Lesson 7
Lesson 7
One of the critical problems for the provision of services is that TCP/IP
application protocols were originally devised without any security
mechanisms. Without security, there is no authentication of the servers
running the applications (or of the clients accessing them), and all data is
sent in plaintext. This makes these services highly vulnerable to spoofing,
eavesdropping, and unauthorized modification. Transport Layer Security
(TLS) was developed as an IETF standard to solve this issue.
TLS works as a layer between the Application and Transport layers of the
TCP/IP stack, or, in OSI terms, at the Session layer. It's normally used to
authenticate and encrypt TCP connections. When it is used with the HTTP
application, it is referred to as HTTP Secure (HTTPS). TLS can also be used to
secure other TCP application protocols, such as DNS, NTP, FTP, POP3/IMAP,
SMTP, and LDAP. The secure form of the protocol typically uses a different
port than the insecure version.
TLS can also be used with UDP, referred to as Datagram Transport Layer
Security (DTLS), most often in virtual private networking (VPN) solutions.
If authentication is successful, the server and client use the key pair in the
digital certificate and a chosen cryptographic cipher suite within the TLS
protocol to set up an encrypted tunnel. Even though someone else might
know the public key and be in a position to record traffic passing between
the server and client, they cannot decrypt the contents of the tunnel without
obtaining the server's private key. This means that the communications
cannot be read or changed by a third party.
The latest versions of TLS can use a mechanism called Perfect Forward
Secrecy (PFS). When this is configured, not even obtaining the server's
private key allows decrpytion of captured packets.
TLS has been developed through a number of versions, with TLSv1.3 being
current at the time of writing. A server and client must be able to agree on a
compatible version. As older versions can contain serious weaknesses, many
servers are configured to allow only TLSv1.3 or TLSv1.2. Additionally, the
client and server must be able to agree on a mutually supported cipher suite.
TLS itself was developed from an older protocol called Secure Sockets Layer
(SSL). SSL is now completely obsolete.
Top-level NTP servers (stratum 1) obtain the Coordinated Universal Time (UTC) via
a direct physical link to an accurate clock source, such as an atomic clock accessed
over the Global Positioning System (GPS). An NTP server that synchronizes its
time with a stratum 1 server over a network is operating at stratum 2. Each stratum
level represents a step away from the accurate clock source over a network link.
These lower stratum servers act as clients of the stratum 1 servers and as servers or
time sources to lower stratum NTP servers or client hosts. Most switches and
routers can be configured to act as time servers to local client hosts and this function
is also typically performed by network directory servers. It is best to configure each
of these devices with multiple reference time sources (at least three) and to establish
them as peers to allow the NTP algorithm to detect drifting or obviously incorrect
time values.
Description
Stratum 1 NTP servers are directly connected to an accurate clock source. Each
stratum level below one represents a network hop away from that accurate time
source. (Images © 123RF.com.)
Client hosts (application servers and workstations) usually obtain the time by using a
modified form of the protocol called Simple NTP (SNTP). SNTP works over the
same port as NTP. A host that supports only SNTP cannot act as a time source for
other hosts. In Windows, the Time Service can be configured by using
the w32tm command. In Linux, the ntp package can be configured
via /etc/ntp.conf.
Time drift is when a system’s clock begins to deviate from the source clock.
NTP can use two methods to deal with time drift:
Slew method—If the time is off by only a few seconds, NTP adjusts
the time a few milliseconds at a time to get it back on track. Slewing is
a slower, methodical method of correcting the time, but the risk of
problems occurring is much less.
Slam method—If the time is off by more than a few seconds and
slewing will take too long, NTP will hard reset the time. While this is a
quick and immediate fix, slamming can cause some programs to not
function properly.
If a server or host is configured with the incorrect time, it may not be able to
access network services. Authentication and other security mechanisms will
often fail if the time is not synchronized on both communicating devices. In
this situation, errors are likely to be generic failure or invalid token type
messages. Always try to rule out time synchronization as an issue early in
the troubleshooting process.
NTP is accurate enough for many network services, but not for the most
timing critical application requirements. Networks supporting industrial
processes, 5G cellular data, medical devices, market trading and financial
services, or broadcasting use the Precision Time Protocol (PTP). Where NTP
can produce millisecond precision, PTP is capable of nanosecond precision.
PTP can also be seen as a general replacement for NTP. It is defined in the
IEEE 1588 standard.
PTP can use layer 2 messaging plus hardware clocks in compatible network
adapters and switches to ensure greater levels of accuracy than NTP can
support. It uses mechanisms to measure and account for delay.
PTP can also be deployed as a layer 3 protocol over IP, but it will not work as
accurately as a layer 2 implementation with PTP-compatible hardware-
timestamping adapters and switches.
The first package we're going to check out is ntp. This is a legacy service
that's being deprecated in newer versions of Redhat and Ubuntu, but it's still
relevant for now. To install it, we need to type 'yum -y install ntp'. This installs
all the libraries, configs, and daemons needed. To check the status, we use
'systemctl status ntpd', and we see that it's not running yet. This is normal,
as we want to make sure the config is in place before we run it. It's located in
/etc, so if we type 'vi /etc/ntp.conf', it'll allow us to view the existing config
related to the ntp package.
Out of the box, this config will only be for the local system. But it's possible
to have this Redhat server as a time server for other systems. Typically, you
wouldn't go through the extra effort to make a time server unless it were GPS
synced, which provides better accuracy than an internet time server. The
config we're interested in is the server list. Whenever you specify an NTP
server, you first start with 'server', the server's name, and lastly, 'iburst'. This
sends a burst of requests to the time server at startup, which usually results
in a faster time sync. The maxpull option could be included here, but I
wouldn't set it too low, otherwise you may be blacklisted from the public
time servers. Entries like 'maxpull 10' would pull NTP messages every 1024
seconds. 6 would be 64 seconds and so on. We're just going to leave
the default time servers as they are. If your organization has specific time
server requirements, this is where you'd make those changes. Let's exit out
of this.
Systemctl 01:58-02:54
'systemctl enable ntpd' enables the daemon to start up at boot. That way we
don't forget to start. The 'systemctl start ntpd' command initializes the
daemon and runs the NTP protocol for us. Now when we check the daemon's
status with 'systemctl status ntpd', we can see that it's running. This only
tells us information about the daemon and not much related to time sync,
which is why we need to use ntpq to query for ntp-related info. When we
issue the 'ntpq -p' command, it prints a list of peers and their states. Notice
when you see the servers you're syncing against, they're not the same
as the servers you specified in your config. This is OK because when you
sync against a DNS name with the word "pool", it means that there's a pool
of servers under that name. Commands related to ntpq can be found in the
man page by typing 'man ntpq'. And here you can see the '-p' flag we just
used, among others.
Just so you know a little about the stats listed, we're going to break it
down. Most of these measurements are in milliseconds, so items such as
delay is the round trip delay it takes or latency of the time packets. The
offset refers to the difference in time between the local host and the time
server. Lastly, jitter is the variance in time between the local host and the
time server. The lower the jitter, the better. After running the command to
check the status again, we notice that it'll take a while for this clock to get in
sync, so your stats may not be good initially.
Chrony is a newer implementation of the NTP protocol. Not only can Chrony
perform better in a congested network, it can synchronize the clock quicker
and with better accuracy. All around, this is better than using the ntp
service. Keep in mind that you can't use both of them at the same time. If
you were using the ntp service prior to this, you'd need to uninstall it first
and then install Chrony. To do so, you type 'yum -y install chrony'. The
configuration is also located in /etc, so type 'vi /etc/chrony.conf'. Now, up at
the top are the time server pools that Redhat uses. Just like the ntp package,
if you had your own NTP servers, you could input them or change some
internet time server pools. Both iburst and maxpull still apply even in this
config. We're just going to keep the defaults, so let's exit this now.
After setting up either the NTP service or Chrony, make sure there are no
firewall rules restricting the use of UDP port 123. Generally, outbound system
firewall traffic isn't blocked by default.
Summary 06:18-06:29
That's it for this demo. In this demo, we showed you two different NTP
protocol services and details related to time sync in Linux.
7.1.4 Lab: Configure NTP on Linux
Use the systemctl utility to verify that the NTP service is running.
Answer Question 1.
Answer Question 2.
Add the NTP server as a time source using the following command:
Verify that the Exec computer is using the NTP server for time
synchronization using the following command:
b. Answer Question 2.
4. Add the NTP server as a time source for the Exec computer.
5. Verify that the Exec computer is using the NTP server for time
synchronization.
close modal
Score: 100%
Question 1.
Correct
You are setting up a secure website for your online store. You want to ensure
that all data transmitted between your website and your customers is
encrypted.
answer
Correct Answer:
Explanation
To secure data transmission between your website and your customers, you
need to implement HTTPS, which is the secure version of HTTP enabled by
TLS. Obtaining and installing a digital certificate from a trusted CA is
essential for this process. The digital certificate will authenticate your
website's identity to your customers and enable encrypted communication.
While useful for tracking website traffic and user behavior, web analytics
tools do not encrypt data transmission.
Increasing bandwidth can improve website performance but does not secure
data transmission.
CAPTCHA systems help differentiate human users from bots but do not
encrypt or secure data transmission.
References
resources\text\t_tls_n09\q_tls_digital_certificate_scenario_n09.question.xml
Question 2.
Correct
answer
A direct physical connection
A public network
Correct Answer:
An encrypted tunnel
Explanation
TLS operates over existing network connections and does not establish new
physical connections. It secures data transmitted over these connections
through encryption.
While TLS can secure data transmitted over public networks, it does not
establish the network itself. Its role is to provide security for data in transit,
regardless of the network type.
References
resources\text\t_tls_n09\q_tls_encrypted_tunnel_n09.question.xml
Question 3.
Correct
answer
Correct Answer:
The server provides its digital certificate to the client for authentication.
Explanation
The correct answer is that the server provides its digital certificate to the
client for authentication. The TLS handshake is a critical phase in
establishing a secure connection. During this process, the server presents its
digital certificate to the client. This certificate allows the client to verify the
server's identity, establishing trust and enabling the secure exchange of
encryption keys for the session.
References
resources\text\t_tls_n09\q_tls_tls_handshake_n09.question.xml
Question 4.
Correct
answer
Slew
Correct Answer:
Time drift
Slam
Dispersion
Explanation
Slamming is an NTP correction method where the time is hard reset to the
correct time.
Dispersion measures how scattered the time offsets (in seconds) are from a
given time server.
References
resources\text\t_ntp_n09\q_ntp_drift_n09.question.xml
Question 5.
Correct
What can happen if a server or host is configured with the incorrect time?
answer
Correct Answer:
Explanation
Without NTP or manual correction, a device will not automatically correct its
time.
References
resources\text\t_ntp_n09\q_ntp_network_services_n09.question.xml
Question 6.
Correct
You are the network administrator for a small consulting firm. You've set up
an NTP server to manage the time across all the machines in the network.
You have a computer that's experiencing a slight time drift of just a few
seconds.
Which time correction should you use to fix the system's clock?
answer
Jitter
Correct Answer:
Slew
Slam
Skew
Explanation
If time is off by just a few seconds, slewing is better for putting it back on
track. Slewing is a slower, methodical method of correcting the time, but the
risk of problems occurring is much less.
Slamming is used if the time is off by quite a bit and slewing will take too
long. While this is a quick and immediate fix, slamming can cause some
programs to function improperly.
Skew measures the difference (in hertz) between a clock's actual frequency
and the frequency necessary to keep a more accurate time.
References
resources\text\t_ntp_n09\q_ntp_slew_n09.question.xml
Question 7.
Correct
answer
PDT
Correct Answer:
UTC
CDT
EDT
Explanation
Network Time Protocol (NTP) uses Coordinated Universal time (UTC) instead
of time zones. Each device is responsible for converting the time to the local
time zone.
References
resources\text\t_ntp_n09\q_ntp_utc_n09.question.xml
Question 8.
Correct
answer
Correct Answer:
Explanation
References
Question 9.
Correct
PTP can be deployed as a layer 3 protocol over IP. What is a limitation of this
deployment?
answer
Correct Answer:
Explanation
When deployed as a layer 3 protocol over IP, PTP cannot work as accurately
as a layer 2 implementation that uses hardware-timestamping adapters and
switches, due to the nature of layer 3's handling of packets.
References
resources\text\t_ntp_issues_n09\
q_ntp_issues_layer_3_limitation_n09.question.xml
Question 10.
Correct
What is the main advantage of Precision Time Protocol (PTP) over Network
Time Protocol (NTP)?
answer
Correct Answer:
Explanation
The correct answer is that PTP provides nanosecond precision. PTP is capable
of providing nanosecond precision, making it suitable for timing-critical
applications, unlike NTP which can only provide millisecond precision. This
higher level of precision is crucial for networks supporting industrial
processes, 5G cellular data, medical devices, market trading and financial
services, or broadcasting.
The main advantage is not about supporting more network services, but
about providing higher precision.
References
resources\text\t_ntp_issues_n09\
q_ntp_issues_ptp_advantage_n09.question.xml
Websites and web applications are perhaps the most useful and ubiquitous of
network services. Web technology can be deployed for a huge range of
functions and applications, in no way limited to the static pages of
information that characterized the first websites. The foundation of web
technology is the HyperText Transfer Protocol (HTTP). HTTP enables
clients (typically web browsers) to request resources from an HTTP server. A
client connects to the HTTP server using an appropriate TCP port (TCP/80, by
default) and submits a request for a resource, using a uniform resource
locator (URL). The server acknowledges the request and either responds with
the data or with an error message.
The response and request formats are defined in the HTTP header. The HTTP
payload is usually used to serve HyperText Markup Language (HTML)
webpages, which are plain text files with coded tags describing how the page
should be formatted. A web browser can interpret the tags and display the
text and other resources associated with the page, such as binary picture or
sound files linked to the HTML page.
Description
Using Firefox's web developer tools to inspect the HTTP requests and
response headers involved in serving a typical modern webpage.
(Screenshot courtesy of Mozilla Foundation.)
HTTP also features a forms mechanism (POST) that enables a user to submit
data from the client to the server. HTTP is nominally a stateless protocol; this
means that the server is not required to preserve information about the
client during a session. However, the basic functionality of HTTP servers is
also often extended by support for scripting and programmable features
(web applications). Servers can also set text file cookies to preserve session
information. These coding features, plus integration with databases, increase
flexibility and interactivity, but also increase the attack surface and expose
more vulnerabilities.
Many argue that HTTP is a stateful protocol. Version 2 of HTTP adds more
state-preserving features (blog.zamicol.com/2017/05/is-http2-stateful-
protocol-application.html).
Web Servers
The main web server platforms are Apache, Microsoft Internet Information
Services (IIS), and NGINX.
It is often necessary to transfer files to and from appliances or servers from a remote
host. Many methods of remote file access use some form of the File Transfer Protocol
(FTP). While HTTPS-based web services and web applications can now offer file
downloads to end users, FTP is still often used to perform the administrative
upload/download of files to and from servers and appliances. For these uses, it is
important to secure the FTP session.
In passive mode, the client opens a data port (again, typically n+1) and sends
the PASV command to the server's control port. The server then opens a random high
port number and sends it to the client using the PORT command. The client then initiates
the connection between the two ports.
Description
Active FTP poses a configuration problem for some firewalls, as the server is initiating
the inbound connection, but there is no way of predicting which port number will be
utilized. However, not all FTP servers and clients can operate in passive mode. If this is
the case, check that firewalls installed between the client and server can support active
FTP (stateful inspection firewalls).
Another problem is that the control connection can remain idle when the data connection is in use,
meaning that the connection can be "timed out" by the firewall (or other routing device).
Secure FTP (SFTP) addresses the privacy and integrity issues of FTP by
encrypting the authentication and data transfer between client and server. In
SFTP, a secure link is created between the client and server using Secure
Shell (SSH) over TCP port 22. Ordinary FTP commands and data transfer can
then be sent over the secure link without risk of eavesdropping. This solution
requires an SSH server that supports SFTP plus SFTP client software.
FTPS is tricky to configure when there are firewalls between the client and
server. Consequently, FTPES is usually the preferred method.
File and print services allow network clients to share access to disk and
printer resources.
SMB has gone through several updates, with SMB3 as the current version.
SMB1 has very serious security vulnerabilities and is now disabled by default
on current Windows versions
(docs.microsoft.com/en-us/windows-server/storage/file-server/troubleshoot/
detect-enable-and-disable-smbv1-v2-v3).
The main drawback of NAS is that it shares bandwidth with other network
applications. Adding a NAS to an already overwhelmed network increases
network traffic and may result in unacceptable delays for users and
applications to access data. On networks with adequate bandwidth, however,
a NAS is a quick and easy way of adding shared storage.
The open source MySQL platform uses TCP/3306. The MariaDB platform
forked from MySQL uses the same port.
These are the principal ports. An RDBMS is likely to use other TCP or UDP
ports for additional functions.
By default, these ports are insecure. However, the RDBMS server can be
installed with a certificate and configured to enable TLS transport encryption.
The connection is still made over the same port. Either the server or the
client can be configured to require encryption and drop the connection if a
valid security profile is not available. Optionally, the client can also be
installed with a certificate and the server configured to refuse connections
from clients without a valid certificate.
The other type of database is referred to as NoSQL or "not only SQL." Rather
than highly structured relational tables, NoSQL data can use a variety of
formats, such as key-value pairs or wide columns (where rows do not have to
have the same set of fields). NoSQL databases are typically accessed using
an application programming interface (API) over HTTPS.
All the RDBMS platforms also provide support for NoSQL datastores. There
are also dedicated NoSQL platforms, such as MongoDB, Amazon DynamoDB,
and CouchDB.
Your answer:4
Correct answer:4
c. Press Enter.
close modal
Score: 100%
Question 1.
Correct
answer
Correct Answer:
Explanation
The correct answer is that each request from a client to a server is treated as
a new request. Being a stateless protocol means that HTTP does not retain
any memory of past requests. Each request is treated independently, without
any knowledge of previous interactions.
The server does not retain information about client requests indefinitely; this
would imply stateful behavior.
Storing data in a centralized database for all requests is a design choice for
managing state and is not inherent to the stateless protocol itself.
References
resources\text\t_http_n09\q_http_stateless_protocol_n09.question.xml
Question 2.
Correct
What feature does version 2 of HTTP add to enhance its functionality?
answer
Increased encryption
Correct Answer:
Explanation
References
resources\text\t_http_n09\q_http_state_preserving_n09.question.xml
Question 3.
Correct
What does a client use to identify the resource it wants to request from an
HTTP server?
answer
MAC address
Correct Answer:
Port number
IP address
Explanation
References
resources\text\t_http_n09\q_http_url_n09.question.xml
Question 4.
Correct
answer
80
8080
21
Correct Answer:
443
Explanation
HTTPS encrypted traffic is sent over TCP port 443 by default. This is different
from HTTP, which uses the unencrypted port 80.
Port 8080 is often used for an HTTP proxy or secondary web server, not
standard HTTPS traffic.
Port 21 is used for FTP (File Transfer Protocol), not HTTPS.
References
resources\text\t_ssl_n09\q_ssl_https_port_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
Active mode FTP can lead to firewall configuration issues because the server
initiates connections to random client ports, which can be blocked by
firewalls not configured to allow such connections.
FTP does not require HTTPS; this is a separate protocol used for secure web
browsing.
Active mode FTP uses TCP ports 20 and 21, not 22, which is for SSH.
FTP does not provide encryption by default; secure versions like FTPS or SFTP
are needed for encryption.
References
resources\text\t_ftp_n09\q_ftp_active_limitation_n09.question.xml
Question 6.
Correct
answer
Correct Answer:
Explanation
FTP is designed to enable the transfer of files between a client and a server
over a network, making it the primary protocol for such tasks.
Encryption of web traffic is typically handled by protocols like HTTPS, not FTP.
Sending email messages is the function of protocols like SMTP, not FTP.
References
resources\text\t_ftp_n09\q_ftp_primary_purpose_n09.question.xml
Question 7.
Correct
answer
It requires manual confirmation for each packet.
Correct Answer:
Explanation
The correct answer is that it operates over UDP, which does not guarantee
delivery. TFTP's use of UDP means it lacks mechanisms like error checking
and retransmission, making it unsuitable for large files where reliability is
crucial.
TFTP does not provide encryption; its unsuitability for large files is due to its
use of UDP.
TFTP's suitability is not limited by network scope but by its reliability and
feature set.
TFTP's limitations stem from its use of UDP, not from requiring manual packet
confirmation.
References
resources\text\t_ftp_n09\q_ftp_transfer_large_files_n09.question.xml
Question 8.
Correct
answer
Correct Answer:
The preference for FTPES over FTPS is not based on speed; both can
potentially offer similar transfer speeds.
FTPES does not necessarily use stronger encryption than FTPS; both use TLS
for encryption. The preference is due to ease of configuration.
The ability to support larger file transfers is not the reason FTPES is
preferred; both FTPES and FTPS can handle large file transfers similarly.
References
resources\text\t_sftp_n09\q_sftp_ftpes_vs_ftps_n09.question.xml
Question 9.
Correct
In the context of FTP over Explicit TLS (FTPES), which command is used to
encrypt the data connection for actual file transfers after upgrading an
unsecure connection to a secure one?
answer
AUTH TLS
SSH
Correct Answer:
PROT
PASV
Explanation
The PROT command is used in FTP over Explicit TLS (FTPES) to encrypt the
data connection for actual file transfers after an unsecure connection has
been upgraded to a secure one using the AUTH TLS command. This ensures
that not only the authentication credentials are protected but also the data
being transferred.
References
resources\text\t_sftp_n09\q_sftp_prot_command_n09.question.xml
Question 10.
Correct
answer
SMTP
Correct Answer:
SMB or FTP
SNMP
HTTP
Explanation
SMTP is used for sending emails, not for file transfers or backups.
SNMP is used for network management and monitoring, not for file transfers
or backups.
References
resources\text\t_file_services_n09\
q_file_services_nas_copy_backup_n09.question.xml
Question 11.
Correct
answer
It is too slow.
Correct Answer:
Explanation
The primary reason for disabling SMB1 is not its speed but its security
vulnerabilities.
While SMB1 does not support encryption, the main reason for its deprecation
is its security vulnerabilities.
References
o 6.1.6 Common TCP and UDP Ports
resources\text\t_file_services_n09\
q_file_services_smb1_disabled_n09.question.xml
Question 12.
Correct
answer
All versions
Correct Answer:
SMB3
SMB1
SMB2
Explanation
SMB1 does not support message encryption and has serious security
vulnerabilities.
SMB2 introduced several improvements over SMB1 but did not include
message encryption.
References
resources\text\t_file_services_n09\q_file_services_smb3_n09.question.xml
Question 13.
Correct
Windows
iOS
Correct Answer:
Linux-based
MacOS
Explanation
Windows is commonly used for PCs and servers but not typically for NAS
appliances.
MacOS is used for Apple's computers and is not the standard OS for NAS
devices.
iOS is used for Apple's mobile devices and is not suitable for the operation of
NAS appliances.
References
resources\text\t_nas_n09\q_nas_linux_os_n09.question.xml
Question 14.
Correct
answer
Correct Answer:
While some databases come with GUIs for management, the primary
function of a database is data storage and retrieval, not serving as a GUI.
References
resources\text\t_db_services_n09\
q_db_services_primary_role_n09.question.xml
Question 15.
Correct
answer
Correct Answer:
Explanation
While TLS can secure data during synchronization, its primary purpose is to
secure data in transit, not the synchronization process itself.
References
resources\text\t_db_services_n09\
q_db_services_tls_purpose_n09.question.xml
Description
SMTP communications can be secured using TLS. This works much like HTTPS
with a certificate on the SMTP server and a negotiation between client and
server about which cipher suites to use. There are two ways for SMTP to use
TLS:
Typical SMTP configurations use the following ports and secure services:
Mail clients can use port 25 to submit messages to the server for delivery,
but this is not best practice. Use of port 25 is typically reserved for relay
between servers.
7.3.2 Internet Message Access Protocol
SMTP is useful only to deliver mail to hosts that are permanently available.
When a message is received by an SMTP server, it delivers the message to a
mailbox server. This could be a separate machine or a separate process
running on the same server. A mailbox access protocol allows the user's
client email software to operate the mailbox.
Internet Message Access Protocol (IMAP) is the most widely used mail
retrieval protocol. IMAP supports permanent connections to a server and
connecting multiple clients to the same mailbox simultaneously. It also allows
a client to manage the mailbox on the server (to organize messages in
folders and to control when they are deleted, for instance) and to create
multiple mailboxes.
A client connects to an IMAP server over TCP port 143, but this port is
insecure. Connection security can be established using a TLS. The default
port for IMAPs is TCP/993.
Legacy voice services use the public switched telephone network (PSTN). A
residential telephone installation would be serviced by a simple box
providing a one- or two-line analog interface to the local exchange. This
analog interface is also referred to as the plain old telephone service (POTS).
Each line provides a single channel for an incoming or outgoing call. A typical
business requires tens or hundreds of lines for voice communications, let
alone capacity for data communications. Historically, this requirement would
have been facilitated by a digital trunk line, also referred to as
a time division multiplexing (TDM) circuit. A TDM can multiplex separate
voice and data channels for transmission over a single cable.
VoIP-Enabled PBX
TDM-based PBXes are being replaced by hybrid and fully IP/VoIP PBXes. For
internal calls and conferences, a VoIP PBX establishes connections between
local VoIP endpoints with data transmitted over the local Ethernet network. A
VoIP PBX can also route incoming and outgoing calls from and to external
networks. This might involve calls between internal and external VoIP
endpoints, or with voice telephone network callers and receivers. A VoIP PBX
will also support features such as music on hold and voicemail.
A VoIP PBX would normally be placed at the network edge and be protected
by a firewall. Internal clients connect to the PBX over Ethernet data cabling
and switching infrastructure, using Internet Protocol (IP) at the Network layer
for addressing. The VoIP PBX uses the organization's Internet link to connect
to a VoIP service provider, which facilitates inward and outward dialing to
voice-based telephone networks.
Description
A VoIP PBX facilitates internal IP calls and calls to and from external VoIP
networks and the landline and cellular telephone networks. (Images ©
123RF.com.)
Voice and video services can be challenging to support because they require
response times measured in milliseconds (ms). Delayed responses will result
in poor call or video quality. This type of data can be one-way, as is the case
with media streaming, or two-way, as is the case with VoIP and VTC.
The Session Initiation Protocol (SIP) is one of the most widely used
session control protocols. SIP endpoints are the end user devices (also known
as user agents), such as IP-enabled handsets or client and server web
conference software. Each device, conference, or telephony user is assigned
a unique SIP address known as a SIP Uniform Resource Identifier (URI).
Examples of SIP URIs include:
sip:jaime@2622136227
meet:sip:[email protected];ms-app=conf;ms-conf-id=subg42
There is also a tel: URI scheme allowing SIP endpoints to dial a landline or
cell phone. A tel: URI can either use the global (E.164) format (such as tel:
+1-866-8358020) or a local format (for internal extensions).
SIP typically runs over UDP or TCP ports 5060 (insecured) and 5061 (SIP-TLS).
SIP has its own reliability and retransmission mechanisms and can thus be
seen to benefit most from the lower overhead and reduced latency and jitter
of UDP. Some enterprise SIP products use TCP anyway.
While SIP provides session management, the actual delivery of real-time data
uses different protocols. The principal one is Real-time Transport Protocol
(RTP). RTP enables the delivery of a stream of media data via UDP, while
implementing some of the reliability features usually associated with TCP
communications. RTP works closely with the RTP Control Protocol (RTCP).
Each RTP stream uses a corresponding RTCP session to monitor the quality of
the connection and to provide reports to the endpoints. These reports can
then be used by the applications to modify codec parameters or by the
network stacks to tune quality of service (QoS) parameters.
Voice over Internet Protocol, or VoIP, is the ability to make phones calls over
the internet. Landlines or telephone lines used to be the main method to
receive phone calls, but VOIP and cell phones have replaced much of the
existing infrastructure. Not only can they provide more options, they can
even save you money as well.
Typically, when FreePBX is built, it's set to DHCP. We want to make sure this
is static so that any firewall rules or phones connecting to this IP will
work. Leaving the DHCP in place could result in an IP change if a reservation
isn't set up. These options are in 'Admin' and 'System Admin'.
On the right-hand side, you'll see 'Network Settings'. Click that. We want to
change this to 'Static' and then pick a different IP address that isn't in our
DHCP range. The rest of the settings can be left as is; these are the right
settings for our network. Saving this interface brings up a window
reminding us of the risks related to changing these settings. Click 'Save and
Apply'. Since the IP has changed, we have to go to the new one. We just
change our IP to '150' on the end and it'll refresh the screen. It's possible
that it might prompt us for a re-login.
Now that that's out of the way, we need to change some more
settings. Under 'Settings' and 'Asterisk SIP Settings', we're interested
specifically in the NAT settings here. If these aren't set right, you could have
problems. For example, we want to define our external (public) IP address
and define all our local networks to use FreePBX. You can see tabs for
chan_pjsip and chan_sip. The chan_pjsip driver is a newer one that
hasn't been used by many SIP trunk providers yet. A SIP trunk is a media
service provided by companies to trunk your phones to a public-switched
phone network. Without a SIP trunk, all you could do would be dial internal
business extensions. We know that our SIP trunk provider is only using
chan_sip, so we need to update our ports. Basically, we need to switch the
port 5060, which is the chan_pjsip one, to use something else so that
chan_sip can have it.
On our chan_pjsip tab, we scroll down and change the port to say
'5260'. When we submit the config, it does give us a note telling us Asterisk
will need to be restarted so the port changes can take effect. Let's apply the
config before proceeding. The easiest way to do this is to go to our console
session for this server. We're going to open PuTTY and go to
'192.168.30.150'. Next, we provide the root username and password for the
server. Then all we need to type is 'fwconsole restart'. This will run through
restarting Asterisk. Since this process takes several iterations to complete,
we're going to fast forward.
Now that our changes are done, we can show you the final product. On our
chan_pjsip, the port is 5160. And if we go to the chan_sip tab, our port is
5060. Basically, we just flipped the ports since weren't not using chan_pjsip.
Next, we're going to look at the area where we configure SIP trunks. Under
'Connectivity' and 'Trunks' is where we'd define our SIP trunk vendor. The
nice thing is that there's a built-in vendor called SIPStation. So, if you do use
SIPStation, it's very easy to configure the SIP trunk with little to no hassle.
Our SIPStation trunks are already defined, but we were unable to show the
wizard due to the personal information needed. If you didn't use SIPStation
and you wanted to add another vendor, you'd typically click 'Add Trunk' and
then 'Add SIP (chan_sip) Trunk'. The SIP trunk provider should give you all the
information you need or a tutorial on how to set it all up. For example, if you
want to set up a trunk name, the phone number associated with your SIP
trunk channel would be listed on the outbound caller ID here. On the 'sip
Settings' tab, you'd provide a Trunk Name and PEER Details. These details
provide the proper connection details, username, and password to connect to
your SIP trunk provider. You'd put similar details on the Incoming tab as
well. Once a trunk is defined, you can then configure the Inbound and
Outbound routes. This is necessary. Otherwise, FreePBX doesn't know
where to route incoming and outgoing calls. Under 'Connectivity' and
'Inbound Routes', you can see that we have one phone number defined from
our SIPStation wizard. If you go to the edit icon, that number is defined as
the DID number because we're using DID verification for the destination
SIPStation trunk. If we go to 'Connectivity' and then 'Outbound Routes', we
see the SIPStation-Out route, too. There are three outbound routes
configured, like the E911 one here, our normal SIPStation outbound route,
and an international outbound route as well. We're just going to deal with the
general outbound route, so let's click the edit icon.
At the bottom, you can see which trunks this is tied to. There are two trunks
listed for redundancy. Under dial patterns is where you configure patterns for
outbound calls. These are the default for SIPStation, but if your company has
a need to switch these patterns, they could do so here.
Extensions 06:35-08:32
Our server is mostly ready. The last thing we need to look at is extensions. To
do so, let's go to 'Applications' and 'Extensions'. As you can see, we have
none. To add one, we can click 'Add Extension' or 'Quick Create
Extension'. The Quick Create option makes things simpler, so let's go with
that.
The Type will be 'chan_sip' since our provider is using that one. The
Extension Number typically shouldn't be the number 1. We're going to start
at 100, but your organization can start on another one if they want.
Display Name would be the name of the person using the phone. You can
specify the Outbound Caller ID, but this would override the caller ID when
going out of a trunk. For now, we're not going to set that. Next, we can put in
an email, such as '[email protected]'.
Now that we have all these settings in place, we should be able to configure
more extensions. Keep in mind that you'll need to do some server
hardening to make sure that this FreePBX server is secure.
Summary 08:32-08:44
That's it for this demo. In this demo, we showed you how to set up a FreePBX
server, provided an overview of SIP trunks, and set up a VoIP phone
extension.
Handsets can use Power over Ethernet (PoE), if available, to avoid the need
for separate power cabling or batteries. There are also wireless handsets that
work over 802.11 Wi-Fi networks.
A Voice over IP, or VoIP, phone is a phone that's specifically used with a VoIP
telephone system. This phone hooks up to a RJ45 connector rather than to a
RJ11 one, which is a standard telephone line. There are many brands of VoIP
phones available, but today, we're just going to look at one from this
particular vendor Polycom.
What you see here is a web browser for the Polycom phone we have on our
network. You should enable DHCP by default so that you can go onto the
phone's screen to obtain the assigned IP address. Our address happens to be
192.168.30.102. When we log in, the default password is 456. Just like the
note up here says, we suggest that you change the default admin password.
This model is a VVX 400. Typically, VoIP phones are more universal when it
comes to business phone systems because they aren't tied to one
brand. First, let's go to 'Preferences' and then 'Date and Time'. It's a good
idea to have the VoIP server and phone synced to the same Network Time
Protocol, or NTP, server. Simple Network Time Protocol, or SNTP, is similar to
NTP. It's basically implemented when a full NTP implementation isn't
necessary. Since we don't have an NTP server on site, let's set this up.
Our first server will be 'pool.ntp.org', and the second one will be 'north-
america.pool.ntp.org' since we're in North America. We're going to set the
time zone and alternate the same because we don't want an alternate time
zone. You can use the overrides, but if you don't have an NTP server on your
network, it won't matter. Also, we can see that daylight savings time is
enabled already. Click 'Save'.
Now back to our Polycom phone. We can enter the user ID of '100' and paste
our password. We'll enter same IP under the Server 1 tab for the address
'192.168.30.150'. The port doesn't need to be set, as the default is 0.
The last part we need to configure is the Message Center. Although it's called
that, it's really just our voicemail. To access this on a FreePBX server, we use
*97 in both the subscription address and callback contact. Let's set the
callback mode to 'Contact'. Having this setup allows for the
voicemail buttons on the phone to work properly. Click 'Save' at the
bottom. Great! Our phone is set up and ready to go.
Troubleshooting 04:00-04:39
Summary 04:39-04:45
https://labsimapp.testout.com/v6_0_588/simwindow.html?
c2ltRGVmVXJsPWh0dHBzJTNBJTJGJTJGY2RuLnRlc3RvdXQuY29tJTJGX3ZlcnNpb
25fNj…
1/2
Lab Report
Lab Report
Not Passed
TASK SUMMARY
Required Actions
Plug the Exec workstation and monitor into the surge protector
o Connect the LAN port on the IP phone to the Ethernet port on the
wall outlet.
o Connect the LAN port on the IP phone to the Ethernet port on the
wall outlet.
EXPLANATION
c. For the IP phone shown, select Details and then select Specifications.
f. Above the IP phone, select Back to switch to the back view of the phone.
i. From the Selected Component pane, drag the unconnected RJ45 Connector
to the Ethernet port on the
wall outlet.
l. Above the IP phone, select Front to switch to the front view of the phone.
Confirm that the phone's
display is on.
g. Drag both AC Power plugs from the wall outlet to an open outlet on the
surge protector.
i. From the Selected Component pane, drag the AC Power Connector (Male)
to an open plug on the wall
outlet.
c. Above the IP phone, select Back to switch to the back view of the phone.
f. From the Selected Component pane, drag the unconnected RJ45 Connector
to the Ethernet port on the
wall outlet.
g. Above the workstation, select Back to switch to the back view of the
workstation.
h. From the Shelf, drag Cat5e Cable, RJ45 to the PC port on the phone
From the Lobby and the Executive Office, complete the following:
o Disconnect the AC/DC adapter from the IP phone and the wall.
o Confirm that the phones are still receiving power through PoE.
Install an IP phone in the Support Office.
o Move the Ethernet cable from the computer to the LAN port on
the phone.
o ping 198.28.2.254.
o ping 198.28.2.254.
• Lab Report
• Time Spent: 00:07
• Score: 0/4 (0%)
• Not Passed
• Passing Score: 4/4 (100%)
• TASK SUMMARY
• Required Actions
• Disconnect the AC adapter from the IP phone in the Lobby and
place it on the ShelfShow Details
• Disconnect the AC adapter from the IP phone in the Executive
Office and place it on the ShelfShow Details
• Add an IP phone to the Support OfficeShow Details
• Confirm that the Support workstation is connected to the internet
• EXPLANATION
• Complete this lab as follows:
• 1. From the Lobby, disconnect the AC/DC adapter from the IP
phone and the wall.
• a. Under Lobby, select Hardware.
• b. Above the IP phone, select Back to switch to the back view of
the phone.
• c. Drag the DC power connector from the phone to the Shelf.
• d. Drag the AC power plug from the wall outlet to the Shelf.
• e. Above the IP phone, select Front to switch to the front view of
the phone and confirm it is on.
• 2. From the Executive Office, disconnect the AC/DC adapter from
the IP phone and the wall.
• a. From the top left, select Floor 1 Overview.
• b. Under Executive Office, select Hardware.
• c. Above the IP phone, select Back to switch to the back view of
the phone.
• d. Drag the DC power connector from the phone to the Shelf.
• e. Drag the AC power plug from the wall outlet to the Shelf.
• f. Above the IP phone, select Front to switch to the front view of
the phone and confirm it is on.
• 3. From the Support Office, connect an IP phone.
• a. From the top left, select Floor 1 Overview.
• b. Under Support Office, select Hardware.
• c. Under Shelf, expand Phones.
• d. Drag the IP Phone to the Workspace.
• e. Above the IP phone, select Back to switch to the back view of
the phone.
• f. Above the workstation, select Back to switch to the back view
of the workstation.
• g. Drag the RJ45 Ethernet cable from the workstation to the LAN
port (top port) on the IP phone.
• h. Under Shelf, expand Cables and then select Cat5e Cable, RJ45.
• i. From the Selected Component pane:
• Drag an RJ45 Connector to the PC port on the phone.
• Drag the other unconnected RJ45 Connector to the NIC on the
workstation.
• 4. Make sure the Support computer is still connected to the
internet.
• a. On the Support monitor, select Click to view Linux.
• b. From the favorites bar, select Terminal.
• c. From the terminal, type ping -c4 198.28.2.254 (the ISP) and
press Enter
• Lab Report
• Lab Report
• Time Spent: 00:07
• Score: 0/4 (0%)
• Not Passed
• Passing Score: 4/4 (100%)
• TASK SUMMARY
• Required Actions
• Disconnect the AC adapter from the IP phone in the Lobby and
place it on the ShelfShow Details
• Disconnect the AC adapter from the IP phone in the Executive
Office and place it on the ShelfShow Details
• Add an IP phone to the Support OfficeShow Details
• Confirm that the Support workstation is connected to the internet
• EXPLANATION
• Complete this lab as follows:
• 1. From the Lobby, disconnect the AC/DC adapter from the IP
phone and the wall.
• a. Under Lobby, select Hardware.
• b. Above the IP phone, select Back to switch to the back view of
the phone.
• c. Drag the DC power connector from the phone to the Shelf.
• d. Drag the AC power plug from the wall outlet to the Shelf.
• e. Above the IP phone, select Front to switch to the front view of
the phone and confirm it is on.
• 2. From the Executive Office, disconnect the AC/DC adapter from
the IP phone and the wall.
• a. From the top left, select Floor 1 Overview.
• b. Under Executive Office, select Hardware.
• c. Above the IP phone, select Back to switch to the back view of
the phone.
• d. Drag the DC power connector from the phone to the Shelf.
• e. Drag the AC power plug from the wall outlet to the Shelf.
• f. Above the IP phone, select Front to switch to the front view of
the phone and confirm it is on.
• 3. From the Support Office, connect an IP phone.
• a. From the top left, select Floor 1 Overview.
• b. Under Support Office, select Hardware.
• c. Under Shelf, expand Phones.
• d. Drag the IP Phone to the Workspace.
• e. Above the IP phone, select Back to switch to the back view of
the phone.
• f. Above the workstation, select Back to switch to the back view
of the workstation.
• g. Drag the RJ45 Ethernet cable from the workstation to the LAN
port (top port) on the IP phone.
• h. Under Shelf, expand Cables and then select Cat5e Cable, RJ45.
• i. From the Selected Component pane:
• Drag an RJ45 Connector to the PC port on the phone.
• Drag the other unconnected RJ45 Connector to the NIC on the
workstation.
• 4. Make sure the Support computer is still connected to the
internet.
• a. On the Support monitor, select Click to view Linux.
• b. From the favorites bar, select Terminal.
• c. From the terminal, type ping -c4 198.28.2.254 (the ISP) and
press Enter
Question 1.
Incorrect
What does SMTP use to discover the IP address of the recipient's SMTP
server?
answer
Correct Answer:
Incorrect answer:
Explanation
The SMTP server uses the domain name part of the recipient's email address
to discover the IP address of the recipient SMTP server through DNS.
The recipient's email password is not used in the process of discovering the
recipient's SMTP server IP address.
References
resources\text\t_smtp_n09\q_smtp_domain_name_discover_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
Explanation
While STARTTLS helps secure the connection, encrypting the entire email
content is not its sole purpose.
References
resources\text\t_smtp_n09\q_smtp_starttls_purpose_n09.question.xml
Question 3.
Correct
What is one of the primary purposes of the Internet Message Access Protocol
(IMAP)?
answer
Correct Answer:
Explanation
IMAP does not encrypt email messages; it is used for mailbox management.
Encryption can be added with TLS or other security protocols.
SMTP, not IMAP, is used to deliver email to hosts. IMAP is focused on mailbox
management.
IMAP is used for accessing and managing email mailboxes, not for
connecting to web servers.
References
resources\text\t_mailbox_n09\
q_mailbox_imap_primary_purpose_n09.question.xml
Question 4.
Correct
answer
Correct Answer:
MAPI
SMTP
IMAP
HTTPS
Explanation
HTTPS is a secure transport protocol used on the web, not specifically for
accessing Microsoft Exchange mailboxes.
References
resources\text\t_mailbox_n09\q_mailbox_mapi_exchange_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
VoIP technology allows for the transmission of voice communications over IP
networks, which can lead to cost savings, greater flexibility, and integration
with other IP-based services.
VoIP provides more, not limited, call routing options due to its use of IP
networks.
VoIP does not require separate voice and data channels; it can integrate
voice and data communications over the same IP network.
References
resources\text\t_voice_video_n09\q_voice_video_pstn_line_n09.question.xml
Question 6.
Correct
answer
A VoIP PBX requires a separate data channel for each call, while a TDM PBX
does not.
A TDM PBX can only support voice mail, while a VoIP PBX cannot.
Correct Answer:
A TDM PBX uses the Internet for all calls, while a VoIP PBX uses the PSTN.
Explanation
A key difference between TDM and VoIP PBX systems is that TDM PBXes are
typically provided as specific hardware solutions, whereas VoIP PBXes can be
implemented as software running on general-purpose servers, offering more
flexibility.
Both TDM and VoIP PBX systems can support voice mail.
A VoIP PBX does not require a separate data channel for each call; it can
multiplex multiple calls over the same IP network.
It's the other way around; a TDM PBX primarily uses the PSTN, while a VoIP
PBX uses the Internet for transmitting voice communications.
References
resources\text\t_voice_video_n09\
q_voice_video_tdm_vs_voip_n09.question.xml
Question 7.
Correct
answer
DNS name
IP address
Correct Answer:
SIP URI
MAC address
Explanation
The correct answer is SIP Uniform Resource Indicator (URI). SIP URIs are
unique identifiers assigned to devices, conferences, or telephony users in SIP
systems. They are used for user discovery and session initiation.
DNS name is used to identify entities on the Internet but is not the specific
identifier used by SIP endpoints in VoIP communications.
References
o 6.1.6 Common TCP and UDP Ports
resources\text\t_voip_n09\q_voip_sip_unique_identifier_n09.question.xml
Question 8.
Correct
answer
Correct Answer:
Explanation
To dial a landline or cell phone is the correct answer. The tel: URI scheme
allows SIP endpoints to dial a landline or cell phone, either using the global
(E.164) format or a local format for internal extensions.
Encrypting voice communications is not the purpose of the tel: URI scheme;
it is used for dialing purposes.
Assigning unique identifiers to devices is the role of SIP URIs, not the tel: URI
scheme.
References
resources\text\t_voip_n09\q_voip_uri_scheme_purpose_n09.question.xml
Question 9.
Incorrect
answer
Incorrect answer:
Correct Answer:
Explanation
The correct answer is by configuring separate VLAN IDs for data and voice
traffic. VoIP phones use VLAN tagging to configure separate VLAN IDs for
data and voice traffic, allowing the two types of traffic to be distinguished
and managed separately on the same physical network link.
By using separate physical links for each type of traffic is incorrect because
VoIP phones typically share the same physical link for both data and voice
traffic, using VLAN IDs to segregate them.
By using digital certificates for voice traffic only is incorrect because digital
certificates are used for securing communications, not for distinguishing
between data and voice traffic.
By prioritizing voice traffic over data traffic using PoE is incorrect because
PoE provides power, not traffic prioritization or segregation.
References
resources\text\t_voip_phones_n09\
q_voip_phones_data_vs_voice_traffic_n09.question.xml
Question 10.
Correct
Correct Answer:
To ensure that SIP control and RTP media protocols are segregated from
normal data traffic
To ensure that voice and data traffic are combined on the same network
Explanation
The correct answer is to ensure that SIP control and RTP media protocols are
segregated from normal data traffic. VLAN tagging allows VoIP phones to
segregate SIP control and RTP media protocols from normal data traffic,
ensuring efficient and secure communication without interference from other
types of network traffic.
To ensure that voice and data traffic are combined on the same network is
incorrect because the purpose of VLAN tagging is to segregate, not combine,
different types of traffic.
To disable all data traffic except for VoIP communication is incorrect as VLAN
tagging segregates traffic types; it does not disable non-VoIP data traffic.
References
resources\text\t_voip_phones_n09\
q_voip_phones_vlan_tagging_n09.question.xml
Identify scenarios for natural and non-natural disasters and options for
protecting systems.
Train staff in the disaster planning procedures and how to react well to
adverse events.
Testing system resilience and incident response effectiveness are crucial for
organizations to recover from disruptions and maintain business continuity.
By conducting various tests, organizations can identify potential
vulnerabilities, evaluate the efficiency of their recovery strategies, and
improve their overall preparedness for real-life incidents.
99.9999% 00:00:32
99.999% 00:05:15
99.99% 00:52:34
99.9% 08:45:36
99% 87:36:00
A system where there is almost no scheduled downtime and outages are
extremely rare is also referred to as continuous availability. This sort of
availability is required when there is not just a commercial imperative, but a
danger of injury or loss of life associated with systems failure. Examples
include networks supporting medical devices, air traffic control systems,
communications satellites, networked autonomous vehicles, and smart traffic
signaling systems.
The MTD metric sets the upper limit on the amount of recovery time that
system and asset owners have to resume operations. Additional metrics can
be used to govern recovery operations:
Recovery point objective (RPO). This is the amount of data loss that a
system can sustain, measured in time units. That is, if a database is
destroyed by a virus, an RPO of 24 hours means that the data can be
recovered from a backup copy to a point not more than 24 hours before the
database was infected.
Description
Any data that has been lost between the RPO and the present needs to
either be accepted as a loss or reconstructed.
Providing redundant devices and spares or network links allows the spare
devices to be swapped in if existing systems fail. Enterprise-level networks
often also provide for spare sites. A spare site is another location that can
provide the same (or similar) level of service. A disaster or systems failure at
one site will cause services to failover to the alternate processing site.
Disaster recovery planning must demonstrate how this will happen, what
checks need to be made to ensure that failover has occurred successfully
(without loss of transactional data or service availability), and how to revert
to the primary site once functionality is restored there.
A warm site could be similar but with the requirement that the latest
dataset will need to be loaded.
A cold site takes longer to set up. A cold site may be an empty
building with a lease agreement in place to install whatever equipment
is required when necessary.
Clearly, providing redundancy on this scale can be very expensive. Sites are
often leased from service providers. However, in the event of a nationwide
emergency, demand for the services is likely to exceed supply! Another
option is for businesses to enter into reciprocal arrangements to provide
mutual support. This is cost-effective but complex to plan and set up.
Where NIC teaming allows load balancing at the component level, a load
balancer can be deployed as a hardware appliance or software instance to
distribute client requests across server nodes in a farm or pool. You can use a
load balancer in any situation where you have multiple servers providing the
same function. Examples include web servers, front-end email servers, and
web conferencing, video conferencing, or streaming media servers. The load
balancer is placed in front of the server network and distributes requests
from the client network or Internet to the application servers. The service
address is advertised to clients as a virtual server. This is used to provision
services that can scale from light to heavy loads, provision fault tolerant
services, and to provide mitigation against distributed denial of service
(DDoS) attacks.
Description
Play Video
CC
1.6x
Volume Control
Play Video
CC
1.6x
Volume Control
Virtual IP
For example, you might want to provision two load balancer appliances so
that if one fails, the other can still handle client connections. Unlike load
balancing with a single appliance, the public IP used to access the service is
shared between the two instances in the cluster. This is referred to as
a virtual IP or shared or floating address. The instances are configured with
a private connection, on which each is identified by its "real" IP address. This
connection runs some type of redundancy protocol, such as Common
Address Redundancy Protocol (CARP), that enables the active node to "own"
the virtual IP and respond to connections. The redundancy protocol also
implements a heartbeat mechanism to allow failover to the passive node if
the active one should suffer a fault.
Description
In the previous example, if one node is active, the other is passive. This is
referred to as active-passive clustering. The major advantage of
active/passive configurations is that performance is not adversely affected
during failover. However, the hardware and operating system costs might be
higher because of the unused capacity.
Description
Hot Standby Router Protocol (HSRP) topology. (Image © 123RF.com.)
Cisco also has the Gateway Load Balancing Protocol (GLBP) which allows for
an active/active load-balanced configuration.
One advantage of VRRP over HSRP is that it does not require each router
interface to be assigned a unique IP address. It is possible to configure VRRP
routers to use only the virtual IP address. This can be useful on subnets
where address space utilization is high.
You are the IT administrator for a small corporate network. You use
CorpServer for your production server and need to have the most throughput
possible. As a result, you need to configure NIC teaming.
Move the cable attached to the onboard NIC to the 4-port NIC on
CorpServer. Leave the other end in port 22 of the switch.
Answer Question 1.
o Teaming mode: LACP
Configure the Hyper-V Virtual Switch Manager to use the new NIC team
for the External network using the Microsoft Network Adapter
Multiplexor Driver.
Verify the status and speed of your network connection in the Network
and Sharing Center.
o Answer Question 2.
Start Lab
ask Summary
Required Actions and
Questions
Connect the 4 port NIC
to the switchShow
Details
Create the NIC
teamShow Details
Q1What is the
connection speed of
Ethernet 3, 4, 5, or 6?
Your answer: 1 Gbps
Correct answer: 1 Gbps
Configure the External
network to use
NetTeamShow Details
Q2What is the
connection speed of
NetTeam?
Your answer: 4 Gbps
Correct answer: 4 Gbps
Explanation
Complete this lab as
follows:
1. Move the network
cable from the onboard
adapter in the
CorpServer to the 4-
port NIC in
CorpServer.
a. Above the rack,
select Back to switch to
the back view of the
rack.
b. Drag the network
cable from the onboard
network adapter on
CorpServer (the 1U
server) to a free port
on the 4-port NIC in
CorpServer.
c. Above the rack,
select Front to switch
to the front view of the
rack.
2. Connect network
cables from the 4-port
NIC on CorpServer to
the switch ports 19, 20,
and 21.
a. Under Shelf, expand
Cables.
b. Select Cat6a Cable,
RJ45.
c. From the Selected
Component pane, drag
an unconnected RJ45
cable to port 19,
20, or 21.
d. Repeat steps 2b-2c
for two more cables.
Use a port not
previously used.
e. Above the rack,
select Back.
f. From Partial
Connections:
ask SummaryRequired Actions and QuestionsConnect the 4 port NIC to the
switchShow DetailsCreate the NIC teamShow DetailsQ1What is the
connection speed of Ethernet 3, 4, 5, or 6?Your answer: 1 GbpsCorrect
answer: 1 GbpsConfigure the External network to use NetTeamShow
DetailsQ2What is the connection speed of NetTeam?Your answer: 4
GbpsCorrect answer: 4 GbpsExplanation Complete this lab as follows:1. Move
the network cable from the onboard adapter in the CorpServer to the 4-port
NIC in CorpServer. a. Above the rack, select Back to switch to the back view
of the rack.b. Drag the network cable from the onboard network adapter on
CorpServer (the 1Userver) to a free port on the 4-port NIC in CorpServer.c.
Above the rack, select Front to switch to the front view of the rack.2. Connect
network cables from the 4-port NIC on CorpServer to the switch ports 19, 20,
and 21. a. Under Shelf, expand Cables.b. Select Cat6a Cable, RJ45.c. From
the Selected Component pane, drag an unconnected RJ45 cable to port 19,
20, or 21.d. Repeat steps 2b-2c for two more cables. Use a port not
previously used.e. Above the rack, select Back.f. From Partial Connections:
Repeat the previous step until there are no more cables in Partial
Connections.
b. From Server Manager, select Local Server from the menu on the left.
c. Next to NIC Teaming, select Disabled to enable and configure NIC Teaming.
d. From the Teams panel, use the Tasks drop-down list to select New Team.
h. Answer Question 1.
i. Minimize the Lab Questions window.
4. Configure the Hyper-V Virtual Switch Manager to use the new NIC team for
the External
network.
a. From Server Manager's menu bar, select Tools > Hyper-V Manager.
d. Under Connection type, use the External network drop-down to select the
e. Select OK
Verify the status of the team and your network connection using the
Network and Sharing
Center.
a. From the system tray, right-click on the network icon and then select Open
b. Verify that the vEthernet (External) NIC has an internet connection. Also,
notice
that the network icon in the system tray shows that the server is connected.
c. To check the connection speed in the Network and Sharing Center, select
e. Answer Question 2.
Score: 87%
Question 1.
Correct
answer
Correct Answer:
Explanation
References
o 7.4.1 Disaster Recovery Concepts
resources\text\t_availability_n09\q_availability_bia_role_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
Explanation
References
resources\text\t_availability_n09\
q_availability_disaster_recovery_focus_n09.question.xml
Question 3.
Correct
answer
Correct Answer:
Explanation
Evaluating financial health is important but not the focus of validation tests,
which are technical in nature.
References
resources\text\t_availability_n09\
q_availability_validation_tests_n09.question.xml
Question 4.
Correct
answer
Correct Answer:
The system can recover from any disaster in 99.999% of cases is incorrect
because it refers to system availability, not the probability of recovery from
disasters.
References
resources\text\t_redundancy_n09\q_redundancy_five_nines_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
RTO is the maximum amount of time allowed for restoring a system after a
disaster has occurred, ensuring that operations can resume within this
timeframe.
The maximum amount of data loss that is acceptable describes the Recovery
Point Objective (RPO), not RTO.
RTO is about recovery time, not detection time.
References
resources\text\t_redundancy_n09\
q_redundancy_rto_measurement_n09.question.xml
Question 6.
Correct
What is the main difference between a hot site and a warm site?
answer
Correct Answer:
Explanation
The main difference is that a hot site is already equipped and updated with a
live data set for immediate deployment, whereas a warm site is similar but
requires the latest data set to be loaded before it can be fully operational.
A site that requires the latest data set to be loaded describes a warm site,
not a hot site.
A site that is ready to deploy immediately describes a hot site, not a warm
site.
References
resources\text\t_recovery_n09\
q_recovery_hot_vs_warm_site_n09.question.xml
Question 7.
Correct
answer
Correct Answer:
It is too expensive.
Explanation
The challenge is that it is complex, not simple, to plan and set up.
References
resources\text\t_recovery_n09\
q_recovery_reciprocal_arrangements_n09.question.xml
Question 8.
Correct
answer
Redundant storage
Correct Answer:
Single network card
Explanation
Redundant storage, such as RAID arrays, is crucial for data availability and
protection against drive failures.
Multiple cooling fans are included to ensure that the failure of a single fan
does not lead to overheating and potential system failure.
References
resources\text\t_multipathing_n09\
q_multipathing_fully_redundant_not_n09.question.xml
Question 9.
Incorrect
What does MTTF stand for, and how is it different from MTBF?
answer
Correct Answer:
Maximum Time to Fix; MTTF is used for repairable components, while MTBF is
for non-repairable ones.
Incorrect answer:
Maximum Time to Failure; MTTF is used for predicting the longest operational
time, while MTBF is an average.
Explanation
Maximum Time to Fix is not what MTTF stands for, and the explanation
incorrectly swaps the uses of MTTF and MTBF.
Mean Time to Fix is not the correct meaning of MTTF, and MTTF and MTBF are
not interchangeable; they apply to different types of components.
References
resources\text\t_multipathing_n09\
q_multipathing_mttf_vs_mtbf_n09.question.xml
Question 10.
Correct
answer
Correct Answer:
Explanation
A Layer 7 switch, also known as a content switch, operates at the application
layer and can make forwarding decisions based on the content of the traffic,
such as URL requests or data types, allowing for more sophisticated load
balancing.
References
resources\text\t_balance_n09\
q_balance_layer_4_vs_layer_7_switch_n09.question.xml
Question 11.
Correct
answer
Correct Answer:
Explanation
The correct answer is between the Internet and the application servers. A
load balancer is placed in front of the server network (application servers)
and acts as a "traffic cop," distributing client requests that come from the
Internet or client network to the application servers.
Between the client network and the Internet would not effectively distribute
traffic to multiple servers.
Load balancers are separate entities that distribute traffic to application
servers, not installed directly on them.
Within the client network would not effectively manage traffic to the servers
providing the services.
References
resources\text\t_balance_n09\
q_balance_load_balancer_placement_n09.question.xml
Question 12.
Correct
answer
The system automatically purchases and adds a new node to the cluster.
The workload of the failed node is not shifted, and the system goes offline.
Correct Answer:
The workload of the failed node is shifted onto the remaining node(s).
Explanation
The system does not go offline; the workload is shifted to ensure continued
operation.
The remaining nodes are not shut down; they take over the workload of the
failed node.
The system does not automatically purchase and add a new node; the
existing nodes handle the failover process.
References
resources\text\t_clusters_n09\q_clusters_active-
active_failover_n09.question.xml
Question 13.
Incorrect
answer
Correct Answer:
Incorrect answer:
Explanation
A virtual IP is not unique to each node; it is shared among the nodes in the
cluster.
References
Question 14.
Correct
answer
EIGRP
GLBP
OSPF
Correct Answer:
HSRP
Explanation
References
resources\text\t_first_hop_n09\q_first_hop_hsrp_active-
standby_n09.question.xml
Question 15.
Correct
answer
Correct Answer:
Standby group
Virtual group
Active group
Backup group
Explanation
"Virtual group" is not the correct term; the correct term is "standby group."
References
resources\text\t_first_hop_n09\q_first_hop_standby_group_n09.question.xml
Score: 100%
Question 1.
Correct
Which port is typically used for message relay between SMTP servers?
answer
Correct Answer:
Port 25
Port 587
Port 465
Port 443
Explanation
Port 587 is used by mail clients to submit messages for delivery by an SMTP
server.
References
resources\text\t_smtp_n09\q_smtp_port_25_servers_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
RPO specifies the maximum timeframe of data loss that is acceptable during
a disaster, indicating how recent the backups need to be to avoid significant
data loss.
References
resources\text\t_redundancy_n09\q_redundancy_rpo_role_n09.question.xml
Question 3.
Correct
You need a solution that will work seamlessly across all devices and provide a
single virtual IP address as the default gateway for the subnet.
Which First Hop Redundancy Protocol would be MOST suitable for this
scenario?
answer
GLBP
OSPF
HSRP
Correct Answer:
VRRP
Explanation
HSRP is a Cisco proprietary protocol, which may not be fully compatible with
non-Cisco devices.
GLBP is also a Cisco proprietary protocol and, while it provides load balancing
in addition to redundancy, may not be supported on non-Cisco devices.
OSPF is a routing protocol, not a First Hop Redundancy Protocol, and does not
provide the functionality required for this scenario.
References
resources\text\t_first_hop_n09\q_first_hop_vrrp_scenario_n09.question.xml
Question 4.
Correct
answer
Correct Answer:
Explanation
References
resources\text\t_db_services_n09\q_db_services_not_nosql_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
Meeting personal development goals for IT staff, while important, is not the
primary focus of ITSCP within a BCP.
Reducing the IT budget is a financial goal and not the focus of ITSCP, which is
about ensuring continuity and resilience of IT support for essential functions.
References
resources\text\t_availability_n09\q_availability_itscp_role_n09.question.xml
Question 6.
Correct
answer
To encrypt data
Correct Answer:
Explanation
HTTP headers are used to provide essential information about the request or
response, or about the object sent in the message body. They define how the
message should be formatted and processed.
HTTP headers do not increase the size of the payload; they are part of the
protocol overhead.
Decreasing the loading time of a web page is not the direct purpose of HTTP
headers; performance optimizations are achieved through other means.
References
resources\text\t_http_n09\q_http_header_purpose_n09.question.xml
Question 7.
Correct
answer
time.nist.gov
Correct Answer:
time.microsoft.com
time.google.com
pool.ntp.org
Explanation
References
resources\text\t_ntp_n09\q_ntp_ntp_server_pool_n09.question.xml
Question 8.
Correct
Which protocol should the IT security specialist implement to secure the NTP
server against these risks?
answer
TLS
Correct Answer:
NTS
SSH
HTTPS
Explanation
The correct answer is NTS. Network Time Security (NTS) is specifically
designed to secure NTP by protecting the synchronization data and
preventing unauthorized access to time sources.
HTTPS is used for secure communication over a computer network but is not
specifically designed to protect NTP.
SSH is a protocol for secure network services but does not specifically protect
NTP synchronization data.
TLS provides secure communications over networks but NTS is the specific
protocol recommended for securing NTP.
References
resources\text\t_ntp_n09\q_ntp_nts_scenario_n09.question.xml
Question 9.
Correct
You've been tasked with finding a storage solution that can accommodate
the growing data needs, ensure data availability, and allow for easy file
sharing among employees. After some research, you decide that a Network
Attached Storage (NAS) system might be the best solution.
You plan to implement a NAS system that uses RAID technology to ensure
data redundancy and availability. However, you are aware that the
company's network is already experiencing high traffic loads during peak
hours.
Given this scenario, which of the following considerations should be your top
priority when implementing the NAS system?
answer
Choosing a NAS that supports RAID to spread information between disks
Ensuring the NAS uses the latest version of Bluetooth for connectivity
Correct Answer:
Explanation
While choosing a NAS that supports RAID is important for data redundancy
and availability, it does not address the immediate concern of network traffic
and potential delays caused by adding a NAS to an already overwhelmed
network.
Upgrading the company's internet service may increase internet speed, but it
does not directly address the internal network traffic issues that could be
exacerbated by adding a NAS system. The primary concern is the internal
network's ability to handle increased traffic, not the speed of the internet
connection.
References
resources\text\t_nas_n09\q_nas_increased_traffic_scenario_n09.question.xml
Question 10.
Correct
Which TCP port does an FTP client use to connect to an FTP server for
command and status information?
answer
20
69
22
Correct Answer:
21
Explanation
TCP port 21 is used for the command and control channel in FTP, allowing for
the transfer of commands and status information between the client and
server.
TCP port 20 is used for the data channel in active mode FTP, not for
commands and status information.
TCP port 22 is used by SSH (Secure Shell) for secure logins, file transfers, and
port forwarding, not FTP.
UDP port 69 is used by TFTP (Trivial File Transfer Protocol), not FTP.
References
resources\text\t_ftp_n09\q_ftp_port_21_n09.question.xml
Question 11.
Correct
What is a critical consideration they should keep in mind for this setup?
answer
Correct Answer:
They need to ensure that their system can handle the increased workload on
the remaining server(s) in the event of a failover.
In the event of a server failure, the system will automatically purchase and
integrate a new server into the cluster.
Explanation
The correct answer is that they need to ensure that their system can handle
the increased workload on the remaining server(s) in the event of a failover.
In an active-active cluster configuration, all servers are processing
connections concurrently. If one server fails, the workload of the failed server
is immediately shifted onto the remaining server(s). This can lead to
increased workload on these servers, potentially degrading performance. It's
critical to ensure that the system can handle this increased workload to
maintain service availability and performance during failover.
References
resources\text\t_clusters_n09\q_clusters_active-
active_scenario_n09.question.xml
Question 12.
Correct
What is the primary function of the Simple Mail Transfer Protocol (SMTP)?
answer
Correct Answer:
Explanation
SMTP specifies how email is delivered from one system to another, ensuring
that messages reach the intended recipient's mail server.
SMTP does not encrypt email messages; it is used for the delivery of emails.
Encryption can be achieved using TLS with SMTP.
References
resources\text\t_smtp_n09\q_smtp_primary_function_n09.question.xml
Question 13.
Correct
What is the main advantage of Precision Time Protocol (PTP) over Network
Time Protocol (NTP)?
answer
Correct Answer:
PTP provides nanosecond precision.
Explanation
The correct answer is that PTP provides nanosecond precision. PTP is capable
of providing nanosecond precision, making it suitable for timing-critical
applications, unlike NTP which can only provide millisecond precision. This
higher level of precision is crucial for networks supporting industrial
processes, 5G cellular data, medical devices, market trading and financial
services, or broadcasting.
The main advantage is not about supporting more network services, but
about providing higher precision.
References
resources\text\t_ntp_issues_n09\
q_ntp_issues_ptp_advantage_n09.question.xml
Question 14.
Correct
answer
Encrypt emails
Correct Answer:
Explanation
IMAP does not directly deal with encrypting emails; it is a protocol for
accessing and managing mailboxes.
References
resources\text\t_mailbox_n09\q_mailbox_multiple_clients_n09.question.xml
Question 15.
Correct
answer
Correct Answer:
Explanation
The correct answer is by configuring separate VLAN IDs for data and voice
traffic. VoIP phones use VLAN tagging to configure separate VLAN IDs for
data and voice traffic, allowing the two types of traffic to be distinguished
and managed separately on the same physical network link.
By using separate physical links for each type of traffic is incorrect because
VoIP phones typically share the same physical link for both data and voice
traffic, using VLAN IDs to segregate them.
By using digital certificates for voice traffic only is incorrect because digital
certificates are used for securing communications, not for distinguishing
between data and voice traffic.
By prioritizing voice traffic over data traffic using PoE is incorrect because
PoE provides power, not traffic prioritization or segregation.
References
resources\text\t_voip_phones_n09\
q_voip_phones_data_vs_voice_traffic_n09.question.xml
Question 16.
Correct
answer
Correct Answer:
Explanation
Email services use protocols like SMTP, IMAP, and POP3, not HTTP.
References
resources\text\t_http_n09\q_http_primary_purpose_n09.question.xml
Question 17.
Correct
What can happen if a server or host is configured with the incorrect time?
answer
Correct Answer:
Explanation
Without NTP or manual correction, a device will not automatically correct its
time.
References
resources\text\t_ntp_n09\q_ntp_network_services_n09.question.xml
Question 18.
Correct
answer
STARTTLS
Correct Answer:
SMTPS
IMAP
SMTP
Explanation
SMTPS establishes the secure connection before any SMTP commands (HELO,
for instance) are exchanged. This is also referred to as implicit TLS and only
represents encryption at the level of the transport layer.
Internet Message Access Protocol (IMAP) is a mail retrieval protocol that has
mailbox management features.
References
resources\text\t_smtp_n09\q_smtp_smtps_implicit_tls_n09.question.xml
Question 19.
Correct
answer
Explanation
References
resources\text\t_ntp_issues_n09\
q_ntp_issues_grandmaster_clock_n09.question.xml
Question 20.
Correct
What are N+1 and N+M configurations in the context of high availability
clusters?
answer
Correct Answer:
Explanation
N+1 and N+M configurations are strategies used in high availability clusters
to provision fewer passive nodes than active nodes. This approach aims to
reduce costs while still providing redundancy and failover capabilities.
Configurations that eliminate the need for a virtual IP do not eliminate the
need for a virtual IP; a virtual IP is still used for accessing the service.
Distributing traffic evenly is not the primary focus of N+1 and N+M
configurations; they are concerned with the provisioning of passive nodes.
References
resources\text\t_clusters_n09\
q_clusters_n1_nm_configuration_n09.question.xml
Exit Exam
Quiz End
English
close modal
Score: 100%
Question 1.
Correct
What is one of the primary purposes of the Internet Message Access Protocol
(IMAP)?
answer
Correct Answer:
Explanation
IMAP does not encrypt email messages; it is used for mailbox management.
Encryption can be added with TLS or other security protocols.
SMTP, not IMAP, is used to deliver email to hosts. IMAP is focused on mailbox
management.
IMAP is used for accessing and managing email mailboxes, not for
connecting to web servers.
References
resources\text\t_mailbox_n09\
q_mailbox_imap_primary_purpose_n09.question.xml
Question 2.
Correct
To answer this question, complete the lab using the information below.
You have already answered this question. You are not allowed to view the lab
again.
You completed the lab correctly.
You are a network technician for a small corporate network. Executives have
decided to add an IP phone for guests in the Lobby and another for the
company owner in the Executive Office.
In the Details window, use the Specifications tab to identify the phone's
connection areas. Additional VoIP configuration steps are required outside of
the tasks listed above, but they will not be included in this lab.
Launch Lab
References
l_voip1_n09.js
Question 3.
Correct
answer
It is too slow.
Correct Answer:
Explanation
The primary reason for disabling SMB1 is not its speed but its security
vulnerabilities.
While SMB1 does not support encryption, the main reason for its deprecation
is its security vulnerabilities.
References
resources\text\t_file_services_n09\
q_file_services_smb1_disabled_n09.question.xml
Question 4.
Correct
You are the network administrator for a small consulting firm. You've set up
an NTP server to manage the time across all the machines in the network.
You have a computer that's experiencing a slight time drift of just a few
seconds.
Which time correction should you use to fix the system's clock?
answer
Jitter
Correct Answer:
Slew
Slam
Skew
Explanation
If time is off by just a few seconds, slewing is better for putting it back on
track. Slewing is a slower, methodical method of correcting the time, but the
risk of problems occurring is much less.
Slamming is used if the time is off by quite a bit and slewing will take too
long. While this is a quick and immediate fix, slamming can cause some
programs to function improperly.
Skew measures the difference (in hertz) between a clock's actual frequency
and the frequency necessary to keep a more accurate time.
References
resources\text\t_ntp_n09\q_ntp_slew_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
The preference for FTPES over FTPS is not based on speed; both can
potentially offer similar transfer speeds.
FTPES does not necessarily use stronger encryption than FTPS; both use TLS
for encryption. The preference is due to ease of configuration.
The ability to support larger file transfers is not the reason FTPES is
preferred; both FTPES and FTPS can handle large file transfers similarly.
References
resources\text\t_sftp_n09\q_sftp_ftpes_vs_ftps_n09.question.xml
Question 6.
Correct
answer
Explanation
The correct answer is between the Internet and the application servers. A
load balancer is placed in front of the server network (application servers)
and acts as a "traffic cop," distributing client requests that come from the
Internet or client network to the application servers.
Between the client network and the Internet would not effectively distribute
traffic to multiple servers.
Within the client network would not effectively manage traffic to the servers
providing the services.
References
resources\text\t_balance_n09\
q_balance_load_balancer_placement_n09.question.xml
Question 7.
Correct
What can happen if a server or host is configured with the incorrect time?
answer
Correct Answer:
Without NTP or manual correction, a device will not automatically correct its
time.
References
resources\text\t_ntp_n09\q_ntp_network_services_n09.question.xml
Question 8.
Correct
You are setting up a secure website for your online store. You want to ensure
that all data transmitted between your website and your customers is
encrypted.
answer
Correct Answer:
Explanation
To secure data transmission between your website and your customers, you
need to implement HTTPS, which is the secure version of HTTP enabled by
TLS. Obtaining and installing a digital certificate from a trusted CA is
essential for this process. The digital certificate will authenticate your
website's identity to your customers and enable encrypted communication.
While useful for tracking website traffic and user behavior, web analytics
tools do not encrypt data transmission.
Increasing bandwidth can improve website performance but does not secure
data transmission.
CAPTCHA systems help differentiate human users from bots but do not
encrypt or secure data transmission.
References
resources\text\t_tls_n09\q_tls_digital_certificate_scenario_n09.question.xml
Question 9.
Correct
What is the main advantage of Precision Time Protocol (PTP) over Network
Time Protocol (NTP)?
answer
Correct Answer:
Explanation
The correct answer is that PTP provides nanosecond precision. PTP is capable
of providing nanosecond precision, making it suitable for timing-critical
applications, unlike NTP which can only provide millisecond precision. This
higher level of precision is crucial for networks supporting industrial
processes, 5G cellular data, medical devices, market trading and financial
services, or broadcasting.
The main advantage is not about supporting more network services, but
about providing higher precision.
Ease of implementation is not discussed as an advantage of PTP over NTP;
the focus is on precision.
References
resources\text\t_ntp_issues_n09\
q_ntp_issues_ptp_advantage_n09.question.xml
Question 10.
Correct
answer
Correct Answer:
Explanation
References
o 7.4.1 Disaster Recovery Concepts
resources\text\t_availability_n09\
q_availability_disaster_recovery_focus_n09.question.xml
Question 11.
Correct
answer
Correct Answer:
Explanation
A virtual IP is not unique to each node; it is shared among the nodes in the
cluster.
References
resources\text\t_clusters_n09\q_clusters_virtual_ip_role_n09.question.xml
Question 12.
Correct
Correct Answer:
To ensure that SIP control and RTP media protocols are segregated from
normal data traffic
To ensure that voice and data traffic are combined on the same network
Explanation
The correct answer is to ensure that SIP control and RTP media protocols are
segregated from normal data traffic. VLAN tagging allows VoIP phones to
segregate SIP control and RTP media protocols from normal data traffic,
ensuring efficient and secure communication without interference from other
types of network traffic.
To ensure that voice and data traffic are combined on the same network is
incorrect because the purpose of VLAN tagging is to segregate, not combine,
different types of traffic.
To disable all data traffic except for VoIP communication is incorrect as VLAN
tagging segregates traffic types; it does not disable non-VoIP data traffic.
References
resources\text\t_voip_phones_n09\
q_voip_phones_vlan_tagging_n09.question.xml
Question 13.
Correct
Correct Answer:
MAPI
SMTP
IMAP
HTTPS
Explanation
HTTPS is a secure transport protocol used on the web, not specifically for
accessing Microsoft Exchange mailboxes.
References
resources\text\t_mailbox_n09\q_mailbox_mapi_exchange_n09.question.xml
Question 14.
Correct
answer
80
8080
21
Correct Answer:
443
Explanation
HTTPS encrypted traffic is sent over TCP port 443 by default. This is different
from HTTP, which uses the unencrypted port 80.
Port 8080 is often used for an HTTP proxy or secondary web server, not
standard HTTPS traffic.
References
resources\text\t_ssl_n09\q_ssl_https_port_n09.question.xml
Question 15.
Correct
In the context of FTP over Explicit TLS (FTPES), which command is used to
encrypt the data connection for actual file transfers after upgrading an
unsecure connection to a secure one?
answer
AUTH TLS
SSH
Correct Answer:
PROT
PASV
Explanation
The PROT command is used in FTP over Explicit TLS (FTPES) to encrypt the
data connection for actual file transfers after an unsecure connection has
been upgraded to a secure one using the AUTH TLS command. This ensures
that not only the authentication credentials are protected but also the data
being transferred.
References
resources\text\t_sftp_n09\q_sftp_prot_command_n09.question.xml
Question 16.
Correct
answer
Correct Answer:
Explanation
VoIP provides more, not limited, call routing options due to its use of IP
networks.
VoIP does not require separate voice and data channels; it can integrate
voice and data communications over the same IP network.
References
resources\text\t_voice_video_n09\q_voice_video_pstn_line_n09.question.xml
Question 17.
Correct
To answer this question, complete the lab using the information below.
You have already answered this question. You are not allowed to view the lab
again.
You are a network technician for a small corporate network. You would like to
use NTP to synchronize time on your network. You are currently logged in as
the root user.
o Answer Question 1.
o Answer Question 2.
o Verify that the Exec computer is using the NTP server for time
synchronization using the following command:
w32tm /query /status
Launch Lab
References
l_ntp_n09.js
Question 18.
Correct
To answer this question, complete the lab using the information below.
You have already answered this question. You are not allowed to view the lab
again.
You are the IT administrator for a small corporate network. You use
CorpServer for your production server and need to have the most throughput
possible. As a result, you need to configure NIC teaming.
o Move the cable attached to the onboard NIC to the 4-port NIC on
CorpServer. Leave the other end in port 22 of the switch.
Answer Question 1.
o Configure the Hyper-V Virtual Switch Manager to use the new NIC
team for the External network using the Microsoft Network
Adapter Multiplexor Driver.
Answer Question 2.
Launch Lab
References
l_nic_teaming_n09.js
Question 19.
Correct
answer
Correct Answer:
Explanation
RTO is the maximum amount of time allowed for restoring a system after a
disaster has occurred, ensuring that operations can resume within this
timeframe.
The maximum amount of data loss that is acceptable describes the Recovery
Point Objective (RPO), not RTO.
References
resources\text\t_redundancy_n09\
q_redundancy_rto_measurement_n09.question.xml
Question 20.
Correct
answer
A public network
Correct Answer:
An encrypted tunnel
Explanation
TLS operates over existing network connections and does not establish new
physical connections. It secures data transmitted over these connections
through encryption.
While TLS can secure data transmitted over public networks, it does not
establish the network itself. Its role is to provide security for data in transit,
regardless of the network type.
References
resources\text\t_tls_n09\q_tls_encrypted_tunnel_n09.question.xml
Question 21.
Correct
answer
Correct Answer:
Explanation
Evaluating financial health is important but not the focus of validation tests,
which are technical in nature.
References
o 7.4.1 Disaster Recovery Concepts
resources\text\t_availability_n09\
q_availability_validation_tests_n09.question.xml
Question 22.
Correct
What does SMTP use to discover the IP address of the recipient's SMTP
server?
answer
Correct Answer:
Explanation
The SMTP server uses the domain name part of the recipient's email address
to discover the IP address of the recipient SMTP server through DNS.
The recipient's email password is not used in the process of discovering the
recipient's SMTP server IP address.
The recipient's physical address has no role in the electronic process of SMTP.
References
resources\text\t_smtp_n09\q_smtp_domain_name_discover_n09.question.xml
Question 23.
Correct
In an active-active cluster configuration, what happens in the event of a
failover?
answer
The system automatically purchases and adds a new node to the cluster.
The workload of the failed node is not shifted, and the system goes offline.
Correct Answer:
The workload of the failed node is shifted onto the remaining node(s).
Explanation
The system does not go offline; the workload is shifted to ensure continued
operation.
The remaining nodes are not shut down; they take over the workload of the
failed node.
The system does not automatically purchase and add a new node; the
existing nodes handle the failover process.
References
resources\text\t_clusters_n09\q_clusters_active-
active_failover_n09.question.xml
Question 24.
Correct
To answer this question, complete the lab using the information below.
You have already answered this question. You are not allowed to view the lab
again.
You are the security analyst for your company. Your manager is concerned
about the vulnerability of the company's database server, which contains the
finance and accounting systems. He wants you to perform a port scan on the
server (192.168.0.22) to identify all the open ports.
Launch Lab
References
o 8.2.2 Nmap
l_nmap_scan_v2_n09.js
Question 25.
Correct
What does a client use to identify the resource it wants to request from an
HTTP server?
answer
MAC address
Correct Answer:
Port number
IP address
Explanation
A URL is used by a client to specify the resource it wishes to request from an
HTTP server. It provides a way to locate a resource on the Internet.
References
resources\text\t_http_n09\q_http_url_n09.question.xml