and dropped calls.
FTP is a file transfer protocol. It is not used with VoIP.
SMTP is an email protocol. It is not used with VoIP.
References
Question 10:
Correct
Upper management has asked you if there is a way to integrate phone calls, emails,
and instant messaging into a single platform.
Which of the following systems should you recommend?
Answer
Correct Answer:
Unified communications
Quality of Service
Voice over IP
PSTN
Explanation
References
Explanation
Virtualization allows a single physical machine (known as the host operating system)
to run multiple virtual machines (known as the guest operating systems). The virtual
machines appear to be self-contained and autonomous systems. Advantages of
virtualization include:
• Server consolidation.
• The ability to migrate systems between different hardware.
• Centralized management of multiple systems.
• Increased utilization of hardware resources.
• Isolation of systems and applications.
Disadvantages of virtualization include:
• A compromise in the host system could affect multiple guest systems.
• A failure in a shared hardware resource could affect multiple systems.
References
Question 2:
Correct
Which hardware components are controlled by the hypervisor?
Answer
Correct Answer:
RAM, CPU, storage
Explanation
RAM, CPU, and storage are controlled by the hypervisor. These are the three
components that all VMs share.
The power supply and motherboard are not controlled by the hypervisor.
The GPU is only for direct usage by the host machine.
References
Question 3:
Correct
John is using a host machine with a Type1 hypervisor. He has 40 virtual servers
using unmodified guest OSs. Which type of virtualization BEST describes this
configuration?
Answer
Paravirtualization
Partial virtualization
Correct Answer:
Full virtualization
Explanation
In full virtualization, the virtual machine completely simulates a real physical host.
This allows most operating systems and applications to run within the virtual
machine without being modified in any way. This is the most common type of
virtualization in use.
Type 2 hypervisors run mostly on laptops or desktop machines.
In partial virtualization, only some of the components of the virtual machine are
virtualized. The guest operating systems use some virtual components and some
real physical hardware components in the actual device where the hypervisor is
running.
In paravirtualization, all guest operating systems running on the hypervisor directly
access various hardware resources in the physical device. The components are not
virtual.
References
• 8.3.3 Virtualization Facts
q_virt_full_02_np6.question.fex
Question 4:
Correct
How many types of full virtualization are there?
Answer
Four
One
Three
Correct Answer:
Two
Explanation
There are two types of full virtualization. They are called software assisted and
hardware assisted.
References
Question 5:
Correct
In virtualization, what is the role of a hypervisor?
Answer
Correct Answer:
A hypervisor allows virtual machines to interact with the hardware without going
through the host operating system.
A hypervisor has the actual hardware in place on the machine, such as the hard disk
drive(s), optical drive, RAM, and motherboard.
A hypervisor is created within the host operating system and simulates a hard disk
for the virtual machine.
Explanation
A hypervisor is a thin layer of software that resides between the virtual operating
system(s) and the hardware. A hypervisor allows virtual machines to interact with the
hardware without going through the host operating system. A hypervisor manages
access to system resources such as:
•CPU
•Storage
•RAM
A physical machine (also known as the host operating system) has the actual
hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM,
motherboard, etc. A virtual machine is a software implementation that executes
programs like a physical machine.
A virtual machine appears to be a self-contained and autonomous system.
A virtual hard disk (VHD) is a file that is created within the host operating system and
simulates a hard disk for the virtual machine.
References
Question 6:
Correct
Which of the following BEST describes an enterprise-level hypervisor?
Answer
VM
Type 2
Correct Answer:
Type 1
VHD
Explanation
References
Sell the current assets and purchase specially made Type 2 hypervisor servers for
virtualization.
Correct Answer:
Convert the existing servers into host servers for virtualization using a Type 1
hypervisor.
Explanation
She should convert the existing servers into host servers for virtualization using a
Type 1 hypervisor. This has minimal expense and utilizes existing assets.
There are no specially made Type 2 hypervisor servers.
Moving to the cloud is expensive and does not utilize current assets.
Only a Type 1 hypervisor can be used in a bare metal installation. Type 2 only work
on computers that have an OS installed.
References
Question 8:
Correct
Which hypervisor is for bare metal use?
Answer
Hyper-V
VMWare
Type 2
Correct Answer:
Type 1
Explanation
References
Question 9:
Correct
Which form of virtualization does not virtualize the hardware?
Answer
Full virtualization
Correct Answer:
Paravirtualization
Partial virtualization
Hypervisor
Explanation
References
Question 10:
Correct
Which resource is nearly impossible to decrease once allocated in virtualization?
Answer
RAM
CPU
NIC
Correct Answer:
Storage
Explanation
References
Route VM-to-VM traffic through a physical firewall and back to the virtual network.
Explanation
Virtualized hosts are susceptible to the same network exploits as physical network
hosts and need to be protected by a firewall. By implementing a virtual firewall within
the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows
between virtual machines.
While routing VM-to-VM traffic through a physical firewall would work, it is very
inefficient.
A virtual router with VRF (Virtual Route Forwarding) is used to create multiple
networks from a single router interface.
Configuring VLAN membership would not allow you to monitor and filter traffic.
References
Question 2:
Correct
Which of the following statements are true about virtual NICs? (Select two.)
Answer
Correct Answer:
Virtual NICs need the appropriate driver to function.
Correct Answer:
Multiple virtual NICs can be added to a virtual machine.
Explanation
Within each virtual machine, you can configure one or more virtual network
interfaces, which function similarly to physical network interfaces. Virtual interfaces
use Ethernet standards to transmit and receive frames on a network. The operating
system within the virtual machine must have the appropriate driver installed to
support the virtual network interface, just as with a physical network interface.
When you configure a virtual network interface within a virtual machine's
configuration, you can specify:
• The type of physical network interface to emulate. This allows the best
possible driver support from the operating system within the virtual
machine.
• A MAC address. Most hypervisors automatically assign a MAC address to
each virtual network interface. Some hypervisors allow you to use a
custom MAC address if needed.
• The network to connect to. Most hypervisors allow you to define many
different virtual networks.
• When you configure a virtual network interface, you select which virtual
network you want it to connect to.
References
Question 3:
Correct
Which key advantage does a virtual router have over a physical router?
Answer
Routing protocols are not necessary for routing data between networks.
Correct Answer:
Multiple networks can connect to a single interface.
Explanation
The key advantage to a virtual router is that it can support multiple networks on a
single router interface. A virtual router does this by using a different routing table for
each network. Physical routers are limited to a single network on each interface.
Like physical routers, virtual routers use routing protocols to route data between
networks.
VRRP is used by physical routers to specify backup routers in the case of failure.
Virtual routers do not offer significant performance increases.
References
Question 4:
Correct
You have configured a virtual network that includes the following virtual components:
• Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual
OS4)
• One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to
communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table
below, click on all of the virtual and physical machines that Virtual OS1 can
communicate with.
Explanation
References
Question 5:
Correct
You have configured a virtual network that includes the following virtual components:
• Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual
OS4)
• One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to
communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table
below, click on all of the virtual and physical machines that Virtual OS1 can
communicate with.
Explanation
References
Disable the switch port that the hypervisor's network interface is connected to.
Create MAC address filters on the network switch that block each virtual machine's
virtual network interfaces.
Correct Answer:
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Explanation
To allow the virtual machines to communicate with each other while isolating them
from the production network, complete the following:
• Create a new virtual switch configured for host-only (internal) networking.
• Connect the virtual network interfaces in the virtual machines to the virtual
switch.
Creating a bridged virtual switch would still allow the virtual machines to
communicate on the production network through the hypervisor's network interface.
Disconnecting the hypervisor's network cable, blocking the virtual machine's MAC
addresses, or disabling the hypervisor's switch port would isolate the virtual
machines from the production network, but this would also prevent them from
communicating with each other.
References
• 8.4.4 Virtual Networking Facts
q_virt_networking_switch_03_np6.question.fex
Question 7:
Correct
You are responsible for maintaining Windows workstation operating systems in your
organization. Recently, an update from Microsoft was automatically installed on your
workstations that caused an in-house application to stop working.
To keep this from happening again, you decide to test all updates on a virtual
machine before allowing them to be installed on production workstations.
Currently, none of your test virtual machines has a network connection. However,
they need to be able to connect to the update servers at Microsoft to download and
install updates.
What should you do? (Select two. Each response is one part of the complete
solution.)
Answer
Disable the switch port that the hypervisor's network interface is connected to.
Correct Answer:
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Explanation
To allow the virtual machines to communicate with the Microsoft update servers on
the internet, complete the following:
• Create a new virtual switch configured for bridged (external) networking.
• Connect the virtual network interfaces in the virtual machines to the virtual
switch.
Creating an internal or host-only virtual switch would not allow the virtual machines
to communicate on the production network through the hypervisor's network
interface. Disabling the hypervisor's switch port would also isolate the virtual
machines from the production network.
References
Question 8:
Correct
Which component is MOST likely to allow physical and virtual machines to
communicate with each other?
Answer
Virtual desktop
VHD
Explanation
References
Question 9:
Correct
You need to provide DHCP and file sharing services to a physical network. These
services should be deployed using virtualization. Which type of virtualization should
you implement?
Answer
Correct Answer:
Virtual servers
Virtual networks
Explanation
References
Question 10:
Correct
Your organization uses a time-keeping application that only runs on Windows 2000
and does not run on newer OS versions. Because of this, there are several Windows
2000 workstations on your network.
Last week, you noticed unusual activity on your network coming from the Windows
2000 workstations. After further examination, you discovered that the Windows 2000
workstations were the victim of a malicious attack and were being used to infiltrate
the network.
You find out that the attackers were able to gain access to the workstations because
of the legacy operating system being used. The organization still needs to use the
Windows 2000 workstations, which need to be connected to the internet, but you
want to make sure the network is protected from future events.
Which solution should you implement to protect the network while also allowing
operations to continue as normal?
Answer
Create a dedicated network for the Windows 2000 workstations that's completely
isolated from the rest of the network, including a separate internet connection.
Install antivirus software on the Windows 2000 workstations and configure Windows
to automatically download and install updates.
Implement a host-based firewall on each Windows 2000 workstation and configure
Windows to automatically download and install updates.
Correct Answer:
Configure VLAN membership so that the Windows 2000 workstations are on their
own VLAN.
Explanation
The best solution is to place the Windows 2000 workstations in their own VLAN. If
you use VLAN network segmentation, the workstations will still have access to the
internet, but network access can be heavily restricted. This greatly reduces the
damage a workstation can cause if it were to become compromised again.
Legacy operating systems, such as Windows 2000, are easy targets for attackers.
This is because legacy operating systems use outdated protocols and have known
exploits.
Installing an antivirus or host-based firewall would do very little to protect the entire
network. In addition, legacy operating system are no longer supported with updates
or patches, so enabling automatic updates would offer no benefit.
Creating a dedicated network for the workstations would affect normal operations
and also increase network management load.
References
Cloud computing requires end user knowledge of the delivery system's physical
location and configuration.
Explanation
Cloud computing does not require end user knowledge of the delivery system's
physical location and configuration. Other cloud computing details include the
following:
• Cloud computing consists of software, data access, computation, and
storage services provided to clients through the internet.
• The term cloud is used as a synonym for the internet. This is based on the
basic cloud drawing used to represent the telephone network
infrastructure and the internet in computer network diagrams.
• Typical cloud computing providers deliver common business applications
online that are accessed from another web service or software, like a web
browser. The software and data are stored on servers.
References
Question 2:
Correct
Match each description on the left with the appropriate cloud technology on the right.
Public cloud
Explanation
References
Question 3:
Correct
You were recently hired by a small startup company. The company is in a small
office and has several remote employees.
You have been asked to find a business service that can both accommodate the
company's current size and scale as the company grows. The service needs to
provide adequate storage as well as additional computing power.
Which cloud service model should you use?
Answer
DaaS
Correct Answer:
IaaS
SaaS
PaaS
Explanation
References
Question 4:
Correct
Which of the following cloud computing solutions delivers software applications to a
client either over the internet or on a local area network?
Answer
DaaS
Correct Answer:
SaaS
PaaS
IaaS
Explanation
Software as a Service (SaaS) delivers software applications to the client either over
the internet or on a local area network.
Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as
processing, storage, networks, and virtualized environments. The client deploys and
runs software without purchasing servers, data center space, or network equipment.
Platform as a Service (PaaS) delivers everything a developer needs to build an
application on to the cloud infrastructure. The deployment comes without the cost
and complexity of buying and managing the underlying hardware and software
layers.
Data as a Service (DaaS) stores and provides data from a centralized location
without requiring local collection and storage.
References
Question 5:
Correct
Which of the following are benefits that a VPN provides? (Select two.)
Answer
Faster connection
Easy setup
Metering
Correct Answer:
Compatibility
Correct Answer:
Cost savings
Explanation
References
Question 6:
Correct
Which of the following provides a VPN gateway that encapsulates and encrypts
outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN
gateway at the target site?
Answer
SSL VPN
Explanation
Site-to-site IPsec VPNs connect networks across an untrusted network, such as the
internet. The VPN gateway encapsulates and encrypts outbound traffic from a site
and sends the traffic through a VPN tunnel to the VPN gateway at the target site.
Clients send and receive normal unencrypted TCP/IP traffic through a VPN gateway.
The receiving VPN gateway strips the headers, decrypts the content, and relays the
packet toward the target host inside its private network.
SSL VPNs use a PKI (public key infrastructure) and digital certificates to authenticate
peers.
GRE over IPsec (Generic Routing Encapsulation over IPsec) does not support
encryption.
Remote access VPNs let remote and mobile users connect to an organizational
network securely.
References
Question 7:
Correct
What is a VPN (virtual private network) primarily used for?
Answer
Correct Answer:
Support secure communications over an untrusted network.
Explanation
References
Question 8:
Correct
IPsec is implemented through two separate protocols. What are these protocols
called? (Select two.)
Answer
EPS
Correct Answer:
ESP
L2TP
SSL
Correct Answer:
AH
Explanation
IPsec is implemented through two separate protocols, which are called
Authentication Header (AH) and Encapsulating Security Payload (ESP). AH provides
authentication and non-repudiation services to verify that the sender is genuine and
that the data was not modified in transit. ESP provides data encryption services for
the data within the packet.
SSL and L2TP are not protocols associated with IPsec.
References
Question 9:
Correct
Which other service is IPsec composed of, in addition to AH?
Answer
Explanation
IPsec is composed of two services, which are called Authentication Header (AH) and
Encapsulating Security Payload (ESP). AH is primarily used for authenticating the
two communication partners in an IPsec link. ESP is primarily used to encrypt and
secure the data transferred between IPsec partners. IPsec employs ISAKMP
(Internet Security Association and Key Management Protocol) for encryption key
management.
References
Question 10:
Correct
Which of the following are IPsec modes of operation? (Select two.)
Answer
Correct Answer:
Transport mode
Single mode
Secure mode
Multimode
Correct Answer:
Tunnel mode
Explanation
Tunnel mode and transport mode are the two IPsec modes of operation.
Single mode and multimode are types of fiber optic network cable.
Secure mode is a wireless LAN setting.
References
Accessibility
Correct Answer:
Privacy
Availability
Correct Answer:
Hacking
Explanation
Hackers and privacy are two majors concerns for IoT users. Because IoT devices
are closely connected, all a hacker has to do is exploit one vulnerability to
manipulate all the data, rendering it unusable. Also, companies that make and
distribute consumer IoT devices could use those devices to obtain and sell users'
personal data.
References
Question 2:
Correct
You notice that a growing number of devices, such as environmental control systems
and wearable devices, are connecting to your network. These devices, known as
smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
Answer
Correct Answer:
Internet of Things (IoT)
Dynamic environment
The smartnet
Explanation
These smart devices are part of a growing ecosystem known as the Internet of
Things (IoT). Environments that contain these types of devices are known as static
environments. A static environment is one that never changes (or changes very
infrequently) and that a network administrator has very little control over. For
example, a smart television in an office has embedded technology that might never
be updated, which creates a security hole in the company's network.
References
Question 3:
Correct
Which of the following is considered part of a smart home?
Answer
Laptop
Telephone
Correct Answer:
Thermostat
TV
Explanation
The term smart home refers to a home with devices that can be controlled remotely
over the internet with a smartphone or computer. Thermostats can learn the
residents' daily routines and adjust the temperature of the home accordingly.
Items that typically connect to a video, audio, or data network as a core part of their
functionality are not considered part of a smart home.
References
Question 4:
Correct
Which of the following are examples of newer devices that are often automated
using IoT technology? (Select three.)
Answer
Headsets
Tablets
Correct Answer:
Home appliances
Correct Answer:
Streaming media devices
Correct Answer:
Security systems
Printers
Computer monitors
Explanation
Streaming media devices with IoT allow you to play content from a device, such as
your smartphone, to a speaker or TV as long as both are connected to the same
home network. Security systems, such as alarms and locks, can be accessed from
an app on your smartphone. Home appliances, such as refrigerators or washing
machines, can be accessed from an app on your smartphone as well.
Computer monitors are controlled by a computing device (such as a laptop or
desktop) and are an output device that's not normally associated with the IoT.
While headsets can be wirelessly connected to a device (such as a computer,
smartphone, or TV), they normally use Bluetooth instead of the IoT.
Tablets are mobile computing devices that normally use Wi-Fi technology to connect
to the internet and are not normally associated with IoT technology.
Printers can wirelessly connect to a home Wi-Fi network, but they are not normally
associated with IoT technology.
References
Question 5:
Correct
Match each smart device with its description.
Thermostat
Learns from your habits and schedule, allows you to control the climate in your
home remotely, shows you energy consumption in real time, and adjusts itself
depending on ambient conditions.
correct answer:
Switch
Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances,
and garbage disposals.
correct answer:
Bulb
Can change colors, track motion, stream audio over Bluetooth, and double as a
connected camera, but it's only smart when turned on. It doesn't work when turned
off.
correct answer:
Plug
Easy solution for making small appliances (such as lamps, coffee makers, and
toasters) smart.
correct answer:
Security camera
Uses voice recognition software and activates through a Wake Word or Hot Word.
correct answer:
Keyboard Instructions
Explanation
The following are smart IoT devices and their general characteristics:
• Thermostats learn from your habits and schedule, allow you to control the
climate in your home remotely, show you energy consumption in real time,
and adjust themselves depending on ambient conditions.
• Switches allow you to control hardwired lights, ceiling fans, fireplaces,
small appliances, and garbage disposals.
• Bulbs can change colors, track motion, stream audio over Bluetooth, and
double as a connected camera, but they're only smart when turned on.
They don't work when turned off.
• Plugs are easy solutions for making small appliances (such as lamps,
coffee makers, and toasters) smart.
• Security cameras use an RF transmitter. They may include such features
as motion detection, scheduled recording, remote viewing, and automatic
cloud storage.
• Door locks use a wireless protocol and a cryptographic key to execute the
authorization process. They can also monitor access and send alerts
related to the status of the device.
• Speakers and digital assistants use voice recognition software and
activate through a Wake Word or Hot Word.
References
Question 6:
Correct
Which frequencies does Zigbee operate on?
Answer
Explanation
Zigbee is a specification based on IEEE 802.15.4. The WPANs operate on 2.4 GHz,
900 MHz, and 868 MHz frequencies.
References
Question 7:
Correct
Anabel purchased a smart speaker. She connected it to all the smart devices in her
home. Which of the following communication models is she using?
Answer
Device-to-gateway
Device-to-cloud
Back-end data-sharing
Correct Answer:
Device-to-device
Explanation
References
Question 8:
Correct
What is the maximum number of nodes Z-Wave allows on its mesh network?
Answer
Correct Answer:
232
223
231
322
Explanation
References
• 8.6.3 Internet of Things Facts
q_iot_nodes_np6.question.fex
Question 9:
Correct
What are the two protocols used most often with IoT devices? (Select two.)
Answer
Correct Answer:
Zigbee
Correct Answer:
Z-Wave
Zerg
Zensys
Zbot
Explanation
Zigbee and Z-Wave are two radio protocols many IoT devices work with because
they are designed for low-data rate, low-power applications. They link all IoT devices
to form a mesh network.
References
Question 10:
Correct
What are the four primary systems of IoT technology?
Answer
Explanation
IoT technology comprises four primary systems: devices, gateway, data storage, and
remote control.
Sensors are hardware included in many IoT devices.
Apps are part of the remote control system.
The internet is part of the gateway and data storage systems.
References
Token passing
CSMA/CD
Correct Answer:
CSMA/CA
Polling
Explanation
802.11x standards for wireless networking all support the CSMA/CA (Carrier Sense
Multiple Access/Collision Avoidance) type of communication path-sharing
technology. This allows multiple baseband clients to share the same communication
medium. CSMA/CA works as follows:
1. The system asks for permission to transmit.
2. A designated authority (such as a hub, router, or access point), grants
access when the communication medium is free.
3. The system transmits data and waits for an ACK (acknowledgment).
4. If no ACK is received, the data is retransmitted.
Polling is a mechanism where one system is labeled as the primary system. The
primary system polls each secondary system in turn to inquire whether they have
data to transmit.
Token passing is a mechanism that uses a digital pass card. Only the system
holding the token is allowed to communicate.
CSMA/CD (Carrier Sense Multiple Access/Collision Detection) is the technology
used by Ethernet. CSMA/CD works as follows:
1. The system listens for traffic. If the line is clear, the system begins
transmitting.
2. During the transmission, the system listens for collisions.
3. If no collisions are detected, the communication succeeds. If collisions are
detected, an interrupt jam signal is broadcast to stop all transmissions.
Each system waits a random amount of time before starting over at step 1.
References
•
9.1.3 Wireless Architecture Facts
q_wireless_arch_csmaca_np6.question.fex
Question 2:
Correct
Match the wireless signaling method on the left with its definition on the right.
Transfers data over a radio signal by switching channels at random within a larger
frequency band.
FHSS
correct answer:
Makes the transmitted bandwidth signal wider than the data stream needs.
DSSS
correct answer:
Encodes data over a wireless network using non-overlapping channels.
OFDM
correct answer:
Keyboard Instructions
Explanation
References
Question 3:
Correct
Which of the following is true of a wireless network SSID?
Answer
Correct Answer:
Groups wireless devices together into the same logical network.
Explanation
The SSID, also called the network name, groups wireless devices together into the
same logical network.
• All devices on the same network (within the BSS and ESS) must have the
same SSID.
• The SSID is a 32-bit value that's inserted into each frame. The SSID is
case sensitive.
• The SSID is sometimes called the ESSID (extended service set ID) or the
BSSID (basic service set ID). In practice, each term means the same
thing. However, SSIDs, ESSIDs, and BSSIDs are technically different.
An access point (AP) is a device that coordinates all communication between
wireless devices.
The basic service set identifier (BSSID) is a 48-bit value that identifies an AP.
Wireless Distribution System (WDS) is a system that enables wireless
interconnection of multiple APs.
References
Question 4:
Correct
Which wireless networking component is used to connect multiple APs together?
Answer
IBSS
Correct Answer:
WDS
BSS
STA
Explanation
The Wireless Distribution System (WDS) is the backbone or LAN that connects
multiple APs (and BSSs) together.
An IBSS (independent basic service set) is a set of STAs configured in ad hoc mode.
A BSS, or cell, is the smallest unit of a wireless network.
An STA is a wireless NIC in an end device, such as a laptop or wireless PDA. The
term STA often refers to the device itself, not just the NIC.
References
Question 5:
Correct
Your organization uses an 802.11b wireless network. Recently, other tenants
installed the following equipment in your building:
• A wireless television distribution system running at 2.4 GHz.
• A wireless phone system running at 5.8 GHz.
• A wireless phone system running at 900 MHz.
• An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency
range.
• An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range.
Since this equipment was installed, your wireless network has been experiencing
significant interference. Which system is to blame?
Answer
Explanation
Because the 802.11b standard operates within the 2.4 GHz to 2.4835 GHz radio
frequency range, the most likely culprit is the wireless TV distribution system.
References
Question 6:
Correct
Which technologies are used by the 802.11ac standard to increase network
bandwidth? (Select two.)
Answer
Explanation
References
Question 7:
Correct
You are designing an update to your client's wireless network. The existing wireless
network uses 802.11b equipment, which your client complains runs too slowly. She
wants to upgrade the network to run up to 600 Mbps.
Due to budget constraints, your client wants to upgrade only the wireless access
points in the network this year. Next year, she will upgrade the wireless network
boards in her users' workstations. She has also indicated that the system must
continue to function during the transition period.
Which 802.11 standard will work BEST in this situation?
Answer
802.11d
Correct Answer:
802.11n
802.11c
802.11a
802.11b
Explanation
802.11n is the best choice for this client and provides up to 600 Mbps. With 802.11n,
you may have a single device that uses multiple radios (one that can operate at one
frequency and one that can operate on another). Because of this, 802.11n usually
allows compatibility between all 802.11 standards, depending on the specific
implementation.
While 802.11g is compatible with 802.11b, it only provides speeds up to 54 Mbps.
References
Question 8:
Correct
Which of the following are frequencies defined by 802.11 committees for wireless
networking? (Select two.)
Answer
900 MHz
1.9 GHz
Correct Answer:
2.4 GHz
Correct Answer:
5.75 GHz
10 GHz
Explanation
802.11 specifications for wireless include standards for operating in the 2.4 GHz
range (802.11b, 802.11g, and 802.11n) and the 5.75 GHz range (802.11a and dual-
band devices using 802.11n).
References
Question 9:
Correct
How many total channels (non-overlapping) are available for 802.11a wireless
networks?
Answer
3
11
12
Correct Answer:
24
54
Explanation
802.11a wireless uses the 5.75 GHz range, which has a total of 24 channels.
802.11b and 802.11g use the 2.4 GHz range, which has a total of 11 channels in the
US.
References
Question 10:
Correct
How many total channels are available for 802.11g wireless networks?
Answer
3
Correct Answer:
11
12
23
54
Explanation
802.11b and 802.11g use the 2.4 GHz range, which has a total of 11 channels in the
US.
802.11a wireless uses the 5.75 GHz range, which has a total of 23 channels.
References
Explanation
A beacon is a frame that the access point sends out periodically. The beacon
announces the access point and the network characteristics (such as the SSID,
supported speeds, and the signaling method used). To improve access times,
decrease the beacon interval.
As long as clients are configured with the SSID, they will be able to locate access
points even if the SSID is not broadcasting in the beacon. The beacon is still sent out
to announce the access point.
Adding the SSID to the beacon does not change how often the beacon is broadcast.
References
Question 2:
Correct
You are an administrator of a growing network. You notice that the network you've
created is broadcasting, but you can't ping systems on different segments. Which
device should you use to fix this issue?
Answer
Correct Answer:
Network bridge
Network hub
Access point
Range extender
Explanation
References
Question 3:
Correct
Which of the following wireless network protection methods prevents the wireless
network name from being broadcast?
Answer
802.1x
MAC filtering
Correct Answer:
SSID broadcast
Explanation
Wireless access points (WAPs) are transceivers that transmit and receive
information on a wireless network. Each access point has a service set ID (SSID)
that identifies the wireless network. By default, access points broadcast the SSID to
announce their presence and make it easier for clients to find and connect.
MAC address filtering identifies specific MAC addresses that are allowed to access
the wireless access point. Clients with unidentified MAC addresses are not allowed
to connect.
A shared secret key is used with shared key authentication. Users must know the
shared key to connect to the access point. A shared key is also used with WEP as
the encryption key.
802.1x authentication uses usernames and passwords, certificates, or devices such
as smart cards to authenticate wireless clients.
References
Question 4:
Correct
Which of the following features does WPA2 supply on a wireless network?
Answer
Network identification
Explanation
Wi-Fi Protected Access (WPA) provides encryption and user authentication for
wireless networks.
MAC address filtering allows or rejects client connections based on the hardware
address.
The SSID is the network name or identifier.
A wireless access point (WAP) is the central connection point for wireless clients.
References
Question 5:
Correct
Which network modes can typically be used for both 2.4 GHz and 5 GHz clients?
(Select two.)
Answer
802.11b only
802.11g only
Correct Answer:
802.11ax only
802-11a only
Correct Answer:
802.11n only
Explanation
The network mode you choose depends on the type of clients that will connect to
your network. 2.4 GHz and 5 GHz clients can both use 802.11n only and 802.11ax
only.
For the 5 GHz band, you typically select:
• Mixed (supports connections from 802.11a, 802.11n, or 802.11ax clients)
• 802-11a only
• 802.11n only
• 802.11ax only
• Disabled
For the 2.4 GHz band, you typically select:
• Mixed
• 802.11b/g only
• 802.11b only
• 802.11g only
• 802.11n only
• 802.11ax only
• Disabled
References
Question 6:
Correct
You have configured a wireless access point to create a small network. For security
reasons, you have disabled SSID broadcast.
From a client computer, you try to browse to find the access point. You see some
other wireless networks in the area, but cannot see your network.
What should you do?
Answer
Explanation
When SSID broadcast is turned off, you must manually configure a profile on the
client computer to identify the SSID. If you disable SSID broadcast, you must
statically configure wireless devices with the SSID before they can connect because
they will be unable to dynamically detect the SSID.
A beacon is a frame that the access point sends out periodically. When you turn off
SSID broadcast, you prevent the access point from including the SSID in the
beacon. On the client, the channel is typically detected automatically and is
configured to match the channel used by the access point. In this scenario, the
wireless card on the client is already enabled because you can see other wireless
networks in the area.
References
Question 7:
Correct
You want to connect a laptop computer running Windows to a wireless network.
The wireless network uses multiple access points and WPA2-Personal. You want to
use the strongest authentication and encryption possible. SSID broadcast has been
disabled.
What should you do?
Answer
Explanation
To connect to a wireless network using WPA2-Personal, you need to use a pre-
shared key for authentication. Advanced Encryption Standard (AES) encryption is
supported by WPA2 and is the strongest encryption method.
WPA and WPA2 designations that include Personal or PSK use a pre-shared key for
authentication.
Methods that include Enterprise use a RADIUS server for authentication and 802.1x
authentication with usernames and passwords.
References
Question 8:
Correct
You need to configure a wireless network. You want to use WPA2 Enterprise. Which
of the following components should be part of your design? (Select two.)
Answer
Open authentication
Pre-shared keys
WEP encryption
Correct Answer:
802.1x
TKIP encryption
Correct Answer:
AES encryption
Explanation
References
Question 9:
Correct
You need to add security for your wireless network. You would like to use the most
secure method.
Which method should you implement?
Answer
WPA
WEP
Kerberos
Correct Answer:
WPA2
Explanation
Wi-Fi Protected Access 2 (WPA2) is currently the most secure wireless security
specification. WPA2 includes specifications for both encryption and authentication.
WPA was an earlier implementation of security specified by the 802.11i committee.
WEP was the original security method for wireless networks. WPA is more secure
than WEP but less secure than WPA2.
Kerberos is an authentication method, not a wireless security method.
References
Question 10:
Correct
You have a small wireless network that uses multiple access points. The network
uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access
points.
You want to connect a laptop computer to the wireless network. Which of the
following parameters do you need to configure on the laptop? (Select two.)
Answer
BSSID
Correct Answer:
Pre-shared key
Channel
AES encryption
Correct Answer:
TKIP encryption
Explanation
To connect to the wireless network using WPA, you need to use a pre-shared key
and TKIP encryption. A pre-shared key used with WPA is known as WPA-PSK or
WPA Personal.
WPA2 uses AES encryption. The channel is automatically detected by the client. The
basic service set identifier (BSSID) is a 48-bit value that identifies an AP in an
infrastructure network or an STP in an ad hoc network. The client automatically
reads the BSSID and uses it to keep track of APs as they roam between cells.
References
802.11g
802.11b
Correct Answer:
802.11n
802.11a
Explanation
References
Question 2:
Correct
Which of the following uses a 2.4 GHz ISM band, has fast transmission rates, and
has been used for applications like geocaching and health monitors?
Answer
Z-Wave
Correct Answer:
Ant+
802.11ac
NFC
Explanation
Ant+ is generally used to monitor sensor data. It uses a 2.4 GHz ISM band, has fast
transmission rates, and has been used for applications like geocaching and health
monitors.
The Z-Wave protocol is found in the home security and automation market and uses
only a mesh topology. Each attached device acts as a repeater and increases the
network strength. Z-Wave has a low data transfer rate.
NFC (Near Field Communication) is common with mobile pay solutions and
connections like Bluetooth, but NFC has to be within 10 cm or 4 inches from another
device to connect.
802.11ac is a wireless networking standard that offers high-speed data transfer.
References
Question 3:
Correct
You have been hired to design a wireless network for a SOHO environment. You are
currently in the process of gathering network requirements from management.
Which of the following questions should you ask? (Select three.)
Answer
Correct Answer:
Which type of data will be transmitted on the network?
Explanation
The first thing you do when designing a wireless network is gather network
requirements. Meet with all stakeholders and decision-makers to discuss the
implementations and gather detailed information. For example, you should:
• Identify the intended use of the wireless network.
• Identify the location of wireless service areas.
• Anticipate the number of wireless devices that need to be supported in
each area.
• Discuss future network needs so that you can plan for expansion.
• Discuss data encryption and network security requirements.
You should consider mounting points, interference, zoning and permit requirements,
and future construction during the network design phase. This happens after all
requirements have been gathered.
References
Question 4:
Correct
Which protocol is well known for its use in the home security and home automation
industry, uses a mesh topology, makes devices act as repeaters, and has a low data
transfer rate?
Answer
802.11ac
Correct Answer:
Z-Wave
Ant+
NFC
Explanation
The Z-Wave protocol is mostly found in the home security and automation market
and uses only a mesh topology. Each attached device acts as a repeater and
increases the network strength. Z-Wave has a low data transfer rate.
Ant+ uses a mesh topology. However, Ant+ is generally used to monitor sensor data.
NFC is common with mobile pay solutions and connections like Bluetooth, but NFC
has to be several inches from another device to connect.
802.11ac is a wireless networking standard that offers high-speed data transfer.
References
Question 5:
Correct
You have been hired to troubleshoot a wireless connectivity issue for two separate
networks located within a close proximity. Both networks use a WAP from the same
manufacturer, and all settings (with the exception of SSIDs) remain configured to
their defaults.
Which of the following might you suspect is the cause of the connectivity problems?
Answer
Explanation
Overlapping wireless networks should use different channels to ensure that they do
not conflict with each other. In this case, each WAP is using the default channel,
which by default, is the same for each one. The solution would be to configure
different channels for each access point.
To configure client connectivity, the wireless client and the access point must share
the same SSID, channel, and WEP encryption strength. In this case, the SSIDs were
changed for each station, so they are not the problem.
References
Question 6:
Correct
Match each wireless term or concept on the left with its associated description on the
right. Each term may be used more than once. (Not all descriptions have a matching
term.)
Compares the Wi-Fi signal level to the level of background radio signals.
Signal-to-noise ratio
correct answer:
Checks channel utilization and identifies sources of RF inference.
Spectrum analysis
correct answer:
Identifies how strong a radio signal is at the receiver.
Explanation
You should be familiar with the following wireless networking concepts and terms:
• Received signal level (RSL) identifies how strong a radio signal is at the
receiver. The closer you are to the transmitter, the stronger the RSL.
• Signal-to-noise ratio (SNR) compares the wireless signal level to the level
of background noise.
• A spectrum analysis checks channel utilization to identify sources of RF
inference at each location where you plan to deploy an access point.
References
Question 7:
Correct
Which of the following should you include in your site survey kit?
Answer
Correct Answer:
A tall ladder
A network bridge
A GPS
Mounting brackets
Explanation
References
Question 8:
Correct
You are concerned that wireless access points might have been deployed within
your organization without authorization.
What should you do? (Select two. Each response is a complete solution.)
Answer
Explanation
References
Question 9:
Correct
Which of the following purposes do wireless site surveys fulfill? (Select two.)
Answer
Correct Answer:
Identify the coverage area and preferred placement of access points.
Correct Answer:
Identify existing or potential sources of interference.
Identify the recommended 100 degree separation angle for alternating access points.
Explanation
Wireless site surveys provide layout and design parameters for access point
coverage and placement. Site surveys can also identify rogue access points and
other forms of interference that reduce security and prevent the proper operation of
authorized network devices.
You use radio frequency spectrum and protocol analyzers to conduct these surveys.
As part of bandwidth planning, you determine the amount of bandwidth required in
various locations.
References
Question 10:
Correct
Which of the following does an SNR higher than 1:1 indicate?
Answer
Correct Answer:
More signal than noise
No signal
No noise
Explanation
An SNR higher than 1:1 indicates more signal than noise, which is desirable.
References
Wireless mesh
Wireless router
Explanation
References
Question 2:
Correct
Which of the following functions does a consumer-grade access point combine into a
single device? (Select two.)
Answer
SSID
Correct Answer:
NAT
AES
Correct Answer:
WAP
WPA
Explanation
A consumer-grade access point combines many functions into a single device, such
as a wireless access point (WAP) and a NAT router.
The SSID is the name of the wireless network that is broadcast from an AP.
Wi-Fi Protected Access (WPA) is a security certification program that was developed
by the Wi-Fi Alliance to secure wireless signals between devices.
Advanced Encryption Standard (AES) uses 128-, 192-, and 256-bit key lengths to
encrypt and decrypt block-sized messages that are broadcast over a wireless
transmission.
References
Question 3:
Correct
Which of the following is a limitation of consumer-grade wireless equipment?
Answer
It makes the transmitted bandwidth signal wider than the data stream needs.
Explanation
References
Bridges
Backhauls
Correct Answer:
Controllers
Access points
Explanation
References
Question 5:
Correct
Which of the following can become a critical point of failure in a large wireless
network infrastructure?
Answer
Access point
Correct Answer:
Controller
Backhaul
Wireless bridge
Explanation
In a large wireless network infrastructure all data must pass through the controller.
As such, the controller becomes a critical point of failure. If the controller goes down,
the entire wireless network will cease to function even if the access points remain
functional.
Wireless bridges are used to connect wired or wireless networks together.
Wireless access points are transceivers that transmit and receive information on a
wireless network.
The link between the access points and the wired network is called the backhaul.
The backhaul allows the wireless access points to communicate with the wired
clients and other wireless clients in a separate BSS (basic service set).
References
Question 6:
Correct
Which of the following enterprise wireless deployment models uses access points
with enough intelligence to allow the creation of guest WLANs for keeping public
wireless traffic separate from private traffic?
Answer
Hub-and-spoke infrastructure
Correct Answer:
Distributed wireless mesh infrastructure
Explanation
References
Question 7:
Correct
Which of the following is a configuration in which a wireless controller is connected to
all APs through a wired link?
Answer
Bridges
Independent APs
Correct Answer:
Hub and spoke
Mesh infrastructure
Explanation
References
Question 8:
Correct
Which of the following BEST describes roaming?
Answer
Correct Answer:
The ability to broadcast the same SSID across multiple APs.
Explanation
Roaming is the ability to broadcast the same SSID across multiple APs. This allows
a wireless device to stay on the same network without interruption while moving from
one AP to another.
The SSID is the name of the wireless network that is broadcast from an AP.
A wireless bridge is a model that connects wired and/or wireless networks.
Distributed wireless mesh infrastructure is a deployment model used by newer
wireless networks.
References
Question 9:
Correct
Your manager has asked you to set up four independent APs and configure them
with the same SSID, channel, and IP subnet. What should you enable to accomplish
this?
Answer
Channel bonding
A spectrum analyzer
Explanation
In order to enable roaming from one AP to another, the APs must be individually set
up and share the same SSID, channel, and IP subnet.
A spectrum analyzer is a device that displays signal amplitude (strength) as it varies
by signal frequency. The frequency appears on the horizontal axis, and the
amplitude is displayed on the vertical axis.
Channel bonding is used to combine more channels in the 5 GHz band, allowing up
to 160-MHz wide channels.
A basic service set (BSS) is a wireless network that uses only one AP for all devices
to communicate with each other.
References
Question 10:
Correct
Match the wireless networking term or concept on the left with its appropriate
description on the right. (Each term may be used once, more than once, or not at
all.)
Moving a wireless device between access points within the same wireless network.
Roaming
correct answer:
Used by Cisco wireless equipment to route frames back and forth between the
wireless network and the wired LAN.
LWAPP
correct answer:
Specifies the number of clients that can utilize the wireless network.
Device density
correct answer:
Automatically partitions a single broadcast domain into multiple VLANs.
VLAN pooling
correct answer:
Connects two wired networks over a Wi-Fi network.
Wireless bridge
correct answer:
The number of useful bits delivered from sender to receiver within a specified
amount of time.
Goodput
correct answer:
Keyboard Instructions
Explanation
You should be familiar with the following wireless networking terms and concepts:
• Device density specifies the number of clients that can utilize the wireless
network.
• Roaming is moving a wireless device between access points within the
same wireless network.
• Lightweight Access Point Protocol (LWAPP) is used by Cisco wireless
equipment to route frames back and forth between the wireless network
and the wired LAN.
• VLAN pooling automatically partitions a single broadcast domain into
multiple VLANs.
• A wireless bridge connects two wired networks over a Wi-Fi network.
• Goodput refers to the number of useful bits delivered from the sender to
the receiver within a specified amount of time.
References
Session filtering
IP address filtering
Correct Answer:
MAC address filtering
Explanation
Both switches and wireless access points are Layer 2 devices, meaning they use the
MAC address to make forwarding decisions. Both devices typically include some
form of security that restricts access based on the MAC address.
Routers and firewalls operate at Layer 3 and can use the IP address or port number
for filtering decisions.
A circuit-level gateway is a firewall that can make forwarding decisions based on the
session information.
References
Question 2:
Correct
You want to implement 802.1x authentication on your wireless network. Where
would you configure the passwords that will be used for the authentication process?
Answer
Correct Answer:
On a RADIUS server.
Explanation
802.1x authentication uses usernames and passwords, certificates, or devices (such
as smart cards) to authenticate wireless clients. Authentication requests received by
the wireless access point are passed to a RADIUS server that validates the logon
credentials (such as the username and password).
If you're using pre-shared keys for authentication, configure the same key on the
wireless access point and each wireless device. You do need a CA to issue a
certificate to the RADIUS server. The certificate proves the RADIUS server's identity
and can be used to issue certificates to individual clients.
References
Question 3:
Correct
You're replacing a wired business network with an 802.11g wireless network. You
currently use Active Directory on the company network as your directory service. The
new wireless network has multiple wireless access points, and you want to use
WPA2 on the network. What should you do to configure the wireless network?
(Select two.)
Answer
Explanation
When you use wireless access points, configure an infrastructure network. Because
you have multiple access points and an existing directory service, you can centralize
authentication by installing a RADIUS server and using 802.1x authentication.
Use ad hoc mode when you need to configure a wireless connection between two
hosts.
Use open authentication with WEP or when you don't want to control access to the
wireless network.
When you can't use 802.1x, use shared secret authentication.
References
• 9.5.3 Wireless Security Facts
q_wireless_security_radius_04_np6.question.fex
Question 4:
Correct
Which of the following wireless security methods uses a common shared key that's
configured on the wireless access point and all wireless clients?
Answer
WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise
Explanation
You can use shared key authentication with WEP, WPA, and WPA2. Shared key
authentication with WPA and WPA2 is often called WPA Personal or WPA2
Personal.
WPA Enterprise and WPA2 Enterprise use 802.1x for authentication. 802.1x
authentication uses usernames and passwords, certificates, or devices (such as
smart cards) to authenticate wireless clients.
References
Question 5:
Correct
Which of the following features are supplied by WPA2 on a wireless network?
Answer
Wi-Fi Protected Access (WPA) provides encryption and user authentication for
wireless networks.
MAC address filtering allows or rejects client connections based on the hardware
address.
A wireless access point (called an AP or WAP) is the central connection point for
wireless clients.
A firewall allows or rejects packets based on packet characteristics (such as
address, port, or protocol type).
References
Question 6:
Correct
Which of the following provides security for wireless networks?
Answer
802.11a
Correct Answer:
WPA
WAP
CSMA/CD
Explanation
Wi-Fi Protected Access (WPA) provides encryption and user authentication for
wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA
is considered more secure than WEP.
A wireless access point (WAP) is a hardware device (like a switch) that provides
access to the wireless network.
802.11a is a wireless networking standard that defines the signal characteristics for
communicating on a wireless network.
CSMA/CD is a media access control method that controls when a device can
communicate on the network.
References
Explanation
A captive portal would be the best choice in this scenario. A captive portal requires
wireless network users to abide by certain conditions before they are allowed access
to the wireless network. For example, the captive portal could require them to:
• Agree to an Acceptable Use Policy
• Provide a PIN or password
• Pay for access to the wireless network
• View information or advertisements about the organization providing the
wireless network (such as an airport or hotel)
When a wireless device initially connects to the wireless network, all traffic to or from
that device is blocked until the user opens a browser and accesses the captive portal
web page. After the user provides the appropriate code, traffic is unblocked, and the
host can access the network normally.
MAC address filtering and 802.1x authentication would work from a technical
standpoint, but these would be completely unmanageable in a hotel scenario where
guests come and go every day. Using a pre-shared key would require a degree of
technical expertise on the part of the hotel guests. It could also become problematic
if the key were to be leaked, allowing non-guests to use the wireless network.
References
Explanation
Wireless access points are transceivers that transmit and receive information on a
wireless network. Each access point has a service set ID (SSID) that identifies the
wireless network. By default, access points broadcast the SSID to announce their
presence and make it easy for clients to find and connect to the wireless network.
Turn off SSID broadcast to keep a wireless 802.11x network from being
automatically discovered. When SSID broadcasting is turned off, users must know
the SSID to connect to the wireless network. This helps to prevent casual attackers
from connecting to the network, but any serious hacker with the right tools can still
connect.
Using authentication with WPA or WPA2 helps prevent attackers from connecting to
your wireless network, but this does not hide the network. Changing the default SSID
to a different value does not disable the SSID broadcast.
References
Question 9:
Correct
Which of the following locations creates the greatest amount of interference for a
wireless access point? (Select two.)
Answer
Near a geofence
Explanation
References
Question 10:
Correct
Your company security policy states that wireless networks are not to be used
because of the potential security risk they present.
One day you find that an employee has connected a wireless access point to the
network in his office.
Which type of security risk is this?
Answer
Physical security
Phishing
Social engineering
On-path attack
Correct Answer:
Rogue access point
Explanation
A rogue access point is an unauthorized access point added to a network or an
access point that's configured to mimic a valid access point. Example scenarios
include:
• An attacker or employee with access to the wired network installs a
wireless access point on a free port. The access port then provides a
method for remotely accessing the network.
• An attacker near a valid wireless access point installs an access point with
the same (or similar) SSID. The access point is configured to prompt for
credentials, allowing the attacker to steal those credentials or use them in
an on-path attack to connect to the valid wireless access point.
• An attacker configures a wireless access point in a public location and
then monitors the traffic of those who connect to the access point.
An on-path attack is used to intercept information passing between two
communication partners. A rogue access point might be used to initiate an on-path
attack, but in this case, the rogue access point was connected without malicious
intent.
Social engineering exploits human nature by convincing someone to reveal
information or perform an activity.
Phishing uses an email and a spoofed website to gain sensitive information.
References
The user needs a new IP address because she is working on a different floor.
The wireless network access point on the user's normal floor has failed.
The user has not yet rebooted her laptop computer while at her new location.
Correct Answer:
The user is out of the effective range of the wireless access point.
The user has not yet logged off and back on to the network while at her new location.
Explanation
Because the user is only experiencing intermittent problems, the most likely cause is
that she is out of the effective range of the wireless network access point.
All of the other answers listed would be appropriate if the user were unable to
connect to the network at all. However, as the user is experiencing only intermittent
problems, none of the other answers is likely to cure the problem.
References
Question 2:
Correct
A user on your network has been moved to another office down the hall. After the
move, she calls you complaining that she has only occasional network access
through her wireless connection. Which of the following is MOST likely the cause of
the problem?
Answer
The encryption level has been erroneously set back to the default setting.
Explanation
In this case, the user had no problems accessing the wireless access point until she
moved to the new office. In some cases, moving a system causes signal loss either
from the increased distance away from the WAP or from unexpected interference by
such things as concrete walls or steel doors. There are several ways to correct the
problem, including reducing the physical distance to the client, using a wireless
amplifier, upgrading the antennae on the wireless devices, or adding another WAP to
the infrastructure.
Because the client could previously access the WAP and still has occasional access,
it is likely that the move was the cause of the problem, not any other configuration
setting.
References
Question 3:
Correct
Your wireless network consists of multiple 802.11n access points that are configured
as follows:
• SSID (hidden): CorpNet
• Security: WPA2-PSK using AES
• Frequency: 5.75 GHz
• Bandwidth per channel: 40 MHz
Because of your facility's unique construction, there are many locations that do not
have a clear line of sight between network clients and access points. As a result,
radio signals are reflected along multiple paths before finally being received. The
result is distorted signals that interfere with each other.
What should you do?
Answer
Antenna diversity implements two or more radio antennae to improve the quality and
reliability of a wireless link. In environments where there is no clear line of sight
between transmitter and receiver, the radio signal is reflected along multiple paths
before finally being received. This can introduce phase shifts, time delays,
attenuation, and distortion that interfere with the antenna signal.
You can rectify the situation by implementing antenna diversity two ways:
• Spatial diversity, which uses multiple antennae that are physically
separated from one another.
• Pattern diversity, which uses two or more co-located antennae with
different radiation patterns.
Using a RADIUS authentication solution increases wireless network security, but it
doesn't address the issue of multipath interference. Reducing radio power could help
solve multipath interference issues in some situations, but it may make it worse in
others. This is also true of directional access points.
References
Question 4:
Correct
You are troubleshooting a wireless connectivity issue in a small office. You
determine that the 2.4GHz cordless phones used in the office are interfering with the
wireless network transmissions.
If the cordless phones are causing the interference, which of the following wireless
standards could the network be using? (Select two.)
Answer
Correct Answer:
Bluetooth
Infrared
802.11a
802.3a
Correct Answer:
802.11b
Explanation
Both the 802.11b and Bluetooth wireless standards use the 2.4 GHz RF range to
transmit data. Cordless phones that operate at the same frequency can cause
interference on the wireless network. Other devices, such as microwaves and
electrical devices, may also cause interference.
802.11a uses the 5 GHz radio frequency, so this would not be affected by the 2.4
GHz phones used in the office.
Infrared uses a light beam to connect computer and peripheral devices to create a
personal area network (PAN).
References
Question 5:
Correct
You are implementing a wireless network inside a local office. You require a wireless
link to connect a laptop in the administrator's office directly to a system in the sales
department. In the default configuration, the wireless AP uses a 360-dispersed RF
wave design. After installation, the signal between the two systems is weak, as many
obstacles interfere with it.
Which of the following strategies could you try to increase signal strength?
Answer
Correct Answer:
Replace the omni-directional antenna with a directional antenna.
Explanation
References
Multi-directional
Directional
Uni-directional
Explanation
References
Question 7:
Correct
You need to place a wireless access point in your two-story building while avoiding
interference. Which of the following is the best location for the access point?
Answer
Correct Answer:
On the top floor
Explanation
References
Question 8:
Correct
Which of the following recommendations should you follow when placing access
points to provide wireless access for users within your company building?
Answer
Explanation
References
• 9.6.4 Wireless Network Troubleshooting Facts
q_wireless_comm_trouble_placement_02_np6.question.fex
Question 9:
Correct
You have physically added a wireless access point to your network and installed a
wireless networking card in two laptops that run Windows. Neither laptop can find the
network, and you've come to the conclusion that you must manually configure the
wireless access point (WAP).
Which of the following values uniquely identifies the WAP?
Answer
WEP
Channel
Frequency
Correct Answer:
SSID
Explanation
The SSID (service set identifier) identifies the wireless network. All PCs and access
points in a LAN share the same SSID.
WEP (Wired Equivalent Privacy) adds a layer of security to the transmission, while
the channel identifies the frequency that the card and AP communicate on.
References
Question 10:
Correct
You have decided to conduct a business meeting at a local coffee shop. The coffee
shop you chose has a wireless hotspot for customers who want internet access.
You decide to check your email before the meeting begins. When you open the
browser, you cannot gain internet access. Other customers are using the internet
without problems. You're sure that your laptop's wireless adapter works because you
use a wireless connection at work.
What is the MOST likely cause of the problem?
Answer
An out-of-range WAP
Correct Answer:
A mismatched SSID
Explanation
You must configure a wireless client and access point to use the same SSID. In this
case, the client system was used on a different wireless network and may still be
using that network's SSID. To log onto this network, the system needs to use the
same SSID as the other customers in the coffee shop.
The problem is not with LAN protocols, as TCP/IP is the protocol used on the
internet. There are no other options.
The WAP is not out of range, as other clients are accessing it.
PPP (Point-to-Point Protocol) is not required to make an internet connection.
References
Modem
Proxy
IDS
Correct Answer:
CSU/DSU
Explanation
A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the
signal received from the WAN provider into a signal that can be used by equipment
at a customer's site. A CSU/DSU is composed of two separate devices.
•
The CSU terminates the digital signal and provides error correction and
line monitoring.
• The DSU converts the digital data into synchronous serial data for
connection to a router.
A modem converts digital signals to analog signals.
A proxy server is a type of firewall that can filter based on upper-layer data.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity.
References
•
10.1.2 WAN Concept Facts
q_wan_concepts_csu_dsu_02_np6.question.fex
Question 2:
Correct
Which of the following is the customer's responsibility to maintain?
Answer
Local loop
CO
Correct Answer:
CPE
PSE
Explanation
Customers are responsible for customer premises equipment (CPE), which is any
equipment at the customer's site.
WAN service providers are responsible for:
• Packet switching exchange (PSE) equipment inside the WAN cloud.
• Central office (CO) equipment that allows access to the PSE.
• Data circuit-terminating equipment (DCE) devices that switch data to the
WAN.
• Local loop wiring that connects the customer to the CO.
References
Question 3:
Correct
Which of the following describe the channels and data transfer rates used for ISDN
BRI? (Select two.)
Answer
Correct Answer:
Two B channels operating at 64 Kbps each.
Correct Answer:
One D channel operating at 16 Kbps.
Explanation
ISDN BRI (integrated services digital network basic rate interface) uses two B
channels operating at 64 Kbps each and one D channel operating at 16 Kbps. This
setup is often called 2B + 1D.
ISDN PRI (integrated services digital network primary rate interface) uses 23 B
channels (at 64 Kbps each) and one D channel (at 64 Kbps). It is also called 23B +
1D. In Europe, ISDN PRI uses an E1 line with thirty 64 Kbps B channels and one 64
Kbps D channel (up to 2.048 Mbps).
References
Question 4:
Correct
Which of the following technologies uses variable-length packets, adds labels to
packets as they enter the WAN cloud, and uses the labels to switch packets and
prioritize traffic?
Answer
SONET
ATM
ISDN
Correct Answer:
MPLS
Explanation
References
Question 5:
Correct
What is the speed of an OC-3 connection?
Answer
45 Mbps
622 Mbps
34 Mbps
Correct Answer:
155 Mbps
Explanation
Optical Carrier (OC) is used to specify the speed of fiber optic networks conforming
to the SONET standard. Common OC speeds are:
• OC-1 = 51.85 Mbps
• OC-3 = 155.52 Mbps
• OC-12 = 622.08 Mbps
• OC-24 = 1.244 Gbps
• OC-48 = 2.488 Gbps
• OC-192 = 9.952 Gbps
T3 is 44.736 Mbps.
E3 is 34.368 Mbps.
References
Question 6:
Correct
Which network type divides transmitted data into smaller pieces and allows multiple
communications on the network medium?
Answer
Correct Answer:
Packet-switched
Circuit-switched
Managed
Multiplexed
Explanation
A packet-switched network divides data into small units called packets. These
packets are routed by their destination addresses. In a packet-switched network,
multiple hosts can use the network medium at the same time. An Ethernet computer
network is an example of a packet-switched network.
A circuit-switched network uses a dedicated connection between sites.
A multiplexer joins several signals together before they're transmitted.
A managed device is a device that can receive instructions and can return responses
in a network.
References
Question 7:
Correct
When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is
managed by the routers at different sites?
Answer
Correct Answer:
Packets
Frames
Bits
Datagrams
Explanation
References
Question 8:
Correct
Which of the following describes the lines used in a local loop for dial-up telephone
access?
Answer
MPLS
Correct Answer:
POTS
SONET
J1
T1
Explanation
POTS stands for plain old telephone service. It is simply the wiring used for analog
phone systems. Existing wires use only one twisted pair. Analog signals are used
through the local loop, while the long-distance network typically uses digital signaling
over fiber optic.
T1 and J1 are designations that identify a WAN line's bandwidth.
SONET is a standard for networking over an optical medium. SONET is classified as
a transport protocol because it can carry other types of traffic, such as ATM,
Ethernet, and IP.
Most PSTN networks use SONET within the long-distance portion of the network.
MPLS is a WAN technology that adds labels to packets. Labels are used for
switching packets and data prioritization.
References
Question 9:
Correct
You are traveling throughout North America to many metropolitan and rural areas.
Which single form of internet connectivity provides the greatest potential connectivity
wherever you travel?
Answer
Broadband cable
DSL
ISDN
Correct Answer:
PSTN
Explanation
Network access using a modem over the telephone company network (PSTN) is not
the fastest method for internet connectivity. However, it has the advantage of being
available virtually anywhere that regular voice-grade communications are available.
Broadband cable is dependent on service offerings from the regional cable television
company, which does not have as great a presence as the telephone company. To
use broadband cable, the service must be added to the cable TV package.
DSL and ISDN are offered through the telephone company. However, they are not
available in all service areas. And even when available, they require that the
subscriber be within a certain proximity to the telephone company's equipment.
References
Question 10:
Correct
Which of the following correctly describes the T1 carrier system? (Select two.)
Answer
T1 lines use analog signaling between the customer premise unit and the ISP.
Correct Answer:
T1 lines use two pairs of copper wire.
Correct Answer:
A single T1 channel can transfer data at 64 Kbps.
Explanation
References
Dial-up
DSL
Correct Answer:
Cable modem
ISDN
Explanation
References
Question 2:
Correct
Which type of internet service uses the DOCSIS specification?
Answer
Correct Answer:
Coaxial cable
Fiber optic
The Data Over Cable Service Interface Specification (DOCSIS) defines coaxial cable
networking specifications. It is used by cable TV providers to provide internet access
over their existing coaxial cable infrastructure. DOCSIS specifies channel widths and
modulation techniques. It also defines the manner in which the core components of
the network communicate.
References
Question 3:
Correct
Which of the following internet connection technologies requires that the location be
within a limited distance of the telephone company's central office?
Answer
Satellite
Correct Answer:
DSL
Cable modem
Wireless
Explanation
There are several variations of the digital subscriber line (DSL) technology, which
are collectively referred to as xDSL. DSL works over existing telephone company
copper wires. It operates concurrently with regular voice-grade communications by
utilizing higher frequencies unused by voice transmissions. One of the
consequences of splitting the signal in this manner is that DSL must operate within a
fixed distance of the telephone company's network switching equipment.
A cable modem can be provided as a means of internet access from a cable
television company. It will work anywhere within the service area.
Satellite and wireless do not have the same distance limitations as either DSL or a
cable modem.
References
Question 4:
Correct
Which of the following describe the EDGE cellular technology? (Select two.)
Answer
Correct Answer:
Offers speeds of 400 to 1,000 Kbps.
Is an extension to 3G.
Correct Answer:
Is the first internet-compatible technology.
Uses MIMO.
Explanation
References
Question 5:
Correct
Which of the following technologies does GSM use to allow multiple connections on
the same frequency?
Answer
Multiple-input, multiple-output
Correct Answer:
Time-division multiple access
Explanation
GSM (Global System for Mobile Communications) uses time-division multiple access
(TDMA) to allow multiple connections on the same frequency.
GSM does not use code-division multiple access (CDMA), but it is the technology
used by most mobile service providers in the United States.
Multiple-input, multiple-output (MIMO) is a method for increasing data throughput
and link range.
Frequency-division multiplexing (FDMA) is used primarily for satellite
communications.
References
Question 6:
Correct
Which of the following cellular network types use MIMO to increase 3G data
throughput? (Select two.)
Answer
CDMA2000
Correct Answer:
HSPA+
EDGE
Correct Answer:
LTE
WiMAX
Explanation
Both HSPA+ and LTE are 3G extensions that use multiple-input, multiple-output
(MIMO) to increase bandwidth.
EDGE was an intermediary network between 2G and 3G networks. WiMAX is a 4G
specification that delivers high-speed internet service to large geographical areas.
CDMA2000 is a 3G technology that adds additional traffic channels to increase
bandwidth.
References
Question 7:
Correct
You are moving to an area where DSL will be available in the next six months. Which
method of internet connectivity should you implement until DSL is available if your
existing connectivity needs are minimal?
Answer
Correct Answer:
PSTN
Cable modem
ISDN
Satellite
Explanation
Dial-up networking using the public switched telephone network (PSTN) offers
sufficient network connectivity for a relatively minimal investment. You can use dial-
up with little hardware, setup, or connection costs.
The other modes of networking provide greater capability than you require and more
of an investment in equipment than is worthwhile for such a short period of time.
References
Question 8:
Correct
A healthcare organization provides mobile clinics throughout the world. Which
network technology should you select to transfer patients' statistical data to a central
database via the internet that ensures network connectivity for any clinic located
anywhere in the world, even remote areas?
Answer
ISDN
Cable modem
DSL
Correct Answer:
Satellite
Dial-up
Explanation
Satellite capability is available even in areas that do not have a local network
infrastructure. Satellite requires a local portable transmitter with an antenna directed
skyward to a satellite. Satellite service providers offer nearly 100% global network
coverage by maintaining a series of satellites circling the earth in geosynchronous
orbit.
Dial-up, ISDN, and cable modems require a local network infrastructure provided by
either the telephone company or cable television company.
References
Question 9:
Correct
Which of the following internet services provides equal upload and download
bandwidth?
Answer
VHDSL
Correct Answer:
SDSL
VDSL
ADSL
Explanation
Symmetrical DSL (SDSL) provides equal download and upload speeds. Depending
on the region, speeds are between 1.544 to 2.048 Mbps. Newer SHDSL provides
between 4.6 to 5.696 Mbps. The entire line is used for data, and simultaneous voice
and data is not supported. Splitters are not required because voice traffic does not
exist on the line.
Asymmetrical DSL (ADSL) and very high DSL (VDSL or VHDSL) provide different
download and upload speeds.
References
Question 10:
Correct
Which of the following forms of networking allows roaming within a limited area of
coverage, but can be limited by dead spots?
Answer
ISDN
DSL
Correct Answer:
Wireless
Dial-up
Explanation
Wireless networks all provide for roaming within a limited area of coverage, but can
be limited by dead spots.
The other forms of networking listed require a cable connection, and are not
designed to allow roaming while using the network connection.
References
Protects usernames.
Explanation
References
Question 2:
Correct
Which of the following authentication protocols transmits passwords in cleartext and
is considered too unsecure for modern networks?
Answer
Correct Answer:
PAP
EAP
RADIUS
CHAP
Explanation
References
Question 3:
Correct
What does a remote access server use for authorization?
Answer
Correct Answer:
Remote access policies
SLIP or PPP
CHAP or MS-CHAP
Explanation
Authorization is the process of identifying the resources that a user can access over
a remote access connection. Authorization is controlled through the use of network
policies (remote access policies) and access control lists (ACLs). Authorization can
restrict access based on:
• Time of day
• Type of connection (PPP or PPPoE, wired or wireless)
• Location of the resource (specific servers)
Authentication is the process of proving identity. Common protocols used for remote
access authentication include PAP, CHAP, MS-CHAP, or EAP.
Usernames and passwords are used during identification and authentication as
authentication credentials. SLIP and PPP are remote access connection protocols
that are used to establish and negotiate parameters for remote access.
References
Question 4:
Correct
What is the primary purpose of RADIUS?
Answer
Correct Answer:
Authenticate remote clients before access to the network is granted.
Explanation
References
Question 5:
Correct
Which of the following are methods for providing centralized authentication,
authorization, and accounting for remote access? (Select two.)
Answer
Correct Answer:
TACACS+
Correct Answer:
RADIUS
PKI
EAP
AAA
Explanation
Both RADIUS and TACACS+ are protocols used for centralized authentication,
authorization, and accounting with remote access. Remote access clients send
authentication credentials to remote access servers. Remote access servers are
configured as clients to the RADIUS or TACACS+ servers and forward the
authentication credentials to the servers. The servers maintain a database of users
and policies that control access for multiple remote access servers.
AAA stands for authentication, authorization, and accounting. AAA is a generic term
that describes the functions performed by RADIUS and TACACS+ servers.
A public key infrastructure (PKI) is a system of certificate authorities that issues
certificates. 802.1x is an authentication mechanism for controlling port access.
EAP is an authentication protocol that enables the use of customized authentication
methods.
References
Question 6:
Correct
Which of the following are differences between RADIUS and TACACS+?
Answer
RADIUS encrypts the entire packet contents, while TACACS+ only encrypts the
password.
Correct Answer:
RADIUS combines authentication and authorization into a single function, while
TACACS+ allows these services to be split between different servers.
Explanation
TACACS+ provides three protocols (one each for authentication, authorization, and
accounting). This allows each service to be provided by a different server. In
addition, TACACS+:
• Uses TCP.
• Encrypts the entire packet contents.
• Supports more protocol suites than RADIUS.
References
Question 7:
Correct
Which of the following are characteristics of TACACS+? (Select two.)
Answer
Correct Answer:
Allows three different servers (one each for authentication, authorization, and
accounting).
Correct Answer:
Uses TCP.
Uses UDP.
Allows two different servers (one for authentication and authorization and another for
accounting).
Explanation
References
• 10.3.3 Remote Access Facts
q_remote_access_tacacs_01_np6.question.fex
Question 8:
Correct
Which of the following is a characteristic of TACACS+?
Answer
Correct Answer:
Encrypts the entire packet, not just authentication packets.
Explanation
References
Question 9:
Correct
Which of the following ports does TACACS use?
Answer
22
Correct Answer:
49
50 and 51
3389
Explanation
Terminal Access Controller Access Control System (TACACS) uses port 49 for TCP
and UDP.
Secure Shell (SSH) uses port 22.
IPsec uses protocol numbers 50 and 51.
Remote Authentication Dial-In User Service (RADIUS) uses ports 1812 and 1813.
Remote Desktop Protocol (RDP) uses port 3389.
References
Question 10:
Correct
You often travel away from the office. While traveling, you would like to use a
modem on your laptop computer to connect directly to a server in your office to
access needed files.
You want the connection to be as secure as possible. Which type of connection do
you need?
Answer
Internet
Correct Answer:
Remote access
Intranet
Explanation
References
AH
SSL
Correct Answer:
ESP
AES
Explanation
Encapsulating Security Payload (ESP) protocol provides data encryption for IPSec
traffic.
Authentication Header (AH) provides message integrity through authentication,
verifying that data is received unaltered from the trusted destination. AH provides no
privacy and is often combined with ESP to achieve integrity and confidentiality.
Secure Sockets Layer (SSL) has long been used to secure traffic generated by IP
protocols such as HTTP, FTP, and email. SSL can also be used as a VPN solution,
typically in a remote access scenario.
Advanced Encryption Standard (AES) uses variable key length (128-, 192-, or 256-
bit keys) and is resistant to all known attacks. It is computationally more efficient than
3DES.
References
Question 2:
Correct
Which statement BEST describes IPsec when used in tunnel mode?
Answer
Packets are routed using the original headers, and only the payload is encrypted.
Correct Answer:
The entire data packet, including headers, is encapsulated.
Explanation
When using IPsec in tunnel mode, the entire data packet, including original headers,
is encapsulated. New encrypted packets are created with headers, indicating only
the endpoint addresses. Tunneling protects the identities of the communicating
parties and the original packet contents. Tunneling is frequently used to secure traffic
traveling across insecure public channels, such as the internet. IPsec in tunnel mode
is the most common configuration for gateway-to-gateway communications.
In transport mode, routing is performed using the original headers. Only the packet's
payload is encrypted. Transport mode is primarily used in direct host-to-host
communication outside of a dedicated IPsec gateway/firewall configuration.
References
Question 3:
Correct
Which of the following VPN protocols merged with the deprecated Point-to-Point
Tunneling Protocol (PPTP) to create L2TP?
Answer
IPsec
TLS
Correct Answer:
Layer 2 Forwarding
SSL
Explanation
Layer 2 Forwarding (L2F) is a VPN technology developed by Cisco that merged with
the deprecated Point-to-Point Tunneling Protocol (PPTP) to create L2TP.
Internet Protocol Security (IPsec) provides authentication and encryption and can be
used in conjunction with L2TP or by itself as a VPN solution. IPsec is still considered
very secure.
Secure Sockets Layer (SSL) has long been used to secure traffic generated by other
IP protocols, such as HTTP, FTP, and email. SSL can also be used as a VPN
solution, typically in a remote access scenario.
Transport Layer Security (TLS) works in a similar way to SSL, even though they are
not interoperable.
References
Question 4:
Correct
A group of salesmen in your organization would like to access your private network
through the internet while they are traveling. You want to control access to the
private network through a single server.
Which solution should you implement?
Answer
IPS
IDS
DMZ
RADIUS
Correct Answer:
VPN concentrator
Explanation
If you are using a remote access VPN, a server on the edge of a network (called a
VPN concentrator) is configured to accept VPN connections from individual hosts.
Hosts that are allowed to connect using the VPN connection are granted access to
resources on the VPN server or the private network.
A screened subnet is a buffer network that sits between a private network and an
untrusted network (such as the internet). A RADIUS server is used to centralize
authentication, authorization, and accounting for multiple remote access servers.
However, clients still connect to individual remote access servers.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. A passive IDS monitors, logs, and detects security
breaches, but it takes no action to stop or prevent the attack. An active IDS (also
called an intrusion protection system, or IPS) performs the functions of an IDS but
can also react when security breaches occur.
References
Question 5:
Correct
A salesperson in your organization spends most of her time traveling between
customer sites. After a customer visit, she must complete various managerial tasks,
such as updating your organization's order database.
Because she rarely comes back to the home office, she usually accesses the
network from her notebook computer using Wi-Fi access provided by hotels,
restaurants, and airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are
concerned that sensitive data could be exposed. To remedy this situation, you
decide to configure her notebook to use a VPN when accessing the home network
over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select
two.)
Answer
Correct Answer:
Configure the VPN connection to use IPsec.
Configure the browser to send HTTPS requests directly to the Wi-Fi network without
going through the VPN connection.
Correct Answer:
Configure the browser to send HTTPS requests through the VPN connection.
Explanation
References
SSL
IPsec
Correct Answer:
GRE
PPTP
Explanation
References
Question 7:
Correct
Which of the following Network layer protocols provides authentication and
encryption services for IP-based network traffic?
Answer
L2TP
TCP
SSL
Correct Answer:
IPsec
Explanation
IPsec is a security implementation that provides security for all other TCP/IP-based
protocols that operate above the Network layer. IPsec provides authentication
through a protocol called IPsec Authentication Header (AH) and encryption services
through a protocol called IPsec Encapsulating Security Payload (ESP)
Transmission Control Protocol (TCP) is a Transport layer connection-oriented
protocol that provides data transmission services. It is not a secure protocol and
relies on other measures, such as IPsec, to provide security.
Secure Sockets Layer (SSL) is an Application layer protocol that is designed to
secure network traffic from certain other protocols, such as HyperText Transfer
Protocol (HTTP) and Post Office Protocol version 3 (POP3). SSL does not provide
security for protocols lower in the TCP/IP protocol stack, such as TCP and UDP.
Layer 2 Tunneling Protocol (L2TP) is a protocol used to encapsulate Point-to-Point
Protocol (PPP) traffic.
References
Question 8:
Correct
Which of the following purposes is a VPN primarily used for?
Answer
Correct Answer:
Support secured communications over an untrusted network.
Explanation
References
Question 9:
Correct
Which VPN tunnel style routes only certain types of traffic?
Answer
Host-to-host
Site-to-site
Correct Answer:
Split
Full
Explanation
A VPN split tunnel routes only certain types of traffic, usually determined by
destination IP address, through the VPN tunnel. All other traffic is passed through
the normal internet connection.
A full VPN tunnel routes all of a user's network traffic through the VPN tunnel. This
can sometimes send unnecessary traffic.
A site-to-site VPN is a VPN implementation that uses routers on the edge of each
site.
A host-to-host VPN implementation allows an individual host connected to the
internet to establish a VPN connection to another host on the internet.
References
Question 10:
Correct
Which of the following statements about an SSL VPN are true? (Select two.)
Answer
Explanation
An SSL VPN uses SSL (Secure Sockets Layer) to secure communications. An SSL
VPN:
• Authenticates the server to the client using public key cryptography and
digital certificates.
• Encrypts the entire communication session.
• Uses port 443, which is already open on most firewalls.
IPsec uses pre-shared keys to provide authentication to other protocols. It also uses
HMAC (Hash-Based Message Authentication Code) to provide message integrity
checks.
The GRE tunneling protocol exclusively uses GRE (General Routing Encapsulation)
headers.
Layer 2 Tunneling Protocol (L2TP) uses port 500.
References
The calculation of how often bits are damaged in transit due to electromagnetic
interference.
The condition that occurs when a system is unable to keep up with the demands
placed on it.
The speed at which packets travel from source to destination and back.
Correct Answer:
The amount of data that can be transferred from one place to another in a specific
amount of time.
Explanation
Bandwidth is the amount of data that can be transferred from one place to another in
a specific amount of time.
Latency is the speed at which packets travel from source to destination and back.
Error rate is the calculation of how often bits are damaged in transit due to
electromagnetic interference (or other interference).
A bottleneck is the condition that occurs when a system is unable to keep up with the
demands placed on it.
References
Question 2:
Correct
Which of the following is a best practice when establishing a baseline?
Answer
Explanation
You should determine your baselines by analyzing network traffic. To get a true
picture of your network's activity, you want to collect data over a period of time. You
should monitor different times of day and different times of year (especially if your
organization has notoriously busy or slow periods). You can create baselines
manually, however, there are also tools you can purchase to collect more information
and to possibly create more accurate baselines, if you so choose.
References
•
11.1.2 Performance Metrics
•
11.4.1 Network Monitoring
•
11.4.4 Use Wireshark to Sniff Traffic
•
11.4.5 Monitor Utilization
•
11.4.6 Monitor Interface Statistics
•
11.4.9 Network Monitoring Facts
q_performance_metrics_baseline_np6.question.fex
Question 3:
Correct
Which of the following is the term for when a system is unable to keep up with the
demands placed on it?
Answer
Hard fault
Jitter
Latency
Correct Answer:
Bottleneck
Explanation
A bottleneck occurs when a system is unable to keep up with the demands placed
on it.
Latency, jitters, and hard faults are related to network and device metrics. They do
not occur when a system can't keep up with the demands placed on it.
References
•
11.1.2 Performance Metrics
q_performance_metrics_bottleneck_np6.question.fex
Question 4:
Correct
Which of the following is the term for a calculation of how often bits are damaged in
transit due to electromagnetic interference?
Answer
Bandwidth
Bottleneck
Latency
Correct Answer:
Error rate
Explanation
Error rate is a calculation of how often bits are damaged in transit due to
electromagnetic interference (or other interference).
Latency is the speed at which data packets travel from source to destination and
back.
A bottleneck is the condition that occurs when a system is unable to keep up with the
demands placed on it.
Bandwidth is the amount of data that could be transferred from one place to another
in a specific amount of time.
References
Question 5:
Correct
When packets arrive at their destination at different speeds, they sometimes arrive
out of order. What does this cause?
Answer
Dropped packets
Latency
Error rates
Correct Answer:
Jitter
Explanation
When packets arrive at their destination at different speeds, they sometimes arrive
out of order. This causes what's known as jitter.
Latency, dropped packets, and error rates are not caused by out-of-order packets.
References
Question 6:
Correct
What is the definition of latency?
Answer
Correct Answer:
The speed at which data packets travel from source to destination and back.
The percentage of time that a disk subsystem reads from and writes to a disk.
Explanation
Latency is the speed at which packets travel from source to destination and back.
Error rate is the calculation of how often bits are damaged in transit due to
electromagnetic interference (or other interference).
Bandwidth utilization is the percentage of available bandwidth being used.
Hard disk utilization is the percentage of time that a disk subsystem reads from and
writes to disk.
References
Question 7:
Correct
Your computer seems to be running slowly. In particular, you notice that the hard
drive activity light remains lit when you run multiple applications and switch between
open windows. This happens even though you aren't saving large files.
What should you do to troubleshoot the problem?
Answer
Use Reliability Monitor to monitor system reliability.
Correct Answer:
Use Resource Monitor to monitor memory utilization.
Explanation
In this scenario, you should use Resource Monitor to monitor memory utilization.
Most likely, you'll see that the physical RAM is being over-utilized. When physical
memory is low, the computer must swap data from memory to hard disk (to the
paging file) to make physical memory available for other applications. If you hear the
hard drive constantly operating as you work or if the hard drive light on the front of
the system case stays illuminated for long periods of time, it means that the
computer is constantly working to move data into and out of memory. The only long-
term solution is to add more physical RAM.
Monitoring disk activity with Resource Monitor or Task Manager won't reveal the true
source of the problem in this scenario (which is a shortage of physical RAM).
Reliability Monitor is not the appropriate tool to use in this scenario.
References
Question 8:
Correct
Which of the following is true about processor performance?
Answer
Processor utilization is the amount of time the processor spends on idle tasks.
Explanation
References
Question 9:
Correct
Which of the following could be to blame if your computer is regularly crashing or
restarting?
Answer
Explanation
References
Question 10:
Correct
Where can you check your CPU's temperature?
Answer
Task Manager
Correct Answer:
BIOS
Performance Manager
Device Manager
Explanation
You can check your CPU's temperature in the system BIOS, or you can use third-
party software to monitor and alert you to any extreme temperature spikes.
Although they're useful performance tools, Task Manager, Performance Manager,
and Device Manager can't be used to check your CPU's temperature.
References
GET
Correct Answer:
Inform
Walk
Alert
Explanation
References
Question 2:
Correct
What is the name of the computer that queries agents and gathers responses by
sending messages?
Answer
Trap
Agent
MIB
Correct Answer:
Manager
Explanation
References
•11.2.5 SNMP Facts
q_snmp_manager_np6.question.fex
Question 3:
Correct
Because of an unexplained slowdown on your network, you decide to install
monitoring software on several key network hosts to locate the problem. You will
then collect and analyze the data from a central network host.
Which protocol will the software use to detect the problem?
Answer
Correct Answer:
SNMP
IPX
UDP
TCP/IP
Explanation
References
Question 4:
Correct
What does SNMP use to identify a group of devices under the same administrative
control?
Answer
Correct Answer:
Community strings
OID
Passwords
Informs
Explanation
Agents and the manager are configured to communicate with each other using the
community strings. A community string identifies a group of devices under the same
administrative control. The community string is like a password because it limits
access to only authorized processes or queries. However, it's not a password; it's
simply a value configured on each device. Devices with different community names
are unable to send SNMP messages to each other.
Informs and OIDs (Object Identifiers) are SNMP components. However, they are not
used to identify a group of devices under the same administrative control.
References
Question 5:
Correct
Which of the following is true about a community string?
Answer
Devices with different community names are able to send SNMP messages to each
other.
Correct Answer:
A community string identifies devices under the same administrative control.
A string is a password.
Explanation
Agents and the manager are configured to communicate with each other using the
community strings. A community string identifies a group of devices under the same
administrative control. The community string is like a password because it limits
access to only authorized processes or queries. However, it's not a password; it's
simply a value configured on each device.
Devices with different community names are unable to send SNMP messages to
each other.
References
Question 6:
Correct
Which protocol uses traps to send notifications from network devices?
Answer
IGMP
ICMP
SMTP
Correct Answer:
SNMP
Explanation
References
Question 7:
Correct
When an event occurs, the agent logs details regarding the event. What is this event
called?
Answer
Correct Answer:
Trap
GET
OID
MIB
Explanation
A trap is an event configured on an agent. When the event occurs, the agent logs
details regarding the event.
GET, OIDs, and MIB are SNMP components, but they are not events.
References
Question 8:
Correct
You have been using SNMP on your network for monitoring and management, but
you're concerned about the security of this configuration. What should you do to
increase security in this situation?
Answer
Explanation
References
Question 9:
Correct
Which of the following improvements to SNMP are included in version 3? (Select
two.)
Answer
Explanation
SNMPv3 adds authentication for agents and managers, encryption, and message
integrity to ensure that data is not altered in transit.
SNMPv3 improvements do not include the use of SFTP for transferring SNMP data
or community name hashing.
SNMP does use UDP ports 161 and 162, but this was not one of the version 3
improvements.
References
Question 10:
Correct
Which SNMP component uses GETNEXT messages to navigate the MIB structure?
Answer
Inform
GET
Trap
Correct Answer:
Walk
Explanation
A walk uses GETNEXT messages to navigate the MIB structure.
GET, traps, and informs are all SNMP components, but they do not use GETNEXT
messages to navigate the MIB structure.
References
Firewall log
Network log
Security log
Explanation
You would choose the application log. Most applications produce some type of event
logging. These logs show application access, crashes, updates, and any other
relevant information that could be valuable in conducting a root cause analysis. The
application may be crashing or not performing correctly, and this could be tied to
suspicious activity that may indicate malicious intent.
Network logs tell you what is coming into and leaving your network.
A firewall log identifies traffic that has been allowed or denied through a firewall.
A security log records information related to logons, such as incorrect password
attempts and user right application.
References
Question 2:
Correct
You suspect that cache poisoning or spoofing has occurred on your network. Users
are complaining of strange web results and being redirected to undesirable sites.
Which log would help you determine what's going on?
Answer
Network logs
Correct Answer:
DNS logs
Application logs
Security logs
Explanation
In this scenario, you should take a look at the DNS logs for DNS cache poisoning.
After this, you can begin monitoring DNS query traffic.
Network logs do not help you with spoofed host name resolution.
Application logs do not help you determine DNS poisoning.
Security logs do little to help you identify spoofing.
References
Question 3:
Correct
You suspect that a bad video driver is causing a user's system to randomly crash
and reboot. Where would you go to identify and confirm your suspicions?
Answer
Application logs
SIP logs
Syslog
Correct Answer:
Dump files
Explanation
You would choose dump files. Dump files are created when an application, OS, or
other computer function stops abruptly. These files help IT admins perform root
cause analysis and can also give clues as to the crash's origin. This could be
something as commonplace as a bad driver or hardware component. Unfortunately,
though, it may prove to be the result of a malicious act.
Syslog is a protocol that defines how log messages are sent from one device to a
logging server on an IP network. The sending device sends a small text message to
the Syslog receiver (the logging server).
App logs show application access, crashes, updates, and any other relevant
information that could be valuable in doing root cause analysis.
Session Information Protocol (SIP) logs contain key information about where a
phone call was initiated and what the communication's intent was.
References
•11.3.5 Log File Management Facts
q_log_management_dump_np6.question.fex
Question 4:
Correct
Which Syslog severity level indicates a debugging message?
Answer
Correct Answer:
Level 7
Level 3
Level 1
Level 5
Explanation
References
Question 5:
Correct
Which Syslog level indicates an emergency that could severely impact the system
and cause it to become unusable?
Answer
Level 4
Level 6
Level 2
Correct Answer:
Level 0
Explanation
Level 0 indicates an emergency that could severely impact the system and cause it
to become unusable.
Level 2 indicates a serious errors in secondary subsystem that should be addressed
immediately.
<="" away.="" right="" addressed="" be="" should="" that="" condition="" critical=""
a="" indicates="" 2="" style="margin: 0px;">
Level 4 indicates a warning that could eventually become a problem if not
addressed.
Level 6 indicates an informational message.
References
Question 6:
Correct
Which of the following is a standard for sending log messages to a central logging
server?
Answer
LC4
Nmap
OVAL
Correct Answer:
Syslog
Explanation
Syslog is a protocol that defines how log messages are sent from one device to a
logging server on an IP network. The sending device sends a small text message to
the Syslog receiver (the logging server).
The Open Vulnerability and Assessment Language (OVAL) is an international
standard for testing, analyzing, and reporting a system's security vulnerabilities.
LC4 (previously called LOphtcrack) is a password cracking tool.
Nmap is a network mapping tool that performs ping and port scans.
References
Question 7:
Correct
You are concerned that an attacker can gain access to your web server, make
modifications to the system, and alter the log files to hide his or her actions. Which of
the following actions would BEST protect the log files?
Answer
Explanation
The best protection is to save log files to a remote server. In this way, system
compromise does not provide access to that system's log files.
Configuring permissions on the log files would allow access for only specified user
accounts. However, if an attacker has gained access to the system, he or she might
also have access to the user accounts that've been given access to the log files.
Encrypting the log files protects the contents from being read, but this does not
prevent the files from being deleted.
Hashing the log files ensures their integrity and that they have not been altered since
they were created.
References
Question 8:
Correct
You are the network administrator for a growing business. When you were hired, the
organization was small, and only a single switch and router were required to support
your users. During this time, you monitored log messages from your router and
switch directly from each device's console.
The organization has grown considerably in recent months. Now you manage eight
individual switches and three routers. It's becoming more and more difficult to
monitor these devices and stay on top of issues in a timely manner.
What should you do?
Answer
Hire additional resources to help monitor and manage your network infrastructure.
Use a remote access utility, such as SSH, to access router and switch consoles
remotely.
Correct Answer:
Use Syslog to implement centralized logging.
Explanation
References
Question 9:
Correct
Over the past few days, a server has gone offline and rebooted automatically several
times. You would like to see a record of when each of these restarts occurred.
Which log type should you check?
Answer
Firewall
Performance
Correct Answer:
System
Security
Explanation
A system log records operating system, system, and hardware events. The system
log contains entries for when the system was shut down or restarted, when new
hardware was added, and when new services were installed as well.
A performance log records information about system resources, such as processor,
memory, disk, or network utilization.
A firewall log identifies traffic that has been allowed or denied through a firewall.
A security log records information related to logons, such as incorrect passwords
and user right usage.
References
Question 10:
Correct
Which log file type is one of the most tedious to parse but can tell you exactly when a
user logged onto your site and what their location was?
Answer
System logs
Application logs
Correct Answer:
Web server logs
Authentication logs
Explanation
Web server logs are some of the most tedious of all logs to parse. However, these
logs can tell you exactly when a user logged onto your site and what their location
was.
Authentication logs are vital to a network's security. Authentication servers may be
Active Directory-based or OpenLDAP depending on your network structure.
System logs are produced by the operating system.
Application logs show application access, crashes, updates, and any other relevant
information that could be valuable in doing root cause analysis.
References
TDR
Certifier
Multimeter
Toner probe
Explanation
Use a protocol analyzer (also called a packet sniffer) to examine network traffic. You
can capture or filter packets from a specific device or packets that use a specific
protocol.
Use a time-domain reflector (TDR) to measure a cable's length or to identify the
location of a fault in the cable.
A toner probe is two devices used together to trace the end of a wire from a known
endpoint to the termination point in the wiring closet.
A cable certifier is a multi-function tool that verifies that a cable or an installation
meets the requirements for a specific architectural implementation.
A multimeter is a device that tests various electrical properties, such as voltage,
amps, and ohms.
References
Question 2:
Correct
Which of the following conditions can low humidity result in?
Answer
Condensation
Cold air
Warm air
Correct Answer:
Electrostatic discharge
Explanation
References
•
11.4.9 Network Monitoring Facts
q_network_monitoring_electrostatic_np6.question.fex
Question 3:
Correct
You are using a protocol analyzer to capture network traffic. You want to only
capture the frames coming from a specific IP address.
Which of the following can you use to simplify this process?
Answer
Display filters
NIC
Correct Answer:
Capture filters
Switch
Explanation
A capture filter records only the frames that the filter identified. Frames that don't
match the filter criteria aren't captured.
A switch connects multiple computers together in a network. It's not used to capture
specific frames.
A network interface card (NIC) is used to transmit and receive frames addressed to
it. It's not used to capture specific frames.
A display filter shows only the frames that match the filter criteria. Frames that don't
match the filter criteria are still captured but not shown.
References
Question 4:
Correct
Most equipment is cooled by bringing cold air in the front and ducting the heat out
the back. What is the term for where heat is sent?
Answer
Front aisle
Cold aisle
Correct Answer:
Hot aisle
Back aisle
Explanation
The hot aisle is where heat is sent from the servers and network equipment to be
transmitted to the HVAC return vent.
The cold aisle is where the chilled air is sent so that the equipment can duct it
through to cool the devices.
Neither front nor back aisle is the correct term used in environmental controls.
References
Question 5:
Correct
You decide to use a packet sniffer to identify the type of traffic sent to a router. You
run the packet sniffing software on a device that's connected to a hub with three
other computers. The hub is connected to a switch that's connected to the router.
When you run the software, you see frames addressed to the four workstations but
not to the router.
Which feature should you configure on the switch?
Answer
Promiscuous mode
Bonding
Correct Answer:
Port mirroring
Explanation
A switch only forwards packets to the switch port that holds a destination device.
This means that when your packet sniffer is connected to a switch port, it does not
see traffic sent to other switch ports. To configure the switch to send all frames to the
packet sniffing device, configure port mirroring on the switch. With port mirroring, all
frames sent to all other switch ports are forwarded on the mirrored port.
Promiscuous mode configures a network adapter to process every frame it sees, not
just the frames addressed to that network adapter. In this scenario, you know that
the packet sniffer is running in promiscuous mode because it can already see frames
sent to other devices.
Bonding logically groups two or more network adapters together to be used at the
same time for a single logical network connection.
Spanning Tree Protocol (STP) runs on a switch and ensures that there is only one
active path between switches, allowing for backup-redundant paths.
References
Question 6:
Correct
You want to know which protocols are being used on your network. You'd like to
monitor network traffic and sort traffic by protocol.
Which tool should you use?
Answer
Correct Answer:
Packet sniffer
Throughput tester
IDS
Port scanner
IPS
Explanation
A packet sniffer is special software that captures (records) frames that are
transmitted on a network. Use a packet sniffer to:
• Identify the types of traffic on a network.
• View the exchange of packets between communicating devices. For
example, you can capture frames related to the Domain Name System
(DNS) and view the exact exchange of packets for a specific name
resolution request.
• Analyze packets sent to and from a specific device.
• View packet contents.
Use a port scanner to identify protocol ports that are open on a firewall or active on a
device. A port scanner checks individual systems, while a packet sniffer watches
network traffic. A throughput tester measures the amount of data that can be
transferred through a network or processed by a device (such as the amount of data
that can be retrieved from a disk in a specific period of time).
An IDS is a special network device that can detect attacks and suspicious activity. A
passive IDS monitors, logs, and detects security breaches, but it takes no action to
stop or prevent the attack. An active IDS (also called an intrusion protection system,
or IPS) performs the functions of an IDS, but it can also react when security
breaches occur.
References
Question 7:
Correct
Which deviation in power is the longest?
Answer
Surge
Transient
Sag
Correct Answer:
Blackout
Explanation
A blackout is generally a longer power outage. The rest of the events are relatively
short durations of less than a few seconds.
References
Question 8:
Correct
You maintain the network for an industrial manufacturing company. A short-circuit of
a switch in the server room starts an electrical fire.
Which of the following should you use to suppress the fire?
Answer
Dry powders
Correct Answer:
Halon or CO2
CO2 or FM200
Explanation
References
• 11.4.11 Environmental Monitoring Facts
q_environment_monitoring_positive_np6.question.fex
Question 9:
Correct
Your 24U rack currently houses two 4U server systems. To prevent overheating,
you've installed a rack-mounted environmental monitoring device within the rack.
Currently, the device shows that the temperature within the rack is 70 degrees
Fahrenheit (21 degrees Celsius).
What should you do?
Answer
Correct Answer:
Nothing, the temperature within the rack is within acceptable limits.
Reorient the cold aisle within the server room so that it is directed toward the air
conditioner's return duct.
Explanation
The ideal temperature for computing equipment is around 68 degrees Fahrenheit (20
degrees Celsius). Therefore, a reading of 70 degrees Fahrenheit (21 degrees
Celsius) within a server rack is not an issue of concern.
Under the current environmental conditions, installing an additional air conditioning
unit isn't necessary and would be very expensive.
Installing a humidifier in the server room would have no effect on the temperature
within the room and is not warranted given the scenario.
Reorienting the cold aisle within the server room so that it's directed toward the air
conditioner's return duct would likely cause the temperature within the server room to
increase.
References
Question 10:
Correct
Which of the following ensures that power is supplied to a server or device during
short power outages?
Answer
Line conditioner
Correct Answer:
Uninterruptible power supply
Backup generator
Surge protector
Explanation
An uninterruptible power supply (UPS) provides continuous power using batteries for
a short period of time. Often, it is paired with a backup generator that can provide
power over a longer time period.
Although a UPS often contains both surge protection and line conditioning, neither
can maintain power during an outage.
References
Company assets
Explanation
Business processes are the primary focus of the scope within business continuity
planning (BCP).
Company assets are the focus of risk assessment for security policy development,
not BCP.
Human life and safety are considerations for emergency response, not BCP.
Recovery time objective is a consideration of emergency response development, not
BCP.
References
Question 2:
Correct
You plan to implement a new security device on your network. Which of the following
policies outlines the process you should follow before you implement that device?
Answer
Acceptable Use
Resource Allocation
Explanation
References
Question 3:
Correct
Which of the following pieces of information are you MOST likely to find in a policy
document?
Answer
Correct Answer:
A requirement for using encrypted communications for web transactions
Explanation
A policy is a document that describes the overall goals and requirements for a
network. A policy identifies what should be done, but it doesn't necessarily define
how the goal is to be reached. In this question, a policy might contain a requirement
that encrypted communications are required for web transactions. The policy does
not state the method that will be deployed, just that encryption is a requirement.
The type of encryption to be used, along with the process for implementing it, would
be included in a procedure document. A procedure is a step-by-step process
outlining how to implement a specific action. As another example, a procedure
document might include steps for completing and validating nightly backups.
You might find the IP address for a device's interface in the configuration
documentation or a network diagram. A baseline is a snapshot of the performance
statistics for your network and devices. A baseline would include a router's average
performance information.
References
Question 4:
Correct
Which of the following information are you MOST likely to find in a procedure
document?
Answer
Explanation
References
Question 5:
Correct
Which of the following is a contract in which both parties agree not to share
proprietary or confidential information gathered during the business relationship?
Answer
Correct Answer:
Non-Disclosure Agreement
Non-Compete Agreement
Memorandum of Understanding
Explanation
References
Question 6:
Correct
Which of the following defines an Acceptable Use Agreement?
Answer
Correct Answer:
An agreement that identifies the employees' rights to use company property, such as
internet access and computer equipment, for personal use.
A legal contract between the organization and the employee that specifies that the
employee is not to disclose the organization's confidential information.
Explanation
References
Question 7:
Correct
You want to make sure that the correct ports on a firewall are open or closed. Which
document should you check?
Answer
Correct Answer:
Baseline configurations
Wiring schematic
Explanation
References
Question 8:
Correct
Which of the following provides a layout of all electrical, plumbing, HVAC, and
networking wiring and components?
Answer
Network diagram
Wiring diagram
Rack diagram
Correct Answer:
Floor plan
Explanation
A floor plan provides a layout of all electrical, plumbing, HVAC, and networking
wiring and components.
A rack diagram, network diagram, and wiring diagram provide layouts for networking
infrastructure, but they do not include electrical, plumbing, and HVAC information.
References
Question 9:
Correct
Which of the following provides information on the subnets within your network,
including the subnet addresses and the routers connecting each subnet?
Answer
Floor plan
Correct Answer:
Network diagram
Wiring diagram
Rack diagram
Explanation
A network diagram includes a layout of the subnets within your network, including
the subnet addresses and the routers connecting each subnet.
A wiring diagram, rack diagram, and floor plan provide information about your
physical network, but they do not include subnet information.
References
Question 10:
Correct
Which type of documentation would you consult to find the location of RJ45 wall
jacks and their endpoints in the intermediate distribution closet?
Answer
Baseline
Correct Answer:
Wiring schematic
Procedure
Policy
Explanation
References
•
3.6.8 Data Center Device Installation
•
3.6.9 Data Center Device Installation Facts
•
11.5.5 Documentation and Agreements
•
11.5.6 Documentation and Agreements Facts
q_docs_agreements_wiring_01_np6.question_xml.question.fex
You manage your company's website, which uses a cluster of two servers with a
single shared storage device. The shared storage device uses a RAID 1
configuration. Each server has a single connection to the shared storage and a
single connection to your ISP.
You want to provide redundancy so that a failure on a single component doesn't
cause the website to become unavailable. What should you add to your configuration
to accomplish this?
Answer
On each server, add a second network connection to connect the server to the
shared storage device.
Correct Answer:
Connect one server to the internet through a different ISP.
Explanation
In this scenario, the ISP is the single point of failure. If the ISP connection goes
down, the website will be unavailable. Connecting one server to a different ISP or
both servers to two ISPs provides redundancy for the connection.
Adding multiple network connections to the shared storage or the same ISP is
unnecessary because if the single network connection on one server fails, the other
server will still be available. Reconfiguring the storage as a RAID 1+0 allows multiple
disk failures, but RAID 1 can sustain a failure on a single disk.
References
Question 2:
Correct
Why should you store backup media off site?
Answer
Explanation
Backup media should be stored off site to prevent the same disaster from affecting
the network and the backup media. If your primary facility is destroyed, your only
hope of recovery is off site data storage.
Off site storage does not significantly reduce the possibility of media theft because it
can be stolen while in transit or at your storage location.
Off site storage is not a government regulation.
Off site storage does not make the restoration process more efficient because
additional time is spent retrieving backup media from the offsite storage location.
References
Question 3:
Correct
In addition to performing regular backups, what must you do to protect your system
from data loss?
Answer
Correct Answer:
Regularly test restoration procedures.
Explanation
The only way to ensure that you have protection against data loss is to regularly test
your restoration procedures. This activity reveals whether or not your backup
process functions properly and your restoration and recovery procedures are
accurate.
It's a good idea to store backup media in a fireproof vault, but it's a better idea to
store it off site.
You should restrict restoration privileges to trusted staff to prevent confidentiality
violations. However, this does not address the issue of data loss protection.
Write-protecting backup media provides little real security for the stored data
because anyone can flip the switch on the media to remove the protection.
References
Question 4:
Correct
You have purchased a solar backup power device to provide temporary electrical
power to critical systems in your data center should the power provided by the
electrical utility company go out. The solar panel array captures sunlight, converts it
into direct current (DC), and stores it in large batteries.
The power supplies on the servers, switches, and routers in your data center require
alternating current (AC) to operate.
Which electrical device should you implement to convert the DC power stored in the
batteries into AC power that can be used in the data center?
Answer
Correct Answer:
Inverter
Capacitor
Transformer
Transistor
Explanation
A power inverter changes direct current (DC) power to alternating current (AC)
power. In this scenario, you can use a power inverter to convert the DC power stored
in the batteries to AC power that your servers, switches, and routers can use in an
emergency.
A transformer is typically used to increase or decrease AC power voltage.
A capacitor temporarily stores an electrical charge. Capacitors are used with the
chips on a computer memory module that store data.
A transistor is used to amplify and switch electrical signals.
References
Question 5:
Correct
Which of the following is the least effective power loss protection for computer
systems?
Answer
Explanation
References
Question 6:
Correct
You are adding a new rack to your data center, which will house two new blade
servers and a new switch. The new servers will be used for virtualization.
The only space you have available in the data center is on the opposite side of the
room from your existing rack, which already houses several servers, a switch, and a
router. You plan to configure a trunk port on each switch and connect them with a
straight-through UTP cable that will run across the floor of the data center.
To protect equipment from power failures, you also plan to install a UPS on the rack
along with redundant power supplies for the server.
Will this configuration work?
Answer
No, you must use a cross-over cable to connect the two switches together.
No, you must implement the UPS and power supplies on the rack externally.
In this scenario, running a cable across the data center floor represents a tripping
hazard. It also represents a point of failure, as the cable will be walked on constantly,
resulting in it being kicked out of one or both jacks. It will also likely fail prematurely
due to the excessive wear. A better option would be to run the cable through the
ceiling plenum.
Blade servers work well for virtualization as long as they meet the system
requirements for the hypervisor software. In the early days of networking, crossover
cables were required to uplink two hubs or switches together. However, most
modern switches implement auto-MDIX, which detects whether crossover is required
and automatically configures the interface for you, making a crossover cable
unnecessary. Rack-mounted power supplies and UPS devices are commonly used
in data centers.
References
Question 7:
Correct
You are adding a new rack to your data center, which will house two new blade
servers and a new switch. The new servers will be used for file storage and a
database server.
The only space you have available in the data center is on the opposite side of the
room from your existing rack, which already houses several servers, a switch, and a
router. You plan to configure a trunk port on each switch and connect them with a
crossover UTP plenum cable that will run through the suspended tile ceiling in the
data center.
To provide power for the new devices, you had an electrician install several new 20-
amp wall outlets near the new rack. Each device on the rack will be plugged directly
into one of these new wall outlets.
What is wrong with this configuration? (Select two.)
Answer
Correct Answer:
You should implement redundant power supplies for the network devices.
Correct Answer:
You should implement a UPS between the wall outlet and the network devices.
You must use a straight-through cable to connect the two switches together.
You should not run a plenum cable through a suspended tile ceiling.
Explanation
In this scenario, all the devices on the new rack will go down if the power from the
wall outlet fails for some reason (such as a power outage). To prevent this from
happening, you should implement a UPS between the wall outlets and the network
devices. In addition, the power supplies used by computing equipment have finite life
spans and fail frequently. Because these are mission-critical devices, you should
consider implementing redundant power supplies.
Plenum network cabling is specifically designed to run through a suspended tile
ceiling. The space between the suspended tile and the physical ceiling is called a
ceiling plenum.
In the early days of networking, crossover cables were required to uplink two hubs or
switches together. However, most modern switches implement auto-MDIX, which
detects whether crossover is required and automatically configures the interface,
allowing you to use either a crossover or straight-through cable. Using a 20-amp
circuit for networking equipment is considered a data center best practice.
Connecting too many devices to a standard 15-amp wall circuit can overload it and
trip its breaker.
References
Question 8:
Correct
Which of the following devices accepts incoming client requests and distributes
those requests to specific servers?
Answer
Correct Answer:
Load balancer
CSU/DSU
Media converter
Caching engine
Explanation
A load balancer is a device that accepts incoming client requests and distributes
those requests to multiple servers. One goal of load balancing is to distribute client
requests evenly between multiple servers to improve performance.
A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the
signal received from the WAN provider into a signal that can be used by equipment
at the customer site. An intrusion prevention system (IPS) can detect and respond to
security events.
A caching engine saves copies of frequently used content, eliminating the need to
download the content each time it's requested.
A media converter converts signals used on one media type (such as twisted-pair
Ethernet) to another media type (such as fiber optic).
References
Question 9:
Correct
What is the purpose of using Ethernet bonding? (Select two.)
Answer
Correct Answer:
Provides a failover solution for network adapters
Increases read and write operations between the system bus and network adapters
Explanation
For a true fault-tolerant strategy, you must consider all system components. Ethernet
bonding (also called adapter teaming) is a fault-tolerant strategy that uses multiple
network adapters configured on a failover solution. In the event of a NIC failure,
other adapters automatically provide link redundancy. Multiple adapters can also
increase performance by distributing the network load between adapters.
Ethernet bonding does not provide increased bus speeds, increase read and write
operations between the system bus and network adapters, or enable dual remote
access (DRA) over a WAN link.
References
Question 10:
Correct
A web server on your network hosts your company's public website. You want to
make sure that a NIC failure on the server does not prevent the website from being
accessible on the internet.
Which solution should you implement?
Answer
QoS
Correct Answer:
Ethernet bonding
Spanning Tree
Traffic shaping
Explanation
Ethernet bonding (also called NIC teaming) logically groups two or more physical
connections to the same network. If one NIC fails, the second NIC with a connection
to the same network can still be used.
Spanning Tree is a protocol on a switch that allows it to maintain multiple paths
within a subnet.
A traffic shaper (also called a bandwidth shaper) is a device that's capable of
modifying the flow of data through a network in response to network traffic
conditions.
Quality of Service (QoS) refers to a set of mechanisms that try to guarantee timely
delivery or minimal delay of important or time-sensitive communications. QoS is
particularly important when you implement Voice over IP (VoIP), Video over IP, or
online gaming, where delay or data loss make the overall experience unacceptable.
References
Only files that have been added since the last full or incremental backup.
Only files that have changed since the last full or incremental backup.
Correct Answer:
Only files that have changed since the last full backup.
Only files that have changed since the last full or differential backup.
Explanation
A differential backup only captures files that have changed since the last full backup.
This backup strategy can create a shorter restoration time than an incremental
backup, but this may consume more disk space, depending on the frequency of file
changes. Restoration is a two-step process. You first load the last full backup and
then finish the restoration by loading the last differential backup.
References
Question 2:
Correct
Which backup strategy backs up only files that have the archive bit set and does not
mark them?
Answer
Incremental
Full
Normal
Correct Answer:
Differential
Explanation
A differential backup backs up only files that have the archive bit set, and it does not
mark them as having been backed up.
A full backup backs up all files regardless of whether the archive bit is set or not. An
incremental backup backs up only files that have the archive bit set, but it marks
them as having been backed up. A normal backup is a type of backup that is unique
to the NTBACKUP.EXE utility on the Windows server. This type also flags the files
as having been backed up.
References
Question 3:
Correct
Which backup strategy backs up all files from a computer's file system (regardless of
whether the file's archive bit is set or not) and then marks them as backed up?
Answer
Copy
Correct Answer:
Full
Differential
Incremental
Explanation
A full backup backs up all files from a computer's file system regardless of whether a
file's archive bit is turned on or off. It also marks them as backed up.
Incremental and differential backups only back up files that have their archive bit set.
The copy backup strategy is used by the NTBACKUP.EXE backup utility on
Windows servers. It backs up all files regardless of whether the archive bit is set.
However, it does not mark them as backed up.
References
Question 4:
Correct
Your network performs a full backup every night. Each Sunday, the previous night's
backup tape is archived.
On a Wednesday morning, the storage system fails. How many restore operations
would you need to perform to recover all of the data?
Answer
Correct Answer:
One
Two
Three
Four
Explanation
You would need to perform a single restore procedure. You would simply restore the
last full backup from Wednesday to restore all of the data.
The fact that you archived one backup each week is irrelevant to restoring the latest
data. The archived copy is only used to restore something to a specific point in time.
If you had used full and differential backups, you would restore the last full and last
differential backups. If you had used full and incremental backups, you would restore
the last full and each subsequent incremental backup.
References
Question 5:
Correct
Of the following restoration processes, which would result in the fastest restoration of
all data if a system failure occurred on Friday?
Answer
Restore the full backup from Sunday and the last incremental backup.
Correct Answer:
Restore the full backup from Sunday and the last differential backup.
Restore the full backup from Sunday and all incremental backups.
Restore the full backup from Sunday and all differential backups.
Explanation
The fastest method for restoring data to its most current state is to restore the full
backup and then the last differential backup. Differential backups include all changes
since the last full backup (or any other backup method that reset the archive bit).
Restoring the full backup and the last incremental backup is an incomplete restore
because all of the incremental backups must be used. However, restoring several
backup sets rather than a single set is slower. You only need to use the last
differential backup.
References
Question 6:
Correct
Your disaster recovery plan (DRP) calls for backup media to be stored at a different
location. The location is a safe deposit box at the local bank. Because of this, the
disaster recovery plan specifies that you must choose a method that uses the least
amount of backup media but also allows you to quickly back up and restore files.
Which backup strategy would BEST meet the DRP's specifications?
Answer
Perform a full backup once per week and an incremental backup the other days of
the week.
Perform a full backup once per month and an incremental backup the other days of
the month.
Correct Answer:
Perform a full backup once per week and a differential backup the other days of the
week.
Explanation
Performing a full backup once per week and a differential backup the other days of
the week would best meet this disaster recovery plan's specifications. The full
backup backs up all files, usually to one tape, but the process can be time-
consuming. The differential backup backs up all files since the last full backup.
Performing a full backup each day would meet the requirement of using as few tapes
as possible, but that backup process would be very time-consuming each day.
Performing a full backup once per week and an incremental backup the other days of
the week would be one of the fastest methods for backing up files, but it would
require many tapes to complete the restore. The incremental backup only backs up
files added or changed since the last backup. Because of this, in order to do a
complete restore of the file system, you'd need a tape for each day of the week that
the incremental backup ran.
Performing a full backup once per month and an incremental backup the other days
of the month would be the fastest method to back up files, but it would require many
tapes to complete. This process only backs up files added or changed since the last
backup. Because of this, in order to do a complete restore of the file system, you'd
need a tape for each day of the month that the incremental backup ran.
References
Question 7:
Correct
Your network uses the following backup strategy. You create:
• Full backups every Sunday night.
• Differential backups Monday night through Saturday night.
On Thursday morning, the storage system fails. How many restore operations would
you need to perform to recover all of the data?
Answer
One
Correct Answer:
Two
Three
Four
Explanation
You would need to perform two restore procedures. You would do the following:
1. Restore the full backup from Sunday.
2. Restore the differential backup from Wednesday.
If you did a full backup every night, you would restore only a single backup
(Wednesday's backup). If you did full backups with incremental backups, you would
restore the last full backup along with each incremental backup.
References
Question 8:
Correct
Which of the following are backed up during an incremental backup?
Answer
Only files that are new since the last full or incremental backup.
Only files that have changed since the last full backup.
Correct Answer:
Only files that have changed since the last full or incremental backup.
Only files that have changed since the last full or differential backup.
Explanation
An incremental backup only captures files that have changed since the last full or
incremental backup. The primary attraction to this backup plan is that it requires less
storage space and processing time to complete. Restoration starts from the last full
backup and then requires the loading of each subsequent incremental backup for a
full restoration.
References
Question 9:
Correct
Your network uses the following backup strategy. You create:
• Full backups every Sunday night.
• Incremental backups Monday night through Saturday night.
On a Thursday morning, the storage system fails. How many restore operations
would you need to perform to recover all of the data?
Answer
One
Two
Three
Correct Answer:
Four
Five
Explanation
In this scenario, you would need to perform the following four restore procedures:
1. Restore the full backup from Sunday.
2. Restore the incremental backup from Monday.
3. Restore the incremental backup from Tuesday.
4. Restore the incremental backup from Wednesday.
If you did a full backup every night, you would restore only a single backup
(Wednesday's backup). If you did full backups with differential backups, you would
restore the last full backup along with the last differential backup.
References
Question 10:
Correct
Which of the following describe a system image backup?
Answer
A system image does not include operating system files, program files, encrypted
files, files in the Recycle Bin, user profile settings, or temporary files.
A system image includes only specified files and folders backed up to a compressed
file.
Correct Answer:
A system image contains everything on the system volume, including the operating
system, installed programs, drivers, and user data files.
A system image only contains the operating system, installed programs, drivers, and
user profile settings.
Explanation
References
Port 135
Correct Answer:
Port 3389
Port 23
Port 22
Explanation
References
Question 2:
Correct
Which of the following is a tool that allows access to the graphical desktop
environment of another Windows client system over a network connection?
Answer
VPN
Correct Answer:
Remote Desktop
SSH
Explanation
Remote Desktop is a software tool that allows access to the graphical desktop
environment of another Windows client system over a network connection.
While SSH and VPNs help to provide remote access, they are not specific to
Windows client systems.
The Remote Desktop Gateway is not the software tool used to directly provide the
graphical desktop environment to the user.
References
Question 3:
Correct
Which of the following is a role service that allows users with the Remote Desktop
Connection client and an internet connection to connect on an internal network.
Answer
Remote Desktop
RD RAP
Correct Answer:
RD Gateway
RD CAP
Explanation
Remote Desktop Gateway (RD Gateway) is a role service that allows users with the
Remote Desktop Connection client and an internet connection to connect on an
internal network.
A Remote Desktop Resource Authorization Policy (RD RAP) identifies the internal
resources that users can access.
A Remote Desktop Connection Authorization Policy (RD CAP) identifies the users
who can establish a connection through the RD Gateway server.
Remote Desktop is a software tool.
References
Question 4:
Correct
You are the desktop administrator for your company. You would like to manage the
computers remotely using a tool with a graphical user interface (GUI).
Which of the following actions can you take to accomplish this?
Answer
Explanation
To remotely manage computers using a graphical user interface, you can use
Remote Desktop to establish a connection to each computer.
Use Remote Shell and Telnet to execute commands on a remote computer.
You initiate a Remote Assistance session by sending an assistance invitation.
References
Question 5:
Correct
You manage a server at work that has just been configured with a new application.
Consequently, the server has crashed several times during the last week. You think
that you've resolved the problem, but you'd like to be able to manage the server
remotely just in case more issues occur.
Which of the following protocols should you use for remote management? (Select
two.)
Answer
Correct Answer:
VNC
L2TP
Correct Answer:
ICA
PPP
PPTP
Explanation
References
Question 6:
Correct
Which of the following protocols or services would you associate with Windows
Remote Desktop network traffic?
Answer
Correct Answer:
RDP
WPA
NNTP
RD RAP
Explanation
References
•
11.8.1 Remote Management
•
11.8.2 Use Remote Desktop
•
11.8.4 Remote Management Facts
q_remote_manage_rdp_01_np6.question.fex
Question 7:
Correct
You are in the middle of a big project at work. All of your work files are on a server at
the office. You want to be able to access the server desktop, open and edit files,
save the files on the server, and print files to a printer that's connected to a computer
at home.
Which protocol should you use?
Answer
Correct Answer:
RDP
SSH
Telnet
FTP
Explanation
To access the server's desktop, use Remote Desktop Protocol (RDP). RDP is
Microsoft's own remote access protocol, but other available protocols include VNC
and ICA. With this remote desktop solution, you can access a device's desktop and
work with applications and files on that device. Device redirection allows you to
redirect sound, drives, or printing at the remote computer to your local computer.
Telnet and SSH are command line utilities used for remote management.
FTP (File Transfer Protocol) is used for file transfer. While you might use this
protocol to transfer files, it does not give you access to a remote system's desktop.
References
Question 8:
Correct
You just deployed a new Cisco router that connects several network segments in
your organization.
The router is physically located in a server room that requires an ID card for access.
You backed up the router configuration to a remote location with an encrypted file.
You access the router configuration interface from your notebook computer using a
Telnet client with the username admin and the password admin. You used the MD5
hashing algorithm to protect the password.
What else should you do to increase the security of this device? (Select two.)
Answer
Use a web browser to access the router configuration using an HTTP connection.
Explanation
In this scenario, you need to address the following two key security issues:
• You should use an SSH (Secure Shell) client to access the router
configuration. Telnet transfers data over the network connection in
cleartext, exposing sensitive data to sniffing.
• You should change the default administrative username and password.
Default usernames and passwords are readily available from websites on
the internet.
Encrypted Type 7 passwords on a Cisco device are less secure than those protected
with MD5.
Using HTTP and TFTP (Trivial File Transfer Protocol) to manage the router
configuration could expose sensitive information to sniffers, as they transmit data in
cleartext.
References
• 11.8.1 Remote Management
• 11.8.2 Use Remote Desktop
• 11.8.4 Remote Management Facts
q_remote_manage_ssh_01_np6.question.fex
Question 9:
Correct
Which of the following is a protocol used for terminal emulation?
Answer
RDP
ICA
Correct Answer:
SSH
VNC
Explanation
References
Question 10:
Correct
Which of the following remote protocols was originally designed for UNIX?
Answer
VPN
RDP
ICA
Correct Answer:
VNC
Explanation
Virtual Network Computing (VNC) was originally designed for UNIX.
ICA, VPN, and RDP are remote desktop protocols. However, they were not originally
designed for UNIX.
You can use a virtual private network (VPN) for remote access, but it is not a
protocol that was originally designed for UNIX.
References
Explanation
An insider could be a customer, a janitor, or even a security guard. But most of the
time, it's an employee. Employees pose one of the biggest threats to any
organization, as an unintentional threat actor is the most common insider threat.
A hacker is any threat agent who uses their technical knowledge to bypass security,
exploit a vulnerability, or gain access to protected information.
An authorized hacker is a good individual who tries to help a company see the
vulnerabilities that exist in their security infrastructure.
Attacks from nation states are generally extremely well-supported and funded.
References
Question 2:
Correct
Which of the following is an example of an internal threat?
Answer
A server backdoor allows an attacker on the internet to gain access to the intranet
site.
A delivery man is able to walk into a controlled area and steal a laptop.
Correct Answer:
A user accidentally deletes the new product designs.
Explanation
References
Question 3:
Correct
Telnet is inherently unsecure because its communication is in plaintext and is easily
intercepted. Which of the following is an acceptable alternative to Telnet?
Answer
PPP
Correct Answer:
SSH
Remote Desktop
SLIP
Explanation
SSH (Secure Shell) is a secure and acceptable alternative to Telnet. SSH allows
secure interactive control of remote systems. SSH uses RSA public key
cryptography for both connection and authentication. SSH also uses the IDEA
algorithm for encryption by default but is able to use Blowfish and DES as well.
Remote Desktop, while a remote control mechanism, is limited to a few versions of
Windows and is not very secure.
Point-to-Point Protocol (PPP) and Serial Line Interface Protocol (SLIP) are not
remote access authentication protocols. They are used to establish a connection, not
provide authentication.
References
Question 4:
Correct
Which of the following protocols can you use to securely manage a network device
from a remote connection?
Answer
Telnet
SFTP
TLS
Correct Answer:
SSH
Explanation
References
•
12.1.6 Secure Protocol Facts
q_secure_protocols_ssh_02_np6.question.fex
Question 5:
Correct
Which protocol does HTTPS use to offer greater security for web transactions?
Answer
CHAP
PAP
IPsec
Correct Answer:
SSL
Explanation
HTTPS (HyperText Transfer Protocol Secure) uses Secure Sockets Layer (SSL) to
offer greater security for web transactions.
IPsec uses HMAC (Hash-Based Message Authentication Code) to provide message
integrity checks.
Password Authentication Protocol (PAP) transmits login credentials in cleartext.
Challenge Handshake Authentication Protocol (CHAP) protects login credentials
using a hash and allows periodic re-authentication.
References
Question 6:
Correct
You want to allow traveling users to connect to your private network through the
internet. Users will connect from various locations, including airports, hotels, and
public access points (like coffee shops and libraries). As such, you won't be able to
configure the firewalls that might be controlling access to the internet in these
locations.
Which of the following protocols is MOST likely to be allowed through the widest
number of firewalls?
Answer
PPTP
L2TP
Correct Answer:
SSL
IPsec
Explanation
Ports must be open on firewalls to allow VPN protocols. For this reason, using SSL
(Secure Sockets Layer) for a VPN often works through firewalls when other solutions
do not because SSL uses port 443, which is a port that's often already open to allow
HTTPS traffic. In addition, some NAT (Network Address Translation) solutions do not
work well with VPN connections.
PPTP (Point-to-Point Tunneling Protocol) uses port 1723. L2TP (Layer 2 Tunneling
Protocol) uses ports 1701 and 500. IPsec uses UDP port 500 for IKE (Internet Key
Exchange).
References
•
12.1.6 Secure Protocol Facts
q_secure_protocols_ssl_02_np6.question.fex
Question 7:
Correct
Which of the following protocols are often added to other protocols to provide secure
data transmission? (Select two.)
Answer
SMTP
HTTPS
SNMP
Correct Answer:
SSL
Correct Answer:
TLS
Explanation
Both Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols
that are used with other protocols to add security. In addition, you can use Secure
Shell (SSH) to add security when using unsecure protocols.
HTTPS (HyperText Transfer Protocol Secure) is the secure form of HTTP that uses
SSL. SMTP (Simple Mail Transfer Protocol) is used for sending email. SNMP
(Simple Network Management Protocol) is for network management tasks.
References
•
12.1.6 Secure Protocol Facts
q_secure_protocols_ssl_tls_np6.question.fex
Question 8:
Correct
Which of the following intrusion detection and prevention systems uses fake
resources to entice intruders by displaying a vulnerability, configuration flaw, or
valuable data?
Answer
Botnet
Correct Answer:
Honeypot
Trojan horse
Zombie
Explanation
References
Question 9:
Correct
Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of
the following main intrusion detection and prevention goals? (Select two.)
Answer
Entices attackers to reveal their IDS signatures, which can then be matched to
known attack patterns.
Detects anomalous behavior that varies from standard activity patterns, also referred
to as heuristic recognition.
Correct Answer:
Offers attackers a target that occupies their time and attention while distracting them
from valid resources.
Correct Answer:
Reveals information about an attacker's methods and gathers evidence for
identification or prosecution purposes.
Lures attackers into a non-critical network segment where their actions are passively
monitored and logged, after which their connection is simply dropped.
Detects attacks that are unique to the services on valid system resources and
monitors application activity.
Explanation
By using honeypots, honeynets, and tarpits, you can fulfill the following intrusion
detection and protection goals:
• Attackers are offered targets that will occupy their time and attention,
distracting them from valid resources.
• You can observe attackers and gather information about their attack
methods or gather evidence for identification or prosecution purposes.
References
Question 10:
Correct
Members of the sales team use laptops to connect to the company network. While
traveling, they connect their laptops to the internet through airport and hotel
networks.
You are concerned that these computers will pick up viruses that could spread to
your private network. You would like to implement a solution that prevents the
laptops from connecting to your network unless antivirus software and the latest
operating system patches have been installed.
Which solution should you use?
Answer
VLAN
Screened subnet
NAT
NIDS
Correct Answer:
NAC
Explanation
References
Quarantine
Remediation
Port security
Correct Answer:
Posture assessment
Explanation
When a wired or wireless host tries to connect to a network, a NAC agent on the
host checks it to make sure it has all of the latest operating system updates installed
and that the latest antivirus definitions have been applied. This is called a posture
assessment. The agent then submits the results of the assessment as a Statement
of Health (SoH) to the system health validator (SHV).
If the host does not meet the client health requirements configured in the NAC
system, the host is placed on a quarantine network to be remediated.
Port security is configured on a switch to restrict connections to hosts with specific
MAC addresses.
References
Question 2:
Correct
When analyzing assets, which analysis method assigns financial values to assets?
Answer
Transfer
Acceptance
Correct Answer:
Quantitative
Qualitative
Explanation
Quantitative analysis assigns a financial value, or a real number (and the cost
required to recover from a loss) to each asset.
Qualitative analysis seeks to identify costs that cannot be concretely defined.
Transfer and acceptance are responses to risk, not risk analysis methods.
References
Question 3:
Correct
What is the main difference between vulnerability scanning and penetration testing?
Answer
Vulnerability scanning uses approved methods and tools; penetration testing uses
hacking tools.
Explanation
Penetration testing simulates an actual attack on the network and is conducted from
outside the organization's security perimeter. Vulnerability scanning is typically
performed internally by users with administrative access to the system.
The goal of both vulnerability scanning and penetration testing is to identify the
effectiveness of security measures and identify weaknesses that can be fixed. While
some penetration testing is performed with no knowledge of the network, penetration
testing could be performed by testers with detailed information about the systems.
Both vulnerability scanning and penetration testing can use similar tools, although
you should avoid illegal tools in both activities.
References
• 12.2.4 Penetration Testing Facts
q_pen_test_differences_np6.question.fex
Question 4:
Correct
A security administrator is conducting a penetration test on a network. She connects
a notebook system running Linux to the wireless network and then uses Nmap to
probe various network hosts to see which operating system they are running.
Which process did the administrator use for the penetration test in this scenario?
Answer
Network enumeration
Passive fingerprinting
Firewalking
Correct Answer:
Active fingerprinting
Explanation
References
Question 5:
Correct
Drag each penetration test characteristic on the left to the appropriate penetration
test name on the right.
Known test
The tester has detailed information about the target system prior to starting the
test.
correct answer:
Partially known test
The tester has the same amount of information that would be available to a typical
insider in the organization.
correct answer:
Unknown test
Either the attacker has prior knowledge about the target system or the
administrator knows that the test is being performed.
correct answer:
Double-blind test
The tester does not have prior information about the system, and the administrator
has no knowledge that the test is being performed.
correct answer:
Keyboard Instructions
Explanation
Penetration testing is classified by the knowledge that the attacker and system
personnel have prior to the attack.
• In an unknown test, the tester has no prior knowledge of the target
system.
• In a known test, the tester has detailed information prior to starting the
test.
• In a partially known test, the tester has the same amount of information
that would be available to a typical insider in the organization.
• In a single-blind test, one side has advanced knowledge. Either the
attacker has prior knowledge about the target system or the defender has
knowledge about the impending attack.
• In a double-blind test, the penetration tester does not have prior
information about the system, and the network administrator has no
knowledge that the test is being performed. A double-blind test provides
more accurate information about a system's security.
References
Question 6:
Correct
Which SIEM component is responsible for gathering all event logs from configured
devices and securely sending them to the SIEM system?
Answer
Correct Answer:
Collectors
Security automation
Data handling
SIEM alerts
Explanation
Collectors are responsible for gathering all event logs from configured devices and
securely sending them to the Security Information and Event Management (SIEM)
system. Collectors are basically the middleman between devices and the SIEM
system.
The data handling component receives the data from the collectors and then reads,
analyzes, and separates the data into different categories.
SIEM alerts are responsible for triggering alerts if any data exceeds the established
thresholds.
Security automation is a feature of a SOAR system.
References
Question 7:
Correct
Which of the following Security Orchestration, Automation, and Response (SOAR)
system components helps to document the processes and procedures that are to be
used by a human during a manual intervention?
Answer
Orchestration
Runbook
Response
Correct Answer:
Playbook
Explanation
Playbooks are linear checklists of required steps and actions that are to be taken to
respond to an alert. While playbooks do support automated actions, they are often
used to document the processes and procedures that are to be used by a human
during a manual intervention.
Runbooks consist of a series of conditional steps to perform actions, such as
sending notifications or threat containment. They are not used to document the
processes and procedures for a manual intervention.
The Orchestration component of the Security Orchestration, Automation, and
Response (SOAR) system is responsible for gathering data and information from
across the network. This is not used to document the processes and procedures for
a manual intervention.
The Response component of a SOAR system allows the system to automatically
take actions against threats. It is not used to document the processes and
procedures for a manual intervention.
References
Question 8:
Correct
You want to make sure that a set of servers only accepts traffic for specific network
services. You have verified that the servers are only running the necessary services,
but you also want to make sure that the servers do not accept packets sent to those
services.
Which tool should you use?
Answer
Packet sniffer
Correct Answer:
Port scanner
IDS
System logs
IPS
Explanation
Use a port scanner to check for open ports on a system or firewall. Compare the list
of open ports with the list of ports allowed by your Network Design and Security
Policy. Typically, a port is open when a service starts or is configured on a device.
Open ports for unused services expose the server to attacks directed at that port.
Use a packet sniffer to examine packets on a network. With a packet sniffer, you can
identify packets directed toward specific ports, but you won't be able to tell if those
ports are open. Examine system logs to look for events that have happened on your
system. These events might include a service starting up, but this would not likely
reflect open ports.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. A passive IDS monitors, logs, and detects security
breaches, but it takes no action to stop or prevent an attack. An active IDS (also
called an intrusion protection system, or IPS) performs the functions of an IDS but
can also react when security breaches occur.
References
Question 9:
Correct
A security administrator logs on to a Windows server on her organization's network.
Then she runs a vulnerability scan on that server.
Which type of scan did she conduct in this scenario?
Answer
Non-credentialed scan
Non-intrusive scan
Intrusive scan
Correct Answer:
Credentialed scan
Explanation
In a credentialed scan, the security administrator authenticates to the system prior to
starting the scan. A credentialed scan usually provides detailed information about
potential vulnerabilities. For example, a credentialed scan of a Windows workstation
allows you to probe the Registry for security vulnerabilities.
With a non-credentialed scan, the security administrator does not authenticate to the
system prior to running the scan.
A non-intrusive scan is the most common type of scan you will see performed. It
looks for vulnerabilities and gives you a report on what it found.
An intrusive scan finds a potential vulnerability and then actively attempts to exploit
it.
References
Question 10:
Correct
You want to be able to identify the services running on a set of servers on your
network. Which tool would BEST give you the information you need?
Answer
Port scanner
Network mapper
Protocol analyzer
Correct Answer:
Vulnerability scanner
Explanation
Use a vulnerability scanner to gather information about systems, such as the running
applications or services. A vulnerability scanner often combines functions found in
other tools and can perform additional functions, such as identifying open firewall
ports, missing patches, and default or blank passwords.
A port scanner is a tool that probes systems for open ports. A port scanner tells you
which ports are open in the firewall, but it cannot identify services running on a
server if the firewall port has been closed.
A network mapper is a tool that can discover devices on a network and show those
devices in a graphical representation. Network mappers typically use a ping scan to
discover devices and a port scanner to identify open ports on those devices.
Use a protocol analyzer to identify traffic that is sent on the network medium and
traffic sources. Services could still be running on a server that do not generate the
network traffic that a protocol analyzer would catch.
References
Explanation
The main concern, in this case, is with laptops being stolen. The best protection
against physical theft is to secure the laptops in place using a cable lock.
Requiring strong passwords or using encryption might prevent unauthorized users
from accessing data on the laptops, but this does not prevent physical theft.
References
Question 2:
Correct
What is the primary benefit of CCTV?
Answer
Explanation
A primary benefit of CCTV is that it expands the area visible to security guards. This
helps fewer guards oversee and monitor a larger area.
CCTV does not reduce the need for locks and sensors on doors.
CCTV does not provide a corrective control (it is a preventative, deterrent, or
detective control).
CCTV does not increase security protection throughout an environment. It only does
so in the area where it is aimed.
References
Question 3:
Correct
Which of the following CCTV types would you use in areas with little or no light?
Answer
C-mount
PTZ
Correct Answer:
Infrared
Explanation
References
Question 4:
Correct
Match each physical security control on the left with an appropriate example of that
control on the right. Each security control may be used once, more than once, or not
at all.
Hardened carrier
Protected cable distribution
correct answer:
Biometric authentication
Door locks
correct answer:
Barricades
Perimeter barrier
correct answer:
Emergency escape plans
Safety
correct answer:
Alarmed carrier
Safety
correct answer:
Exterior floodlights
Perimeter barrier
correct answer:
Keyboard Instructions
Explanation
References
Question 5:
Correct
You want to use CCTV as a preventative security measure. Which of the following is
a requirement for your plan?
Answer
Sufficient lighting
PTZ camera
Correct Answer:
Security guards
Explanation
When used in a preventative way, you must have a guard or other person available
who monitors one or more cameras. Only a security guard can interpret what the
camera sees to make appropriate security decisions.
Even with sufficient lighting on a low-LUX or infrared camera, cameras are not a
useful preventative measure without a security guard present to interpret images and
make security decisions.
A pan tilt zoom (PTZ) camera lets you dynamically move the camera and zoom in on
specific areas.
References
Explanation
To control access to the switch console, you must keep it in a locked room. A
console connection can only be established with a direct physical connection to the
device. If the switch is in a locked room, only those with access will be able to make
a console connection. In addition, even if you had set console passwords, users with
physical access to the device could perform password recovery and gain access.
References
Question 7:
Correct
Which of the following controls is an example of a physical access control method?
Answer
Passwords
Smart cards
Explanation
Locks on doors is an example of a physical access control method. Physical controls
restrict or control physical access.
Passwords, access control lists, and smart cards are all examples of technical
controls. Even though a smart card is a physical object, the card by itself is part of a
technical implementation. Requiring background checks for hiring is an example of a
policy or an administrative control.
References
Question 8:
Correct
Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry?
Answer
Explanation
References
Replace the USB hard disks used for server backups with a tape drive.
Correct Answer:
Control access to the work area with locking doors and card readers.
Replace the key lock on the server closet with a card reader.
Explanation
In this scenario, you should recommend the client make the following changes:
• Relocate the switch to the locked server closet. Keeping it in a cubicle
could allow an attacker to configure port mirroring on the switch and
capture network traffic.
• Control access to the work area with locking doors and card readers.
Controlling access to the building is critical for preventing unauthorized
people from gaining access to computers. In this scenario, you were able
to walk unescorted into the work area without any kind of physical access
control other than the receptionist.
Because the office manager will control who has access to the server closet key, it
isn't necessary to implement a card reader on the server closet door. Using tape
drives instead of hard disks wouldn't increase the security of the backups. Using
separate perimeter security devices instead of an all-in-one device would be unlikely
to increase network security.
References
Question 10:
Correct
Which of the following is a secure doorway that can be used with a mantrap to allow
an easy exit but actively prevents re-entrance through the exit portal?
Answer
Egress mantraps
Explanation
Turnstiles allow an easy exit from a secured environment but actively prevent re-
entrance through the exit portal. Turnstiles are a common exit portal used with
entrance portal mantraps. A turnstile can't be used to enter into a secured facility, as
it only functions in one direction.
Egress mantraps are not easy exit portals. Plus, they are a tremendously
unnecessary expense and administrative burden. Any form of door, including self-
locking doors with push bars or credential readers, can be hijacked to allow an
outsider to enter.
References
Commitment
Correct Answer:
Authority
Persuasive
Social validation
Explanation
Authority social engineering entails an attacker either lying about having authority or
using their high status in a company to force victims to perform actions that exceed
their authorization level.
Persuasive social engineering entails an attacker convincing a person to give them
information or access that he or she shouldn't.
Social validation entails an attacker using peer pressure to coerce someone else to
bend rules or give information he or she shouldn't.
Commitment social engineering entails convincing someone to buy into an overall
idea and then demanding or including further specifics that were not presented up
front.
References
Question 2:
Correct
What is the primary countermeasure to social engineering?
Answer
Traffic filters
Correct Answer:
Awareness
Explanation
References
Question 3:
Correct
Match each social engineering description on the left with the appropriate attack type
on the right.
Phishing
An attacker gathers personal information about the target individual, who is a CEO.
correct answer:
Spear phishing
Explanation
References
Question 4:
Correct
What is the definition of any attack involving human interaction of some kind?
Answer
Attacker manipulation
An authorized hacker
Correct Answer:
Social engineering
An opportunistic attack
Explanation
Social engineering refers to any attack involving human interaction of some kind.
Attackers who use social engineering try to convince a victim to perform actions or
give out information they wouldn't under normal circumstances.
An opportunistic attack is typically automated and involves scanning a wide range of
systems for known vulnerabilities, such as old software, exposed ports, poorly
secured networks, and default configurations.
An authorized hacker helps companies find vulnerabilities in their security
infrastructure.
Social engineers are master manipulators and use multiple tactics on their victims.
References
Question 5:
Correct
Dumpster diving is a low-tech way of gathering information that may be useful for
gaining unauthorized access or as a starting point for more advanced attacks. How
can a company reduce the risk associated with dumpster diving?
Answer
Explanation
Dumpster diving is best addressed with a Document Destruction Policy. All sensitive
documents should be shredded or burned, and employees should be trained on the
proper use of disposal equipment and the policies governing the disposal of sensitive
information.
A strong password policy, authentication types, and screensaver passwords are not
enough to prevent the risks associated with dumpster diving. Username and
password complexity efforts are wasted if employees document and dispose of this
information in an unsecure fashion.
References
Question 6:
Correct
You have just received a generic-looking email that is addressed as coming from the
administrator of your company. The email says that as part of a system upgrade, you
need enter your username and password in a new website so you can manage your
email and spam using the new service.
What should you do?
Answer
Open a web browser, type in the URL included in the email, and follow the directions
to enter your login credentials.
Correct Answer:
Verify that the email was sent by the administrator and that this new service is
legitimate.
Click on the link in the email and look for company graphics or information before
you enter the login information.
Explanation
You should verify that the email is legitimate and has come from your administrator.
It is possible that the network administrator has signed up for a new service. If you
ignore the message or delete it, you might not get the benefits the company has
signed up for. However, the email might be a phishing attack. An attacker might be
trying to capture personal information. By verifying the email with the administrator,
you will be able to tell if it is legitimate.
References
Question 7:
Correct
Which of the following is a common social engineering attack?
Answer
Explanation
Hoax virus information emails are a form of social engineering attack. This type of
attack preys on email recipients who are fearful and will believe most information if it
is presented in a professional manner. All too often, the victims of these attacks fail
to double-check the information or instructions with a reputable third-party antivirus
software vendor before implementing the recommendations. Usually, these hoax
messages instruct the reader to delete key system files or download Trojan horses.
Social engineering relies on the trusting nature of individuals to incentivize them to
take an action or allow an unauthorized action.
References
• 12.4.2 Social Engineering Facts
q_social_engineering_hoax_np6.question.fex
Question 8:
Correct
On your way into the back entrance of your work building one morning, a man
dressed as a plumber asks you to let him in so he can fix the restroom. What should
you do?
Answer
Let him in and help him find the restroom. Then let him work.
Explanation
You should direct him to the front entrance where he can check in with the proper
authorities in your organization. Letting him in without knowing if he should be there
could compromise security. Turning him away would be unprofessional.
References
Question 9:
Correct
Which of the following are examples of social engineering attacks? (Select two.)
Answer
Port scanning
Correct Answer:
Dumpster diving
Correct Answer:
Shoulder surfing
Impersonation
War dialing
Explanation
Social engineering leverages human nature. Internal employees are often the targets
of trickery, and false trust can quickly lead to a serious breach of information
security. Shoulder surfing and dumpster diving are examples of social engineering.
Shoulder surfing is the act of looking over an authorized user's shoulder in hopes of
obtaining an access code or credentials. Social engineers often employ keystroke
loggers to capture usernames and passwords. These low-tech attack methods are
often the first course of action that a hacker pursues.
Port scanning and war dialing are technical attacks that seek to take advantage of
vulnerabilities in systems or networks.
Impersonation is pretending to be trustworthy and having a legitimate reason for
approaching the target. This is done with the purpose of asking for sensitive
information or access to protected systems.
References
Question 10:
Correct
A senior executive reports that she received a suspicious email concerning a
sensitive internal project that is behind production. The email was sent from
someone she doesn't know, and he is asking for immediate clarification on several of
the project's details so the project can get back on schedule.
Which type of attack BEST describes the scenario?
Answer
Correct Answer:
Whaling
MAC spoofing
Masquerading
Passive
Explanation
Whaling is a form of social engineering attack that targets senior executives and
high-profile victims. Social engineering is an attack that exploits human nature by
convincing someone to reveal information or perform an activity.
Masquerading is convincing personnel to grant access to sensitive information or
protected systems by pretending to be someone who is authorized and/or requires
that access. Passive social engineering attacks take advantage of the unintentional
actions of others to gather information or gain access to a secure facility. MAC
spoofing is changing the source MAC address on frames sent by the attacker. MAC
spoofing can be used to hide the identity of the attacker's computer or to
impersonate another device on the network.
References
Lab Report
Time Spent: 05:41
TASK SUMMARY
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.6.12 Configure DHCP Snooping
Lab Report
Time Spent: 04:37
TASK SUMMARY
Required Actions
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.6.4 Poison ARP and Analyze with Wireshark
Lab Report
Time Spent: 01:52
TASK SUMMARY
Lab Questions
EXPLANATION
Complete this lab as follows:
1. Use Wireshark to capture packets on the enp2s0 interface for five seconds.
a. From the Favorites bar, select Wireshark.
b. Maximize the window for easier viewing.
c. Under Capture, select enp2s0.
d. Select the blue fin to begin a Wireshark capture.
e. After capturing packets for five seconds, select the red box to stop the Wireshark capture.
2. Analyze the Wireshark packets to determine whether ARP poisoning is taking place.
a. In the Apply a display filter field, type arp and press Enter to only show ARP packets.
b. In the Info column, look for lines containing the 192.168.0.2 IP address.
c. From the top right, select Answer Questions.
d. Answer the questions.
e. Select Score Lab.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.6.6 Poison DNS
Lab Report
Time Spent: 04:54
TASK SUMMARY
Q1: When a user tries to access the rmksupplies.com site, which IP address will they be redirected
to?
Q2: Which of the following was a result of the DNS spoofing attack?
EXPLANATION
Complete this lab as follows:
1. From Exec, view normal access to the RMK Office Supplies website.
a. From the taskbar, select Google Chrome.
b. In the URL field, type www.rmksupplies.com and press Enter.
Notice that you are taken to the RMK Office Supplies website.
c. Close Google Chrome.
2. From Support, learn how Ettercap's DNS spoofing plug-in works by viewing the host file (etter.dns).
a. From the top left, select Floor 1 Overview.
b. Under Support Office, select Support.
c. From the Favorites bar, select Terminal.
d. From the Terminal prompt, type cd /etc/ettercap and then press Enter to change to the Ettercap
directory.
e. Type ls and then press Enter to view the current files.
f. Type cat etter.dns and then press Enter to view the contents of the etter.dns file.
Typing cat etter.dns | less lets you view the file one line at a time. If used, type q to end the
cat command.
g. At the bottom, locate the line that specifies where the RMK Office Supplies website will be redirected.
h. From the top right, select Answer Questions.
i. Answer Question 1.
j. Minimize the Answer Questions dialog.
3. Use Ettercap to begin unified sniffing on the enp2s0 interface.
a. From the Favorites bar, select Ettercap.
b. Select Sniff > Unified sniffing...
c. From the Network Interface drop-down list, select enp2s0.
d. Select OK.
4. Set Exec (192.168.0.30) as the target machine.
a. Select Hosts > Host list to view the hosts known to the tool.
None are shown.
b. Select Hosts > Scan for hosts to scan for hosts on the network.
A list of hosts is shown.
c. Under IP Address, select 192.168.0.30 (the Exec computer).
d. Select Add to Target 1 to assign it as the target.
5. Initiate DNS spoofing using the Ettercap plug-in.
a. Select Plugins > Manage the plugins.
b. Select the Plugins tab.
c. Double-click dns_spoof to activate it.
6. Initiate ARP poisoning on remote connections.
a. Select Mitm > ARP poisoning.
b. Select Sniff remote connections.
c. Select OK.
7. From Exec, attempt to access the RMK Office Supplies site to view the results of the DNS spoofing.
a. From the top left, select Floor 1 Overview.
b. Under Executive Office, select Exec.
c. From the taskbar, select Google Chrome.
d. In the URL field, type www.rmksupplies.com and press Enter.
e. From the top right, select Answer Questions.
f. Answer Question 2.
g. Select Score Lab.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.6.9 Perform a DHCP Spoofing On-Path Attack
Lab Report
Time Spent: 04:17
TASK SUMMARY
Q2: Which gateway addresses are provided in the DHCP ACK packets?
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
13.1.4 Disable Network Service
Lab Report
Time Spent: 02:25
TASK SUMMARY
EXPLANATION
While completing this lab, use the following information:
Ports to scan:
3389 - Remote Desktop Services (TermServices)
5900 - VNC Server (vncserver)
Computer identification:
192.168.0.30 Exec
192.168.0.31 ITAdmin
192.168.0.32 Gst-Lap
192.168.0.33 Office1
192.168.0.34 Office2
192.168.0.45 Support
192.168.0.46 IT-Laptop
1. Using Zenmap, scan the network for open remote access ports.
a. From the Favorites bar, select Zenmap.
b. Maximize the windows for better viewing.
c. In the Command field, use nmap -p [port number] 192.168.0.0/24 to scan the port.
d. Select Scan (or press Enter) to scan the subnet for a given service.
e. Using the table in the scenario, identify the computer(s) with the open port using the IP address found.
f. From the top right, select Answer Questions.
g. Answer Question 1.
h. Repeat steps 1c-1e and then answer Question 2.
2. For computers that have a remote access service port open, disable and then stop the applicable service
from running.
a. From the top left, select Floor 1 Overview.
b. Select the computer with the remote access service port open. If needed, minimize or move the Lab
Questions dialog.
c. Right-click Start and select Computer Management.
d. From the left pane, expand and select Services and Applications > Services.
e. Maximize the window for better viewing.
f. Double-click the service (Remote Desktop Services or VNC Server) that needs to be stopped.
g. Using the Startup type drop-down menu, select Disabled.
h. Under Service status, select Stop.
i. Select OK.
j. Repeat step 2a-2i.
k. From the top right, select Answer Questions.
l. Select Score Lab.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
13.1.6 Enable and Disable Linux Services
Lab Report
Time Spent: 02:09
TASK SUMMARY
Required Actions
Enable service
Disable service
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
13.3.5 Configure Account Password Policies
Lab Report
Time Spent: 05:33
TASK SUMMARY
Required Actions
EXPLANATION
In this lab, your task is to edit the Local Security Policy and configure settings as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
13.3.8 Change Your Linux Password
Lab Report
Time Spent: 01:20
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
As you type in the password, the cursor will not move. Continue entering the password
anyway.
c. At the New password prompt, type V3rySecure1@ and then press Enter.
d. Retype V3rySecure1@ as the new password and then press Enter.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
13.3.9 Change a User's Linux Password
Lab Report
Time Spent: 02:02
TASK SUMMARY
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
13.4.4 Update Firmware
Lab Report
Time Spent: 01:33
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
14.3.9 Troubleshoot with Wireshark
Lab Report
Time Spent: 04:57
TASK SUMMARY
Q6: What is the effect of the eth contains 11:12:13 filter in Wireshark?
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
While browsing the internet, you notice that the browser displays ads linked to recent
keyword searches you performed.
Which attack type is this an example of?
Answer
Logic bomb
Zombie
Correct Answer:
Adware
Worm
Explanation
Adware monitors actions that denote personal preferences and sends pop-ups and
ads that match those preferences. Adware:
• Is usually passive.
• Is privacy-invasive software.
• Is installed on your machine when you visit a particular website or run an
application.
• Is usually more annoying than harmful.
A logic bomb is designed to execute only under predefined conditions and lays
dormant until the condition is met.
A worm is a self-replicating virus.
A zombie is a computer that's infected with malware in order to allow remote
software updates and control by a command and control center, which is called a
zombie master.
References
Question 2:
Correct
What should you try first if your antivirus software does not detect and remove a
virus?
Answer
Explanation
Virus detection software can only search for viruses listed in its known virus data file.
An outdated file can prevent the virus detection software from recognizing a new
virus.
References
Question 3:
Correct
Which of the following best describes spyware?
Answer
Correct Answer:
It monitors the actions you take on your machine and sends the information back to
its originating source.
It monitors user actions that denote personal preferences and then sends pop-ups
and ads to the user that match their tastes.
Explanation
Spyware monitors the actions you take on your machine and sends the information
back to its originating source.
Adware monitors user actions that denote personal preferences and then sends pop-
ups and ads to the user that match their taste.
A virus is a program that attempts to damage a computer system and replicate itself
to other computer systems.
A Trojan horse is a malicious program that is disguised as legitimate software.
References
A worm is restricted to one system, while a virus can spread from system to system.
A worm requires an execution mechanism to start, while a virus can start itself.
Explanation
References
Question 5:
Correct
Which of the following BEST describes the key difference between DoS and DDoS?
Answer
Correct Answer:
Attackers use numerous computers and connections.
Explanation
The DoS attacks that you probably hear the most about are distributed denial-of-
service attacks (DDoS attacks). The key difference is these attacks use numerous
computers and numerous internet connections across the world to overload the
target systems. DDoS attacks are usually executed through a network of devices
that the attacker has gained control of.
DoS attacks use a single connection to attack a single target. With all DoS attacks,
the attacker sends a large number of legitimate-looking requests to the server in a
way that the server cannot determine which requests are valid and which are not.
This barrage of requests overwhelms the system to the point that the server cannot
manage the capacity, resulting in the server being inaccessible to other users.
References
Question 6:
Correct
Which type of denial-of-service (DoS) attack occurs when a name server receives
malicious or misleading data that incorrectly maps hostnames to IP addresses?
Answer
SYN flood
Correct Answer:
DNS poisoning
Spam
ARP poisoning
Explanation
DNS poisoning occurs when a name server receives malicious or misleading data
that incorrectly maps hostnames to IP addresses. In a DNS poisoning attack:
• Incorrect DNS data is introduced into a primary DNS server.
• The incorrect mapping is made available to client applications through the
resolver.
• Traffic is directed to incorrect sites.
ARP poisoning corrupts the ARP cache or sends incorrect ARP data that spoofs
MAC addresses, causing devices to send frames to the wrong host or an
unreachable host.
Spam sent in great amounts can consume bandwidth or fill a mailbox, leaving no
room for legitimate traffic.
The SYN flood exploits the TCP three-way handshake.
References
• 12.5.5 Denial of Service
q_dos_dns_poisioning_03_np6.question.fex
Question 7:
Correct
Which of the following is an attack that either exploits a software flaw or floods a
system with traffic in order to prevent legitimate activities or transactions from
occurring?
Answer
On-path attack
Privilege escalation
Explanation
References
Question 8:
Correct
You are using a password attack that tests every possible keystroke for each single
key in a password until the correct one is found. Which of the following technical
password attacks are you using?
Answer
Correct Answer:
Brute force attack
Pass-the-hash attack
Password sniffing
Keylogger
Explanation
In a brute force attack, every password is eventually found because the technique is
to test every possible keystroke for each single key in a password until the correct
one is found.
Keyloggers log or record every keystroke on the computer keyboard to obtain
passwords and other important data.
A pass-the-hash attack is a hacking technique where an attacker uses an underlying
NTLM (New Technology LAN Manager) or hash of a user's password to gain access
to a server without ever using the actual plaintext password.
Password sniffing is a passive way for attackers to gain access to an account. The
sniffer collects data that is in transit on a LAN. If access is gained on one system on
a LAN, data can be gathered from traffic being sent from any other system on the
network. The sniffer runs in the background, making it undetectable.
References
Question 9:
Correct
Which of the following is a text file that a website stores on a client's hard drive to
track and record information about the user?
Answer
Certificate
Correct Answer:
Cookie
Digital signature
Mobile code
Explanation
A cookie is a text file that a website provides to a client. It is stored on a user's hard
drive to track and record information about the user.
Mobile code is self-contained software that is transferred to a web client to be
executed. It allows client-side execution of web applications.
A certificate is a digital proof of identity used to establish or verify a user's identity
over a network or the internet.
A digital signature is a cryptographic tool that is used to prove who a message is
from and that the contents of the message did not change or become altered while in
transit.
References
Question 10:
Correct
You are cleaning your desk at work. You toss several stacks of paper in the trash,
including a sticky note with your password written on it. Which of the following types
of non-technical password attacks have you enabled?
Answer
Social engineering
Password guessing
Shoulder surfing
Correct Answer:
Dumpster diving
Explanation
Dumpster diving relies on finding sensitive information that has been discarded in
garbage cans, dumpsters, or other unsecure places that create access for attackers.
Shoulder surfing is watching and recording a password, pin, or access code that is
being entered by someone nearby.
Social engineering relies on human error. It works by feigning trustworthiness to
convince someone to give the attacker access.
Password guessing happens when someone is able to easily guess a password,
typically because it is very common, like a pet's name or a hobby.
References
Question 11:
Correct
As you are helping a user with a computer problem, you notice that she has written
her password on a note stuck to her computer monitor. You check your company's
Password Policy and find that the following settings are currently required:
• Minimum password length = 10
• Minimum password age = 4
• Maximum password age = 30
• Password history = 6
• Account lockout clipping level = 3
• Require complex passwords that include numbers and symbols
Which of the following is the best action to take to make remembering passwords
easier so that the user no longer has to write their password down?
Answer
Explanation
The best solution is to implement end user training. Instruct users on the importance
of security and teach them how to create and remember complex passwords.
Making any other changes would violate the Password Policy and reduce every
password's overall security.
References
Snooping
Sniffing
Spamming
Correct Answer:
Spoofing
Explanation
References
Question 2:
Correct
What is spoofing?
Answer
Correct Answer:
Changing or falsifying information in order to mislead or re-direct traffic.
Explanation
Spoofing is the act of changing or falsifying information in order to mislead or re-
direct traffic. For example, an email-based spoofing attack changes the source email
address so that it is impossible to backtrack the message to its original source. Other
examples of spoofing attacks are Smurf and fraggle attacks. These attacks send
ICMP or UDP echo requests that have spoofed source addresses to an intermediary
system. The echo responses are returned to the stated source address, which is not
the sender's real address but that of the intended victim. A land attack is another
example of an attack that utilizes spoofing. A land attack is when a SYN packet (the
first packet of the TCP three-way handshake) is sent to a server, but the source
address is spoofed as the target server's address.
Snooping is the act of spying on private information or communications. One type of
snooping is sniffing. Sniffing is the act of capturing network packets in order to
examine the contents.
Spamming is sending a victim unwanted and unrequested email messages.
References
Question 3:
Correct
Which type of activity changes or falsifies information in order to mislead or re-direct
traffic?
Answer
Correct Answer:
Spoofing
Snooping
Spamming
Sniffing
Explanation
References
Question 4:
Correct
Which of the following is the term used to describe what happens when an attacker
sends falsified messages to link their MAC address with the IP address of a
legitimate computer or server on the network?
Answer
Correct Answer:
ARP poisoning
Port mirroring
MAC spoofing
MAC flooding
Explanation
Address Resolution Protocol (ARP) poisoning is when an attacker sends fake ARP
messages to link their MAC address with the IP address of a legitimate computer or
server on the network. Once their MAC address is linked to an authentic IP address,
the attacker can receive any messages directed to the legitimate address. As a
result, the attacker can intercept, modify, or block communications to the legitimate
MAC address.
Port mirroring creates a duplicate of all network traffic on a port and sends it to
another device.
MAC flooding is when an attacker intentionally floods a Content Addressable
Memory (CAM) table with Ethernet frames, each originating from different MAC
addresses. Once the table starts to overflow, the switch responds by broadcasting all
incoming data to all ports, basically turning itself into a hub instead of a switch.
MAC spoofing bypasses access control lists on servers or routers by either hiding a
computer on a network or by allowing the computer to impersonate another device.
References
Question 5:
Correct
Which of the following attacks can also be used to perform denial of service (DoS)
attacks?
Answer
Hijacking
Null session
MAC flooding
Correct Answer:
ARP spoofing
Explanation
ARP spoofing (poisoning) associates the attacker's MAC address with the IP
address of a victim's device. When computers send an ARP request to get the MAC
address of a known IP address, the attacker's system responds with its MAC
address. ARP spoofing can also be used to perform denial of service (DoS) attacks
by redirecting communications to fake or nonexistent MAC addresses.
MAC flooding overloads a switch's MAC forwarding table to make the switch function
like a hub. The attacker floods the switch with packets, each containing different
source MAC addresses. The flood of packets fills up the forwarding table and
consumes so much of the memory in the switch that it causes it to enter a state
called fail-open mode in which all incoming packets are broadcast out all ports (as
with a hub) instead of just to the correct ports.
A null session is the ability to log on using a blank username and password.
With hijacking, an attacker steals an open session, inserting himself or herself into
the session in place of the original client.
References
Question 6:
Correct
Using sniffers has become one way for an attacker to view and gather network
traffic. If an attacker overcomes your defenses and obtains network traffic, which of
the following is the BEST countermeasure for securing the captured network traffic?
Answer
Using encryption methods is the best practice to secure network traffic in this
scenario. The encryption becomes one of the last lines of defense. If the encryption
method you use is strong enough, it will take the attacker too long to decrypt the
traffic to be worth the effort.
An IDS (intrusion detection system) detects and alerts network administrators to
attacks. These systems can search for anomalies in network traffic. They send an
alert when an intrusion is detected, but they're not used as a countermeasure to
secure network traffic that has already been obtained by an attacker.
Implementing policies and promoting network security awareness training are good
countermeasures, but they will not protect data that has already been obtained by an
attacker.
Closing unnecessary ports associated with known attacks and only allowing
necessary applications to run lessens the attack surface and are both good
countermeasures. However, this does not secure network traffic that's already been
obtained.
References
Question 7:
Correct
Your network administrator is configuring settings so the switch shuts down a port
when the max number of MAC addresses is reached. What is the network
administrator taking countermeasures against?
Answer
Filtering
Spoofing
Correct Answer:
Sniffing
Hijacking
Explanation
Switched networks provide a natural barrier for an attacker using a sniffer. Be sure to
configure settings so the switch shuts down a port when the max number of MAC
addresses is reached (so MAC flooding is not possible).
Session hijacking is the process of taking over an established connection between a
host and a user.
DNS spoofing, also known as DNS cache poisoning, targets Active Directory or other
DNS-reliant networks.
Packet-filtering firewalls look at a packet's header information to determine legitimate
traffic.
References
Question 8:
Correct
Which of the following is the MOST effective protection against IP packet spoofing
on a private network?
Answer
Digital signatures
Host-based IDS
Antivirus scanners
Correct Answer:
Ingress and egress filters
Explanation
Ingress and egress filters are the most effective protection against IP packet
spoofing. Ingress filters examine packets coming into the network, while egress
filters examine packets going out of the network. These filters examine packets
based on rules that identify any spoofed packet, and they drop any packet suspected
of being spoofed on its way into or out of your network.
Antivirus scanners are useful against viruses.
Host-based IDSs are good at detecting host intrusions and security violations.
Digital signatures provide a recipient with proof of non-repudiation and
communication integrity.
References
Question 9:
Correct
Which of the following describes an on-path attack?
Answer
A system constructs an IP packet that is larger than the valid size.
A person plants malicious code on a system, where the code waits for a triggering
event before activating.
Correct Answer:
A false server intercepts communications from a client by impersonating the
intended server.
A person convinces an employee to reveal their login credentials over the phone.
Explanation
References
Question 10:
Correct
Which of the following attack types consists of capturing packets as they travel from
one host to another with the intent of altering the contents?
Answer
Passive logging
Correct Answer:
On-path
Spoofing
Spamming
Explanation
References
Port security
Correct Answer:
Dynamic ARP inspection
IGMP snooping
DHCP snooping
Explanation
References
Question 2:
Correct
A network switch detects a DHCP frame on the LAN that appears to have come from
a DHCP server that is not located on the local network. In fact, it appears to have
originated from outside the organization's firewall.
As a result, the switch drops the DHCP message from that server.
Which security feature was enabled on the switch to accomplish this?
Answer
Port security
IGMP snooping
Correct Answer:
DHCP snooping
Explanation
Some switches provide DHCP snooping as a security feature, which filters untrusted
DHCP messages. An untrusted DHCP message is received from outside the
network or firewall. DHCP snooping acts like a firewall between DHCP clients and
your DHCP servers. The switch maintains a DHCP snooping binding table that
matches MAC addresses with DHCP messages. When DHCP snooping is enabled,
the switch drops DHCP messages if the frame from the DHCP server is received
from outside the network or firewall. It also drops DHCP messages if the source
MAC address and the DHCP client MAC address do not match in the DHCP
snooping binding table.
IGMP (Internet Group Management Protocol) snooping allows a switch to control
which ports get IGMP traffic for a specific group.
Port security restricts which hosts can connect to a switch port based on MAC
address.
Dynamic ARP inspection is designed to prevent on-path attacks by validating ARP
packets on the network.
References
Question 3:
Correct
You are in the process of implementing a Network Access Protection (NAP)
infrastructure to increase your network's security.
You are currently configuring the remediation network that non-compliant clients will
connect to in order to become compliant. The remediation network needs to be
isolated from the secure network.
Which technology should you implement to accomplish this task?
Answer
Port security
Virtual private network (VPN)
Explanation
Implementing network segmentation would isolate the remediation server from the
rest of the network while still allowing the remediation server to contact the NAP
infrastructure.
A virtual private network (VPN) is used to create a secure connection between two
hosts or two sites over an unsecure network.
Encrypting data transmissions using PKI would only protect transmitted data, not
isolate the remediation network.
Port security is used to identify allowed and denied devices that connect to a switch
port. Doing this would not isolate the remediation network.
References
Question 4:
Correct
Match the Network Access Protection (NAP) component on the left with its
description on the right.
Generates a Statement of Health (SoH) that reports the client configuration for health
requirements.
NAP client
correct answer:
Runs the System Health Validator (SHV) program.
NAP server
correct answer:
Is clients' connection point to the network.
Explanation
References
Question 5:
Correct
You manage a network that uses switches. In the lobby of your building are three
RJ45 ports connected to a switch.
You want to make sure that visitors cannot plug their computers in to the free
network jacks and connect to the network, but you want employees who plug in to
those same jacks to be able to connect to the network.
Which feature should you configure?
Answer
VLANs
Mirroring
Correct Answer:
Port authentication
Bonding
Spanning Tree
Explanation
Use port authentication to prevent unauthorized access through switch ports. Port
authentication is provided by the 802.1x protocol and allows only authenticated
devices to connect to the LAN through the switch. Authentication uses usernames
and passwords, smart cards, or other authentication methods. For example:
• When a device first connects, the port is set to an unauthorized state.
Ports in unauthorized states can only be used for 802.1x authentication
traffic.
• After the server authenticates the device or the user, the switch port is
placed in an authorized state, and access to other LAN devices is allowed.
With VLANs, you assign each port to a specific VLAN. If the ports in the lobby were
assigned to one VLAN, you could control the type of access through the switch for
those ports, but you could not modify the access based on user. If you use a VLAN,
both visitors and employees would have the same access through those ports.
Spanning Tree is a protocol on a switch that allows it to maintain multiple paths
between switches within a subnet. Spanning Tree runs on each switch and is used to
select a single path between any two switches. Mirroring sends traffic from all switch
ports to a switch port that you designate. Bonding allows multiple switch ports to be
used at the same time to reach a specific destination.
References
Question 6:
Correct
Which type of security uses MAC addresses to identify devices that are allowed or
denied a connection to a switch?
Answer
Correct Answer:
Port security
Traffic shaping
MAC spoofing
Explanation
Port security uses the MAC address to identify allowed and denied devices.
Traffic shaping is the practice of modifying the flow of data through a network to
assure a certain level of performance.
Secure Sockets Layer (SSL) is a protocol that secures IP traffic.
MAC spoofing is a technique attackers use to gain access to a network through MAC
filtering.
References
Question 7:
Correct
Match the port security MAC address type on the left with its description on the right.
A MAC address that is manually identified as an allowed address.
SecureConfigured
correct answer:
A MAC address that has been learned and allowed by the switch.
SecureDynamic
correct answer:
A MAC address that is manually configured or dynamically learned and is saved in
the config file.
SecureSticky
correct answer:
Keyboard Instructions
Explanation
MAC addresses are stored in RAM in the CAM table and are identified with the port
and by a MAC address type. Port security uses the following three MAC address
types:
• A SecureConfigured address is a MAC address that has been manually
identified as an allowed address.
• A SecureDynamic address is a MAC address that has been dynamically
learned and allowed by the switch.
• A SecureSticky address is a MAC address that is manually configured or
dynamically learned and saved.
References
Question 8:
Correct
Which of the following is a best practice for router security?
Answer
Correct Answer:
Disable unused protocols, services, and ports.
Explanation
References
Question 9:
Correct
You have a company network with a single switch. All devices connect to the
network through the switch.
You want to control which devices will be able to connect to your network. For
devices that do not have the latest operating system patches, you want to prevent
access except to a special server that holds the patches the computers need to
download.
Which of the following components should be part of your solution? (Select two.)
Answer
Honeypot
Correct Answer:
Remediation servers
Correct Answer:
802.1x authentication
Extranet
Screened subnet
Explanation
References
Question 10:
Correct
Which of the following are best practices for hardening a server? (Select three.)
Answer
Explanation
References
Explanation
References
Question 2:
Correct
Match the authentication factor types on the left with the appropriate authentication
factor on the right. (You can use each authentication factor type more than once.)
PIN
Something you do
correct answer:
Keyboard Instructions
Explanation
References
Question 3:
Correct
Which of the following is the strongest form of multi-factor authentication?
Answer
Correct Answer:
A password, a biometric scan, and a token device
Two-factor authentication
Two passwords
Explanation
A password, a biometric scan, and a token device together are the strongest form of
multi-factor authentication listed here. Multi-factor authentication is any combination
of two or more of the same or different authentication factors. The three common
authentication factor types are something you know (such as a password),
something you have (such as a smart card or a token device), or something you are
(such as a biometric quality like a fingerprint).
The other three options are all weaker forms of multi-factor authentication. A
password and a biometric scan is a multi-factor authentication system, but it is also
an example of two-factor authentication. Two-factor authentication is any
combination of two or more different authentication factors. Two passwords is an
example of multi-factor authentication, but since it uses two of the same type of
factors, it is not a true two-factor authentication method.
References
Question 4:
Correct
Which of the following actions typically involve the use of 802.1x authentication?
(Select two.)
Answer
Correct Answer:
Controlling access through a wireless access point.
Explanation
References
• 13.2.6 Authentication Protocol Facts
q_authentication_protocol_802_1x_01_np6.question.fex
Question 5:
Correct
You are a contractor that has agreed to implement a new remote access solution
based on a Windows Server 2016 system for a client. The customer wants to
purchase and install a smart card system to provide a high level of security to the
implementation.
Which of the following authentication protocols are you MOST likely to recommend
to the client?
Answer
MS-CHAP
PPP
Correct Answer:
EAP
CHAP
Explanation
References
Question 6:
Correct
Which EAP implementation is MOST secure?
Answer
Correct Answer:
EAP-TLS
EAP-FAST
LEAP
EAP-MD5
Explanation
EAP-TLS uses Transport Layer Security (TLS) and is considered one of the most
secure EAP standards available. A compromised password is not enough to break
into EAP-TLS-enabled systems because the attacker must also have the client's
private key.
EAP-MD5 offers minimal security and is susceptible to dictionary and on-path
attacks. Lightweight Extensible Authentication Protocol (LEAP) does a poor job of
protecting user authentication credentials and is also susceptible to dictionary
attacks. EAP-FAST is a replacement for LEAP that uses a protected access
credential (PAC) to establish a TLS tunnel through which client authentication
credentials are transmitted. While more secure than EAP-MD5 and LEAP, EAP-
FAST can still be compromised if the attacker intercepts the PAC.
References
Question 7:
Correct
With Kerberos authentication, which of the following terms describes the token that
verifies the user's identity to the target system?
Answer
Voucher
Hashkey
Correct Answer:
Ticket
Coupon
Explanation
The tokens used in Kerberos authentication are known as tickets. Tickets perform a
number of functions, including notifying the network service of the user who has
been granted access and authenticating the identity of the person when they attempt
to use that network service.
The terms coupon and voucher are not associated with Kerberos or any other
commonly implemented network authentication system.
The term hashkey is sometimes used to describe a value that has been derived from
some piece of data (if the value is used to access a service). The term hashkey is
not associated with Kerberos, however.
References
Question 8:
Correct
Which of the following is a feature of MS-CHAPv2 that is not included in CHAP?
Answer
Three-way handshake
Correct Answer:
Mutual authentication
Certificate-based authentication
Explanation
MS-CHAPv2 allows for mutual authentication in which the server authenticates to the
client.
Both CHAP and MS-CHAP use a three-way handshake process for authenticating
users with usernames and passwords. The password (or shared secret) value is
hashed, and the hash (not the shared secret) is sent for authentication.
References
Question 9:
Correct
Which of the following is a mechanism for granting and validating certificates?
Answer
Correct Answer:
PKI
AAA
RADIUS
Kerberos
Explanation
Certificates are obtained from public-key infrastructure (PKI), which is a system that
provides a trusted third party to vouch for user identities. PKI is made up of
certificate authorities (CAs), which are entities trusted to issue, store, and revoke
certificates.
Both RADIUS and TACACS+ are protocols for centralized authentication,
authorization, and accounting during remote access.
Kerberos is an authentication and authorization method that uses tickets.
References
Question 10:
Correct
Which of the following is a platform-independent authentication system that
maintains a database of user accounts and passwords to centralize the maintenance
of those accounts?
Answer
Correct Answer:
RADIUS
EAP
RRAS
NAS
Explanation
References
Explanation
References
Question 2:
Correct
You are configuring the Local Security Policy on a Windows system. You want to
require users to create passwords that are at least 10 characters in length. You also
want to prevent login after three unsuccessful login attempts.
Which policies should you configure? (Select two.)
Answer
Correct Answer:
Account lockout threshold
Explanation
Set the Minimum password length policy to require a password equal to or longer
than the specified length. Set the Account lockout threshold policy to lock an account
after the specified number of incorrect login attempts.
The following lists explains the incorrect policy choices for this scenario:
• Enforce password history requires users to input a unique (previously
unused) password when changing their password. This prevents users
from reusing previous passwords.
• Maximum password age forces users to change the password after the
specified time interval.
• Password must meet complexity requirements prevents using passwords
that are easy to guess or crack. It forces passwords to include letters,
symbols, and numbers and also requires passwords of at least seven
characters. However, you cannot configure a longer password length
requirement with this policy.
• Account lockout duration determines the length of time the account is
disabled (in minutes). When the time period expires, the account is
unlocked automatically.
References
Question 3:
Correct
For users on your network, you want to automatically lock user accounts if four
incorrect passwords are used within 10 minutes.
What should you do?
Answer
Account lockout disables a user account after a specified number of incorrect login
attempts. The account lockout threshold identifies the allowed number of incorrect
login attempts. The account lockout counter identifies a time period for keeping track
of incorrect attempts (such as 10 minutes).
If account lockout locks a user account, use the unlock feature to allow login. Use
the enable/disable feature to prevent or allow login with that user account.
Configure account (password) policies in Group Policy to enforce rules about
password composition, such as minimum length, complexity, and history
requirements. Use account expiration to disable an account after a specific day. Use
day/time restrictions to prevent login during certain days or hours.
References
Question 4:
Correct
You have just configured the password policy and set the minimum password age to
10.
What is the effect of this configuration?
Answer
The password must be entered within 10 minutes of the login prompt being
displayed.
Explanation
The minimum password age setting prevents users from changing the password too
frequently. After the password is changed, it cannot be changed again for at least 10
days.
The maximum password age setting determines how frequently a password must be
changed. The minimum password length setting controls the minimum number of
characters that must be in the password. Password history is used to prevent
previous passwords from being reused.
References
Question 5:
Correct
Upon running a security audit in your organization, you discover that several sales
employees are using the same domain user account to log in and update the
company's customer database.
Which action should you take? (Select two. Each response is part of a complete
solution.)
Answer
Apply the Group Policy Object (GPO) to the container where the sales employees'
user accounts reside.
Implement a Group Policy Object (GPO) that restricts simultaneous logins to one.
Explanation
You should prohibit the use of shared user accounts. Allowing multiple users to
share an account increases the likelihood of the account being compromised.
Because the account is shared, users tend to take security for the account less
seriously. In the scenario, the following tasks need to be completed:
• The existing shared user account needs to be deleted. Until you delete the
account, users can continue to use it for authentication. You could just
change the password on the account, but there is a high chance that the
new password would be shared again.
• Train sales employees to use their own user accounts to update the
customer database. Ensure that these accounts have the level of access
required to access the database.
Applying time-of-day login restrictions to a Group Policy Object does not address the
issue in this scenario.
References
Question 6:
Correct
You have hired 10 new temporary employees to be with the company for three
months.
How can you make sure that these users can only log on during regular business
hours?
Answer
Correct Answer:
Configure day/time restrictions in user accounts.
Explanation
Use day/time restrictions to limit the days and hours when users can log in.
Configure account expiration to disable an account after a specific date.
Use account policies in Group Policy to configure requirements for passwords.
Use account lockout settings in Group Policy to automatically lock accounts when a
specific number of incorrect passwords are entered.
References
Question 7:
Correct
You have performed an audit and found an active account for an employee with the
username joer. This user no longer works for the company.
Which command can you use to disable this account?
Answer
usermod -u joer
usermod -d joer
usermod -l joer
Correct Answer:
usermod -L joer
Explanation
Use usermod -L joer to lock a user's password. Doing so disables the account.
The usermod -l joer command changes the account's login name.
The -d flag changes the account's home directory.
The -u flag changes the account's numeric ID.
References
Question 8:
Correct
An employee named Bob Smith, whose username is bsmith, has left the company.
You have been instructed to delete his user account and home directory.
Which of the following commands would produce the desired outcome? (Select two.)
Answer
Correct Answer:
userdel bsmith;rm -rf /home/bsmith
Correct Answer:
userdel -r bsmith
userdel -h bsmith
userdel bsmith
userdel -x bsmith
Explanation
The userdel -r command deletes a user's home directory and user account.
The userdel command by itself does not delete a user's home directory and user
account.
Executing rm -rf on the user's home directory after executing userdel removes the
home directory.
The userdel -h command displays the syntax and options for the userdel command.
References
Question 9:
Correct
Which of the following utilities could you use to lock a user account? (Select two.)
Answer
ulimit
Correct Answer:
passwd
useradd
userdel
Correct Answer:
usermod
Explanation
References
Question 10:
Correct
You suspect that the gshant user account is locked.
Enter the command you would use in Command Prompt to display the account's
status.
Explanation
Use passwd -S gshant to display the status of the gshant user account.
• LK indicates that the user account is locked.
• PS indicates that the user account has a password.
Viewing the /etc/shadow file also displays whether the user account is disabled. The
second field for each entry in the /etc/password file is the password field. For
example:
• $ preceding the password identifies the password as an encrypted entry.
• ! or !! indicates that the account is locked and cannot be used to log in.
• * indicates a system account entry, which cannot be used to log in.
References
14 days
Correct Answer:
7 days
30 days
365 days
Explanation
When you open the Settings app and navigate to Update & Security > Windows
Update, you can pause new updates for a period of 7 days.
References
Question 2:
Correct
Which of the following are true about Windows Update for Business? (Select three.)
Answer
Correct Answer:
Windows Update for Business works with all versions of Windows 10 except
Windows 10 Home.
Windows Update for Business provides the latest features for your Windows 10
devices, but it does not include security upgrades.
Correct Answer:
Windows Update for Business provides the latest features for your Windows 10
devices, including security upgrades.
Windows Update for Business can only be configured with Group Policy.
Windows Update for Business works with all versions of Windows 10.
Explanation
Windows Update for Business provides the latest features for your Windows 10
devices, including security upgrades.
Windows Update for Business can be used with all versions of Windows 10 except
Windows 10 Home.
Windows Update for Business can be configured with Group Policy, Mobile Device
Management, or Systems Center Configuration Manager.
Microsoft Intune is a mobile device management (MDM) tool.
References
Question 3:
Correct
Windows Update for Business (WUfB) lets you keep your devices current with the
latest security upgrades and features.
Which operating system releases does WUfB support?
Answer
Windows 8
Windows 10 Home
Correct Answer:
Windows 10
Windows 8 Home
Explanation
References
Explanation
To check a computer for a specific update, you click the View update history link
in Windows Update. You can also click View installed updates in Programs and
Features (both available through the Control Panel).
The Wuauclt.exe command is the client component for Windows Update. One of
this program's functions is to check for updates using settings configured locally or
through Group Policy. You can run the wuauclt /detectnow command to force the
computer to check for updates immediately. However, there is no option for seeing
which updates have been installed.
The netsh winhttp import proxy source command imports Internet Explorer's
Internet Options settings directly.
The Local Security Policy shows you the update settings you can control locally. In
this scenario, because Group Policy is being used, these settings wouldn't tell you
anything about the computer's configuration.
References
Question 5:
Correct
While deploying Windows updates, when would you use the critical update ring?
Answer
Correct Answer:
When deploying updates to important systems (only after the update has been
vetted).
When deploying updates to most of the organization in order to monitor for feedback.
When deploying updates for any general user within the organization.
Explanation
The critical deployment ring is for critical machines that you don't want to update until
the update has been vetted. These are machines that are critical to the running of
your organization or that are running essential projects. You can defer feature
updates for up six months and quality improvement updates for up to 30 days.
The preview ring is for those users who want to stay on top of changes and are on
the cutting edge. They want to see the latest and greatest. This is called the
Windows Insider Program. It allows you to get the most recent updates for your
system.
The broad ring includes the Semi-Annual Channel and is broadly deployed to most
of the organization to monitor for feedback.
References
Question 6:
Correct
When deploying Windows updates, when would you use the preview update ring?
Answer
Correct Answer:
When deploying updates to users that want to stay on top of changes.
When deploying updates to important machines (only after the update has been
vetted).
When deploying updates to most of the organization in order to monitor for feedback.
When deploying updates for any general user within the organization.
Explanation
The preview ring is for those users who want to stay on top of changes and are on
the cutting edge. They want to see the latest and greatest. This is called the
Windows Insider Program. It allows you to get the most recent updates for your
system.
The critical deployment ring is for critical machines that you don't want to update until
the update has been vetted. These are machines that are critical to the running of
your organization or that are running important projects. You can defer feature
updates for up six months and quality improvement updates for up to 30 days.
The broad ring includes the Semi-Annual Channel and is broadly deployed to most
of the organization to monitor for feedback.
References
Question 7:
Correct
What does the Windows Update Delivery Optimization function do?
Answer
Delivery Optimization lets you know when and if there are any urgent updates for
your system and provides you with an option to download and install them.
Delivery Optimization lets you set active hours to indicate normal use for your
device. The device will not reboot to install updates during this time.
Delivery Optimization lets you view the updates you have installed. It also lets you
uninstall an update if needed.
Correct Answer:
Delivery Optimization provides you with Windows and Store app updates and other
Microsoft products.
Explanation
Delivery Optimization provides you with Windows and Store app updates and other
Microsoft products. Clicking Advanced Options from here lets you throttle the
bandwidth for downloading and uploading updates, including the monthly limit.
From Windows Update, you would use View update history to view all the updates
that have been applied to your system. You can also install updates from here.
From Windows Update, you would use Change active hours to set active hours to
indicate normal use for your device. The device will not reboot to install an update
during this time.
From Windows Update, you would use Check for updates to access Microsoft's site
and see if any new updates are available for you system.
References
Question 8:
Correct
What is WindowsUpdate.log?
Answer
A log file that deploys updates to device groups over a deployment timeline.
A log file that analyzes Windows Update Service, BITS, and Windows Network
Diagnostics Service.
A log file that allows you to see enforced policies on your Windows 10 machine.
Correct Answer:
A log or record of all notable changes made to a Windows system.
Explanation
References
Question 9:
Correct
Dan wants to implement reconnaissance countermeasures to help protect his DNS
service. Which of the following actions should he take?
Answer
Correct Answer:
Install patches against known vulnerabilities and clean up out-of-date zones, files,
users, and groups.
Limit the sharing of critical information in press releases, annual reports, product
catalogs, or marketing materials.
Explanation
References
Question 10:
Correct
Which of the following tools can you use to troubleshoot and validate Windows
updates? (Select three.)
Answer
Correct Answer:
PowerShell
Device Manager
Windows Defender
Correct Answer:
Windows Server Update Service (WSUS)
Explanation
You can use PowerShell to look at and compile Windows Update logs. Doing so
creates a file that's deposited on to your desktop.
Windows Server Update Service (WSUS) is a role you can add to a server to
manage updates. Rather than have all your organization's PCs go to Microsoft to get
their updates, you can have the updates deposited in to the WSUS server.
Windows Update Troubleshooter analyzes Windows Update Service, Background
Intelligent Transfer Service (BITS), and Windows Network Diagnostics Service.
The other answers are not tools you can use to troubleshoot and validate Windows
updates.
References
QoS
Spanning Tree
Traffic shaping
Correct Answer:
Ethernet bonding
Explanation
Ethernet bonding (also called NIC teaming) logically groups two or more physical
connections to the same network. If one NIC fails, the second one with a connection
to the same network can still be used.
Spanning Tree is a protocol on a switch that allows it to maintain multiple paths
between other switches within a subnet.
A traffic shaper (also called a bandwidth shaper) is a device that's capable of
modifying the flow of data through a network. This happens in response to network
traffic conditions.
Quality of Service (QoS) refers to a set of mechanisms that try to guarantee timely
delivery or minimal delay of important or time-sensitive communications.
References
Question 2:
Correct
What is the purpose of using Ethernet bonding? (Select two.)
Answer
Increases read and write operations between the system bus and network adapters.
Correct Answer:
Provides a failover solution for network adapters.
Explanation
In a true fault-tolerant strategy, you must consider all the system components.
Ethernet bonding (also called adapter teaming) is a fault-tolerant strategy that uses
multiple network adapters configured as a failover solution. In the event of a NIC
failure, other adapters automatically provide link redundancy.
Multiple adapters can also increase performance by distributing the network load.
References
Question 3:
Correct
Which of the following components do switches use to optimize network
performance by performing switching operations in hardware rather than using the
CPU and software?
Answer
A caching engine
Ethernet bonding
A traffic shaper
Correct Answer:
An application-specific integrated circuit
Explanation
Question 4:
Correct
You have a website that uses multiple servers for different types of transactions. For
example, one server is responsible for static web content, while another is
responsible for secure transactions.
You would like to implement a device to speed up access to your web content. The
device should be able to distribute requests between the various web servers using
specialized hardware, not just software configurations. In addition, SSL sessions
should use the hardware components in the device to create the sessions.
Which type of device should you use to accomplish this?
Answer
Circuit-level gateway
Proxy server
Bandwidth shaper
Correct Answer:
Content switch
Explanation
Use a content switch to perform these functions. Switches use specialized hardware
modules to perform common tasks. For example, you can have a switch with a
special hardware module that's used for SSL connections. Using the hardware
module in a specialized switch is faster than using the CPU or software in another
device.
A bandwidth shaper (also called a traffic shaper) is a device that's capable of
modifying the flow of data through a network. This happens in response to network
traffic conditions.
A proxy server is a server that sits between a client and a destination device and can
be configured to filter requests based on URL. However, a proxy server uses
software and not hardware to perform these tasks.
A circuit-level gateway uses the session information to make filtering decisions for
allowed or denied traffic.
References
Explanation
The Differentiated Services Code Point (DSCP) classification system has the
following characteristics:
• Classification occurs at Layer 3.
• Precedence values are inserted in an IP packet's DiffServ field.
• Up to 64 different classifications are possible, but most networks use only
the following ones:
o Default Best Effort
o Expedited Forwarding (EF) - low loss, low latency
o Assured Forwarding (AF) - assured delivery under prescribed
conditions
o Class Selector - maintains backward compatibility with the IP
Precedence field
References
Question 6:
Correct
Which type of switch optimizes network performance by using ASIC to perform
switching at wire speed?
Answer
Layer 2 switch
Correct Answer:
Multilayer switch
Unmanaged switch
Layer 1 switch
Explanation
References
Question 7:
Correct
Match the Class of Service (CoS) priority on the left with its corresponding value on
the right.
0
Background
correct answer:
1
Best effort
correct answer:
2
Excellent effort
correct answer:
3
Critical applications
correct answer:
4
Internetwork control
correct answer:
7
Network control
correct answer:
Keyboard Instructions
Explanation
Class of Service (CoS) marks individual frames with a priority value between 0 and
7:
• 0 - Background
• 1 - Best effort
• 2 - Excellent effort
• 3 - Critical applications
• 4 - Video (< 100ms latency)
• 5 - Voice (< 10ms latency)
• 6 - Internetwork control
• 7 - Network control
References
Question 8:
Correct
Which Class of Service (CoS) priority value should be assigned to a video
conference call?
Answer
1
5
0
Correct Answer:
4
Explanation
A priority value of 4 should be assigned to the video data stream. Each CoS priority
value goes with a specific traffic type:
• 0 - Best effort (default)
• 1 - Background
• 2 - Excellent effort
• 3 - Critical applications
• 4 - Video (< 100ms latency)
• 5 - Voice (< 10ms latency)
• 6 - Internetwork control
• 7 - Network control
References
Question 9:
Correct
You are in the process of implementing a network access protection (NAP)
infrastructure to increase your network's security.
You are currently configuring the remediation network that non-compliant clients will
connect to in order to become compliant. You need to isolate the remediation
network from the secure network.
Which technology should you implement to accomplish this task?
Answer
Port security
Explanation
Implementing network segmentation would isolate the remediation server from the
rest of the network while still allowing the remediation server to contact the NAP
infrastructure.
A virtual private network (VPN) creates a secure connection between two hosts or
two sites over an unsecured network.
Encrypting data transmissions using PKI would only protect transmitted data, not
isolate the remediation network.
Port security identifies allowed and denied devices that connect to a switch port.
Doing this would not isolate the remediation network.
References
Question 10:
Correct
Your organization uses a time-keeping application that only runs on Windows 2000
and does not run on newer OS versions. Because of this, there are several Windows
2000 workstations on your network.
Last week, you noticed unusual activity on your network coming from the
workstations. After further examination, you discover that they were victims of a
malicious attack and were being used to infiltrate the network.
You find out that the attackers were able to gain access to the workstations because
of the legacy operating system being used. Your organization still needs to use the
Windows 2000 workstations (which need to be connected to the internet) but you
want to make sure that the network is protected from future attacks.
Which solution should you implement to protect the network while also allowing
operations to continue as normal?
Answer
Correct Answer:
Configure VLAN membership so that the Windows 2000 workstations are on their
own VLAN.
Install antivirus software on the Windows 2000 workstations, and configure them to
automatically download and install updates.
Create a dedicated network for the Windows 2000 workstations that's completely
isolated from the rest of the network, including a separate internet connection.
Implement a host-based firewall on each Windows 2000 workstation, and configure
them to automatically download and install updates.
Explanation
The best solution is to place the Windows 2000 workstations in their own VLAN. If
you use VLAN network segmentation, the workstations will still have access to the
internet, but network access can be heavily restricted. This greatly reduces the
damage a workstation can cause if it were to become compromised again.
Legacy operating systems, such as Windows 2000, are easy targets for attackers.
This is because these operating systems use outdated protocols and have known
exploits.
Installing antivirus software or a host-based firewall would do very little to protect the
entire network. In addition, legacy operating system are no longer supported with
updates or patches, so enabling automatic updates would offer no benefit.
Creating a dedicated network for the workstations would affect normal operations
and also increase the network management load.
References
Explanation
At this point, you should create an action plan and account for side effects.
Identifying the effects ahead of time helps you put measures in place to eliminate or
reduce any potential negative consequences.
Escalation isn't necessary because you're already in charge of managing the
wireless access point, and the problem is isolated to that device. Fix the problem
only after creating the action plan and identifying possible side effects. Document the
problem and the solution after the problem has been fixed and the solution has been
verified.
References
Question 2:
Correct
A user reports that she can't connect to a server on your network. You check the
problem and find out that all users are having the same problem.
What should you do next?
Answer
Explanation
At this point, you have identified the symptoms and the scope of the problem. In this
scenario, you have determined that the problem affects all users. The next step is to
determine what might have changed that could have caused the problem.
You have already identified the affected area because you know that the problem
affects all users. Before you can choose a probable cause, do additional work to see
what might have changed. After selecting a probable cause, determine if escalation
is required. Then create an action plan and fix the problem.
References
Question 3:
Correct
Users report that the network is down. As a help desk technician, you investigate
and determine that a specific router is configured so that a routing loop exists.
What should you do next?
Answer
Explanation
After identifying the most probable cause, escalate the problem if it is beyond your
ability to fix or if it is out of your scope of management. For example, the problem
might be on a router configuration that you are not authorized to correct. When
forwarding the problem on to someone else, be sure to describe the nature of the
problem, the actions you have already taken, and the symptoms that lead you to
believe the problem is outside of your area of responsibility.
If you decide that escalation is not necessary, you can then create an action plan
that includes the fix and identify possible side effects of implementing it. After the
solution has been implemented, verify that it works and that there were no
unforeseen consequences. Finally, document the problem and the solution.
References
• 14.2.1 Troubleshooting Methodology
• 14.2.2 Troubleshooting Methodology Facts
q_trouble_meth_escalation_np6.question.fex
Question 4:
Correct
A user reports that he can't connect to a specific website. You go to the user's
computer and reproduce the problem.
What should you do next?
Answer
Explanation
After identifying the problem, identify the affected area and determine how large the
problem is. For example, is the problem limited to this one user, or does it affect all
users or a group of users?
After identifying the affected area, find out if anything has changed that might cause
the problem. At this point, you should have enough information that you can select a
probable cause and determine if escalation is necessary.
References
Question 5:
Correct
A user is unable to connect to the network. You investigate the problem and
determine that the network adapter is defective. You replace the network adapter
and verify that it works.
What should you do next?
Answer
Correct Answer:
Identify the results and side effects of the solution.
Explanation
After implementing and testing the solution, identify the results and side effects of the
solution. Make sure that the solution has fully fixed the problem and has not caused
any other problems.
Document the problem and solution after it has been fixed and verified. Determine if
escalation is needed and create an action plan before implementing the solution.
References
Question 6:
Correct
A router periodically goes offline. Once it goes offline, you find that a simple reboot
puts the router back online.
After doing some research, you find that the MOST likely cause is a bug in the router
software. A new patch is available from the manufacturer that is supposed to
eliminate the problem.
What should you do next?
Answer
Correct Answer:
Identify possible side effects of the solution.
Explanation
Based on the troubleshooting process, you should create an action plan and identify
possible side effects of implementing the solution. For example, you might consider
how long the router will be offline to apply the patch, how long it will take to
implement the solution, and which problems might occur during the process.
Take the action to fix the problem only after you have created the plan, identified the
side effects, and determined the best time to implement the fix. Document the
solution after the problem is fixed and verified. Identifying the affected areas is part
of the process you take before arriving at a probable solution.
References
Question 7:
Correct
When troubleshooting network issues, it's important to carry out tasks in a specific
order.
Drag each trouble shooting task on the left to the correct step on the right.
Step 1
References
Question 8:
Correct
You are a network administrator for your company. A frantic user calls you one
morning exclaiming that nothing is working. What should you do next in your
troubleshooting strategy?
Answer
Explanation
Currently, you have no idea which problem the user is having. For all you know, it
could be anything large or small. You need to establish the symptoms first.
References
Question 9:
Correct
You are a network administrator for your company. A user calls and tells you that
after stepping on the network cable in her office, she can no longer access the
network.
You go to the office and see that some of the wires in the Cat 5 network cable are
now exposed. You make another cable and attach it from the wall plate to the user's
computer.
What should you do next in your troubleshooting strategy?
Answer
Explanation
After you implement a solution, you should always test it. Sometimes, more than one
problem exists, or your solution may not have solved the issue. In this example, you
may have incorrectly set the wires in the network cable you just fixed, or the user
may have jarred the computer and damaged the NIC when she stepped on the
cable.
References
Question 10:
Correct
A new assistant network administrator was recently hired by your organization to
relieve some of your workload.
You assigned the assistant network administrator to replace a defective patch cable
that connected port 1 on your patch panel to one of your network switches. You
noticed that it took him an unusually long time to complete this task. Once done,
users almost immediately began to report that the network had gone down.
Upon entering the server room, you see that the assistant administrator has
configured your network rack as shown below.
What should you do? (Choose two. Each response is a complete solution.)
Answer
Correct Answer:
Enable STP on each switch.
Correct Answer:
Remove the patch cable connecting the first switch to the third switch.
Connect the patch panel to the switches with red crossover cables.
Consolidate all patch cables from the patch panel to a single switch.
Explanation
The assistant administrator in the scenario appears to have connected the switches
together in a way that creates a bridge loop (sometimes called a switching loop).
Notice the following:
• Switch1 is connected to Switch2 and Switch3.
• Switch2 is connected to Switch1 and Switch3.
• Switch3 is connected to Switch1 and Switch2.
A bridge loop occurs when there are multiple Layer 2 paths between two network
hosts. This usually results in a broadcast storm, as the switches repeatedly
rebroadcast all broadcast messages, flooding the network.
To fix this issue, you can do one of the following:
• Remove the patch cable connecting the first switch to the third switch.
This will break the switching loop and stop the broadcast storm.
• Enable STP on each switch. STP ensures there is only one active path
between switches. Switch ports that are part of that path are placed in a
forwarding state. Switch ports that are part of redundant but unused paths
are placed in a blocking (non-forwarding) state. When an active path goes
down, the STP automatically recovers and activates the backup ports
necessary to provide continued connectivity.
Consolidating all patch cables from the patch panel to a single switch will not break
the bridge loop, nor will enabling port security on each switch port. It is not necessary
to replace the patch cables connecting the switches together with crossover cables,
as most switches have auto-MDIX enabled by default.
References
SSH
Correct Answer:
arp
netstat
arping
Explanation
Use the arp command to view the MAC addresses associated with IP addresses that
the local workstation has contacted recently. When a workstation uses ARP to find
the MAC address of an IP address, it places that information in its ARP table.
Use the arping command to send an ARP request to a specified IP
address. arping works much like ping in that the host with the specified IP address
responds.
netstat shows IP-related statistics, including incoming and outgoing connections and
active sessions, ports, and sockets.
SSH (Secure Shell) is a remote console that's similar to Telnet except that it uses
encryption that hides certain information, such as user credentials, on the other end
of the transmission.
References
Question 2:
Correct
You are troubleshooting a connectivity problem on a Linux server. You're able to
connect to another system on the local network but not to a server on a remote
network.
You suspect that the default gateway information for the system may be configured
incorrectly. Which of the following commands would you use to view the default
gateway information on the Linux server?
Answer
Correct Answer:
ifconfig
ipconfig
Telnet
dig
Explanation
Use the ifconfig command on systems running Linux to view information on the
TCP/IP configuration for network adapters.
Use ipconfig to view network configuration information on Windows systems.
Use the dig command on Linux and Unix systems to query Domain Name Service
(DNS) servers.
Telnet is a remote console that allows access to devices within a network.
References
Question 3:
Correct
arp -a
Correct Answer:
ipconfig
ping
netstat -a
Explanation
References
Question 4:
Correct
Examine the following output:
Active Connections
Proto Local Address Foreign Address State
TCP SERVER1:1036 localhost:4832 TIME_WAIT
TCP SERVER1:4798 localhost:1032 TIME_WAIT
TCP SERVER1:1258 pool-141-150-16-231.mad.east.ttr:24076 CLOSE_WAIT
TCP SERVER1:2150 cpe-66-67-225-118.roc.res.rr.com:14100 ESTABLISHED
TCP SERVER1:268 C872c-032.cpe.net.cale.rers.com:46360 ESTABLISHED
TCP SERVER1:2995 ip68-97-96-186.ok.ok.cox.net:23135 ESTABLISHED
Which of the following utilities produced this output?
Answer
dig
ifconfig
nslookup
Correct Answer:
netstat
Explanation
The netstat command produced the output. netstat reports the TCP/IP ports that
are open on the local system, as well as identifying the protocol and remote host
connected to that port. This information can be very useful when looking for security
weaknesses, as a TCP/IP port that's open to traffic unnecessarily represents a
security risk.
ifconfig is a tool used on Unix, Linux, and Macintosh systems to view the
configuration of network interfaces, including TCP/IP network settings.
The dig command allows you to perform manual DNS lookups from a Linux or Unix
system. This can be very useful when troubleshooting name resolution issues.
nslookup allows you to perform manual DNS lookups from a Windows system.
References
Question 5:
Correct
ipconfig
ifconfig
arp -a
Correct Answer:
ping
Explanation
The ping command displays the results of four echo request/reply contacts with a
destination host.
Use the ifconfig command to show you the TCP/IP configuration for a Linux
computer.
ipconfig is a utility used to obtain TCP/IP configuration on Windows systems.
Use the arp command to view the MAC addresses associated with IP addresses that
the local workstation has contacted recently. The -a switch shows current ARP
cache tables.
References
nslookup
Correct Answer:
traceroute
tracert
ifconfig
Explanation
traceroute is a Linux utility that allows you to track a packet's route as it traverses
the network. The traceroute utility is used on Linux systems, while tracert is used
on Windows systems.
ifconfig is a utility used to obtain TCP/IP configuration on Linux systems.
nslookup is a utility used to perform manual DNS lookups on Windows systems.
References
Question 7:
Correct
A security analyst is using tcpdump to capture suspicious traffic detected on port 443
of a server. The analyst wants to capture the entire packet with hexadecimal and
ASCII output only. Which of the following tcpdump options will achieve this output?
Answer
Explanation
-SX is the command line option for both full packet capture and hexadecimal and
ASCII output of port 443.
src port captures source port traffic, but this won't capture the entire packet or
output the hexadecimal and ASCII codes.
-SA captures full packets, but only ASCII output is included.
-SXX performs the same function as -SX, but it also gives the Ethernet header.
References
Question 8:
Correct
You want to make sure that a set of servers will only accept traffic for specific
network services. You have verified that the servers are only running the necessary
services, but you also want to make sure that the servers will not accept packets
sent to those services.
Which tool should you use?
Answer
IPS
System logs
Packet sniffer
IDS
Correct Answer:
Port scanner
Explanation
Use a port scanner to check for open ports on a system or firewall. Compare the list
of opened ports with the list of ports allowed by your network design and security
policy. Typically, a port is opened when a service starts or is configured on a device.
Open ports for unused services expose the server to attacks directed towards that
port.
Use a packet sniffer to examine packets on your network. With a packet sniffer, you
can identify packets directed towards specific ports, but you won't be able to tell if
those ports are open. Examine system logs to look for events that have happened on
a system, which might include a service starting, but would not likely reflect open
ports.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. A passive IDS monitors, logs, and detects security
breaches, but takes no action to stop or prevent the attack. An active IDS (also
called an intrusion protection system, or IPS) performs the functions of an IDS, but it
can also react when security breaches occur.
References
Question 9:
Correct
You have been asked to perform a penetration test for a company to see if any
sensitive information can be captured by a potential hacker. You used Wireshark to
capture a series of packets. Using the tcp contains Invoice filter, you found one
packet.
Using the captured information shown, which of the following is the name of the
company requesting payment?
Answer
Correct Answer:
ACME, Inc
Home Shop
Wood Specialist
Big 7, Inc
Explanation
By looking at the beginning of the packet, you see that Robert Scam is sending an
email with a subject line of ACME, Inc Invoice #1543. So, you now know that the
name of the company requesting payment is ACME, Inc.
References
Question 10:
Correct
With Wireshark, you've used a filter to capture only the desired packet types. Using
the information shown in the image, which of the following BEST describes the
effects of using the host 192.168.0.34 filter?
Answer
Explanation
Wireshark's host filter lets you only capture where the specified IP address is in
either the source or the destination address.
The IP address of 192.168.0.34 is a specific address for an individual device. It is not
an address for the entire network.
References