Test Lab
Test Lab
Lab Report
Time Spent: 02:47
TASK SUMMARY
Required Actions
Add a filter between the phone and the phone cable connected to the outlet
EXPLANATION
Complete this lab as follows:
4. When implementing DSL, install a filter between the phone port and each phone.
a. Above the phone, select Back.
b. Under Shelf, expand Filters.
c. Drag the DSL Filter to the phone port.
d. Under Shelf, expand Cables.
e. Select UTP Cable, 2-pair, RJ-11.
f. From the Selected Component pane:
Drag an RJ-11 Connector to the RJ11 port on the filter.
Drag the unconnected RJ-11 Connector to the phone port on the wall outlet.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
10.4.3 Configure a Remote Access VPN
Lab Report
Time Spent: 05:54
TASK SUMMARY
Required Actions
EXPLANATION
While completing this lab, use the following information:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
10.4.5 Configure a VPN Connection iPad
Lab Report
Time Spent: 03:02
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.3.6 Configure Logging on pfSense
Lab Report
Time Spent: 05:04
TASK SUMMARY
Q2: What is the maximum number of logs that can be displayed after configuring the system log
settings?
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.3.8 Auditing Device Logs on a Cisco Switch
Lab Report
Time Spent: 02:32
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.6.9 Configure NIC Teaming
Lab Report
Time Spent: 06:36
TASK SUMMARY
EXPLANATION
1. Move the network cable from the onboard adapter in the CorpServer to the 4-port NIC in CorpServer.
a. Above the rack, select Back to switch to the back view of the rack.
b. Drag the network cable from the onboard network adapter on CorpServer (the 1U server) to a free port
on the 4-port NIC in CorpServer.
c. Above the rack, select Front to switch to the front view of the rack.
d. Move the other end of the network cable to port 22 on the switch.
2. Connect network cables from the 4-port NIC on CorpServer, to the switch ports 19, 20, and 21.
a. Under Shelf, expand Cables.
b. Select Cat6a Cable, RJ45.
c. From the Selected Component pane, drag an unconnected RJ45 cable to port 19, 20, or 21.
d. Repeat steps 2b-2c for two more cables. Use a port not previously used.
e. Above the rack, select Back.
f. From Partial Connections:
Drag a cable to an open port on the 4-port NIC in CorpServer.
Repeat the previous step until there are no more cables in Partial Connections.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.7.6 Back Up Files with File History
Lab Report
Time Spent: 02:08
TASK SUMMARY
Required Actions
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
11.7.8 Recover a File from File History
Lab Report
Time Spent: 03:20
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Lab Report
Time Spent: 01:43
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.3.3 Implement Physical Security
Lab Report
Time Spent: 00:51
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
12.4.5 Respond to Social Engineering Exploits
Lab Report
Time Spent: 02:00
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Microsoft
Windows
Notice the various spelling errors and that the
Update Center Phishing Delete
link does not direct you to a Microsoft website.
New Service
Pack
Grandma White
FW: FW: FW: Any email that asks you to forward it to everyone
Hoax Delete
Virus Attack you know is probably a hoax.
Warning
Activities
Committee This email doesn't ask you to click on anything or
Safe Keep
Pumpkin run any attachments.
Contest
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.1.7 Configure a Host Firewall
Lab Report
Time Spent: 08:07
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
On Dorm-PC:
On Dorm-PC2:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.2.5 Configure Network Security Appliance Access
Lab Report
Time Spent: 03:36
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.2.6 Configure a Security Appliance
Lab Report
Time Spent: 01:44
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.2.8 Configure a Perimeter Firewall
Lab Report
Time Spent: 04:24
TASK SUMMARY
Required Actions
Create and configure a firewall rule to pass HTTP traffic from the internet to the web
server Show Details
Create and configure a firewall rule to pass HTTPS traffic from the internet to the web
server Show Details
Create and configure a firewall rule to pass all traffic from the LAN network to the screened subnet
(DMZ) network Show Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.3.4 Configure a Screened Subnet (DMZ)
Lab Report
Time Spent: 05:08
TASK SUMMARY
Required Actions
Configure pfSense's DHCP server for the DMZ interface Show Details
EXPLANATION
Complete this lab as follows:
3. Add a firewall rule to the DMZ interface that allows all traffic from the DMZ.
a. From the pfSense menu bar, select Firewall > Rules.
b. Under the Firewall breadcrumb, select DMZ. (Notice that no rules have been created.)
c. Select Add (either one).
d. For the Action field, make sure Pass is selected.
e. For the Interface field, make sure DMZ is selected.
f. For the Protocol, use the drop-down menu to select Any.
g. Under Source, use the drop-down menu to select DMZ net.
h. Under Destination, make sure it is configured for any.
i. Under Extra Options, enter Allow DMZ to any rule as the description.
j. Scroll to the bottom and select Save.
k. Select Apply Changes.
4. Configure pfSense's DHCP server for the DMZ interface.
a. From the menu bar, select Services > DHCP Server.
b. Under the Services breadcrumb, select DMZ.
c. Select Enable to enable DHCP server on the DMZ interface.
d. Configure the Range field as follows:
From: [Link]
To: [Link]
e. Scroll to the bottom and select Save.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
6.4.4 Implement Intrusion Prevention
Lab Report
Time Spent: 05:15
TASK SUMMARY
Required Actions
Configure the Snort Interface settings for the WAN interface Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.1.6 Secure a Switch
Lab Report
Time Spent: 04:31
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Lab Report
Time Spent: 02:10
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
1. Configure the IP address and subnet mask for the VLAN 1 interface.
a. Select Switch.
b. From the switch terminal, press Enter to get started.
c. At the Switch> prompt, type enable and press Enter.
d. At the Switch# prompt, type configure terminal and press Enter.
e. At the Switch(config)# prompt, type interface vlan1 and press Enter.
f. At the Switch(config-if)# prompt, type ip address [Link] [Link] and press Enter.
g. Type exit and press Enter.
2. Configure the default gateway.
a. At the Switch(config)# prompt, type ip default-gateway [Link] and press Enter.
b. At the prompt, type exit and press Enter.
3. Verify the configuration changes.
a. At the prompt, type show run and press Enter.
b. Press the space bar as needed to verify that the correct changes were made.
c. Type any key to exit show command.
4. Save your changes to the startup-config file.
a. At the Switch# prompt, type copy run start and press Enter.
b. Press Enter to begin building the configuration.
c. Press Enter to return to the prompt.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.2.4 Configure Switch IP and VLAN - GUI
Lab Report
Time Spent: 03:21
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.2.6 Create VLANs - GUI
Lab Report
Time Spent: 06:08
TASK SUMMARY
Required Actions
Connect the IP cameras to the VLAN and mount the IP cameras to the wall Show Details
Launch the IP camera-monitoring software and confirm that the IP cameras are online
EXPLANATION
Complete this lab as follows:
To verify that all components are connected, you can change the location to the Network
Closet hardware view. You should see green link/activity lights on ports 18 - 21 of the switch.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.2.9 Configure Switch IP Settings - CLI
Lab Report
Time Spent: 05:18
TASK SUMMARY
Q1: What is the IP address assigned to the FastEthernet0/0 interface on the SFO router?
EXPLANATION
Complete this lab as follows:
1. Find the IP address assigned to the FastEthernet0/0 interface on the SFO router.
a. Select the Branch1 switch.
b. From the Terminal, press Enter to get started.
c. Type enable and press Enter to change to the EXEC or Global Configuration mode.
d. Type show cdp neighbors detail and press Enter.
e. Find the IP address for the SFO router.
f. From the top right, select Answer Questions.
g. Answer the question.
h. Move the question dialog to the side and keep working.
2. Configure the IP address and subnet mask for the Branch1 switch.
a. At the Branch1# prompt, type config t and press Enter.
b. At the Branch1(config)# prompt, type interface vlan1 and press Enter.
c. At the Branch1(config-if)# prompt, type ip address [Link] [Link] and press Enter.
d. At the Branch1(config-if)# prompt, type exit and press Enter.
3. Configure the switch to use the FastEthernet0/0 interface on the SFO router as the default gateway.
a. At the Branch1(config)# prompt, type ip default-gateway routers_IP_address and press Enter.
b. At the Branch1(config)# prompt, type exit and press Enter.
4. Save your changes to the startup-config file.
a. At the Branch1# prompt, type copy run start and press Enter.
b. Press Enter to begin building the configuration.
c. When you see OK, press Enter.
d. From the question dialog, select Score Lab.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.12 Configure Port Mirroring
Lab Report
Time Spent: 01:55
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.14 Configure PoE
Lab Report
Time Spent: 01:32
TASK SUMMARY
Q1: How many watts of power is the security camera currently using?
Q2: How many watts of power are available in the switch for PoE devices?
Save the changes to the switch's startup configuration file Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.4 Configure Trunking
Lab Report
Time Spent: 10:30
TASK SUMMARY
Leave ports GE27 and GE28 set to Trunk, but set the PVID to 2 Show Details
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.6 Configure Port Aggregation
Lab Report
Time Spent: 04:56
TASK SUMMARY
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.3.8 Enable Jumbo Frame Support
Lab Report
Time Spent: 02:07
TASK SUMMARY
Q1: How many combined Undersize Packets, Oversize Packets, Fragments, Jabbers, and Collisions
are there?
Q2: True or False: Now that Jumbo Frames is enabled, network devices should also be configured
to use Jumbo Frames or have a frame size larger than 1500 bytes.
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.4.10 Secure Access to a Switch 2
Lab Report
Time Spent: 04:25
TASK SUMMARY
Required Actions
EXPLANATION
While completing this lab, use the following information:
Configure the GameConsoles MAC-based access control entry (ACE) settings as follows:
Destination
Priority Action Source MAC Address
MAC Address
Value: 00041F111111
1 Deny Any
Mask: 000000111111
Value: 005042111111
2 Deny Any
Mask: 000000111111
Value: 000D3A111111
3 Deny Any
Mask: 000000111111
Value: 001315111111
4 Deny Any
Mask: 000000111111
Value: 0009BF111111
5 Deny Any
Mask: 000000111111
Value: 00125A111111
6 Deny Any
Mask: 000000111111
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.4.6 Disable Switch Ports - GUI
Lab Report
Time Spent: 01:30
TASK SUMMARY
Required Actions
Disable port 15
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.4.8 Harden a Switch
Lab Report
Time Spent: 03:11
TASK SUMMARY
Required Actions
Configure Port Security settings for the used ports Show Details
EXPLANATION
While completing this lab, use the following information:
GE2 GE1
GE7 GE3-GE6
GE9-GE20 GE8
GE25 GE21-GE24
GE27-GE28 GE26
Lab Report
Time Spent: 04:11
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Lab Report
Time Spent: 15:41
TASK SUMMARY
Use the Traffic Shaper wizard for dedicated links using one WAN connection
Change the port number used for the MSRDP outbound rule
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
7.6.4 Configure NAT
Lab Report
Time Spent: 06:28
TASK SUMMARY
Required Actions
Configure NAT port forwarding for the Kali Linux server Show Details
Configure NAT port forwarding for the web server Show Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.1.3 Configure an iSCSI Target
Lab Report
Time Spent: 02:42
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
To view the iSCSI virtual disk and target you just created, expand the Server Manager window.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.1.4 Configure an iSCSI Initiator
Lab Report
Time Spent: 02:58
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.2.3 Connect VoIP 1
Lab Report
Time Spent: 05:49
TASK SUMMARY
Required Actions
Plug the Exec workstation and monitor into the surge protector
Ensure that the workstation in the Executive Office is connected to the network and the internet
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.2.4 Connect VoIP 2
Lab Report
Time Spent: 01:16
TASK SUMMARY
Required Actions
Disconnect the AC adapter from the IP phone in the Lobby and place it on the Shelf Show Details
Disconnect the AC adapter from the IP phone in the Executive Office and place it on the
Shelf Show Details
EXPLANATION
1. From the Lobby, disconnect the AC/DC adapter from the IP phone and the wall.
a. Under Lobby, select Hardware.
b. Above the IP phone, select Back to switch to the back view of the phone.
c. Drag the DC power connector from the phone to the Shelf.
d. Drag the AC power plug from the wall outlet to the Shelf.
e. Above the IP phone, select Front to switch to the front view of the phone and confirm it is on.
2. From the Executive Office, disconnect the AC/DC adapter from the IP phone and the wall.
a. From the top left, select Floor 1 Overview.
b. Under Executive Office, select Hardware.
c. Above the IP phone, select Back to switch to the back view of the phone.
d. Drag the DC power connector from the phone to the Shelf.
e. Drag the AC power plug from the wall outlet to the Shelf.
f. Above the IP phone, select Front to switch to the front view of the phone and confirm it is on.
3. From the Support Office, connect an IP phone.
a. From the top left, select Floor 1 Overview.
b. Under Support Office, select Hardware.
c. Under Shelf, expand Phones.
d. Drag the IP Phone to the Workspace.
e. Above the IP phone, select Back to switch to the back view of the phone.
f. Above the workstation, select Back to switch to the back view of the workstation.
g. Drag the RJ45 Ethernet cable from the workstation to the LAN port (top port) on the IP phone.
h. Under Shelf, expand Cables and then select Cat5e Cable, RJ45.
i. From the Selected Component pane:
Drag an RJ45 Connector to the PC port on the phone.
Drag the other unconnected RJ45 Connector to the NIC on the workstation.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.6.4 Configure Smart Devices
Lab Report
Time Spent: 12:27
TASK SUMMARY
Required Actions
Install and configure the thermostat in the Main Hall Show Details
EXPLANATION
While completing this lab, use the following information:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
8.6.7 Scan for IoT Devices
Lab Report
Time Spent: 01:28
TASK SUMMARY
Scan [Link]
Q1: What is the name of the IoT device with the IP address of [Link]?
Q2: How many issues exist for the device with the IP address of [Link]?
Q3: In the IP address range of [Link] through [Link], which IP addresses had issues?
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.2.5 Create a Home Wireless Network
Lab Report
Time Spent: 05:20
TASK SUMMARY
Required Actions
Connect the wireless access point to the existing router on the rack using a Cat 5e cable
On the laptop, slide the wireless switch to turn the integrated wireless network interface card on
EXPLANATION
Complete this lab as follows:
3. Connect the Ethernet cable to the wireless access point and existing router.
a. Under Shelf, select the Cat6a Cable, RJ45 Ethernet cable.
b. From the Selected Component pane:
Drag an RJ45 Ethernet connector to the back of the access point.
Drag the unconnected RJ45 Ethernet connector to one of the free LAN ports on the router.
To confirm the connection, right-click the wireless networking icon in the notification area again
and select Open Network & Internet settings. The image on the Status page shows a
connection to the internet.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.2.6 Secure a Home Wireless Network
Lab Report
Time Spent: 05:03
TASK SUMMARY
Required Actions
Change the wireless access point's default administrator authentication credentials Show Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.2.7 Configure Wireless Profiles
Lab Report
Time Spent: 01:05
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.3.7 Design an Indoor Wireless Network
Lab Report
Time Spent: 01:44
TASK SUMMARY
Required Actions
EXPLANATION
Only three WAPs are required to complete this lab (one omnidirectional WAP and two directional WAPs).
The following WAP configuration provides adequate coverage and reduces signal emanation.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.3.8 Design an Outdoor Wireless Network
Lab Report
Time Spent: 02:23
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.4.4 Implement an Enterprise Wireless Network
Lab Report
Time Spent: 02:29
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.10 Configuring a Captive Portal
Lab Report
Time Spent: 07:13
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.12 Creating a Guest Network for BYOD
Lab Report
Time Spent: 10:30
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.13 Configure a Secure Email Account on Mobile Device
Lab Report
Time Spent: 02:04
TASK SUMMARY
Required Actions
Secure IMAP network communications and authenticate to CorpNet-Wireless Wi-Fi Show Details
EXPLANATION
Complete this lab as follows:
1. Set the email account to use SSL and the secure port 993.
a. Select Settings.
b. From the left menu, select Accounts & Passwords. (You may need to scroll down to see this option.)
c. Under Accounts & Passwords, select Gmail.
d. Under Gmail, select mbrown@[Link].
e. Select Advanced.
f. Slide the button to enable Use SSL.
g. Make sure the server port is set to 993.
h. At the top, select Account.
i. Click Done.
2. Connect to CorpNet Wi-Fi.
a. From the left menu, select Wi-Fi.
b. Select CorpNet.
c. In the Password field, enter @CorpNetWeRSecure!& as the password.
d. Select Join.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.7 Secure an Enterprise Wireless Network
Lab Report
Time Spent: 04:55
TASK SUMMARY
Required Actions
EXPLANATION
To complete this lab, use the following MAC addresses:
[Link]
[Link]
[Link]
[Link]
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.5.8 Enable Wireless Intrusion Prevention
Lab Report
Time Spent: 00:58
TASK SUMMARY
Required Actions
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.6.6 Optimize a Wireless Network
Lab Report
Time Spent: 22:21
TASK SUMMARY
Required Actions
EXPLANATION
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.6.7 Explore Wireless Network Problems
Lab Report
Time Spent: 04:51
TASK SUMMARY
Q2: What is the passphrase used for the WLAN security key?
On Exec-Lap, slide the wireless switch to ON and connect to the CorpNet wireless network Show
Details
EXPLANATION
Complete this lab as follows:
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
9.6.8 Troubleshoot Wireless Network Problems
Lab Report
Time Spent: 02:19
TASK SUMMARY
Required Actions
On Exec-Lap, slide the wireless switch to ON and connect to the CorpNet wireless network Show
Details
EXPLANATION
Complete this lab as follows:
1. Check to see if the ITAdmin computer can connect to the wireless network.
a. Under IT Administration, select ITAdmin.
b. In the Notification Area, select the wireless network icon to view the available networks in order to see
what is being shown on a working computer.
c. Select the CorpNet wireless network.
d. Select Connect.
e. Enter @CorpNetWeRSecure!& for the security key and then select Next.
ITAdmin is now connected to the CorpNet wireless network. Because this computer can connect to the
wireless network, the problem may be limited to only the Exec-Laptop laptop in the Executive Office.
2. Troubleshoot and fix the wireless networking on Exec-Laptop.
a. From the top left, select Floor 1 Overview to switch to Exec-Laptop.
b. Under Executive Office, select Exec-Laptop.
c. In the Notification Area, select the wireless network icon to view the available networks.
Note that there are no wireless networks shown as available for this laptop. Possible causes for this
include:
The wireless network interface card is not turned on (the wireless switch on the exterior of the
laptop is in the OFF position). Since no wireless networks are shown in the list, you must take
additional steps.
The wireless network's SSID is not broadcasting. However, from Step 1, you know that the wireless
access point is broadcasting the SSID.
The wireless access point is not powered on. However, from Step 1, you know that the wireless
access point is powered on.
d. From the top left, select Executive Office to switch to the devices found in the executive office.
e. On the front of the Exec-Laptop, check to see if the switch for the wireless network interface card is in
the On position.
Notice that it is in the OFF position instead.
f. Slide the wireless switch to the On position to turn the wireless network interface card on.
g. On the laptop monitor, select Click to view Windows 10.
h. In the Notification Area, select the wireless network icon to view the available networks. The CorpNet
wireless network is now displayed in the list of available networks.
i. Select the CorpNet wireless network.
j. Select Connect.
k. Enter @CorpNetWeRSecure!& for the security key and then select Next.
Exec-Laptop is now connected to the CorpNet wireless network.
Copyright © 2023 TestOut Corp. Copyright © The Computing Technology Industry Association, Inc. All rights
reserved.
Which of the following is true about a firewall?
Answer
Implicit deny is used to deny permissions to a specific user even when the rest of the
user's group is allowed access.
Explanation
By default, most firewalls deny all traffic, which is called implicit deny. You must
manually specify which traffic you want to allow through the firewall. Everything else
is blocked.
Explicit deny is used to deny permissions to a specific user even when the rest of the
user's group is allowed access.
You can use a host-based firewall in addition to a network-based firewall to provide
multiple layers of protection.
Firewalls do not offer protection against all attacks (such as email spoofing attacks).
References
Question 2:
Correct
Which options are you able to set on a firewall? (Select three.)
Answer
Sequence number
Correct Answer:
Packet destination address
Checksum
Correct Answer:
Port number
Digital signature
Acknowledgement number
Correct Answer:
Packet source address
Explanation
Firewalls allow you to set filters by source or destination IP address and port
number. They do not filter by checksum, acknowledgement number, sequence
number, or digital signature.
References
Question 3:
Correct
You have been given a laptop to use for work. You connect the laptop to your
company network, use the laptop from home, and use it while traveling.
You want to protect the laptop from internet-based attacks.
Which solution should you use?
Answer
VPN concentrator
Proxy server
Network-based firewall
Correct Answer:
Host-based firewall
Explanation
References
Question 4:
Correct
Which of the following is true about a network-based firewall?
Answer
Correct Answer:
A network-based firewall is installed at the edge of a private network or network
segment.
Explanation
References
Question 5:
Correct
How does a proxy server differ from a packet-filtering firewall?
Answer
Correct Answer:
A proxy server operates at the Application layer, while a packet-filtering firewall
operates at the Network layer.
A proxy server includes filters for the session ID as well as the IP address and port
number.
A proxy server can prevent unknown network attacks, while a packet-filtering firewall
can only prevent known attacks.
Explanation
References
Question 6:
Correct
Based on the diagram, which type of proxy server is handling the client's request?
Answer
Explanation
A reverse proxy server handles requests from the internet to an internal network.
Instead of requests for a server going directly to the server, they first go to the
reverse proxy server.
A forward proxy server handles requests from an internal network out to the internet.
An open proxy server is accessible to any user on the internet and is used to forward
requests to and from anywhere on the internet.
A circuit-level proxy server is typically used as a stateful firewall to allow or deny
sessions.
References
Question 7:
Correct
Which of the following are true about reverse proxy? (Select two.)
Answer
Correct Answer:
Can perform load balancing, authentication, and caching.
Correct Answer:
Handles requests from the internet to a server on a private network.
Explanation
A reverse proxy server handles requests from the internet to a server located inside
a private network. Reverse proxies can perform load balancing, authentication, and
caching.
Reverse proxies often work transparently, meaning clients don't know they are
connected to a reverse proxy.
References
Question 8:
Correct
Which device combines multiple security features, such as anti-spam, load-
balancing, and antivirus, into a single network appliance?
Answer
Correct Answer:
Unified Threat Management (UTM)
Circuit-level gateway
Packet-filtering firewall
Explanation
A Unified Threat Management device combines multiple security features into a
single network appliance. A single UTM device can provide several security features,
including firewall, VPN, anti-spam, antivirus, and load balancing.
A NGFW combines a traditional firewall with an application firewall.
A circuit-level gateway makes decisions about which traffic to allow based on virtual
circuits or sessions.
A packet-filtering firewall allows and blocks network traffic by examining information
in the IP packet.
References
Question 9:
Correct
Which of the following chains is used for incoming connections that aren't delivered
locally?
Answer
Reject
Drop
Correct Answer:
Forward
Output
Explanation
Forward is a chain that's used for incoming connections that aren't delivered locally.
An example is iptables used on a router. The traffic is not destined for the router, but
the router forwards the traffic to the destination device.
Drop is an action that drops the connection.
Reject is an action that does not allow the connection but does send a response
back.
Output is a chain for outgoing connections.
References
Question 10:
Correct
Which of the following does the sudo iptables -F command accomplish?
Answer
Explanation
References
A host-based firewall
Correct Answer:
A network-based firewall
An IDS
An IPS
Explanation
You should use a network-based firewall to create a screened subnet between two
servers.
A host-based firewall inspects traffic that's received by a host. It is not designed for
use on a screened subnet.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. You cannot use an IDS to create a screened subnet.
An active IDS (also called an intrusion protection system, or IPS) performs the
functions of an IDS, but it can also react when security breaches occur.
References
•
6.2.2 Unified Threat Management (UTM) Appliances Facts
q_utm_devices_network_np6.[Link]
Question 2:
Correct
Which of the following combines several layers of security services and network
functions into one piece of hardware?
Answer
Firewall
Circuit-level gateway
Correct Answer:
Unified Threat Management (UTM)
Explanation
A Unified Threat Management (UTM) appliance combines several layers of security
services and network functions into one piece of hardware.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity.
A circuit-level gateway makes decisions about which traffic to allow based on virtual
circuits or sessions.
A firewall is a software- or hardware-based network security system that allows or
denies network traffic according to a set of rules.
References
Question 3:
Correct
Which of the following are specific to extended Access control lists? (Select two.)
Answer
Explanation
Standard ACLs:
• Identify traffic based on the destination address.
• Are used by route maps and VPN filters.
• Use the number ranges 1-99 and 1300-1999.
• Should be placed as close to the destination as possible.
Extended ACLs:
• Are the most used type of ACL.
• Are used for access rules that permit or deny traffic through a device.
• Can filter by multiple factors including source protocol, source host name,
destination host name, etc.
• Use the number ranges 100-199 and 2000-2699.
• Should be placed as close to the source as possible.
References
Question 4:
Correct
Which of the following describes how access control lists can improve network
security?
Answer
Correct Answer:
An access control list filters traffic based on the IP header information, such as
source or destination IP address, protocol, or socket number.
An access control list identifies traffic that must use authentication or encryption.
An access control list filters traffic based on the frame header, such as source or
destination MAC address.
An access control list looks for patterns of traffic between multiple packets and takes
action to stop detected attacks.
Explanation
An access control list filters traffic based on the IP header information, such as
source or destination IP address, protocol, or socket number. Access control lists are
configured on routers, and they operate on Layer 3 information.
Port security is configured on switches, which filter traffic based on the MAC address
in the frame.
An intrusion detection system (IDS) or intrusion prevention system (IPS) examines
patterns detected across multiple packets. An IPS can take action when a suspicious
pattern of traffic is detected.
References
Question 5:
Correct
Your Cisco router has three network interfaces configured.
• S0/1/0 is a WAN interface that is connected to an ISP.
• F0/0 is connected to an Ethernet LAN segment with a network address of
[Link]/24.
• F0/1 is connected to an Ethernet LAN segment with a network address of
[Link]/24.
You have configured an access control list on this router using the following rules:
• deny ip [Link] [Link] any
• deny ip [Link] [Link] any
These rules will be applied to the WAN interface on the router. Your goal is to block
any IP traffic coming in on the WAN interface that has a spoofed source address that
makes it appear to be coming from the two internal networks.
However, when you enable the ACL, you find that no traffic is being allowed through
the WAN interface.
What should you do?
Answer
Use the out parameter instead of the in parameter within each ACL rule.
Apply the access list to the Fa0/1 interface instead of the S0/1/0 interface.
Correct Answer:
Add a permit statement to the bottom of the access list.
Apply the access list to the Fa0/0 interface instead of the S0/1/0 interface.
Explanation
The problem with this access list is that it only contains deny statements. On Cisco
devices, there is an implicit deny any at the end of every access list. You need to
add a permit statement and identify the type of traffic that is allowed.
References
Question 6:
Correct
Which of the following are true about routed firewalls? (Select two.)
Answer
Correct Answer:
Counts as a router hop.
Correct Answer:
Supports multiple interfaces.
Operates at Layer 2.
Easily introduced to an existing network.
Explanation
On a routed firewall, the firewall is also a Layer 3 router. In fact, many hardware
routers include firewall functionality. Transmitting data through this type of firewall
counts as a router hop. A routed firewall usually supports multiple interfaces, each
connected to a different network segment.
A transparent firewall (which is also called a virtual firewall) works differently. It
operates at Layer 2 and is not seen as a router hop by connected devices. Both the
internal and external interfaces on a transparent firewall connect to the same
network segment. Because it is not a router, you can easily introduce a transparent
firewall into an existing network.
References
Question 7:
Correct
Which of the following is a firewall function?
Answer
Frame filtering
Encrypting
Correct Answer:
Packet filtering
FTP hosting
Explanation
Firewalls often filter packets by checking each one against a set of administrator-
defined criteria. If a packet is not accepted, it is simply dropped.
References
Question 8:
Correct
You have used firewalls to create a screened subnet. You have a web server that
needs to be accessible to internet users. The web server must communicate with a
database server to retrieve product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select
two.)
Answer
Explanation
Publicly accessible resources (servers) are placed inside the screened subnet.
Examples of publicly accessible resources include web, FTP, and email servers.
Devices that should not be accessible to public users are placed on the private
network. If you have a public server that communicates with another server (such as
a database server) and that server should not have direct contact with public hosts,
place the server on the private network and allow only traffic from the public server to
cross the inner firewall.
References
Question 9:
Correct
Which of the following BEST describes a stateful inspection?
Answer
Offers secure connectivity between many entities and uses encryption to provide an
effective defense against sniffing.
Designed to sit between a host and a web server and communicate with the server
on behalf of the host.
Allows all internal traffic to share a single public IP address when connecting to an
outside entity.
Correct Answer:
Determines the legitimacy of traffic based on the state of the connection from which
the traffic originated.
Explanation
References
Question 10:
Correct
Which of the following are characteristics of a stateless firewall? (Select two.)
Answer
Explanation
A stateless firewall controls traffic using access control lists, or ACLs. Instead of
analyzing the state of network traffic, stateless firewalls inspect the information
contained in IP packets and compare it to a static list of rules in the ACL. These rules
determine whether to accept or reject IP packets based on the defined criteria. This
criteria can include IP addresses,
port numbers, services, and traffic direction
A stateful firewall allows or denies traffic based on virtual circuits of sessions. A
stateless firewall is also known as a circuit-level proxy or a circuit-level gateway.
Standard ACL:
• Identify traffic based on the destination address.
• Are used by route maps and VPN filters.
• Use the number ranges 1-99 and 1300-1999.
• Should be placed as close to the destination as possible.
References
Circuit proxy
Correct Answer:
Bastion
Multi-homed
Kernel proxy
Explanation
A bastion, or sacrificial, host is one that's unprotected by a firewall. The term bastion
host is used to describe any device fortified against attack (such as a firewall). A
sacrificial host might be a device intentionally exposed to attack, such as a honeypot.
Circuit proxies and kernel proxies are types of firewall devices.
Multi-homed describes a device with multiple network interface cards.
References
Question 2:
Correct
How many network interfaces does a dual-homed gateway typically have?
Answer
one
Correct Answer:
three
four
two
Explanation
A dual-homed gateway is a firewall device that typically has three network interfaces.
One is connected to the internet, one is connected to the public subnet, and one is
connected to the private network.
References
Question 3:
Correct
You have a company network that is connected to the internet. You want all users to
have internet access, but you need to protect your private network and users. You
also need to make a web server publicly available to the internet users.
Which solution should you use?
Answer
Use a single firewall. Put the server and the private network behind the firewall.
Use a single firewall. Put the web server in front of the firewall and the private
network behind the firewall.
Use firewalls to create a screened subnet. Place the web server and the private
network inside the screened subnet.
Correct Answer:
Use firewalls to create a screened subnet. Place the web server inside the screened
subnet and the private network behind the screened subnet.
Explanation
A screened subnet is a buffer network (or subnet) that sits between a private network
and an untrusted network, such as the internet. A common configuration uses two
firewalls, with one connected to the public network and one connected to the private
network. Publicly accessible resources (servers) are placed inside the screened
subnet. Examples of publicly accessible resources include web, FTP, or email
servers. Private resources that are not accessible from the internet are placed
behind the screened subnet (behind the inner firewall).
Placing the web server inside the private network would mean opening ports on the
firewall that lead to the private network, which could expose other devices to attacks.
Placing the web server outside the firewall would leave it unprotected.
References
Question 4:
Correct
You are managing a network and have used firewalls to create a screened subnet.
You have a web server that internet users need to access. It must communicate with
a database server to retrieve product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select
two.)
Answer
Correct Answer:
Put the web server inside the screened subnet.
Put the database server and the web server inside the screened subnet.
Correct Answer:
Put the database server on the private network.
Explanation
Publicly accessible resources (servers) are placed inside the screened subnet.
Examples of publicly accessible resources include web, FTP, or email servers.
Devices that should not be accessible to public users are placed on the private
network. If you have a public server that communicates with another server (such as
a database server), and that server shouldn't have direct contact with public hosts,
place it on the private network and only allow traffic from the public server to cross
the inner firewall. Placing the database server and the web server inside the
screened subnet would not provide the necessary traffic flow.
References
Question 5:
Correct
In which of the following situations would you MOST likely implement a screened
subnet?
Answer
Correct Answer:
You want to protect a public web server from attack.
You want to encrypt data sent between two hosts using the internet.
You want users to see a single IP address when they access your company network.
Explanation
A screened subnet is a network placed between a private, secured network and the
internet to grant external users access to internally controlled services. In essence, it
serves as a buffer zone for your network.
An intranet is a private network that happens to employ internet information services.
An extranet is a division of a private network that's accessible to a limited number of
users, such as business partners, suppliers, and certain customers.
A padded cell is an intrusion detection countermeasure that's used to delay intruders
enough to record meaningful information about them for discovery and prosecution.
References
Question 6:
Correct
Which of the following can serve as a buffer zone between a private, secured
network and an untrusted network?
Answer
Padded cell
Correct Answer:
Screened subnet
Extranet
Intranet
Explanation
References
• 6.2.12 Firewall Design and Configuration Facts
• 6.3.1 Screened Subnets
• 6.3.2 Configure a Screened Subnet
• 6.3.3 Screened Subnet Facts
• 12.1.1 Security Concepts
• 12.1.2 Security Concepts Facts
• 12.1.7 Defense in Depth
• 12.1.8 Defense in Depth Facts
q_screened_subnet_fact_04_np6.[Link]
Question 7:
Correct
What do you need to configure on a firewall to allow traffic directed to the public
resources on the screened subnet?
Answer
Correct Answer:
Packet filters
Subnet
VPN
FTP
Explanation
Packet filters on a firewall allow traffic directed to the public resources inside the
screened subnet. Packet filters also prevent unauthorized traffic from reaching the
private network.
A subnet is used to segment a network.
A VPN (virtual private network) provides a secure outside connection to an internal
network's resources. A VPN does not need to be configured on the firewall to allow
traffic to the public resources on the screened subnet.
FTP (File Transfer Protocol) is a protocol that's used to transfer files. You do not
need to configure this on the firewall to allow traffic to the public resources on the
screened subnet.
References
Question 8:
Correct
Which of the following is another name for a firewall that performs router functions?
Answer
Screened subnet
Correct Answer:
Screening router
Screened-host gateway
Dual-homed gateway
Explanation
References
Question 9:
Correct
Which of the following uses access control lists (ACLs) to filter packets as a form of
security?
Answer
Dual-homed gateway
Screened subnet
Correct Answer:
Screened router
Screened-host gateway
Explanation
A screening router is the router that is most external to the network and closest to
the internet. It uses access control lists (ACLs) to filter packets as a form of security.
A dual-homed gateway is a firewall device that typically has three network interfaces.
One is connected to the internet, one is connected to the public subnet, and one is
connected to the private network.
A screened-host gateway resides within the screened subnet, requiring users to
authenticate to access resources within the screened subnet or the intranet.
A screened subnet uses two firewalls. The external firewall is connected to the
internet and allows access to public resources. The internal firewall connects the
screened subnet to the private network.
References
Question 10:
Correct
Which of the following is the BEST solution to allow access to private resources from
the internet?
Answer
Correct Answer:
VPN
Packet filters
FTP
Subnet
Explanation
References
• 6.3.3 Screened Subnet Facts
q_screened_subnet_vpn_np6.[Link]
Which IDS method defines a baseline of normal network traffic and then looks for
anything that falls outside of that baseline?
Answer
Misuse detection
Correct Answer:
Anomaly-based
Pattern matching
Dictionary recognition
Explanation
Anomaly-based detection defines a baseline of normal network traffic and then looks
for anything that falls outside of that baseline.
Dictionary recognition is a detection method. However, this method does not define a
baseline of normal network traffic and then look for anything that falls outside of that
baseline.
Pattern matching is a detection method. However, this method does not define a
baseline of normal network traffic and then look for anything that falls outside of that
baseline.
Misuse detection is a detection method. However, this method does not define a
baseline of normal network traffic and then look for anything that falls outside of that
baseline.
References
Question 2:
Correct
Which of the following describes the worst possible action by an IDS?
Answer
The system detected a valid attack and the appropriate alarms and notifications were
generated.
Explanation
The worst possible action an IDS can perform is identifying harmful traffic as
harmless and allowing it to pass without generating any alerts. This condition is
known as a false negative.
Positive traffic assessment means that the system detected a valid attack and the
appropriate alarms and notifications were generated. Negative traffic assessment
means that the system correctly deemed harmless traffic as inoffensive and let it
pass. False positive traffic assessment means that the system identified harmless
traffic as offensive and triggered an alarm.
References
Question 3:
Correct
Which IDS traffic assessment indicates that the system identified harmless traffic as
offensive and generated an alarm or stopped the traffic?
Answer
Positive
Negative
Correct Answer:
False positive
False negative
Explanation
A false positive traffic assessment means that the system identified harmless traffic
as offensive and generated an alarm or stopped the traffic.
A positive traffic assessment means that the system detected an attack and the
appropriate alarms and notifications were generated or the correct actions were
performed to prevent or stop the attack.
A negative traffic assessment means that the system deemed the traffic harmless
and let it pass.
A false negative traffic assessment means that harmful traffic passed without any
alerts being generated or any actions being taken to prevent or stop it. This is the
worst possible scenario.
References
Question 4:
Correct
As a security precaution, you've implemented IPsec to work between any two
devices on your network. IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted
traffic to prevent any malicious attacks.
Which solution should you implement?
Answer
Correct Answer:
Host-based IDS
Protocol analyzer
Network-based IDS
Port scanner
VPN concentrator
Explanation
A host-based IDS is installed on a single host and monitors all traffic coming into the
host. A host-based IDS can analyze encrypted traffic because the host operating
system decrypts that traffic as it's received.
A network-based IDS is a dedicated device installed on the network. It analyzes all
traffic on the network. It cannot analyze encrypted traffic because the packet's
contents are encrypted so that only the recipient can read them.
A protocol analyzer examines packets on the network, but it cannot look at the
contents of encrypted packets.
A port scanner probes a device to identify open protocol ports.
A VPN concentrator is a device used to establish remote access VPN connections.
References
Question 5:
Correct
Which of the following is true about an intrusion detection system?
Answer
An intrusion detection system maintains an active security role within the network.
Correct Answer:
An intrusion detection system monitors data packets for malicious or unauthorized
traffic.
Explanation
References
Question 6:
Correct
You're concerned about attacks directed at your network firewall. You want to be
able to identify and be notified of any attacks. In addition, you want the system to
take immediate action to stop or prevent the attack, if possible.
Which tool should you use?
Answer
Correct Answer:
IPS
IDS
Port scanner
Packet sniffer
Explanation
Use an intrusion prevention system (IPS) to both detect and respond to attacks.
An intrusion detection system (IDS) can detect attacks and send notifications, but it
cannot respond to attacks.
Use a port scanner to check for open ports on a system or a firewall.
Use a packet sniffer to examine packets on your network.
References
Question 7:
Correct
Which of the following is true about an NIDS?
Answer
Correct Answer:
It detects malicious or unusual incoming and outgoing traffic in real time.
Explanation
References
Question 8:
Correct
Which IDS type can alert you to trespassers?
Answer
NIDS
HIDS
Correct Answer:
PIDS
VMIDS
Explanation
A PIDS (perimeter intrusion detection system) can alert you to physical trespassers.
VMIDS, NIDS, and HIDS are IDS types. However, they cannot alert you to physical
trespassers.
References
Question 9:
Correct
Which IDS method searches for intrusion or attack attempts by recognizing patterns
or identifying entities listed in a database?
Answer
Correct Answer:
Signature-based IDS
Heuristics-based IDS
Explanation
Question 10:
Correct
You've just installed a new network-based IDS system that uses signature
recognition. What should you do on a regular basis?
Answer
Explanation
References
In-band management
correct answer:
Uses a dedicated communication channel.
Out-of-band management
correct answer:
Must be encrypted to protect communications from sniffing.
In-band management
correct answer:
Does not compete with normal network traffic for bandwidth.
Out-of-band management
correct answer:
Affected by network outages.
In-band management
correct answer:
Keyboard Instructions
Explanation
You can perform switch management tasks through a network connection by using
the management utilities. This is called in-band management because it uses a
normal network switch connection to perform these tasks. Tools such as Telnet or
SSH provide in-band management. Using the same network connection for both
data and management has several drawbacks. For example:
• You must compete with normal network traffic for bandwidth.
• The network traffic created by the management utilities must be protected
from sniffing to ensure that hackers cannot capture sensitive configuration
information.
• If the network connection is unavailable or if the switch is unresponsive,
you can't perform management tasks.
Out-of-band management, on the other hand, overcomes these problems by using
dedicated communication channels that separate server management traffic from
normal network traffic. With network switches (and routers), you can use console
redirection to redirect console output to a built-in serial or USB console port.
References
• 7.1.4 Switching Facts
q_switching_bands_np6.[Link]
Question 2:
Correct
Which level of the OSI model does a Layer 2 switch operate at?
Answer
Correct Answer:
Data Link layer
Transportation layer
Network layer
Session layer
Explanation
A Layer 2 switch operates at the second layer of the OSI model, which is the Data
Link layer.
A Layer 2 switch does not operate at the fourth or fifth layer of the OSI model, which
are the Transportation and Session layers.
A Layer 3 switch can operate at the second and third layers of the OSI model, which
are the Data Link and Network layers.
References
Question 3:
Correct
Which of the following is a device that can send and receive data simultaneously?
Answer
Managed
Unmanaged
Correct Answer:
Full-duplex
Honeypot
Explanation
A full-duplex device can send and receive data simultaneously.
A honeypot is a security system used to decoy attackers.
A managed device is a network device that can receive instructions and return
responses to various components.
An unmanaged switch is a simple plug-and-play device that needs no configuration
to work.
References
Question 4:
Correct
On your network, you have a VLAN for the sales staff and a VLAN for the production
staff. Both need to be able to communicate over the network. Which of the following
devices would work BEST for communication between VLANs?
Answer
Load balancer
Repeater
Correct Answer:
Layer 3 switch
Layer 2 switch
Explanation
References
Question 5:
Correct
As a network administrator, you have 10 VLANs on your network that need to
communicate with each other. Which of the following network devices is the BEST
choice for allowing communication between 10 VLANs?
Answer
Correct Answer:
Layer 3 switch
Layer 2 switch
Load balancer
Repeater
Explanation
References
Question 6:
Correct
Match each type of switch on the left with its corresponding characteristics on the
right. Each switch type may be used once, more than once, or not at all.
Commonly sold at retail stores.
Unmanaged switch
correct answer:
Provides port security features.
Managed switch
correct answer:
Supports VLANs.
Managed switch
correct answer:
Provides very few configuration options.
Unmanaged switch
correct answer:
Can be configured over a network connection.
Managed switch
correct answer:
Can be configured over a dedicated communication channel.
Managed switch
correct answer:
Keyboard Instructions
Explanation
You cannot configure the low-end switches available from many retail stores. These
are called unmanaged switches. To implement an unmanaged switch, you simply
plug it in to a power outlet and connect your network devices with UTP cables. While
unmanaged switches are convenient and easy to implement, they lack many of the
advanced management and security features available on managed switches. For
example, managed switches provide port security and support VLANs.
References
Question 7:
Correct
Which of the following is required to establish a new network switch and configure its
IP address for the first time?
Answer
Client-to-site VPN
Correct Answer:
Out-of-band management
Site-to-site VPN
In-band management
Explanation
Out-of-band management is required when you establish a new network switch and
configure its IP address for the first time.
A client-to-site VPN is a connection where remote clients connect to the server
through the internet and to a LAN behind a server.
In-band management can only be used after the switch has been configured with an
IP address and authentication information through out-of-band management.
A site-to-site VPN is a connection between networks that creates a secure link
through VPN gateways.
References
Question 8:
Correct
Which of the following methods is best to have when a network goes down?
Answer
Site-to-site VPN
Correct Answer:
Out-of-band management
Client-to-site VPN
In-band management
Explanation
References
Router
Hub
Correct Answer:
Switch
Access point
Explanation
References
Question 10:
Correct
Which of the following is true about an unmanaged switch?
Answer
Correct Answer:
It can connect to all devices in a small area.
An unmanaged switch is faster and more economical than a managed switch and
can connect all devices within a small area, like a home or small office.
Managed switches allow VLAN creation for segmentation; unmanaged switches do
not.
Managed switches support link aggregation; unmanaged switches do not.
Managed switches allow port configuration; unmanaged switches do not.
References
RFC1918
NDP
Correct Answer:
802.1q
ARP
Explanation
802.1q is the open standard for tagging Layer 2 frames and is used for implementing
trunk porting.
RFC1918 is used to create IP addresses on a private network.
ARP (Address Resolution Protocol) works at Layer 3 to establish the MAC address
that's linked to the gateway's IP address.
NDP (Neighbor Discovery Protocol) works for address resolution with IPv6.
References
Question 2:
Correct
Which of the following protocols prescribes what to do when a data channel is in use
on a half-duplex device?
Answer
ARP
Correct Answer:
CSMA/CD
Auto-MDI-X
NDP
Explanation
References
Question 3:
Correct
A switch receives a frame with a destination MAC address that is not found in its
MAC address table. What happens next?
Answer
The frame stops at the switch and is not forwarded until the destination MAC
address is manually added to the MAC address table.
Correct Answer:
The frame is replicated and sent to every active port on the switch except the source
port.
The frame is replicated and sent to every active port on the switch.
Explanation
When a switch receives a frame with a destination MAC address that is not found in
its MAC address table, the switch replicates the frame and sends it to every active
port on the switch except the source port.
The frame is replicated, but it is not sent to every active port on the switch. It is sent
to every one except the port the frame came from.
The frame is not rejected and returned.
The frame does not stop at the switch until the destination MAC address is manually
added to the table.
References
ARP
Correct Answer:
NDP
Auto-MDIX
CSMA/CD
Explanation
Neighbor Discovery Protocol (NDP) is the protocol that replaced ARP in IPv6 and is
used for address resolution.
Address Resolution Protocol (ARP) is used for address resolution with IPv4.
Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is a protocol used to
prescribe what to do when a data channel is in use on a half-duplex device.
Auto-MDIX, or auto-medium dependent crossover, is a line-sensing port that
automatically decides which type of cable configuration is needed for a connection.
References
Question 5:
Correct
In which type of device is a MAC address table stored?
Answer
Router
Correct Answer:
Switch
Repeater
Hub
Explanation
A Layer 2 switch stores MAC addresses in a table, which the switch uses to know
where to forward frames.
A router is a Layer 3 device and stores ARP tables, not MAC address tables.
A hub cannot learn or store MAC addresses. They are Layer 1 devices.
A repeater is a Layer 1 device that boosts a signal by electrically amplifying it. A
repeater does not store MAC address tables.
References
Question 6:
Correct
You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch,
but you still need to access the network through the computer.
Which of the following should you use in this situation?
Answer
Spanning Tree
VPN
Correct Answer:
VLAN
Port security
Explanation
You should define virtual LANs (VLANs) on the switch. With a VLAN, a switch port is
associated with a VLAN, and only devices connected to ports that are members of
the same VLAN can communicate with each other. You can use routers to allow
communication between VLANs if necessary.
Use a virtual private network (VPN) to connect two hosts securely through an
unsecure network (such as the internet). VPN tunneling protocols protect data as it
travels through the unsecure network.
Spanning Tree is a switch feature that allows redundant paths between switches.
Port security is a method of requiring authentication before a network connection is
allowed.
References
•7.2.2 VLAN Facts
q_vlan_vlan_01_np6.[Link]
Question 7:
Correct
For which of the following devices does a voice VLAN prioritize traffic?
Answer
Hub
Layer 3 switch
Bridge
Correct Answer:
VoIP phone
Explanation
A VoIP phone is a phone that transmits sound over the internet. It works best when a
voice VLAN is created to prioritize its traffic.
A hub is a device that broadcasts data to every computer that is connected to it.
A Layer 3 switch is a device that can provide all the functions of a Layer 2 switch
along with routing.
A bridge is a device that creates a single network from multiple network segments.
References
Question 8:
Correct
What does the ip address dhcp command allow you to do?
Answer
Correct Answer:
Configure a switch to obtain an IP address from a DHCP server.
You can use the ip address dhcp command to configure a switch or router to get its
IP address from a DHCP server. You can configure the DHCP server to deliver the
default gateway and DNS server addresses to a Cisco device as well. A manually
configured default gateway address overrides any address received from the DHCP
server.
References
Question 9:
Correct
Which command would you use on a switch to enable management from a remote
network?
Answer
ip address dhcp
no shutdown
Correct Answer:
ip default-gateway [Link]
Explanation
References
Question 10:
Correct
You are configuring a switch so that you can manage it using PuTTY from the same
network segment. On the switch, you enter the following commands:
switch#config terminal
switch(config)#interface vlan 1
switch(config-if)#ip address [Link] [Link]
Will this configuration work?
Answer
Correct Answer:
No. The no shutdown command needs to be entered.
No. The switch needs to obtain an IP address from the DHCP server using the ip
address dhcp command.
Yes. The switch can now be accessed by PuTTY using the IP address [Link].
Explanation
References
In the learning state, the MAC address table cannot be populated because the port is
blocked.
Correct Answer:
In the learning state, the MAC address table can be populated, but frames are not
forwarded.
Explanation
References
Question 2:
Correct
You manage a single subnet with three switches. The switches are connected to
provide redundant paths between themselves.
Which feature prevents switching loops and ensures that there is only a single active
path between any two switches?
Answer
Trunking
Correct Answer:
Spanning Tree
802.1x
PoE
Explanation
References
Question 3:
Correct
You manage a network with two switches. The switches are connected together
through their Gigabit Ethernet uplink ports.
You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN
1 needs to communicate with a device on the second switch in VLAN 1.
What should you configure to allow communication between these two devices
through the switches?
Answer
Layer 3 switching
Spanning Tree
Correct Answer:
Trunking
Bonding
Explanation
References
Question 4:
Correct
Computers A and B are on the same VLAN and are separated by two switches as
shown in the exhibit. Computer A sends a frame to Computer B.
Which of the following BEST describes the frame's composition as it travels from A
to B?
Answer
Computer A sends a normal frame. The first switch forwards the frame to the second
switch, where the VLAN ID is appended to the frame and forwarded to Computer B.
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame.
The VLAN ID remains on the frame through the second switch up to Computer B.
Computer A appends a VLAN ID to the frame. It travels from switch to switch and
arrives at Computer B, where it removes the VLAN ID.
Correct Answer:
Computer A sends a normal frame. The first switch appends a VLAN ID to the frame.
The second switch removes the VLAN ID before forwarding it to Computer B.
Explanation
Only switches understand VLAN IDs, who use the IDs for inter-switch traffic. The first
switch appends the VLAN ID, and the second switch removes it.
References
Question 5:
Correct
Which of the following BEST describes port aggregation?
Answer
Correct Answer:
Multiple ports linked together and used as a single logical port.
Explanation
Multiple ports linked together and used as a single logical port is called link
aggregation.
Multiple VLANs traveling through a single port is called port tagging or port trunking.
The 802.3 IEEE network standard refers to an 802.3 Ethernet network.
The IEEE standard for prioritized flow control is 802.1Qbb. It is not port aggregation
itself.
References
•7.3.10 Switch Port Feature Facts
q_switch_ports_features_aggregation_01_np6.[Link]
Question 6:
Correct
Which of the following BEST describes Ethernet flow control?
Answer
A configuration that allows frames larger than 1,500 bytes to pass through the port
without fragmentation.
Explanation
Ethernet flow control is a configuration that sends a pause frame to the transmitting
device when the receiving device cannot keep up with the volume of data being sent.
Port tagging is a configuration that allows traffic from multiple VLANs on a single
port.
Setting your network devices' MTU to 9,000 is a configuration that allows frames
larger than 1,500 bytes (known as jumbo frames) to pass through the ports without
fragmentation.
Spanning Tree Protocol is a protocol designed to prevent looping in network traffic.
References
Question 7:
Correct
Which of the following must each device's MTU be set to for jumbo frames to
transverse the network without risk of fragmentation?
Answer
6,000
1,500
3,000
Correct Answer:
9,000
Explanation
The MTU of each device in the network must be set to 9,000 for jumbo frames to
transverse the network without fragmentation.
If a device's MTU is set to 1,500, 3,000, or 6,000, a jumbo frame could be
fragmented.
References
Question 8:
Correct
Your organization's management wants to monitor all the customer services calls.
The calls are taken on VoIP phones. Which of the following configurations would
BEST help you set up a way to monitor the calls?
Answer
Correct Answer:
Port mirroring
LACP
Explanation
Port mirroring provides copies of packets from a selected port for monitoring and
analysis.
LACP is Link Aggregation Control Protocol. It allows you to link up to eight ports
together to act as a single logical port.
Spanning Tree Protocol is a protocol designed to prevent looping in network traffic.
Priority-based flow control is protocol that allows you to prioritize traffic on your
network by category.
References
PoE++ Type 3
PoE+
PoE
Explanation
You would need PoE++ Type 4, which provides up to 71. 3 watts of power.
PoE provides up to 15.4 watts of power and would not be sufficient to power the flat
screen.
PoE+ provides up to 25.5 watts of power and would not be sufficient to power the flat
screen.
PoE++ Type 3 provides up to 51 watts of power and would not be sufficient to power
the flat screen.
References
Question 10:
Correct
Which of the following switch features allows you to configure how the switch's MAC
address table is filled?
Answer
Auto-negotiation
Port mirroring
Explanation
Port security allows you to choose from dynamic locking, static locking, or a
combination of both to fill the MAC address table. This is done to protect the switch
from MAC flooding and other vulnerabilities.
Port mirroring provides copies of packets from a selected port for monitoring and
analysis.
Auto-negotiation is a default setting on Ethernet devices in which connected devices
communicate to select the speed, duplex, and flow control parameters for their
transmissions.
References
Explanation
References
Question 2:
Correct
You have two switches connected together as shown in the following diagram. How
many broadcast domains are in the network?
Answer
Zero
One
Correct Answer:
Two
Four
Five
Explanation
There are two broadcast domains. Each VLAN is in its own broadcast domain.
When you connect devices to a switch, each switch port connection is in its own
collision domain. In this graphic, there are five collision domains.
References
Question 3:
Correct
You are the network administrator for a city library. Throughout the library are
several groups of computers that provide public access to the internet. Supervision
of these computers has been difficult. You've had problems with patrons bringing
personal laptops into the library and disconnecting the network cables from the
library computers to connect their laptops to the internet.
The library computers are in groups of four. Each group of four computers is
connected to a hub that's connected to the library network through an access port on
a switch. You want to restrict access to the network so that only library computers
are permitted connectivity to the internet.
What can you do?
Answer
Correct Answer:
Configure port security on the switch.
Remove the hub and place each library computer on its own access port.
Create static MAC addresses for each computer and associate each address with a
VLAN.
Explanation
Configuring port security on the switch can restrict access so that only specific MAC
addresses can connect to the configured switch port. This would prevent the laptop
computers from connecting.
Placing each library computer on its own access port would have no effect.
VLANs are used to group broadcast traffic and do not restrict device connectivity as
needed in this scenario.
References
Question 4:
Correct
Which of the following BEST describes an ARP spoofing attack?
Answer
Explanation
An ARP spoofing attack associates an attacker's MAC address with the IP address
of a victim's device.
MAC flooding is an attack in which a switch is flooded with packets, each containing
a different source MAC address.
MAC spoofing is an attack that changes the source MAC address on frames.
Double tagging is a VLAN hopping attack where a frame is manipulated to contain
two tags.
References
Question 5:
Correct
Which of the following is a method of VLAN hopping?
Answer
MAC flooding
ARP spoofing
Correct Answer:
Double tagging
MAC spoofing
Explanation
References
Question 6:
Correct
Drag each description on the left to the appropriate switch attack type on the right.
ARP spoofing/poisoning
The source device sends frames to the attacker's MAC address instead of to the
correct device.
correct answer:
Dynamic Trunking Protocol
Should be disabled on the switch's end user (access) ports before implementing
the switch configuration in to the network.
correct answer:
MAC flooding
Causes packets to fill up the forwarding table and consumes so much of the
switch's memory that it enters a state called fail open mode.
correct answer:
MAC spoofing
Can be used to hide the identity of the attacker's computer or impersonate another
device on the network.
correct answer:
Keyboard Instructions
Explanation
Common attacks that are perpetrated against switches are MAC flooding, ARP
spoofing/poisoning, and MAC spoofing.
MAC flooding overloads the switch's MAC forwarding table to make the switch
function like a hub. MAC flooding works in the following manner:
• The attacker floods the switch with packets, each containing a different
source MAC address.
• The flood of packets fills up the forwarding table and consumes so much
of the memory in the switch that it causes it to enter in to fail open mode.
While in this mode, all incoming packets are broadcast out of all ports (as
with a hub) instead of just to the correct ports, as per normal operations.
• The attacker captures all the traffic with a protocol analyzer/sniffer.
ARP spoofing/poisoning associates the attacker's MAC address with the IP address
of the victim's device. ARP spoofing works in the following manner:
•When computers send an ARP request for a known IP address's MAC
address, the attacker's system responds with its own MAC address.
• The source device sends frames to the attacker's MAC address instead of
to the correct device.
• Switches are indirectly involved in the attack because they do not verify
the MAC address/IP address association.
MAC spoofing changes the source MAC address on frames sent by the attacker.
• MAC spoofing is typically used to bypass 802.1x port-based security.
• MAC spoofing can be used to bypass wireless MAC filtering.
• MAC spoofing can be used to hide the identity of the attacker's computer
or to impersonate another device on the network.
Dynamic Trunking Protocol (DTP) switches have the ability to automatically detect
trunk ports and negotiate the trunking protocol used between devices. DTP is not
secure and allows unauthorized devices to possibly modify configuration information.
You should disable DTP services on a switch's end user (access) ports before
implementing the switch configuration on the network.
References
DTP attack
Explanation
References
Question 8:
Correct
You have just connected four switches as shown in the Exhibit.
Assuming the default switch configuration, how can you force switch C to become
the root bridge?
Answer
Explanation
To force a specific switch to become the root bridge, configure a priority number
lower than the default (32768). The switch with the lowest bridge ID becomes the
root bridge. The bridge ID is composed of two parts, a bridge priority number and the
MAC address assigned to the switch. When the default priority is used for all
switches, the switch with the lowest MAC address becomes the root bridge.
References
Question 9:
Correct
Which of the following switch attacks bypasses the normal functions of a router to
communicate between VLANs and gain unauthorized access to traffic on another
VLAN?
Answer
ARP spoofing
MAC spoofing
Explanation
Switch spoofing, also known as VLAN spoofing, is an attack that bypasses the
normal functions of a router to communicate between VLANs and gain unauthorized
access to traffic on another VLAN. It does this by taking advantage of a switch's
default setting called dynamic auto or dynamic desirable. The attacker uses this
function to imitate a trunking switch and gain access to the traffic on multiple VLANs.
VLAN, or switch, spoofing is a method of VLAN hopping.
MAC spoofing is changing the source MAC address on frames. The attacker's
system sends frames with the spoofed MAC address. The switch reads the source
address contained in the frames and associates the MAC address with the port
where the attacker is connected.
ARP spoofing/poisoning associates the attacker's MAC address with the IP address
of a victim's device.
Switches have the ability to automatically detect trunk ports and negotiate the
trunking protocol used between devices. Dynamic Trunking Protocol is not secure
and allows unauthorized devices to modify configuration information.
References
Question 10:
Correct
Which of the following attacks manipulates a switch's auto-negotiation setting to
access a virtual local area network that's connected to the same switch as the
attacker's virtual local area network?
Answer
ARP spoofing
MAC spoofing
Correct Answer:
VLAN spoofing
Explanation
References
Explanation
References
Question 2:
Correct
Jake is a network administrator for a hospital. There is medical equipment that relies
on having uninterrupted internet connectivity. Which of the following types of routing
protocols should Jake focus on to ensure that the hospital's network connectivity
remains reliable?
Answer
Explanation
References
Question 3:
Correct
Which of the following has the least default administrative distance?
Answer
Correct Answer:
Static route to an IP address
External BGP
OSPF
RIP
Explanation
References
• 7.5.4 Routing Protocol Characteristics Facts
q_rounting_admin_distance_np6.[Link]
Question 4:
Correct
Under which of the following circumstances might you implement BGP on your
company network and share routes with internet routers?
Answer
Explanation
Very large networks can use BGP internally, but they typically only share routes on
the internet if the AS (autonomous system) has two or more connections to the
internet through different ISPs.
If your network has over 15 hops, use a routing protocol other than RIP.
Use OSPF or IS-IS to divide your network into areas.
Private networks that use public IP addresses do not need to share routes with
internet routers. It is typically the ISP's responsibility to configure routes on the
private network, even when public addressing is being used.
A single route out of the private network is all that's required if the network has a
single connection to the internet.
References
Question 5:
Correct
A router is connected to network [Link]/24 and network [Link]/24. The
router is configured to use RIP and has learned both networks.
The next hop router for network [Link] has changed. You need to make the
change with the least amount of effort possible.
What should you do?
Answer
Stop and restart the RIP protocol on the router.
Manually reconfigure the default route to point to the new next hop router.
Explanation
When you use a routing protocol, changes in routing information take some time to
be propagated to all routers on the network. The term convergence is used to
describe the condition when all routers have the same (or correct) routing
information.
Static routes in a routing table must be updated manually.
Restarting RIP might actually increase the time required for changes to be learned.
Forcing an update (if the router supports it) is not a requirement, as the periodic
sharing of routes will eventually update the routing table entry.
References
Question 6:
Correct
Which of the following routing protocols is a hybrid that uses a composite number for
its metric based on bandwidth and delay?
Answer
RIP
BGP
Correct Answer:
EIGRP
OSPF
Explanation
Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid protocol that uses
a composite number for its metric based on bandwidth and delay.
RIP uses hop count as its metric and is for networks with 15 or less hops.
OSPF is a link state routing protocol used for routing within an AS and uses relative
link cost as its metric.
BGP is an advanced distance vector protocol (also called a path vector protocol) that
uses path, rules, and policies instead of a metric to make routing decisions.
References
Question 7:
Correct
Which of the following are true of the IS-IS routing protocol? (Select two.)
Answer
It is a classful protocol.
Explanation
References
Question 8:
Correct
What are the main differences between the OSPF and IS-IS routing protocols?
Answer
Correct Answer:
OSPF requires an area 0, while IS-IS does not.
Explanation
Like OSPF, IS-IS uses areas when designing the network. However, IS-IS does not
require an area 0 like OSPF does. Because IS-IS was originally designed for non-IP
protocols, it can more easily support IPv6 routing.
Both OSPF and IS-IS have the following characteristics:
• Both are link state protocols.
• Both are classless protocols, supporting CIDR and VLSM.
• Both are interior gateway protocols that are used within an AS.
References
Question 9:
Correct
What is the main difference between RIP and RIPv2?
Answer
RIP use hop count for the metric, while RIPv2 uses a relative link cost.
RIP has a limit of 15 hops, while RIPv2 increases the hop count limit.
Correct Answer:
RIP is a classful protocol, while RIPv2 is a classless protocol.
Explanation
RIPv1 is a classful protocol, meaning that the subnet mask is not included in routing
updates. With RIP, only the default subnet mask is used to identify networks. RIPv2
is a classless protocol, meaning that the subnet mask is included in routing updates.
RIPv2 supports variable-length subnet masks (VLSM).
Both RIP and RIPv1 are distance vector protocols and use hop count for the metric.
RIP and RIPv2 have a limit of 15 hops between any two networks.
References
Question 10:
Correct
You have only one physical interface but want to connect two IP networks. Which of
the following would allow you to do so?
Answer
A loopback address
Correct Answer:
Subinterfaces
Virtual IPs
Explanation
You can use subinterfaces to connect two IP networks through one parent physical
interface. Each subinterface is given its own IP information and data can then be
routed from one network to the other through the physical interface.
A loopback address is a special IP address used for diagnostics and for
troubleshooting the TCP/IP stack.
Virtual IPs (VIPs) are IP addresses that are not associated with a single device.
Multiple devices with an internet connection can share a VIP. They are used for one-
to-many Network Address Translation, mobility, and fault tolerance.
The sticky feature is a Cisco port security command that you can enable to
automatically add MAC addresses to the Content Addressable Memory (CAM) table,
or MAC address table.
References
Explanation
Hosts on a private network share the IP address of the NAT router. NAT works by
translating private addresses NAT supports up to 5,000 concurrent connections. This
can consume processor and memory resources, but allows one NAT router to
translate for a large network.
Network address translation can forward DNS requests to the internet.
NAT does not provide end-device to end-device traceability, but this also provide
some security to hosts within the private network as their IP addresses are not
shared publicly.
NAT does not allow external hosts to initiate communication with internal hosts. All
communication is through the NAT router.
References
Question 2:
Correct
Which of the following allows incoming traffic addressed to a specific port to move
through the firewall and be transparently forwarded to a specific host on the private
network?
Answer
Correct Answer:
DNAT
IP masquerade
Dynamic NAT
OSPF
Explanation
DNAT (Destination Network Address Translation) is also called port forwarding and
allows incoming traffic addressed to a specific port to move through the firewall and
be transparently forwarded to a specific host on the private network. Dynamic NAT
automatically maps internal IP addresses with a dynamic port assignment. In this
implementation, many internal private IP addresses are mapped to one public IP
address on the NAT router.
IP masquerade is another name for Dynamic NAT and many-to-one NAT.
OSPF (Open Shortest Path First) is a link-state routing protocol used for routing
within an autonomous system.
References
Question 3:
Correct
Which device is NAT typically implemented on?
Answer
AD server
RADIUS server
ISP router
Correct Answer:
Default gateway router
Explanation
References
Question 4:
Correct
Which of the following NAT implementations maps a single private IP address to a
single public IP address on the NAT router?
Answer
Dynamic NAT
IP masquerade
Many-to-one NAT
Correct Answer:
Static NAT
Explanation
Static NAT maps a single private IP address to a single public IP address on the
NAT router.
IP masquerade and many-to-one NAT are simply different names for Dynamic NAT.
Dynamic NAT automatically maps internal IP addresses with a dynamic port
assignment. In this implementation, many internal private IP addresses are mapped
to one public IP address on the NAT router.
References
Question 5:
Correct
Which of the following do hosts on a private network share if the network utilizes a
NAT router?
Answer
A virtual IP address
Explanation
Hosts on a private network share the NAT router's physical IP address. The NAT
router allows the hosts to share its physical IP address when connecting to the
internet.
Hosts on a private network do not share virtual or physical MAC addresses on a
network that utilizes a NAT router. Each host retains its own MAC address.
Hosts on a private network do not share a virtual IP address on a network that
utilizes a NAT router.
References
Question 6:
Correct
Which of the following is a method that allows you to connect a private network to
the internet without obtaining registered addresses for every host?
Answer
EIGRP
BGP
OSPF
Correct Answer:
NAT
Explanation
References
Question 7:
Correct
Kate, a network administrator, has been tasked with staying within the company
budget. She has a large network and doesn't want to spend more than she needs to
on purchasing and registering multiple public IP addresses for each of the hosts on
her network.
Which of the following methods could help her provide internet access but also keep
costs low and limit the number of registered IP addresses her organization needs to
purchase?
Answer
Explanation
Using NAT will allow the hosts on Kate's network to be private and to utilize just one
registered public IP address.
Using Layer 2 switches will not impact the public IP address situation.
Using Layer 3 switches would only improve the public IP address situation if NAT
were implemented on them.
Using PoE (Power over Ethernet) devices will not impact the public IP address
situation.
References
Question 8:
Correct
Which of the following is NOT one of the IP address ranges defined in RFC 1918
that are commonly used behind a NAT server?
Answer
[Link] to [Link]
[Link] to [Link]
[Link] to [Link]
Correct Answer:
[Link] to [Link]
Explanation
[Link] to [Link] is the IP address range assigned to Windows DHCP
clients (if a DHCP server does not assign the client an IP address). This range is
known as the Automatic Private IP Addressing (APIPA) range.
The other three ranges listed in this question are defined as private IP addresses in
RFC 1918, which are commonly used behind a NAT server.
References
Question 9:
Correct
You are the network administrator for a small company that implements NAT to
access the internet. However, you recently acquired five servers that must be
accessible from outside your network. Your ISP has provided you with five additional
registered IP addresses to support these new servers, but you don't want the public
to access these servers directly. You want to place these servers behind your
firewall on the inside network, yet still allow them to be accessible to the public from
the outside.
Which method of NAT translation should you implement for these servers?
Answer
Restricted
Overloading
Correct Answer:
Static
Dynamic
Explanation
References
Question 10:
Correct
In which of the following tables does a NAT router store port numbers and their
associated private IP addresses?
Answer
Routing table
ARP table
Explanation
A NAT router stores port numbers and their associated private IP addresses in a
translation table. NAT uses this table to know which host to send the incoming traffic
to.
A routing table is for routing packets from one network to another.
A MAC address table is used by Ethernet switches to know where to forward traffic
within a network segment.
An ARP table associates MAC addresses with IP addresses.
References
When a DHCP snooping technique is used to drop packets from untrusted DHCP
servers.
When an attacker adds a second DHCP server to a network and offers IP addresses
to clients wanting to join the network.
Explanation
A denial of service from a lack of IP addresses in a DHCP server's pool is one form
of DHCP scope exhaustion. Another form comes from inefficient IP address
management in which the IP address pool is depleted faster than it can be refilled.
A rogue DCHP server occurs when an attacker adds a second DHCP server to a
network and offers IP addresses to client wanting to join the network. If the network
administrator does not have control over a DHCP server, it is considered a rogue
DHCP server.
Shortening IP address lease times on a DHCP server can help prevent DHCP scope
exhaustion.
DHCP snooping techniques can help protect against rogue DHCP servers.
References
Question 2:
Correct
You have just connected a new computer to your network. The network uses static
IP addressing.
You find that the computer can communicate with hosts on the same subnet, but not
with hosts on a different subnet. No other computers are having issues.
Which of the following configuration values would you MOST likely need to change?
Answer
DNS server
Correct Answer:
Default gateway
Subnet mask
IP address
Explanation
You should check the computer's default gateway setting; this value is used to send
packets to other subnets. If it's incorrect, packets won't be sent to the correct router.
In this scenario, the host can communicate with other hosts on the same subnet,
meaning that the IP address and subnet mask are correctly configured.
The DNS server address is likely not the problem, as name resolution is not
mentioned in the scenario. In addition, if name resolution were a problem, it could
affect access to both local and remote hosts.
References
Question 3:
Correct
A workstation's network board is currently configured as follows:
• Network Speed = Auto
• Duplexing = Auto
The workstation is experiencing poor network performance, and you suspect that the
network board is incorrectly detecting the network speed and duplex settings. Upon
investigation, you find that it's running at 10 Mbps half-duplex. You know that your
network switch is capable of much faster throughput. To fix this issue, you decide to
manually configure these settings on the workstation.
Before you do so, you need to verify the switch port configuration for the connected
workstation. Given that it's a Cisco switch, which commands can you use on the
switch to show a list of all switch ports and their current settings? (Select two.)
Answer
To view the speed and duplex settings of interfaces on a Cisco switch, you can use
one of the following commands:
• show running-config interface (displays concise summary information)
• show interface (displays extended information)
The show interface capabilities command displays information about interface
capabilities, not the current switch configuration.
The show interface ethernet counters command displays interface statistics.
The show interface switchport command displays VLAN information regarding
switch interfaces.
References
•
7.7.4 Switching and Routing Troubleshooting Facts
q_trouble_switching_routing_interface_np6.[Link]
Question 4:
Correct
Which of the following utilities would you use to view the routing table?
Answer
traceroute
mtr
tracert
dig
Correct Answer:
route
Explanation
Use the route command to display the routing table contents and to add or remove
static routes.
The tracert command uses ICMP packets to test connectivity between devices and
display the path between them. Responses from each hop on the route are
measured three times to provide an accurate representation of how long a packet
takes to reach and be returned by that host.
The mtr command on Linux is a combination of the ping and traceroute commands.
The dig command resolves (looks up) a hostname's IP address.
References
Question 5:
Correct
You are unsure if the gateway address is correct for one of your subnetworks
because traffic is not leaving the network. Which of the following tables could you
look at to check if the gateway address is correct?
Answer
ARP table
State table
Explanation
References
Question 6:
Correct
Which of the following scenarios would cause a problem in asymmetric routing?
Answer
Explanation
When you have asymmetrical routing, the outbound traffic would go through one
stateful firewall and the inbound traffic would come through the second stateful
firewall. The second firewall would drop the packets because it wouldn't have any
record of them in its state table. That information would be recorded in the first
firewall.
Unless you've specifically programmed a hub as stateful, it would not have problems
with asymmetrical routing.
In general, routers do not have problems with asymmetric routing, regardless of
number.
Switches do not have problems with asymmetric routing, regardless of number.
References
Question 7:
Correct
You manage a network with multiple switches. You find that your switches are
experiencing heavy broadcast storms.
Which of the following will help reduce the effects of these broadcast storms?
Answer
Explanation
References
Question 8:
Correct
Which of the following can cause broadcast storms?
Answer
Duplicate IP addresses
Routing loops
Explanation
Switching loops can cause broadcast storms. The broadcast packets are forwarded
to each port on each switch. The switches will then rebroadcast the packets
endlessly and flood the network.
Duplicate MAC addresses, duplicate IP addresses, and routing loops do not cause
broadcast storms.
References
Question 9:
Correct
You run a small network for your business that has a single router connected to the
internet and a single switch. You keep sensitive documents on a computer that you
would like to keep isolated from other computers on the network. Other hosts on the
network should not be able to communicate with this computer through the switch,
but you still need to access the network through the computer.
What should you use for this situation?
Answer
Port security
VPN
Spanning Tree
Correct Answer:
VLAN
Explanation
You should define virtual LANs (VLANs) on the switch. To do so, a port on the switch
is associated with a specific VLAN. Only devices connected to ports that are
members of the same VLAN can communicate with each other. Routers are used to
allow communication between VLANs if necessary.
Use a virtual private network (VPN) to connect two hosts securely through an
unsecure network (such as the internet). VPN tunneling protocols protect data as it
travels through the unsecure network.
Spanning Tree is a switch protocol that allows redundant paths between switches.
Port security is a method of requiring authentication before allowing a network
connection.
References
A top-of-rack switch
Explanation
A storage attached network (SAN) is a block-level storage solution built for speed
and ease of sharing.
A top-of-rack switch connects devices to a network.
A mid-tier speed switch is also known as a Distribution or Aggregation layer switch.
A Core layer switch is the backbone of a three-tier data center.
References
Question 2:
Correct
You manage a network with three dedicated storage devices, as shown in the
diagram. Users on the network see only a single file server.
Which network-based storage technology is being used?
Answer
NAS
Explanation
Question 3:
Correct
Which of the following are the components of a SAN?
Answer
Explanation
Storage attached networks have hosts (hypervisors), storage on the target servers,
and SAN fabric that consists of the cabling.
Access switches are part of the data center architecture. All SAN storage devices
are called targets. Hosts are servers that have a hypervisor installed. SAN fabric
consists of the cabling and networking hardware that provides the connectivity
between host components and storage components. Distribution layer switches are
mid-tier speed switches. Core layer switches are large modular appliances. The
servers that connect to the shared storage device are called initiators.
References
•
8.1.5 SAN Facts
q_san_components_np6.[Link]
Question 4:
Correct
Match the SAN technology on the left with it's specialization on the right. (Items may
be once, used more that once or not at all.)
iSCSI
Explanation
References
Question 5:
Correct
Brett has been tasked with creating a new SAN. The company currently has Gigabit
internet, and his CTO wants to use Fibre Channel over Ethernet (FCoE) in the SAN.
Brett tells the CTO that this will not work. Which of the following BEST describes the
problem?
Answer
Explanation
References
Question 6:
Correct
What BEST describes the designed purpose of InfiniBand?
Answer
Cloud platforms
Jumbo frames
Explanation
References
Question 7:
Correct
You are in the process of configuring an iSCSI storage area network (SAN) for your
network.
You want to configure a Windows Server system to connect to an iSCSI target
defined on a different server system. You also need to define iSCSI security settings,
including CHAP and IPsec.
Which tool should you use?
Answer
Correct Answer:
iSCSI Initiator
Multipath I/O
Explanation
Run the iSCSI Initiator to connect to an iSCSI target defined somewhere on the SAN
fabric. You can also use this utility to define iSCSI security settings, including CHAP
and IPsec.
Internet Storage Name Service (iSNS) servers provide discoverability and zoning for
SAN resources.
Multipath I/O (MPIO) provides support for a storage device's multiple data paths.
Use the iSCSI option under File and Storage Services in Server Manager to define
an iSCSI target on a server.
References
Question 8:
Correct
Within an SDN, what is commonly referred to as the brains?
Answer
Initiators
Fabric
Hosts
Correct Answer:
Controllers
Explanation
Controllers are what operate at the control plane and run an SDN.
An initiator is a client that sends iSCSI commands to storage devices within the SAN.
Hosts can refer to many items, such as servers that allow access to the SAN.
Fabric is a layer within a SAN.
References
Question 9:
Correct
Which option BEST describes the third layer in the SDN architecture?
Answer
Control
Management
Correct Answer:
Infrastructure
Application
Explanation
The third layer of SDN is the Infrastructure, or Physical, layer. This is where the
network hardware is located.
The Control layer is the second layer and functions as the brains of the network.
The Application layer is the first layer and contains the applications needed to
program and monitor the network.
The management plane is the interface that admins use to set network parameters.
References
Question 10:
Correct
What are the three layers of an SDN?
Answer
Explanation
The three layers of an SDN are the Application, Control, and Infrastructure layers.
The control plane deals with software and management.
Physical is not correct since the top layer deals with applications, and virtualized is
an incorrect term for infrastructure, as some components may be physical.
SaaS, IaaS, and PaaS are cloud service models.
References
Explanation
The codec's main purpose is to compress and decompress data to save bandwidth.
External calls are controlled through other hardware, not the codec.
While the codec does help with sound and transmission quality, this is not its main
purpose.
References
Question 2:
Correct
Which of the following BEST describes VoIP (Voice over Internet Protocol)?
Answer
A series of protocols optimized for voice (telephone calls) and digital data
transmission through a packet-switched IP network.
A protocol optimized for voice data transmission (telephone calls) through a wireless
network.
Explanation
References
Question 3:
Correct
Which of the following are considered VoIP endpoints?
Answer
Correct Answer:
Hard phones and soft phones
Explanation
Hard phones and soft phones are endpoints for VoIP since both can take calls over
Ethernet cable.
A hardline is a traditional phone that does not use the internet. Cell phones work
through different technology.
A satellite phone uses signals from satellites, not from the internet.
PBX (private branch exchange) is a different piece of equipment; it is not considered
an endpoint.
References
Question 4:
Correct
Larry is tasked with implementing a VoIP system in the office. He presents his
research to his boss, who wants to use the current traditional hard phones to save
money. What BEST explains why this is not possible?
Answer
Traditional hard phones don't provide conferencing, but VoIP hard lines do.
Regular hard phones only work with SNMP, and VoIP hard phones use UDP and
TCP.
Explanation
VoIP requires a computer to work. VoIP hard phones are, in essence, computers
that understand network protocols.
VoIP hard phones must conform to IEEE 802.3.
Traditional hard phones are not capable of understanding any network protocols,
including SNMP.
Traditional business hard phones have included conferencing for a long time. It is not
a unique feature to VoIP hard phones.
References
Question 5:
Correct
Amber, a network administrator, is conducting VoIP training for other IT team
members. Melanie, a new team member, is confused about the difference between
latency and jitter. What is the BEST way to explain the difference?
Answer
Explanation
References
Question 6:
Correct
Dan, a network administrator, gets an email from the CEO. She is upset because
people keep talking over each other on conference calls. Which option BEST
describes Dan's first step to remedy this problem?
Answer
Explanation
You can give VoIP traffic priority on your network. Latency is recommended to be set
between 75 and 150 milliseconds.
Latency should always be below 250 milliseconds. Any higher and call quality
becomes unacceptable.
While having a VoIP server hosted in the cloud increases latency, this doesn't
change the basic problem of the current latency configuration.
Holding a telephone etiquette training course is not within Dan's purview, even
though it is probably warranted.
References
Question 7:
Correct
Dan, a network administrator, has noticed a consistent increase in bandwidth
consumption since installing a new VoIP system. The increase is outside of the
parameters given by the vendor. What is MOST likely the issue Dan needs to
address?
Answer
Explanation
References
Question 8:
Correct
VoIP uses several protocols. Which layer of the OSI model do these protocols reside
on?
Answer
Data Link
Presentation
Physical
Correct Answer:
Transport
Explanation
References
Question 9:
Correct
What is the MOST common Transport layer protocol that VoIP uses?
Answer
FTP
TCP
SMTP
Correct Answer:
UDP
Explanation
UDP continues a session even if there is some data loss. On a phone call, data loss
is minimal.
TCP requires that all packets be received in order. If not, retransmission is
attempted, creating latency and dropped calls.
FTP is a file transfer protocol. It is not used with VoIP.
SMTP is an email protocol. It is not used with VoIP.
References
Question 10:
Correct
Upper management has asked you if there is a way to integrate phone calls, emails,
and instant messaging into a single platform.
Which of the following systems should you recommend?
Answer
Correct Answer:
Unified communications
Quality of Service
Voice over IP
PSTN
Explanation
References
Explanation
Virtualization allows a single physical machine (known as the host operating system)
to run multiple virtual machines (known as the guest operating systems). The virtual
machines appear to be self-contained and autonomous systems. Advantages of
virtualization include:
• Server consolidation.
• The ability to migrate systems between different hardware.
• Centralized management of multiple systems.
• Increased utilization of hardware resources.
• Isolation of systems and applications.
Disadvantages of virtualization include:
• A compromise in the host system could affect multiple guest systems.
• A failure in a shared hardware resource could affect multiple systems.
References
Question 2:
Correct
Which hardware components are controlled by the hypervisor?
Answer
Correct Answer:
RAM, CPU, storage
Explanation
RAM, CPU, and storage are controlled by the hypervisor. These are the three
components that all VMs share.
The power supply and motherboard are not controlled by the hypervisor.
The GPU is only for direct usage by the host machine.
References
Question 3:
Correct
John is using a host machine with a Type1 hypervisor. He has 40 virtual servers
using unmodified guest OSs. Which type of virtualization BEST describes this
configuration?
Answer
Paravirtualization
Partial virtualization
Correct Answer:
Full virtualization
Explanation
In full virtualization, the virtual machine completely simulates a real physical host.
This allows most operating systems and applications to run within the virtual
machine without being modified in any way. This is the most common type of
virtualization in use.
Type 2 hypervisors run mostly on laptops or desktop machines.
In partial virtualization, only some of the components of the virtual machine are
virtualized. The guest operating systems use some virtual components and some
real physical hardware components in the actual device where the hypervisor is
running.
In paravirtualization, all guest operating systems running on the hypervisor directly
access various hardware resources in the physical device. The components are not
virtual.
References
• 8.3.3 Virtualization Facts
q_virt_full_02_np6.[Link]
Question 4:
Correct
How many types of full virtualization are there?
Answer
Four
One
Three
Correct Answer:
Two
Explanation
There are two types of full virtualization. They are called software assisted and
hardware assisted.
References
Question 5:
Correct
In virtualization, what is the role of a hypervisor?
Answer
Correct Answer:
A hypervisor allows virtual machines to interact with the hardware without going
through the host operating system.
A hypervisor has the actual hardware in place on the machine, such as the hard disk
drive(s), optical drive, RAM, and motherboard.
A hypervisor is created within the host operating system and simulates a hard disk
for the virtual machine.
Explanation
A hypervisor is a thin layer of software that resides between the virtual operating
system(s) and the hardware. A hypervisor allows virtual machines to interact with the
hardware without going through the host operating system. A hypervisor manages
access to system resources such as:
•CPU
•Storage
•RAM
A physical machine (also known as the host operating system) has the actual
hardware in place on the machine, such as the hard disk drive(s), optical drive, RAM,
motherboard, etc. A virtual machine is a software implementation that executes
programs like a physical machine.
A virtual machine appears to be a self-contained and autonomous system.
A virtual hard disk (VHD) is a file that is created within the host operating system and
simulates a hard disk for the virtual machine.
References
Question 6:
Correct
Which of the following BEST describes an enterprise-level hypervisor?
Answer
VM
Type 2
Correct Answer:
Type 1
VHD
Explanation
References
Sell the current assets and purchase specially made Type 2 hypervisor servers for
virtualization.
Correct Answer:
Convert the existing servers into host servers for virtualization using a Type 1
hypervisor.
Explanation
She should convert the existing servers into host servers for virtualization using a
Type 1 hypervisor. This has minimal expense and utilizes existing assets.
There are no specially made Type 2 hypervisor servers.
Moving to the cloud is expensive and does not utilize current assets.
Only a Type 1 hypervisor can be used in a bare metal installation. Type 2 only work
on computers that have an OS installed.
References
Question 8:
Correct
Which hypervisor is for bare metal use?
Answer
Hyper-V
VMWare
Type 2
Correct Answer:
Type 1
Explanation
References
Question 9:
Correct
Which form of virtualization does not virtualize the hardware?
Answer
Full virtualization
Correct Answer:
Paravirtualization
Partial virtualization
Hypervisor
Explanation
References
Question 10:
Correct
Which resource is nearly impossible to decrease once allocated in virtualization?
Answer
RAM
CPU
NIC
Correct Answer:
Storage
Explanation
References
Route VM-to-VM traffic through a physical firewall and back to the virtual network.
Explanation
Virtualized hosts are susceptible to the same network exploits as physical network
hosts and need to be protected by a firewall. By implementing a virtual firewall within
the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows
between virtual machines.
While routing VM-to-VM traffic through a physical firewall would work, it is very
inefficient.
A virtual router with VRF (Virtual Route Forwarding) is used to create multiple
networks from a single router interface.
Configuring VLAN membership would not allow you to monitor and filter traffic.
References
Question 2:
Correct
Which of the following statements are true about virtual NICs? (Select two.)
Answer
Correct Answer:
Virtual NICs need the appropriate driver to function.
Correct Answer:
Multiple virtual NICs can be added to a virtual machine.
Explanation
Within each virtual machine, you can configure one or more virtual network
interfaces, which function similarly to physical network interfaces. Virtual interfaces
use Ethernet standards to transmit and receive frames on a network. The operating
system within the virtual machine must have the appropriate driver installed to
support the virtual network interface, just as with a physical network interface.
When you configure a virtual network interface within a virtual machine's
configuration, you can specify:
• The type of physical network interface to emulate. This allows the best
possible driver support from the operating system within the virtual
machine.
• A MAC address. Most hypervisors automatically assign a MAC address to
each virtual network interface. Some hypervisors allow you to use a
custom MAC address if needed.
• The network to connect to. Most hypervisors allow you to define many
different virtual networks.
• When you configure a virtual network interface, you select which virtual
network you want it to connect to.
References
Question 3:
Correct
Which key advantage does a virtual router have over a physical router?
Answer
Routing protocols are not necessary for routing data between networks.
Correct Answer:
Multiple networks can connect to a single interface.
Explanation
The key advantage to a virtual router is that it can support multiple networks on a
single router interface. A virtual router does this by using a different routing table for
each network. Physical routers are limited to a single network on each interface.
Like physical routers, virtual routers use routing protocols to route data between
networks.
VRRP is used by physical routers to specify backup routers in the case of failure.
Virtual routers do not offer significant performance increases.
References
Question 4:
Correct
You have configured a virtual network that includes the following virtual components:
• Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual
OS4)
• One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to
communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table
below, click on all of the virtual and physical machines that Virtual OS1 can
communicate with.
Explanation
References
Question 5:
Correct
You have configured a virtual network that includes the following virtual components:
• Four virtual machines (Virtual OS1, Virtual OS2, Virtual OS3, and Virtual
OS4)
• One virtual switch
The virtual switch is connected to a physical network to allow the virtual machines to
communicate with the physical machines out on the physical network.
Given the port configuration for the virtual switch and the physical switch in the table
below, click on all of the virtual and physical machines that Virtual OS1 can
communicate with.
Explanation
References
Disable the switch port that the hypervisor's network interface is connected to.
Create MAC address filters on the network switch that block each virtual machine's
virtual network interfaces.
Correct Answer:
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Explanation
To allow the virtual machines to communicate with each other while isolating them
from the production network, complete the following:
• Create a new virtual switch configured for host-only (internal) networking.
• Connect the virtual network interfaces in the virtual machines to the virtual
switch.
Creating a bridged virtual switch would still allow the virtual machines to
communicate on the production network through the hypervisor's network interface.
Disconnecting the hypervisor's network cable, blocking the virtual machine's MAC
addresses, or disabling the hypervisor's switch port would isolate the virtual
machines from the production network, but this would also prevent them from
communicating with each other.
References
• 8.4.4 Virtual Networking Facts
q_virt_networking_switch_03_np6.[Link]
Question 7:
Correct
You are responsible for maintaining Windows workstation operating systems in your
organization. Recently, an update from Microsoft was automatically installed on your
workstations that caused an in-house application to stop working.
To keep this from happening again, you decide to test all updates on a virtual
machine before allowing them to be installed on production workstations.
Currently, none of your test virtual machines has a network connection. However,
they need to be able to connect to the update servers at Microsoft to download and
install updates.
What should you do? (Select two. Each response is one part of the complete
solution.)
Answer
Disable the switch port that the hypervisor's network interface is connected to.
Correct Answer:
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Explanation
To allow the virtual machines to communicate with the Microsoft update servers on
the internet, complete the following:
• Create a new virtual switch configured for bridged (external) networking.
• Connect the virtual network interfaces in the virtual machines to the virtual
switch.
Creating an internal or host-only virtual switch would not allow the virtual machines
to communicate on the production network through the hypervisor's network
interface. Disabling the hypervisor's switch port would also isolate the virtual
machines from the production network.
References
Question 8:
Correct
Which component is MOST likely to allow physical and virtual machines to
communicate with each other?
Answer
Virtual desktop
VHD
Explanation
References
Question 9:
Correct
You need to provide DHCP and file sharing services to a physical network. These
services should be deployed using virtualization. Which type of virtualization should
you implement?
Answer
Correct Answer:
Virtual servers
Virtual networks
Explanation
References
Question 10:
Correct
Your organization uses a time-keeping application that only runs on Windows 2000
and does not run on newer OS versions. Because of this, there are several Windows
2000 workstations on your network.
Last week, you noticed unusual activity on your network coming from the Windows
2000 workstations. After further examination, you discovered that the Windows 2000
workstations were the victim of a malicious attack and were being used to infiltrate
the network.
You find out that the attackers were able to gain access to the workstations because
of the legacy operating system being used. The organization still needs to use the
Windows 2000 workstations, which need to be connected to the internet, but you
want to make sure the network is protected from future events.
Which solution should you implement to protect the network while also allowing
operations to continue as normal?
Answer
Create a dedicated network for the Windows 2000 workstations that's completely
isolated from the rest of the network, including a separate internet connection.
Install antivirus software on the Windows 2000 workstations and configure Windows
to automatically download and install updates.
Implement a host-based firewall on each Windows 2000 workstation and configure
Windows to automatically download and install updates.
Correct Answer:
Configure VLAN membership so that the Windows 2000 workstations are on their
own VLAN.
Explanation
The best solution is to place the Windows 2000 workstations in their own VLAN. If
you use VLAN network segmentation, the workstations will still have access to the
internet, but network access can be heavily restricted. This greatly reduces the
damage a workstation can cause if it were to become compromised again.
Legacy operating systems, such as Windows 2000, are easy targets for attackers.
This is because legacy operating systems use outdated protocols and have known
exploits.
Installing an antivirus or host-based firewall would do very little to protect the entire
network. In addition, legacy operating system are no longer supported with updates
or patches, so enabling automatic updates would offer no benefit.
Creating a dedicated network for the workstations would affect normal operations
and also increase network management load.
References
Cloud computing requires end user knowledge of the delivery system's physical
location and configuration.
Explanation
Cloud computing does not require end user knowledge of the delivery system's
physical location and configuration. Other cloud computing details include the
following:
• Cloud computing consists of software, data access, computation, and
storage services provided to clients through the internet.
• The term cloud is used as a synonym for the internet. This is based on the
basic cloud drawing used to represent the telephone network
infrastructure and the internet in computer network diagrams.
• Typical cloud computing providers deliver common business applications
online that are accessed from another web service or software, like a web
browser. The software and data are stored on servers.
References
Question 2:
Correct
Match each description on the left with the appropriate cloud technology on the right.
Public cloud
Explanation
References
Question 3:
Correct
You were recently hired by a small startup company. The company is in a small
office and has several remote employees.
You have been asked to find a business service that can both accommodate the
company's current size and scale as the company grows. The service needs to
provide adequate storage as well as additional computing power.
Which cloud service model should you use?
Answer
DaaS
Correct Answer:
IaaS
SaaS
PaaS
Explanation
References
Question 4:
Correct
Which of the following cloud computing solutions delivers software applications to a
client either over the internet or on a local area network?
Answer
DaaS
Correct Answer:
SaaS
PaaS
IaaS
Explanation
Software as a Service (SaaS) delivers software applications to the client either over
the internet or on a local area network.
Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as
processing, storage, networks, and virtualized environments. The client deploys and
runs software without purchasing servers, data center space, or network equipment.
Platform as a Service (PaaS) delivers everything a developer needs to build an
application on to the cloud infrastructure. The deployment comes without the cost
and complexity of buying and managing the underlying hardware and software
layers.
Data as a Service (DaaS) stores and provides data from a centralized location
without requiring local collection and storage.
References
Question 5:
Correct
Which of the following are benefits that a VPN provides? (Select two.)
Answer
Faster connection
Easy setup
Metering
Correct Answer:
Compatibility
Correct Answer:
Cost savings
Explanation
References
Question 6:
Correct
Which of the following provides a VPN gateway that encapsulates and encrypts
outbound traffic from a site and sends the traffic through a VPN tunnel to the VPN
gateway at the target site?
Answer
SSL VPN
Explanation
Site-to-site IPsec VPNs connect networks across an untrusted network, such as the
internet. The VPN gateway encapsulates and encrypts outbound traffic from a site
and sends the traffic through a VPN tunnel to the VPN gateway at the target site.
Clients send and receive normal unencrypted TCP/IP traffic through a VPN gateway.
The receiving VPN gateway strips the headers, decrypts the content, and relays the
packet toward the target host inside its private network.
SSL VPNs use a PKI (public key infrastructure) and digital certificates to authenticate
peers.
GRE over IPsec (Generic Routing Encapsulation over IPsec) does not support
encryption.
Remote access VPNs let remote and mobile users connect to an organizational
network securely.
References
Question 7:
Correct
What is a VPN (virtual private network) primarily used for?
Answer
Correct Answer:
Support secure communications over an untrusted network.
Explanation
References
Question 8:
Correct
IPsec is implemented through two separate protocols. What are these protocols
called? (Select two.)
Answer
EPS
Correct Answer:
ESP
L2TP
SSL
Correct Answer:
AH
Explanation
IPsec is implemented through two separate protocols, which are called
Authentication Header (AH) and Encapsulating Security Payload (ESP). AH provides
authentication and non-repudiation services to verify that the sender is genuine and
that the data was not modified in transit. ESP provides data encryption services for
the data within the packet.
SSL and L2TP are not protocols associated with IPsec.
References
Question 9:
Correct
Which other service is IPsec composed of, in addition to AH?
Answer
Explanation
IPsec is composed of two services, which are called Authentication Header (AH) and
Encapsulating Security Payload (ESP). AH is primarily used for authenticating the
two communication partners in an IPsec link. ESP is primarily used to encrypt and
secure the data transferred between IPsec partners. IPsec employs ISAKMP
(Internet Security Association and Key Management Protocol) for encryption key
management.
References
Question 10:
Correct
Which of the following are IPsec modes of operation? (Select two.)
Answer
Correct Answer:
Transport mode
Single mode
Secure mode
Multimode
Correct Answer:
Tunnel mode
Explanation
Tunnel mode and transport mode are the two IPsec modes of operation.
Single mode and multimode are types of fiber optic network cable.
Secure mode is a wireless LAN setting.
References
Accessibility
Correct Answer:
Privacy
Availability
Correct Answer:
Hacking
Explanation
Hackers and privacy are two majors concerns for IoT users. Because IoT devices
are closely connected, all a hacker has to do is exploit one vulnerability to
manipulate all the data, rendering it unusable. Also, companies that make and
distribute consumer IoT devices could use those devices to obtain and sell users'
personal data.
References
Question 2:
Correct
You notice that a growing number of devices, such as environmental control systems
and wearable devices, are connecting to your network. These devices, known as
smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
Answer
Correct Answer:
Internet of Things (IoT)
Dynamic environment
The smartnet
Explanation
These smart devices are part of a growing ecosystem known as the Internet of
Things (IoT). Environments that contain these types of devices are known as static
environments. A static environment is one that never changes (or changes very
infrequently) and that a network administrator has very little control over. For
example, a smart television in an office has embedded technology that might never
be updated, which creates a security hole in the company's network.
References
Question 3:
Correct
Which of the following is considered part of a smart home?
Answer
Laptop
Telephone
Correct Answer:
Thermostat
TV
Explanation
The term smart home refers to a home with devices that can be controlled remotely
over the internet with a smartphone or computer. Thermostats can learn the
residents' daily routines and adjust the temperature of the home accordingly.
Items that typically connect to a video, audio, or data network as a core part of their
functionality are not considered part of a smart home.
References
Question 4:
Correct
Which of the following are examples of newer devices that are often automated
using IoT technology? (Select three.)
Answer
Headsets
Tablets
Correct Answer:
Home appliances
Correct Answer:
Streaming media devices
Correct Answer:
Security systems
Printers
Computer monitors
Explanation
Streaming media devices with IoT allow you to play content from a device, such as
your smartphone, to a speaker or TV as long as both are connected to the same
home network. Security systems, such as alarms and locks, can be accessed from
an app on your smartphone. Home appliances, such as refrigerators or washing
machines, can be accessed from an app on your smartphone as well.
Computer monitors are controlled by a computing device (such as a laptop or
desktop) and are an output device that's not normally associated with the IoT.
While headsets can be wirelessly connected to a device (such as a computer,
smartphone, or TV), they normally use Bluetooth instead of the IoT.
Tablets are mobile computing devices that normally use Wi-Fi technology to connect
to the internet and are not normally associated with IoT technology.
Printers can wirelessly connect to a home Wi-Fi network, but they are not normally
associated with IoT technology.
References
Question 5:
Correct
Match each smart device with its description.
Thermostat
Learns from your habits and schedule, allows you to control the climate in your
home remotely, shows you energy consumption in real time, and adjusts itself
depending on ambient conditions.
correct answer:
Switch
Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances,
and garbage disposals.
correct answer:
Bulb
Can change colors, track motion, stream audio over Bluetooth, and double as a
connected camera, but it's only smart when turned on. It doesn't work when turned
off.
correct answer:
Plug
Easy solution for making small appliances (such as lamps, coffee makers, and
toasters) smart.
correct answer:
Security camera
Uses voice recognition software and activates through a Wake Word or Hot Word.
correct answer:
Keyboard Instructions
Explanation
The following are smart IoT devices and their general characteristics:
• Thermostats learn from your habits and schedule, allow you to control the
climate in your home remotely, show you energy consumption in real time,
and adjust themselves depending on ambient conditions.
• Switches allow you to control hardwired lights, ceiling fans, fireplaces,
small appliances, and garbage disposals.
• Bulbs can change colors, track motion, stream audio over Bluetooth, and
double as a connected camera, but they're only smart when turned on.
They don't work when turned off.
• Plugs are easy solutions for making small appliances (such as lamps,
coffee makers, and toasters) smart.
• Security cameras use an RF transmitter. They may include such features
as motion detection, scheduled recording, remote viewing, and automatic
cloud storage.
• Door locks use a wireless protocol and a cryptographic key to execute the
authorization process. They can also monitor access and send alerts
related to the status of the device.
• Speakers and digital assistants use voice recognition software and
activate through a Wake Word or Hot Word.
References
Question 6:
Correct
Which frequencies does Zigbee operate on?
Answer
Explanation
Zigbee is a specification based on IEEE 802.15.4. The WPANs operate on 2.4 GHz,
900 MHz, and 868 MHz frequencies.
References
Question 7:
Correct
Anabel purchased a smart speaker. She connected it to all the smart devices in her
home. Which of the following communication models is she using?
Answer
Device-to-gateway
Device-to-cloud
Back-end data-sharing
Correct Answer:
Device-to-device
Explanation
References
Question 8:
Correct
What is the maximum number of nodes Z-Wave allows on its mesh network?
Answer
Correct Answer:
232
223
231
322
Explanation
References
• 8.6.3 Internet of Things Facts
q_iot_nodes_np6.[Link]
Question 9:
Correct
What are the two protocols used most often with IoT devices? (Select two.)
Answer
Correct Answer:
Zigbee
Correct Answer:
Z-Wave
Zerg
Zensys
Zbot
Explanation
Zigbee and Z-Wave are two radio protocols many IoT devices work with because
they are designed for low-data rate, low-power applications. They link all IoT devices
to form a mesh network.
References
Question 10:
Correct
What are the four primary systems of IoT technology?
Answer
Explanation
IoT technology comprises four primary systems: devices, gateway, data storage, and
remote control.
Sensors are hardware included in many IoT devices.
Apps are part of the remote control system.
The internet is part of the gateway and data storage systems.
References
Token passing
CSMA/CD
Correct Answer:
CSMA/CA
Polling
Explanation
802.11x standards for wireless networking all support the CSMA/CA (Carrier Sense
Multiple Access/Collision Avoidance) type of communication path-sharing
technology. This allows multiple baseband clients to share the same communication
medium. CSMA/CA works as follows:
1. The system asks for permission to transmit.
2. A designated authority (such as a hub, router, or access point), grants
access when the communication medium is free.
3. The system transmits data and waits for an ACK (acknowledgment).
4. If no ACK is received, the data is retransmitted.
Polling is a mechanism where one system is labeled as the primary system. The
primary system polls each secondary system in turn to inquire whether they have
data to transmit.
Token passing is a mechanism that uses a digital pass card. Only the system
holding the token is allowed to communicate.
CSMA/CD (Carrier Sense Multiple Access/Collision Detection) is the technology
used by Ethernet. CSMA/CD works as follows:
1. The system listens for traffic. If the line is clear, the system begins
transmitting.
2. During the transmission, the system listens for collisions.
3. If no collisions are detected, the communication succeeds. If collisions are
detected, an interrupt jam signal is broadcast to stop all transmissions.
Each system waits a random amount of time before starting over at step 1.
References
•
9.1.3 Wireless Architecture Facts
q_wireless_arch_csmaca_np6.[Link]
Question 2:
Correct
Match the wireless signaling method on the left with its definition on the right.
Transfers data over a radio signal by switching channels at random within a larger
frequency band.
FHSS
correct answer:
Makes the transmitted bandwidth signal wider than the data stream needs.
DSSS
correct answer:
Encodes data over a wireless network using non-overlapping channels.
OFDM
correct answer:
Keyboard Instructions
Explanation
References
Question 3:
Correct
Which of the following is true of a wireless network SSID?
Answer
Correct Answer:
Groups wireless devices together into the same logical network.
Explanation
The SSID, also called the network name, groups wireless devices together into the
same logical network.
• All devices on the same network (within the BSS and ESS) must have the
same SSID.
• The SSID is a 32-bit value that's inserted into each frame. The SSID is
case sensitive.
• The SSID is sometimes called the ESSID (extended service set ID) or the
BSSID (basic service set ID). In practice, each term means the same
thing. However, SSIDs, ESSIDs, and BSSIDs are technically different.
An access point (AP) is a device that coordinates all communication between
wireless devices.
The basic service set identifier (BSSID) is a 48-bit value that identifies an AP.
Wireless Distribution System (WDS) is a system that enables wireless
interconnection of multiple APs.
References
Question 4:
Correct
Which wireless networking component is used to connect multiple APs together?
Answer
IBSS
Correct Answer:
WDS
BSS
STA
Explanation
The Wireless Distribution System (WDS) is the backbone or LAN that connects
multiple APs (and BSSs) together.
An IBSS (independent basic service set) is a set of STAs configured in ad hoc mode.
A BSS, or cell, is the smallest unit of a wireless network.
An STA is a wireless NIC in an end device, such as a laptop or wireless PDA. The
term STA often refers to the device itself, not just the NIC.
References
Question 5:
Correct
Your organization uses an 802.11b wireless network. Recently, other tenants
installed the following equipment in your building:
• A wireless television distribution system running at 2.4 GHz.
• A wireless phone system running at 5.8 GHz.
• A wireless phone system running at 900 MHz.
• An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency
range.
• An 802.11j wireless network running in the 4.9 - 5.0 GHz frequency range.
Since this equipment was installed, your wireless network has been experiencing
significant interference. Which system is to blame?
Answer
Explanation
Because the 802.11b standard operates within the 2.4 GHz to 2.4835 GHz radio
frequency range, the most likely culprit is the wireless TV distribution system.
References
Question 6:
Correct
Which technologies are used by the 802.11ac standard to increase network
bandwidth? (Select two.)
Answer
Explanation
References
Question 7:
Correct
You are designing an update to your client's wireless network. The existing wireless
network uses 802.11b equipment, which your client complains runs too slowly. She
wants to upgrade the network to run up to 600 Mbps.
Due to budget constraints, your client wants to upgrade only the wireless access
points in the network this year. Next year, she will upgrade the wireless network
boards in her users' workstations. She has also indicated that the system must
continue to function during the transition period.
Which 802.11 standard will work BEST in this situation?
Answer
802.11d
Correct Answer:
802.11n
802.11c
802.11a
802.11b
Explanation
802.11n is the best choice for this client and provides up to 600 Mbps. With 802.11n,
you may have a single device that uses multiple radios (one that can operate at one
frequency and one that can operate on another). Because of this, 802.11n usually
allows compatibility between all 802.11 standards, depending on the specific
implementation.
While 802.11g is compatible with 802.11b, it only provides speeds up to 54 Mbps.
References
Question 8:
Correct
Which of the following are frequencies defined by 802.11 committees for wireless
networking? (Select two.)
Answer
900 MHz
1.9 GHz
Correct Answer:
2.4 GHz
Correct Answer:
5.75 GHz
10 GHz
Explanation
802.11 specifications for wireless include standards for operating in the 2.4 GHz
range (802.11b, 802.11g, and 802.11n) and the 5.75 GHz range (802.11a and dual-
band devices using 802.11n).
References
Question 9:
Correct
How many total channels (non-overlapping) are available for 802.11a wireless
networks?
Answer
3
11
12
Correct Answer:
24
54
Explanation
802.11a wireless uses the 5.75 GHz range, which has a total of 24 channels.
802.11b and 802.11g use the 2.4 GHz range, which has a total of 11 channels in the
US.
References
Question 10:
Correct
How many total channels are available for 802.11g wireless networks?
Answer
3
Correct Answer:
11
12
23
54
Explanation
802.11b and 802.11g use the 2.4 GHz range, which has a total of 11 channels in the
US.
802.11a wireless uses the 5.75 GHz range, which has a total of 23 channels.
References
Explanation
A beacon is a frame that the access point sends out periodically. The beacon
announces the access point and the network characteristics (such as the SSID,
supported speeds, and the signaling method used). To improve access times,
decrease the beacon interval.
As long as clients are configured with the SSID, they will be able to locate access
points even if the SSID is not broadcasting in the beacon. The beacon is still sent out
to announce the access point.
Adding the SSID to the beacon does not change how often the beacon is broadcast.
References
Question 2:
Correct
You are an administrator of a growing network. You notice that the network you've
created is broadcasting, but you can't ping systems on different segments. Which
device should you use to fix this issue?
Answer
Correct Answer:
Network bridge
Network hub
Access point
Range extender
Explanation
References
Question 3:
Correct
Which of the following wireless network protection methods prevents the wireless
network name from being broadcast?
Answer
802.1x
MAC filtering
Correct Answer:
SSID broadcast
Explanation
Wireless access points (WAPs) are transceivers that transmit and receive
information on a wireless network. Each access point has a service set ID (SSID)
that identifies the wireless network. By default, access points broadcast the SSID to
announce their presence and make it easier for clients to find and connect.
MAC address filtering identifies specific MAC addresses that are allowed to access
the wireless access point. Clients with unidentified MAC addresses are not allowed
to connect.
A shared secret key is used with shared key authentication. Users must know the
shared key to connect to the access point. A shared key is also used with WEP as
the encryption key.
802.1x authentication uses usernames and passwords, certificates, or devices such
as smart cards to authenticate wireless clients.
References
Question 4:
Correct
Which of the following features does WPA2 supply on a wireless network?
Answer
Network identification
Explanation
Wi-Fi Protected Access (WPA) provides encryption and user authentication for
wireless networks.
MAC address filtering allows or rejects client connections based on the hardware
address.
The SSID is the network name or identifier.
A wireless access point (WAP) is the central connection point for wireless clients.
References
Question 5:
Correct
Which network modes can typically be used for both 2.4 GHz and 5 GHz clients?
(Select two.)
Answer
802.11b only
802.11g only
Correct Answer:
802.11ax only
802-11a only
Correct Answer:
802.11n only
Explanation
The network mode you choose depends on the type of clients that will connect to
your network. 2.4 GHz and 5 GHz clients can both use 802.11n only and 802.11ax
only.
For the 5 GHz band, you typically select:
• Mixed (supports connections from 802.11a, 802.11n, or 802.11ax clients)
• 802-11a only
• 802.11n only
• 802.11ax only
• Disabled
For the 2.4 GHz band, you typically select:
• Mixed
• 802.11b/g only
• 802.11b only
• 802.11g only
• 802.11n only
• 802.11ax only
• Disabled
References
Question 6:
Correct
You have configured a wireless access point to create a small network. For security
reasons, you have disabled SSID broadcast.
From a client computer, you try to browse to find the access point. You see some
other wireless networks in the area, but cannot see your network.
What should you do?
Answer
Explanation
When SSID broadcast is turned off, you must manually configure a profile on the
client computer to identify the SSID. If you disable SSID broadcast, you must
statically configure wireless devices with the SSID before they can connect because
they will be unable to dynamically detect the SSID.
A beacon is a frame that the access point sends out periodically. When you turn off
SSID broadcast, you prevent the access point from including the SSID in the
beacon. On the client, the channel is typically detected automatically and is
configured to match the channel used by the access point. In this scenario, the
wireless card on the client is already enabled because you can see other wireless
networks in the area.
References
Question 7:
Correct
You want to connect a laptop computer running Windows to a wireless network.
The wireless network uses multiple access points and WPA2-Personal. You want to
use the strongest authentication and encryption possible. SSID broadcast has been
disabled.
What should you do?
Answer
Explanation
To connect to a wireless network using WPA2-Personal, you need to use a pre-
shared key for authentication. Advanced Encryption Standard (AES) encryption is
supported by WPA2 and is the strongest encryption method.
WPA and WPA2 designations that include Personal or PSK use a pre-shared key for
authentication.
Methods that include Enterprise use a RADIUS server for authentication and 802.1x
authentication with usernames and passwords.
References
Question 8:
Correct
You need to configure a wireless network. You want to use WPA2 Enterprise. Which
of the following components should be part of your design? (Select two.)
Answer
Open authentication
Pre-shared keys
WEP encryption
Correct Answer:
802.1x
TKIP encryption
Correct Answer:
AES encryption
Explanation
References
Question 9:
Correct
You need to add security for your wireless network. You would like to use the most
secure method.
Which method should you implement?
Answer
WPA
WEP
Kerberos
Correct Answer:
WPA2
Explanation
Wi-Fi Protected Access 2 (WPA2) is currently the most secure wireless security
specification. WPA2 includes specifications for both encryption and authentication.
WPA was an earlier implementation of security specified by the 802.11i committee.
WEP was the original security method for wireless networks. WPA is more secure
than WEP but less secure than WPA2.
Kerberos is an authentication method, not a wireless security method.
References
Question 10:
Correct
You have a small wireless network that uses multiple access points. The network
uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access
points.
You want to connect a laptop computer to the wireless network. Which of the
following parameters do you need to configure on the laptop? (Select two.)
Answer
BSSID
Correct Answer:
Pre-shared key
Channel
AES encryption
Correct Answer:
TKIP encryption
Explanation
To connect to the wireless network using WPA, you need to use a pre-shared key
and TKIP encryption. A pre-shared key used with WPA is known as WPA-PSK or
WPA Personal.
WPA2 uses AES encryption. The channel is automatically detected by the client. The
basic service set identifier (BSSID) is a 48-bit value that identifies an AP in an
infrastructure network or an STP in an ad hoc network. The client automatically
reads the BSSID and uses it to keep track of APs as they roam between cells.
References
802.11g
802.11b
Correct Answer:
802.11n
802.11a
Explanation
References
Question 2:
Correct
Which of the following uses a 2.4 GHz ISM band, has fast transmission rates, and
has been used for applications like geocaching and health monitors?
Answer
Z-Wave
Correct Answer:
Ant+
802.11ac
NFC
Explanation
Ant+ is generally used to monitor sensor data. It uses a 2.4 GHz ISM band, has fast
transmission rates, and has been used for applications like geocaching and health
monitors.
The Z-Wave protocol is found in the home security and automation market and uses
only a mesh topology. Each attached device acts as a repeater and increases the
network strength. Z-Wave has a low data transfer rate.
NFC (Near Field Communication) is common with mobile pay solutions and
connections like Bluetooth, but NFC has to be within 10 cm or 4 inches from another
device to connect.
802.11ac is a wireless networking standard that offers high-speed data transfer.
References
Question 3:
Correct
You have been hired to design a wireless network for a SOHO environment. You are
currently in the process of gathering network requirements from management.
Which of the following questions should you ask? (Select three.)
Answer
Correct Answer:
Which type of data will be transmitted on the network?
Explanation
The first thing you do when designing a wireless network is gather network
requirements. Meet with all stakeholders and decision-makers to discuss the
implementations and gather detailed information. For example, you should:
• Identify the intended use of the wireless network.
• Identify the location of wireless service areas.
• Anticipate the number of wireless devices that need to be supported in
each area.
• Discuss future network needs so that you can plan for expansion.
• Discuss data encryption and network security requirements.
You should consider mounting points, interference, zoning and permit requirements,
and future construction during the network design phase. This happens after all
requirements have been gathered.
References
Question 4:
Correct
Which protocol is well known for its use in the home security and home automation
industry, uses a mesh topology, makes devices act as repeaters, and has a low data
transfer rate?
Answer
802.11ac
Correct Answer:
Z-Wave
Ant+
NFC
Explanation
The Z-Wave protocol is mostly found in the home security and automation market
and uses only a mesh topology. Each attached device acts as a repeater and
increases the network strength. Z-Wave has a low data transfer rate.
Ant+ uses a mesh topology. However, Ant+ is generally used to monitor sensor data.
NFC is common with mobile pay solutions and connections like Bluetooth, but NFC
has to be several inches from another device to connect.
802.11ac is a wireless networking standard that offers high-speed data transfer.
References
Question 5:
Correct
You have been hired to troubleshoot a wireless connectivity issue for two separate
networks located within a close proximity. Both networks use a WAP from the same
manufacturer, and all settings (with the exception of SSIDs) remain configured to
their defaults.
Which of the following might you suspect is the cause of the connectivity problems?
Answer
Explanation
Overlapping wireless networks should use different channels to ensure that they do
not conflict with each other. In this case, each WAP is using the default channel,
which by default, is the same for each one. The solution would be to configure
different channels for each access point.
To configure client connectivity, the wireless client and the access point must share
the same SSID, channel, and WEP encryption strength. In this case, the SSIDs were
changed for each station, so they are not the problem.
References
Question 6:
Correct
Match each wireless term or concept on the left with its associated description on the
right. Each term may be used more than once. (Not all descriptions have a matching
term.)
Compares the Wi-Fi signal level to the level of background radio signals.
Signal-to-noise ratio
correct answer:
Checks channel utilization and identifies sources of RF inference.
Spectrum analysis
correct answer:
Identifies how strong a radio signal is at the receiver.
Explanation
You should be familiar with the following wireless networking concepts and terms:
• Received signal level (RSL) identifies how strong a radio signal is at the
receiver. The closer you are to the transmitter, the stronger the RSL.
• Signal-to-noise ratio (SNR) compares the wireless signal level to the level
of background noise.
• A spectrum analysis checks channel utilization to identify sources of RF
inference at each location where you plan to deploy an access point.
References
Question 7:
Correct
Which of the following should you include in your site survey kit?
Answer
Correct Answer:
A tall ladder
A network bridge
A GPS
Mounting brackets
Explanation
References
Question 8:
Correct
You are concerned that wireless access points might have been deployed within
your organization without authorization.
What should you do? (Select two. Each response is a complete solution.)
Answer
Explanation
References
Question 9:
Correct
Which of the following purposes do wireless site surveys fulfill? (Select two.)
Answer
Correct Answer:
Identify the coverage area and preferred placement of access points.
Correct Answer:
Identify existing or potential sources of interference.
Identify the recommended 100 degree separation angle for alternating access points.
Explanation
Wireless site surveys provide layout and design parameters for access point
coverage and placement. Site surveys can also identify rogue access points and
other forms of interference that reduce security and prevent the proper operation of
authorized network devices.
You use radio frequency spectrum and protocol analyzers to conduct these surveys.
As part of bandwidth planning, you determine the amount of bandwidth required in
various locations.
References
Question 10:
Correct
Which of the following does an SNR higher than 1:1 indicate?
Answer
Correct Answer:
More signal than noise
No signal
No noise
Explanation
An SNR higher than 1:1 indicates more signal than noise, which is desirable.
References
Wireless mesh
Wireless router
Explanation
References
Question 2:
Correct
Which of the following functions does a consumer-grade access point combine into a
single device? (Select two.)
Answer
SSID
Correct Answer:
NAT
AES
Correct Answer:
WAP
WPA
Explanation
A consumer-grade access point combines many functions into a single device, such
as a wireless access point (WAP) and a NAT router.
The SSID is the name of the wireless network that is broadcast from an AP.
Wi-Fi Protected Access (WPA) is a security certification program that was developed
by the Wi-Fi Alliance to secure wireless signals between devices.
Advanced Encryption Standard (AES) uses 128-, 192-, and 256-bit key lengths to
encrypt and decrypt block-sized messages that are broadcast over a wireless
transmission.
References
Question 3:
Correct
Which of the following is a limitation of consumer-grade wireless equipment?
Answer
It makes the transmitted bandwidth signal wider than the data stream needs.
Explanation
References
Bridges
Backhauls
Correct Answer:
Controllers
Access points
Explanation
References
Question 5:
Correct
Which of the following can become a critical point of failure in a large wireless
network infrastructure?
Answer
Access point
Correct Answer:
Controller
Backhaul
Wireless bridge
Explanation
In a large wireless network infrastructure all data must pass through the controller.
As such, the controller becomes a critical point of failure. If the controller goes down,
the entire wireless network will cease to function even if the access points remain
functional.
Wireless bridges are used to connect wired or wireless networks together.
Wireless access points are transceivers that transmit and receive information on a
wireless network.
The link between the access points and the wired network is called the backhaul.
The backhaul allows the wireless access points to communicate with the wired
clients and other wireless clients in a separate BSS (basic service set).
References
Question 6:
Correct
Which of the following enterprise wireless deployment models uses access points
with enough intelligence to allow the creation of guest WLANs for keeping public
wireless traffic separate from private traffic?
Answer
Hub-and-spoke infrastructure
Correct Answer:
Distributed wireless mesh infrastructure
Explanation
References
Question 7:
Correct
Which of the following is a configuration in which a wireless controller is connected to
all APs through a wired link?
Answer
Bridges
Independent APs
Correct Answer:
Hub and spoke
Mesh infrastructure
Explanation
References
Question 8:
Correct
Which of the following BEST describes roaming?
Answer
Correct Answer:
The ability to broadcast the same SSID across multiple APs.
Explanation
Roaming is the ability to broadcast the same SSID across multiple APs. This allows
a wireless device to stay on the same network without interruption while moving from
one AP to another.
The SSID is the name of the wireless network that is broadcast from an AP.
A wireless bridge is a model that connects wired and/or wireless networks.
Distributed wireless mesh infrastructure is a deployment model used by newer
wireless networks.
References
Question 9:
Correct
Your manager has asked you to set up four independent APs and configure them
with the same SSID, channel, and IP subnet. What should you enable to accomplish
this?
Answer
Channel bonding
A spectrum analyzer
Explanation
In order to enable roaming from one AP to another, the APs must be individually set
up and share the same SSID, channel, and IP subnet.
A spectrum analyzer is a device that displays signal amplitude (strength) as it varies
by signal frequency. The frequency appears on the horizontal axis, and the
amplitude is displayed on the vertical axis.
Channel bonding is used to combine more channels in the 5 GHz band, allowing up
to 160-MHz wide channels.
A basic service set (BSS) is a wireless network that uses only one AP for all devices
to communicate with each other.
References
Question 10:
Correct
Match the wireless networking term or concept on the left with its appropriate
description on the right. (Each term may be used once, more than once, or not at
all.)
Moving a wireless device between access points within the same wireless network.
Roaming
correct answer:
Used by Cisco wireless equipment to route frames back and forth between the
wireless network and the wired LAN.
LWAPP
correct answer:
Specifies the number of clients that can utilize the wireless network.
Device density
correct answer:
Automatically partitions a single broadcast domain into multiple VLANs.
VLAN pooling
correct answer:
Connects two wired networks over a Wi-Fi network.
Wireless bridge
correct answer:
The number of useful bits delivered from sender to receiver within a specified
amount of time.
Goodput
correct answer:
Keyboard Instructions
Explanation
You should be familiar with the following wireless networking terms and concepts:
• Device density specifies the number of clients that can utilize the wireless
network.
• Roaming is moving a wireless device between access points within the
same wireless network.
• Lightweight Access Point Protocol (LWAPP) is used by Cisco wireless
equipment to route frames back and forth between the wireless network
and the wired LAN.
• VLAN pooling automatically partitions a single broadcast domain into
multiple VLANs.
• A wireless bridge connects two wired networks over a Wi-Fi network.
• Goodput refers to the number of useful bits delivered from the sender to
the receiver within a specified amount of time.
References
Session filtering
IP address filtering
Correct Answer:
MAC address filtering
Explanation
Both switches and wireless access points are Layer 2 devices, meaning they use the
MAC address to make forwarding decisions. Both devices typically include some
form of security that restricts access based on the MAC address.
Routers and firewalls operate at Layer 3 and can use the IP address or port number
for filtering decisions.
A circuit-level gateway is a firewall that can make forwarding decisions based on the
session information.
References
Question 2:
Correct
You want to implement 802.1x authentication on your wireless network. Where
would you configure the passwords that will be used for the authentication process?
Answer
Correct Answer:
On a RADIUS server.
Explanation
802.1x authentication uses usernames and passwords, certificates, or devices (such
as smart cards) to authenticate wireless clients. Authentication requests received by
the wireless access point are passed to a RADIUS server that validates the logon
credentials (such as the username and password).
If you're using pre-shared keys for authentication, configure the same key on the
wireless access point and each wireless device. You do need a CA to issue a
certificate to the RADIUS server. The certificate proves the RADIUS server's identity
and can be used to issue certificates to individual clients.
References
Question 3:
Correct
You're replacing a wired business network with an 802.11g wireless network. You
currently use Active Directory on the company network as your directory service. The
new wireless network has multiple wireless access points, and you want to use
WPA2 on the network. What should you do to configure the wireless network?
(Select two.)
Answer
Explanation
When you use wireless access points, configure an infrastructure network. Because
you have multiple access points and an existing directory service, you can centralize
authentication by installing a RADIUS server and using 802.1x authentication.
Use ad hoc mode when you need to configure a wireless connection between two
hosts.
Use open authentication with WEP or when you don't want to control access to the
wireless network.
When you can't use 802.1x, use shared secret authentication.
References
• 9.5.3 Wireless Security Facts
q_wireless_security_radius_04_np6.[Link]
Question 4:
Correct
Which of the following wireless security methods uses a common shared key that's
configured on the wireless access point and all wireless clients?
Answer
WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise
Explanation
You can use shared key authentication with WEP, WPA, and WPA2. Shared key
authentication with WPA and WPA2 is often called WPA Personal or WPA2
Personal.
WPA Enterprise and WPA2 Enterprise use 802.1x for authentication. 802.1x
authentication uses usernames and passwords, certificates, or devices (such as
smart cards) to authenticate wireless clients.
References
Question 5:
Correct
Which of the following features are supplied by WPA2 on a wireless network?
Answer
Wi-Fi Protected Access (WPA) provides encryption and user authentication for
wireless networks.
MAC address filtering allows or rejects client connections based on the hardware
address.
A wireless access point (called an AP or WAP) is the central connection point for
wireless clients.
A firewall allows or rejects packets based on packet characteristics (such as
address, port, or protocol type).
References
Question 6:
Correct
Which of the following provides security for wireless networks?
Answer
802.11a
Correct Answer:
WPA
WAP
CSMA/CD
Explanation
Wi-Fi Protected Access (WPA) provides encryption and user authentication for
wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA
is considered more secure than WEP.
A wireless access point (WAP) is a hardware device (like a switch) that provides
access to the wireless network.
802.11a is a wireless networking standard that defines the signal characteristics for
communicating on a wireless network.
CSMA/CD is a media access control method that controls when a device can
communicate on the network.
References
Explanation
A captive portal would be the best choice in this scenario. A captive portal requires
wireless network users to abide by certain conditions before they are allowed access
to the wireless network. For example, the captive portal could require them to:
• Agree to an Acceptable Use Policy
• Provide a PIN or password
• Pay for access to the wireless network
• View information or advertisements about the organization providing the
wireless network (such as an airport or hotel)
When a wireless device initially connects to the wireless network, all traffic to or from
that device is blocked until the user opens a browser and accesses the captive portal
web page. After the user provides the appropriate code, traffic is unblocked, and the
host can access the network normally.
MAC address filtering and 802.1x authentication would work from a technical
standpoint, but these would be completely unmanageable in a hotel scenario where
guests come and go every day. Using a pre-shared key would require a degree of
technical expertise on the part of the hotel guests. It could also become problematic
if the key were to be leaked, allowing non-guests to use the wireless network.
References
Explanation
Wireless access points are transceivers that transmit and receive information on a
wireless network. Each access point has a service set ID (SSID) that identifies the
wireless network. By default, access points broadcast the SSID to announce their
presence and make it easy for clients to find and connect to the wireless network.
Turn off SSID broadcast to keep a wireless 802.11x network from being
automatically discovered. When SSID broadcasting is turned off, users must know
the SSID to connect to the wireless network. This helps to prevent casual attackers
from connecting to the network, but any serious hacker with the right tools can still
connect.
Using authentication with WPA or WPA2 helps prevent attackers from connecting to
your wireless network, but this does not hide the network. Changing the default SSID
to a different value does not disable the SSID broadcast.
References
Question 9:
Correct
Which of the following locations creates the greatest amount of interference for a
wireless access point? (Select two.)
Answer
Near a geofence
Explanation
References
Question 10:
Correct
Your company security policy states that wireless networks are not to be used
because of the potential security risk they present.
One day you find that an employee has connected a wireless access point to the
network in his office.
Which type of security risk is this?
Answer
Physical security
Phishing
Social engineering
On-path attack
Correct Answer:
Rogue access point
Explanation
A rogue access point is an unauthorized access point added to a network or an
access point that's configured to mimic a valid access point. Example scenarios
include:
• An attacker or employee with access to the wired network installs a
wireless access point on a free port. The access port then provides a
method for remotely accessing the network.
• An attacker near a valid wireless access point installs an access point with
the same (or similar) SSID. The access point is configured to prompt for
credentials, allowing the attacker to steal those credentials or use them in
an on-path attack to connect to the valid wireless access point.
• An attacker configures a wireless access point in a public location and
then monitors the traffic of those who connect to the access point.
An on-path attack is used to intercept information passing between two
communication partners. A rogue access point might be used to initiate an on-path
attack, but in this case, the rogue access point was connected without malicious
intent.
Social engineering exploits human nature by convincing someone to reveal
information or perform an activity.
Phishing uses an email and a spoofed website to gain sensitive information.
References
The user needs a new IP address because she is working on a different floor.
The wireless network access point on the user's normal floor has failed.
The user has not yet rebooted her laptop computer while at her new location.
Correct Answer:
The user is out of the effective range of the wireless access point.
The user has not yet logged off and back on to the network while at her new location.
Explanation
Because the user is only experiencing intermittent problems, the most likely cause is
that she is out of the effective range of the wireless network access point.
All of the other answers listed would be appropriate if the user were unable to
connect to the network at all. However, as the user is experiencing only intermittent
problems, none of the other answers is likely to cure the problem.
References
Question 2:
Correct
A user on your network has been moved to another office down the hall. After the
move, she calls you complaining that she has only occasional network access
through her wireless connection. Which of the following is MOST likely the cause of
the problem?
Answer
The encryption level has been erroneously set back to the default setting.
Explanation
In this case, the user had no problems accessing the wireless access point until she
moved to the new office. In some cases, moving a system causes signal loss either
from the increased distance away from the WAP or from unexpected interference by
such things as concrete walls or steel doors. There are several ways to correct the
problem, including reducing the physical distance to the client, using a wireless
amplifier, upgrading the antennae on the wireless devices, or adding another WAP to
the infrastructure.
Because the client could previously access the WAP and still has occasional access,
it is likely that the move was the cause of the problem, not any other configuration
setting.
References
Question 3:
Correct
Your wireless network consists of multiple 802.11n access points that are configured
as follows:
• SSID (hidden): CorpNet
• Security: WPA2-PSK using AES
• Frequency: 5.75 GHz
• Bandwidth per channel: 40 MHz
Because of your facility's unique construction, there are many locations that do not
have a clear line of sight between network clients and access points. As a result,
radio signals are reflected along multiple paths before finally being received. The
result is distorted signals that interfere with each other.
What should you do?
Answer
Antenna diversity implements two or more radio antennae to improve the quality and
reliability of a wireless link. In environments where there is no clear line of sight
between transmitter and receiver, the radio signal is reflected along multiple paths
before finally being received. This can introduce phase shifts, time delays,
attenuation, and distortion that interfere with the antenna signal.
You can rectify the situation by implementing antenna diversity two ways:
• Spatial diversity, which uses multiple antennae that are physically
separated from one another.
• Pattern diversity, which uses two or more co-located antennae with
different radiation patterns.
Using a RADIUS authentication solution increases wireless network security, but it
doesn't address the issue of multipath interference. Reducing radio power could help
solve multipath interference issues in some situations, but it may make it worse in
others. This is also true of directional access points.
References
Question 4:
Correct
You are troubleshooting a wireless connectivity issue in a small office. You
determine that the 2.4GHz cordless phones used in the office are interfering with the
wireless network transmissions.
If the cordless phones are causing the interference, which of the following wireless
standards could the network be using? (Select two.)
Answer
Correct Answer:
Bluetooth
Infrared
802.11a
802.3a
Correct Answer:
802.11b
Explanation
Both the 802.11b and Bluetooth wireless standards use the 2.4 GHz RF range to
transmit data. Cordless phones that operate at the same frequency can cause
interference on the wireless network. Other devices, such as microwaves and
electrical devices, may also cause interference.
802.11a uses the 5 GHz radio frequency, so this would not be affected by the 2.4
GHz phones used in the office.
Infrared uses a light beam to connect computer and peripheral devices to create a
personal area network (PAN).
References
Question 5:
Correct
You are implementing a wireless network inside a local office. You require a wireless
link to connect a laptop in the administrator's office directly to a system in the sales
department. In the default configuration, the wireless AP uses a 360-dispersed RF
wave design. After installation, the signal between the two systems is weak, as many
obstacles interfere with it.
Which of the following strategies could you try to increase signal strength?
Answer
Correct Answer:
Replace the omni-directional antenna with a directional antenna.
Explanation
References
Multi-directional
Directional
Uni-directional
Explanation
References
Question 7:
Correct
You need to place a wireless access point in your two-story building while avoiding
interference. Which of the following is the best location for the access point?
Answer
Correct Answer:
On the top floor
Explanation
References
Question 8:
Correct
Which of the following recommendations should you follow when placing access
points to provide wireless access for users within your company building?
Answer
Explanation
References
• 9.6.4 Wireless Network Troubleshooting Facts
q_wireless_comm_trouble_placement_02_np6.[Link]
Question 9:
Correct
You have physically added a wireless access point to your network and installed a
wireless networking card in two laptops that run Windows. Neither laptop can find the
network, and you've come to the conclusion that you must manually configure the
wireless access point (WAP).
Which of the following values uniquely identifies the WAP?
Answer
WEP
Channel
Frequency
Correct Answer:
SSID
Explanation
The SSID (service set identifier) identifies the wireless network. All PCs and access
points in a LAN share the same SSID.
WEP (Wired Equivalent Privacy) adds a layer of security to the transmission, while
the channel identifies the frequency that the card and AP communicate on.
References
Question 10:
Correct
You have decided to conduct a business meeting at a local coffee shop. The coffee
shop you chose has a wireless hotspot for customers who want internet access.
You decide to check your email before the meeting begins. When you open the
browser, you cannot gain internet access. Other customers are using the internet
without problems. You're sure that your laptop's wireless adapter works because you
use a wireless connection at work.
What is the MOST likely cause of the problem?
Answer
An out-of-range WAP
Correct Answer:
A mismatched SSID
Explanation
You must configure a wireless client and access point to use the same SSID. In this
case, the client system was used on a different wireless network and may still be
using that network's SSID. To log onto this network, the system needs to use the
same SSID as the other customers in the coffee shop.
The problem is not with LAN protocols, as TCP/IP is the protocol used on the
internet. There are no other options.
The WAP is not out of range, as other clients are accessing it.
PPP (Point-to-Point Protocol) is not required to make an internet connection.
References
Modem
Proxy
IDS
Correct Answer:
CSU/DSU
Explanation
A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the
signal received from the WAN provider into a signal that can be used by equipment
at a customer's site. A CSU/DSU is composed of two separate devices.
•
The CSU terminates the digital signal and provides error correction and
line monitoring.
• The DSU converts the digital data into synchronous serial data for
connection to a router.
A modem converts digital signals to analog signals.
A proxy server is a type of firewall that can filter based on upper-layer data.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity.
References
•
10.1.2 WAN Concept Facts
q_wan_concepts_csu_dsu_02_np6.[Link]
Question 2:
Correct
Which of the following is the customer's responsibility to maintain?
Answer
Local loop
CO
Correct Answer:
CPE
PSE
Explanation
Customers are responsible for customer premises equipment (CPE), which is any
equipment at the customer's site.
WAN service providers are responsible for:
• Packet switching exchange (PSE) equipment inside the WAN cloud.
• Central office (CO) equipment that allows access to the PSE.
• Data circuit-terminating equipment (DCE) devices that switch data to the
WAN.
• Local loop wiring that connects the customer to the CO.
References
Question 3:
Correct
Which of the following describe the channels and data transfer rates used for ISDN
BRI? (Select two.)
Answer
Correct Answer:
Two B channels operating at 64 Kbps each.
Correct Answer:
One D channel operating at 16 Kbps.
Explanation
ISDN BRI (integrated services digital network basic rate interface) uses two B
channels operating at 64 Kbps each and one D channel operating at 16 Kbps. This
setup is often called 2B + 1D.
ISDN PRI (integrated services digital network primary rate interface) uses 23 B
channels (at 64 Kbps each) and one D channel (at 64 Kbps). It is also called 23B +
1D. In Europe, ISDN PRI uses an E1 line with thirty 64 Kbps B channels and one 64
Kbps D channel (up to 2.048 Mbps).
References
Question 4:
Correct
Which of the following technologies uses variable-length packets, adds labels to
packets as they enter the WAN cloud, and uses the labels to switch packets and
prioritize traffic?
Answer
SONET
ATM
ISDN
Correct Answer:
MPLS
Explanation
References
Question 5:
Correct
What is the speed of an OC-3 connection?
Answer
45 Mbps
622 Mbps
34 Mbps
Correct Answer:
155 Mbps
Explanation
Optical Carrier (OC) is used to specify the speed of fiber optic networks conforming
to the SONET standard. Common OC speeds are:
• OC-1 = 51.85 Mbps
• OC-3 = 155.52 Mbps
• OC-12 = 622.08 Mbps
• OC-24 = 1.244 Gbps
• OC-48 = 2.488 Gbps
• OC-192 = 9.952 Gbps
T3 is 44.736 Mbps.
E3 is 34.368 Mbps.
References
Question 6:
Correct
Which network type divides transmitted data into smaller pieces and allows multiple
communications on the network medium?
Answer
Correct Answer:
Packet-switched
Circuit-switched
Managed
Multiplexed
Explanation
A packet-switched network divides data into small units called packets. These
packets are routed by their destination addresses. In a packet-switched network,
multiple hosts can use the network medium at the same time. An Ethernet computer
network is an example of a packet-switched network.
A circuit-switched network uses a dedicated connection between sites.
A multiplexer joins several signals together before they're transmitted.
A managed device is a device that can receive instructions and can return responses
in a network.
References
Question 7:
Correct
When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is
managed by the routers at different sites?
Answer
Correct Answer:
Packets
Frames
Bits
Datagrams
Explanation
References
Question 8:
Correct
Which of the following describes the lines used in a local loop for dial-up telephone
access?
Answer
MPLS
Correct Answer:
POTS
SONET
J1
T1
Explanation
POTS stands for plain old telephone service. It is simply the wiring used for analog
phone systems. Existing wires use only one twisted pair. Analog signals are used
through the local loop, while the long-distance network typically uses digital signaling
over fiber optic.
T1 and J1 are designations that identify a WAN line's bandwidth.
SONET is a standard for networking over an optical medium. SONET is classified as
a transport protocol because it can carry other types of traffic, such as ATM,
Ethernet, and IP.
Most PSTN networks use SONET within the long-distance portion of the network.
MPLS is a WAN technology that adds labels to packets. Labels are used for
switching packets and data prioritization.
References
Question 9:
Correct
You are traveling throughout North America to many metropolitan and rural areas.
Which single form of internet connectivity provides the greatest potential connectivity
wherever you travel?
Answer
Broadband cable
DSL
ISDN
Correct Answer:
PSTN
Explanation
Network access using a modem over the telephone company network (PSTN) is not
the fastest method for internet connectivity. However, it has the advantage of being
available virtually anywhere that regular voice-grade communications are available.
Broadband cable is dependent on service offerings from the regional cable television
company, which does not have as great a presence as the telephone company. To
use broadband cable, the service must be added to the cable TV package.
DSL and ISDN are offered through the telephone company. However, they are not
available in all service areas. And even when available, they require that the
subscriber be within a certain proximity to the telephone company's equipment.
References
Question 10:
Correct
Which of the following correctly describes the T1 carrier system? (Select two.)
Answer
T1 lines use analog signaling between the customer premise unit and the ISP.
Correct Answer:
T1 lines use two pairs of copper wire.
Correct Answer:
A single T1 channel can transfer data at 64 Kbps.
Explanation
References
Dial-up
DSL
Correct Answer:
Cable modem
ISDN
Explanation
References
Question 2:
Correct
Which type of internet service uses the DOCSIS specification?
Answer
Correct Answer:
Coaxial cable
Fiber optic
The Data Over Cable Service Interface Specification (DOCSIS) defines coaxial cable
networking specifications. It is used by cable TV providers to provide internet access
over their existing coaxial cable infrastructure. DOCSIS specifies channel widths and
modulation techniques. It also defines the manner in which the core components of
the network communicate.
References
Question 3:
Correct
Which of the following internet connection technologies requires that the location be
within a limited distance of the telephone company's central office?
Answer
Satellite
Correct Answer:
DSL
Cable modem
Wireless
Explanation
There are several variations of the digital subscriber line (DSL) technology, which
are collectively referred to as xDSL. DSL works over existing telephone company
copper wires. It operates concurrently with regular voice-grade communications by
utilizing higher frequencies unused by voice transmissions. One of the
consequences of splitting the signal in this manner is that DSL must operate within a
fixed distance of the telephone company's network switching equipment.
A cable modem can be provided as a means of internet access from a cable
television company. It will work anywhere within the service area.
Satellite and wireless do not have the same distance limitations as either DSL or a
cable modem.
References
Question 4:
Correct
Which of the following describe the EDGE cellular technology? (Select two.)
Answer
Correct Answer:
Offers speeds of 400 to 1,000 Kbps.
Is an extension to 3G.
Correct Answer:
Is the first internet-compatible technology.
Uses MIMO.
Explanation
References
Question 5:
Correct
Which of the following technologies does GSM use to allow multiple connections on
the same frequency?
Answer
Multiple-input, multiple-output
Correct Answer:
Time-division multiple access
Explanation
GSM (Global System for Mobile Communications) uses time-division multiple access
(TDMA) to allow multiple connections on the same frequency.
GSM does not use code-division multiple access (CDMA), but it is the technology
used by most mobile service providers in the United States.
Multiple-input, multiple-output (MIMO) is a method for increasing data throughput
and link range.
Frequency-division multiplexing (FDMA) is used primarily for satellite
communications.
References
Question 6:
Correct
Which of the following cellular network types use MIMO to increase 3G data
throughput? (Select two.)
Answer
CDMA2000
Correct Answer:
HSPA+
EDGE
Correct Answer:
LTE
WiMAX
Explanation
Both HSPA+ and LTE are 3G extensions that use multiple-input, multiple-output
(MIMO) to increase bandwidth.
EDGE was an intermediary network between 2G and 3G networks. WiMAX is a 4G
specification that delivers high-speed internet service to large geographical areas.
CDMA2000 is a 3G technology that adds additional traffic channels to increase
bandwidth.
References
Question 7:
Correct
You are moving to an area where DSL will be available in the next six months. Which
method of internet connectivity should you implement until DSL is available if your
existing connectivity needs are minimal?
Answer
Correct Answer:
PSTN
Cable modem
ISDN
Satellite
Explanation
Dial-up networking using the public switched telephone network (PSTN) offers
sufficient network connectivity for a relatively minimal investment. You can use dial-
up with little hardware, setup, or connection costs.
The other modes of networking provide greater capability than you require and more
of an investment in equipment than is worthwhile for such a short period of time.
References
Question 8:
Correct
A healthcare organization provides mobile clinics throughout the world. Which
network technology should you select to transfer patients' statistical data to a central
database via the internet that ensures network connectivity for any clinic located
anywhere in the world, even remote areas?
Answer
ISDN
Cable modem
DSL
Correct Answer:
Satellite
Dial-up
Explanation
Satellite capability is available even in areas that do not have a local network
infrastructure. Satellite requires a local portable transmitter with an antenna directed
skyward to a satellite. Satellite service providers offer nearly 100% global network
coverage by maintaining a series of satellites circling the earth in geosynchronous
orbit.
Dial-up, ISDN, and cable modems require a local network infrastructure provided by
either the telephone company or cable television company.
References
Question 9:
Correct
Which of the following internet services provides equal upload and download
bandwidth?
Answer
VHDSL
Correct Answer:
SDSL
VDSL
ADSL
Explanation
Symmetrical DSL (SDSL) provides equal download and upload speeds. Depending
on the region, speeds are between 1.544 to 2.048 Mbps. Newer SHDSL provides
between 4.6 to 5.696 Mbps. The entire line is used for data, and simultaneous voice
and data is not supported. Splitters are not required because voice traffic does not
exist on the line.
Asymmetrical DSL (ADSL) and very high DSL (VDSL or VHDSL) provide different
download and upload speeds.
References
Question 10:
Correct
Which of the following forms of networking allows roaming within a limited area of
coverage, but can be limited by dead spots?
Answer
ISDN
DSL
Correct Answer:
Wireless
Dial-up
Explanation
Wireless networks all provide for roaming within a limited area of coverage, but can
be limited by dead spots.
The other forms of networking listed require a cable connection, and are not
designed to allow roaming while using the network connection.
References
Protects usernames.
Explanation
References
Question 2:
Correct
Which of the following authentication protocols transmits passwords in cleartext and
is considered too unsecure for modern networks?
Answer
Correct Answer:
PAP
EAP
RADIUS
CHAP
Explanation
References
Question 3:
Correct
What does a remote access server use for authorization?
Answer
Correct Answer:
Remote access policies
SLIP or PPP
CHAP or MS-CHAP
Explanation
Authorization is the process of identifying the resources that a user can access over
a remote access connection. Authorization is controlled through the use of network
policies (remote access policies) and access control lists (ACLs). Authorization can
restrict access based on:
• Time of day
• Type of connection (PPP or PPPoE, wired or wireless)
• Location of the resource (specific servers)
Authentication is the process of proving identity. Common protocols used for remote
access authentication include PAP, CHAP, MS-CHAP, or EAP.
Usernames and passwords are used during identification and authentication as
authentication credentials. SLIP and PPP are remote access connection protocols
that are used to establish and negotiate parameters for remote access.
References
Question 4:
Correct
What is the primary purpose of RADIUS?
Answer
Correct Answer:
Authenticate remote clients before access to the network is granted.
Explanation
References
Question 5:
Correct
Which of the following are methods for providing centralized authentication,
authorization, and accounting for remote access? (Select two.)
Answer
Correct Answer:
TACACS+
Correct Answer:
RADIUS
PKI
EAP
AAA
Explanation
Both RADIUS and TACACS+ are protocols used for centralized authentication,
authorization, and accounting with remote access. Remote access clients send
authentication credentials to remote access servers. Remote access servers are
configured as clients to the RADIUS or TACACS+ servers and forward the
authentication credentials to the servers. The servers maintain a database of users
and policies that control access for multiple remote access servers.
AAA stands for authentication, authorization, and accounting. AAA is a generic term
that describes the functions performed by RADIUS and TACACS+ servers.
A public key infrastructure (PKI) is a system of certificate authorities that issues
certificates. 802.1x is an authentication mechanism for controlling port access.
EAP is an authentication protocol that enables the use of customized authentication
methods.
References
Question 6:
Correct
Which of the following are differences between RADIUS and TACACS+?
Answer
RADIUS encrypts the entire packet contents, while TACACS+ only encrypts the
password.
Correct Answer:
RADIUS combines authentication and authorization into a single function, while
TACACS+ allows these services to be split between different servers.
Explanation
TACACS+ provides three protocols (one each for authentication, authorization, and
accounting). This allows each service to be provided by a different server. In
addition, TACACS+:
• Uses TCP.
• Encrypts the entire packet contents.
• Supports more protocol suites than RADIUS.
References
Question 7:
Correct
Which of the following are characteristics of TACACS+? (Select two.)
Answer
Correct Answer:
Allows three different servers (one each for authentication, authorization, and
accounting).
Correct Answer:
Uses TCP.
Uses UDP.
Allows two different servers (one for authentication and authorization and another for
accounting).
Explanation
References
• 10.3.3 Remote Access Facts
q_remote_access_tacacs_01_np6.[Link]
Question 8:
Correct
Which of the following is a characteristic of TACACS+?
Answer
Correct Answer:
Encrypts the entire packet, not just authentication packets.
Explanation
References
Question 9:
Correct
Which of the following ports does TACACS use?
Answer
22
Correct Answer:
49
50 and 51
3389
Explanation
Terminal Access Controller Access Control System (TACACS) uses port 49 for TCP
and UDP.
Secure Shell (SSH) uses port 22.
IPsec uses protocol numbers 50 and 51.
Remote Authentication Dial-In User Service (RADIUS) uses ports 1812 and 1813.
Remote Desktop Protocol (RDP) uses port 3389.
References
Question 10:
Correct
You often travel away from the office. While traveling, you would like to use a
modem on your laptop computer to connect directly to a server in your office to
access needed files.
You want the connection to be as secure as possible. Which type of connection do
you need?
Answer
Internet
Correct Answer:
Remote access
Intranet
Explanation
References
AH
SSL
Correct Answer:
ESP
AES
Explanation
Encapsulating Security Payload (ESP) protocol provides data encryption for IPSec
traffic.
Authentication Header (AH) provides message integrity through authentication,
verifying that data is received unaltered from the trusted destination. AH provides no
privacy and is often combined with ESP to achieve integrity and confidentiality.
Secure Sockets Layer (SSL) has long been used to secure traffic generated by IP
protocols such as HTTP, FTP, and email. SSL can also be used as a VPN solution,
typically in a remote access scenario.
Advanced Encryption Standard (AES) uses variable key length (128-, 192-, or 256-
bit keys) and is resistant to all known attacks. It is computationally more efficient than
3DES.
References
Question 2:
Correct
Which statement BEST describes IPsec when used in tunnel mode?
Answer
Packets are routed using the original headers, and only the payload is encrypted.
Correct Answer:
The entire data packet, including headers, is encapsulated.
Explanation
When using IPsec in tunnel mode, the entire data packet, including original headers,
is encapsulated. New encrypted packets are created with headers, indicating only
the endpoint addresses. Tunneling protects the identities of the communicating
parties and the original packet contents. Tunneling is frequently used to secure traffic
traveling across insecure public channels, such as the internet. IPsec in tunnel mode
is the most common configuration for gateway-to-gateway communications.
In transport mode, routing is performed using the original headers. Only the packet's
payload is encrypted. Transport mode is primarily used in direct host-to-host
communication outside of a dedicated IPsec gateway/firewall configuration.
References
Question 3:
Correct
Which of the following VPN protocols merged with the deprecated Point-to-Point
Tunneling Protocol (PPTP) to create L2TP?
Answer
IPsec
TLS
Correct Answer:
Layer 2 Forwarding
SSL
Explanation
Layer 2 Forwarding (L2F) is a VPN technology developed by Cisco that merged with
the deprecated Point-to-Point Tunneling Protocol (PPTP) to create L2TP.
Internet Protocol Security (IPsec) provides authentication and encryption and can be
used in conjunction with L2TP or by itself as a VPN solution. IPsec is still considered
very secure.
Secure Sockets Layer (SSL) has long been used to secure traffic generated by other
IP protocols, such as HTTP, FTP, and email. SSL can also be used as a VPN
solution, typically in a remote access scenario.
Transport Layer Security (TLS) works in a similar way to SSL, even though they are
not interoperable.
References
Question 4:
Correct
A group of salesmen in your organization would like to access your private network
through the internet while they are traveling. You want to control access to the
private network through a single server.
Which solution should you implement?
Answer
IPS
IDS
DMZ
RADIUS
Correct Answer:
VPN concentrator
Explanation
If you are using a remote access VPN, a server on the edge of a network (called a
VPN concentrator) is configured to accept VPN connections from individual hosts.
Hosts that are allowed to connect using the VPN connection are granted access to
resources on the VPN server or the private network.
A screened subnet is a buffer network that sits between a private network and an
untrusted network (such as the internet). A RADIUS server is used to centralize
authentication, authorization, and accounting for multiple remote access servers.
However, clients still connect to individual remote access servers.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. A passive IDS monitors, logs, and detects security
breaches, but it takes no action to stop or prevent the attack. An active IDS (also
called an intrusion protection system, or IPS) performs the functions of an IDS but
can also react when security breaches occur.
References
Question 5:
Correct
A salesperson in your organization spends most of her time traveling between
customer sites. After a customer visit, she must complete various managerial tasks,
such as updating your organization's order database.
Because she rarely comes back to the home office, she usually accesses the
network from her notebook computer using Wi-Fi access provided by hotels,
restaurants, and airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are
concerned that sensitive data could be exposed. To remedy this situation, you
decide to configure her notebook to use a VPN when accessing the home network
over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select
two.)
Answer
Correct Answer:
Configure the VPN connection to use IPsec.
Configure the browser to send HTTPS requests directly to the Wi-Fi network without
going through the VPN connection.
Correct Answer:
Configure the browser to send HTTPS requests through the VPN connection.
Explanation
References
SSL
IPsec
Correct Answer:
GRE
PPTP
Explanation
References
Question 7:
Correct
Which of the following Network layer protocols provides authentication and
encryption services for IP-based network traffic?
Answer
L2TP
TCP
SSL
Correct Answer:
IPsec
Explanation
IPsec is a security implementation that provides security for all other TCP/IP-based
protocols that operate above the Network layer. IPsec provides authentication
through a protocol called IPsec Authentication Header (AH) and encryption services
through a protocol called IPsec Encapsulating Security Payload (ESP)
Transmission Control Protocol (TCP) is a Transport layer connection-oriented
protocol that provides data transmission services. It is not a secure protocol and
relies on other measures, such as IPsec, to provide security.
Secure Sockets Layer (SSL) is an Application layer protocol that is designed to
secure network traffic from certain other protocols, such as HyperText Transfer
Protocol (HTTP) and Post Office Protocol version 3 (POP3). SSL does not provide
security for protocols lower in the TCP/IP protocol stack, such as TCP and UDP.
Layer 2 Tunneling Protocol (L2TP) is a protocol used to encapsulate Point-to-Point
Protocol (PPP) traffic.
References
Question 8:
Correct
Which of the following purposes is a VPN primarily used for?
Answer
Correct Answer:
Support secured communications over an untrusted network.
Explanation
References
Question 9:
Correct
Which VPN tunnel style routes only certain types of traffic?
Answer
Host-to-host
Site-to-site
Correct Answer:
Split
Full
Explanation
A VPN split tunnel routes only certain types of traffic, usually determined by
destination IP address, through the VPN tunnel. All other traffic is passed through
the normal internet connection.
A full VPN tunnel routes all of a user's network traffic through the VPN tunnel. This
can sometimes send unnecessary traffic.
A site-to-site VPN is a VPN implementation that uses routers on the edge of each
site.
A host-to-host VPN implementation allows an individual host connected to the
internet to establish a VPN connection to another host on the internet.
References
Question 10:
Correct
Which of the following statements about an SSL VPN are true? (Select two.)
Answer
Explanation
An SSL VPN uses SSL (Secure Sockets Layer) to secure communications. An SSL
VPN:
• Authenticates the server to the client using public key cryptography and
digital certificates.
• Encrypts the entire communication session.
• Uses port 443, which is already open on most firewalls.
IPsec uses pre-shared keys to provide authentication to other protocols. It also uses
HMAC (Hash-Based Message Authentication Code) to provide message integrity
checks.
The GRE tunneling protocol exclusively uses GRE (General Routing Encapsulation)
headers.
Layer 2 Tunneling Protocol (L2TP) uses port 500.
References
The calculation of how often bits are damaged in transit due to electromagnetic
interference.
The condition that occurs when a system is unable to keep up with the demands
placed on it.
The speed at which packets travel from source to destination and back.
Correct Answer:
The amount of data that can be transferred from one place to another in a specific
amount of time.
Explanation
Bandwidth is the amount of data that can be transferred from one place to another in
a specific amount of time.
Latency is the speed at which packets travel from source to destination and back.
Error rate is the calculation of how often bits are damaged in transit due to
electromagnetic interference (or other interference).
A bottleneck is the condition that occurs when a system is unable to keep up with the
demands placed on it.
References
Question 2:
Correct
Which of the following is a best practice when establishing a baseline?
Answer
Explanation
You should determine your baselines by analyzing network traffic. To get a true
picture of your network's activity, you want to collect data over a period of time. You
should monitor different times of day and different times of year (especially if your
organization has notoriously busy or slow periods). You can create baselines
manually, however, there are also tools you can purchase to collect more information
and to possibly create more accurate baselines, if you so choose.
References
•
11.1.2 Performance Metrics
•
11.4.1 Network Monitoring
•
11.4.4 Use Wireshark to Sniff Traffic
•
11.4.5 Monitor Utilization
•
11.4.6 Monitor Interface Statistics
•
11.4.9 Network Monitoring Facts
q_performance_metrics_baseline_np6.[Link]
Question 3:
Correct
Which of the following is the term for when a system is unable to keep up with the
demands placed on it?
Answer
Hard fault
Jitter
Latency
Correct Answer:
Bottleneck
Explanation
A bottleneck occurs when a system is unable to keep up with the demands placed
on it.
Latency, jitters, and hard faults are related to network and device metrics. They do
not occur when a system can't keep up with the demands placed on it.
References
•
11.1.2 Performance Metrics
q_performance_metrics_bottleneck_np6.[Link]
Question 4:
Correct
Which of the following is the term for a calculation of how often bits are damaged in
transit due to electromagnetic interference?
Answer
Bandwidth
Bottleneck
Latency
Correct Answer:
Error rate
Explanation
Error rate is a calculation of how often bits are damaged in transit due to
electromagnetic interference (or other interference).
Latency is the speed at which data packets travel from source to destination and
back.
A bottleneck is the condition that occurs when a system is unable to keep up with the
demands placed on it.
Bandwidth is the amount of data that could be transferred from one place to another
in a specific amount of time.
References
Question 5:
Correct
When packets arrive at their destination at different speeds, they sometimes arrive
out of order. What does this cause?
Answer
Dropped packets
Latency
Error rates
Correct Answer:
Jitter
Explanation
When packets arrive at their destination at different speeds, they sometimes arrive
out of order. This causes what's known as jitter.
Latency, dropped packets, and error rates are not caused by out-of-order packets.
References
Question 6:
Correct
What is the definition of latency?
Answer
Correct Answer:
The speed at which data packets travel from source to destination and back.
The percentage of time that a disk subsystem reads from and writes to a disk.
Explanation
Latency is the speed at which packets travel from source to destination and back.
Error rate is the calculation of how often bits are damaged in transit due to
electromagnetic interference (or other interference).
Bandwidth utilization is the percentage of available bandwidth being used.
Hard disk utilization is the percentage of time that a disk subsystem reads from and
writes to disk.
References
Question 7:
Correct
Your computer seems to be running slowly. In particular, you notice that the hard
drive activity light remains lit when you run multiple applications and switch between
open windows. This happens even though you aren't saving large files.
What should you do to troubleshoot the problem?
Answer
Use Reliability Monitor to monitor system reliability.
Correct Answer:
Use Resource Monitor to monitor memory utilization.
Explanation
In this scenario, you should use Resource Monitor to monitor memory utilization.
Most likely, you'll see that the physical RAM is being over-utilized. When physical
memory is low, the computer must swap data from memory to hard disk (to the
paging file) to make physical memory available for other applications. If you hear the
hard drive constantly operating as you work or if the hard drive light on the front of
the system case stays illuminated for long periods of time, it means that the
computer is constantly working to move data into and out of memory. The only long-
term solution is to add more physical RAM.
Monitoring disk activity with Resource Monitor or Task Manager won't reveal the true
source of the problem in this scenario (which is a shortage of physical RAM).
Reliability Monitor is not the appropriate tool to use in this scenario.
References
Question 8:
Correct
Which of the following is true about processor performance?
Answer
Processor utilization is the amount of time the processor spends on idle tasks.
Explanation
References
Question 9:
Correct
Which of the following could be to blame if your computer is regularly crashing or
restarting?
Answer
Explanation
References
Question 10:
Correct
Where can you check your CPU's temperature?
Answer
Task Manager
Correct Answer:
BIOS
Performance Manager
Device Manager
Explanation
You can check your CPU's temperature in the system BIOS, or you can use third-
party software to monitor and alert you to any extreme temperature spikes.
Although they're useful performance tools, Task Manager, Performance Manager,
and Device Manager can't be used to check your CPU's temperature.
References
GET
Correct Answer:
Inform
Walk
Alert
Explanation
References
Question 2:
Correct
What is the name of the computer that queries agents and gathers responses by
sending messages?
Answer
Trap
Agent
MIB
Correct Answer:
Manager
Explanation
References
•11.2.5 SNMP Facts
q_snmp_manager_np6.[Link]
Question 3:
Correct
Because of an unexplained slowdown on your network, you decide to install
monitoring software on several key network hosts to locate the problem. You will
then collect and analyze the data from a central network host.
Which protocol will the software use to detect the problem?
Answer
Correct Answer:
SNMP
IPX
UDP
TCP/IP
Explanation
References
Question 4:
Correct
What does SNMP use to identify a group of devices under the same administrative
control?
Answer
Correct Answer:
Community strings
OID
Passwords
Informs
Explanation
Agents and the manager are configured to communicate with each other using the
community strings. A community string identifies a group of devices under the same
administrative control. The community string is like a password because it limits
access to only authorized processes or queries. However, it's not a password; it's
simply a value configured on each device. Devices with different community names
are unable to send SNMP messages to each other.
Informs and OIDs (Object Identifiers) are SNMP components. However, they are not
used to identify a group of devices under the same administrative control.
References
Question 5:
Correct
Which of the following is true about a community string?
Answer
Devices with different community names are able to send SNMP messages to each
other.
Correct Answer:
A community string identifies devices under the same administrative control.
A string is a password.
Explanation
Agents and the manager are configured to communicate with each other using the
community strings. A community string identifies a group of devices under the same
administrative control. The community string is like a password because it limits
access to only authorized processes or queries. However, it's not a password; it's
simply a value configured on each device.
Devices with different community names are unable to send SNMP messages to
each other.
References
Question 6:
Correct
Which protocol uses traps to send notifications from network devices?
Answer
IGMP
ICMP
SMTP
Correct Answer:
SNMP
Explanation
References
Question 7:
Correct
When an event occurs, the agent logs details regarding the event. What is this event
called?
Answer
Correct Answer:
Trap
GET
OID
MIB
Explanation
A trap is an event configured on an agent. When the event occurs, the agent logs
details regarding the event.
GET, OIDs, and MIB are SNMP components, but they are not events.
References
Question 8:
Correct
You have been using SNMP on your network for monitoring and management, but
you're concerned about the security of this configuration. What should you do to
increase security in this situation?
Answer
Explanation
References
Question 9:
Correct
Which of the following improvements to SNMP are included in version 3? (Select
two.)
Answer
Explanation
SNMPv3 adds authentication for agents and managers, encryption, and message
integrity to ensure that data is not altered in transit.
SNMPv3 improvements do not include the use of SFTP for transferring SNMP data
or community name hashing.
SNMP does use UDP ports 161 and 162, but this was not one of the version 3
improvements.
References
Question 10:
Correct
Which SNMP component uses GETNEXT messages to navigate the MIB structure?
Answer
Inform
GET
Trap
Correct Answer:
Walk
Explanation
A walk uses GETNEXT messages to navigate the MIB structure.
GET, traps, and informs are all SNMP components, but they do not use GETNEXT
messages to navigate the MIB structure.
References
Firewall log
Network log
Security log
Explanation
You would choose the application log. Most applications produce some type of event
logging. These logs show application access, crashes, updates, and any other
relevant information that could be valuable in conducting a root cause analysis. The
application may be crashing or not performing correctly, and this could be tied to
suspicious activity that may indicate malicious intent.
Network logs tell you what is coming into and leaving your network.
A firewall log identifies traffic that has been allowed or denied through a firewall.
A security log records information related to logons, such as incorrect password
attempts and user right application.
References
Question 2:
Correct
You suspect that cache poisoning or spoofing has occurred on your network. Users
are complaining of strange web results and being redirected to undesirable sites.
Which log would help you determine what's going on?
Answer
Network logs
Correct Answer:
DNS logs
Application logs
Security logs
Explanation
In this scenario, you should take a look at the DNS logs for DNS cache poisoning.
After this, you can begin monitoring DNS query traffic.
Network logs do not help you with spoofed host name resolution.
Application logs do not help you determine DNS poisoning.
Security logs do little to help you identify spoofing.
References
Question 3:
Correct
You suspect that a bad video driver is causing a user's system to randomly crash
and reboot. Where would you go to identify and confirm your suspicions?
Answer
Application logs
SIP logs
Syslog
Correct Answer:
Dump files
Explanation
You would choose dump files. Dump files are created when an application, OS, or
other computer function stops abruptly. These files help IT admins perform root
cause analysis and can also give clues as to the crash's origin. This could be
something as commonplace as a bad driver or hardware component. Unfortunately,
though, it may prove to be the result of a malicious act.
Syslog is a protocol that defines how log messages are sent from one device to a
logging server on an IP network. The sending device sends a small text message to
the Syslog receiver (the logging server).
App logs show application access, crashes, updates, and any other relevant
information that could be valuable in doing root cause analysis.
Session Information Protocol (SIP) logs contain key information about where a
phone call was initiated and what the communication's intent was.
References
•11.3.5 Log File Management Facts
q_log_management_dump_np6.[Link]
Question 4:
Correct
Which Syslog severity level indicates a debugging message?
Answer
Correct Answer:
Level 7
Level 3
Level 1
Level 5
Explanation
References
Question 5:
Correct
Which Syslog level indicates an emergency that could severely impact the system
and cause it to become unusable?
Answer
Level 4
Level 6
Level 2
Correct Answer:
Level 0
Explanation
Level 0 indicates an emergency that could severely impact the system and cause it
to become unusable.
Level 2 indicates a serious errors in secondary subsystem that should be addressed
immediately.
<="" away.="" right="" addressed="" be="" should="" that="" condition="" critical=""
a="" indicates="" 2="" style="margin: 0px;">
Level 4 indicates a warning that could eventually become a problem if not
addressed.
Level 6 indicates an informational message.
References
Question 6:
Correct
Which of the following is a standard for sending log messages to a central logging
server?
Answer
LC4
Nmap
OVAL
Correct Answer:
Syslog
Explanation
Syslog is a protocol that defines how log messages are sent from one device to a
logging server on an IP network. The sending device sends a small text message to
the Syslog receiver (the logging server).
The Open Vulnerability and Assessment Language (OVAL) is an international
standard for testing, analyzing, and reporting a system's security vulnerabilities.
LC4 (previously called LOphtcrack) is a password cracking tool.
Nmap is a network mapping tool that performs ping and port scans.
References
Question 7:
Correct
You are concerned that an attacker can gain access to your web server, make
modifications to the system, and alter the log files to hide his or her actions. Which of
the following actions would BEST protect the log files?
Answer
Explanation
The best protection is to save log files to a remote server. In this way, system
compromise does not provide access to that system's log files.
Configuring permissions on the log files would allow access for only specified user
accounts. However, if an attacker has gained access to the system, he or she might
also have access to the user accounts that've been given access to the log files.
Encrypting the log files protects the contents from being read, but this does not
prevent the files from being deleted.
Hashing the log files ensures their integrity and that they have not been altered since
they were created.
References
Question 8:
Correct
You are the network administrator for a growing business. When you were hired, the
organization was small, and only a single switch and router were required to support
your users. During this time, you monitored log messages from your router and
switch directly from each device's console.
The organization has grown considerably in recent months. Now you manage eight
individual switches and three routers. It's becoming more and more difficult to
monitor these devices and stay on top of issues in a timely manner.
What should you do?
Answer
Hire additional resources to help monitor and manage your network infrastructure.
Use a remote access utility, such as SSH, to access router and switch consoles
remotely.
Correct Answer:
Use Syslog to implement centralized logging.
Explanation
References
Question 9:
Correct
Over the past few days, a server has gone offline and rebooted automatically several
times. You would like to see a record of when each of these restarts occurred.
Which log type should you check?
Answer
Firewall
Performance
Correct Answer:
System
Security
Explanation
A system log records operating system, system, and hardware events. The system
log contains entries for when the system was shut down or restarted, when new
hardware was added, and when new services were installed as well.
A performance log records information about system resources, such as processor,
memory, disk, or network utilization.
A firewall log identifies traffic that has been allowed or denied through a firewall.
A security log records information related to logons, such as incorrect passwords
and user right usage.
References
Question 10:
Correct
Which log file type is one of the most tedious to parse but can tell you exactly when a
user logged onto your site and what their location was?
Answer
System logs
Application logs
Correct Answer:
Web server logs
Authentication logs
Explanation
Web server logs are some of the most tedious of all logs to parse. However, these
logs can tell you exactly when a user logged onto your site and what their location
was.
Authentication logs are vital to a network's security. Authentication servers may be
Active Directory-based or OpenLDAP depending on your network structure.
System logs are produced by the operating system.
Application logs show application access, crashes, updates, and any other relevant
information that could be valuable in doing root cause analysis.
References
TDR
Certifier
Multimeter
Toner probe
Explanation
Use a protocol analyzer (also called a packet sniffer) to examine network traffic. You
can capture or filter packets from a specific device or packets that use a specific
protocol.
Use a time-domain reflector (TDR) to measure a cable's length or to identify the
location of a fault in the cable.
A toner probe is two devices used together to trace the end of a wire from a known
endpoint to the termination point in the wiring closet.
A cable certifier is a multi-function tool that verifies that a cable or an installation
meets the requirements for a specific architectural implementation.
A multimeter is a device that tests various electrical properties, such as voltage,
amps, and ohms.
References
Question 2:
Correct
Which of the following conditions can low humidity result in?
Answer
Condensation
Cold air
Warm air
Correct Answer:
Electrostatic discharge
Explanation
References
•
11.4.9 Network Monitoring Facts
q_network_monitoring_electrostatic_np6.[Link]
Question 3:
Correct
You are using a protocol analyzer to capture network traffic. You want to only
capture the frames coming from a specific IP address.
Which of the following can you use to simplify this process?
Answer
Display filters
NIC
Correct Answer:
Capture filters
Switch
Explanation
A capture filter records only the frames that the filter identified. Frames that don't
match the filter criteria aren't captured.
A switch connects multiple computers together in a network. It's not used to capture
specific frames.
A network interface card (NIC) is used to transmit and receive frames addressed to
it. It's not used to capture specific frames.
A display filter shows only the frames that match the filter criteria. Frames that don't
match the filter criteria are still captured but not shown.
References
Question 4:
Correct
Most equipment is cooled by bringing cold air in the front and ducting the heat out
the back. What is the term for where heat is sent?
Answer
Front aisle
Cold aisle
Correct Answer:
Hot aisle
Back aisle
Explanation
The hot aisle is where heat is sent from the servers and network equipment to be
transmitted to the HVAC return vent.
The cold aisle is where the chilled air is sent so that the equipment can duct it
through to cool the devices.
Neither front nor back aisle is the correct term used in environmental controls.
References
Question 5:
Correct
You decide to use a packet sniffer to identify the type of traffic sent to a router. You
run the packet sniffing software on a device that's connected to a hub with three
other computers. The hub is connected to a switch that's connected to the router.
When you run the software, you see frames addressed to the four workstations but
not to the router.
Which feature should you configure on the switch?
Answer
Promiscuous mode
Bonding
Correct Answer:
Port mirroring
Explanation
A switch only forwards packets to the switch port that holds a destination device.
This means that when your packet sniffer is connected to a switch port, it does not
see traffic sent to other switch ports. To configure the switch to send all frames to the
packet sniffing device, configure port mirroring on the switch. With port mirroring, all
frames sent to all other switch ports are forwarded on the mirrored port.
Promiscuous mode configures a network adapter to process every frame it sees, not
just the frames addressed to that network adapter. In this scenario, you know that
the packet sniffer is running in promiscuous mode because it can already see frames
sent to other devices.
Bonding logically groups two or more network adapters together to be used at the
same time for a single logical network connection.
Spanning Tree Protocol (STP) runs on a switch and ensures that there is only one
active path between switches, allowing for backup-redundant paths.
References
Question 6:
Correct
You want to know which protocols are being used on your network. You'd like to
monitor network traffic and sort traffic by protocol.
Which tool should you use?
Answer
Correct Answer:
Packet sniffer
Throughput tester
IDS
Port scanner
IPS
Explanation
A packet sniffer is special software that captures (records) frames that are
transmitted on a network. Use a packet sniffer to:
• Identify the types of traffic on a network.
• View the exchange of packets between communicating devices. For
example, you can capture frames related to the Domain Name System
(DNS) and view the exact exchange of packets for a specific name
resolution request.
• Analyze packets sent to and from a specific device.
• View packet contents.
Use a port scanner to identify protocol ports that are open on a firewall or active on a
device. A port scanner checks individual systems, while a packet sniffer watches
network traffic. A throughput tester measures the amount of data that can be
transferred through a network or processed by a device (such as the amount of data
that can be retrieved from a disk in a specific period of time).
An IDS is a special network device that can detect attacks and suspicious activity. A
passive IDS monitors, logs, and detects security breaches, but it takes no action to
stop or prevent the attack. An active IDS (also called an intrusion protection system,
or IPS) performs the functions of an IDS, but it can also react when security
breaches occur.
References
Question 7:
Correct
Which deviation in power is the longest?
Answer
Surge
Transient
Sag
Correct Answer:
Blackout
Explanation
A blackout is generally a longer power outage. The rest of the events are relatively
short durations of less than a few seconds.
References
Question 8:
Correct
You maintain the network for an industrial manufacturing company. A short-circuit of
a switch in the server room starts an electrical fire.
Which of the following should you use to suppress the fire?
Answer
Dry powders
Correct Answer:
Halon or CO2
CO2 or FM200
Explanation
References
• 11.4.11 Environmental Monitoring Facts
q_environment_monitoring_positive_np6.[Link]
Question 9:
Correct
Your 24U rack currently houses two 4U server systems. To prevent overheating,
you've installed a rack-mounted environmental monitoring device within the rack.
Currently, the device shows that the temperature within the rack is 70 degrees
Fahrenheit (21 degrees Celsius).
What should you do?
Answer
Correct Answer:
Nothing, the temperature within the rack is within acceptable limits.
Reorient the cold aisle within the server room so that it is directed toward the air
conditioner's return duct.
Explanation
The ideal temperature for computing equipment is around 68 degrees Fahrenheit (20
degrees Celsius). Therefore, a reading of 70 degrees Fahrenheit (21 degrees
Celsius) within a server rack is not an issue of concern.
Under the current environmental conditions, installing an additional air conditioning
unit isn't necessary and would be very expensive.
Installing a humidifier in the server room would have no effect on the temperature
within the room and is not warranted given the scenario.
Reorienting the cold aisle within the server room so that it's directed toward the air
conditioner's return duct would likely cause the temperature within the server room to
increase.
References
Question 10:
Correct
Which of the following ensures that power is supplied to a server or device during
short power outages?
Answer
Line conditioner
Correct Answer:
Uninterruptible power supply
Backup generator
Surge protector
Explanation
An uninterruptible power supply (UPS) provides continuous power using batteries for
a short period of time. Often, it is paired with a backup generator that can provide
power over a longer time period.
Although a UPS often contains both surge protection and line conditioning, neither
can maintain power during an outage.
References
Company assets
Explanation
Business processes are the primary focus of the scope within business continuity
planning (BCP).
Company assets are the focus of risk assessment for security policy development,
not BCP.
Human life and safety are considerations for emergency response, not BCP.
Recovery time objective is a consideration of emergency response development, not
BCP.
References
Question 2:
Correct
You plan to implement a new security device on your network. Which of the following
policies outlines the process you should follow before you implement that device?
Answer
Acceptable Use
Resource Allocation
Explanation
References
Question 3:
Correct
Which of the following pieces of information are you MOST likely to find in a policy
document?
Answer
Correct Answer:
A requirement for using encrypted communications for web transactions
Explanation
A policy is a document that describes the overall goals and requirements for a
network. A policy identifies what should be done, but it doesn't necessarily define
how the goal is to be reached. In this question, a policy might contain a requirement
that encrypted communications are required for web transactions. The policy does
not state the method that will be deployed, just that encryption is a requirement.
The type of encryption to be used, along with the process for implementing it, would
be included in a procedure document. A procedure is a step-by-step process
outlining how to implement a specific action. As another example, a procedure
document might include steps for completing and validating nightly backups.
You might find the IP address for a device's interface in the configuration
documentation or a network diagram. A baseline is a snapshot of the performance
statistics for your network and devices. A baseline would include a router's average
performance information.
References
Question 4:
Correct
Which of the following information are you MOST likely to find in a procedure
document?
Answer
Explanation
References
Question 5:
Correct
Which of the following is a contract in which both parties agree not to share
proprietary or confidential information gathered during the business relationship?
Answer
Correct Answer:
Non-Disclosure Agreement
Non-Compete Agreement
Memorandum of Understanding
Explanation
References
Question 6:
Correct
Which of the following defines an Acceptable Use Agreement?
Answer
Correct Answer:
An agreement that identifies the employees' rights to use company property, such as
internet access and computer equipment, for personal use.
A legal contract between the organization and the employee that specifies that the
employee is not to disclose the organization's confidential information.
Explanation
References
Question 7:
Correct
You want to make sure that the correct ports on a firewall are open or closed. Which
document should you check?
Answer
Correct Answer:
Baseline configurations
Wiring schematic
Explanation
References
Question 8:
Correct
Which of the following provides a layout of all electrical, plumbing, HVAC, and
networking wiring and components?
Answer
Network diagram
Wiring diagram
Rack diagram
Correct Answer:
Floor plan
Explanation
A floor plan provides a layout of all electrical, plumbing, HVAC, and networking
wiring and components.
A rack diagram, network diagram, and wiring diagram provide layouts for networking
infrastructure, but they do not include electrical, plumbing, and HVAC information.
References
Question 9:
Correct
Which of the following provides information on the subnets within your network,
including the subnet addresses and the routers connecting each subnet?
Answer
Floor plan
Correct Answer:
Network diagram
Wiring diagram
Rack diagram
Explanation
A network diagram includes a layout of the subnets within your network, including
the subnet addresses and the routers connecting each subnet.
A wiring diagram, rack diagram, and floor plan provide information about your
physical network, but they do not include subnet information.
References
Question 10:
Correct
Which type of documentation would you consult to find the location of RJ45 wall
jacks and their endpoints in the intermediate distribution closet?
Answer
Baseline
Correct Answer:
Wiring schematic
Procedure
Policy
Explanation
References
•
3.6.8 Data Center Device Installation
•
3.6.9 Data Center Device Installation Facts
•
11.5.5 Documentation and Agreements
•
11.5.6 Documentation and Agreements Facts
q_docs_agreements_wiring_01_np6.question_xml.[Link]
You manage your company's website, which uses a cluster of two servers with a
single shared storage device. The shared storage device uses a RAID 1
configuration. Each server has a single connection to the shared storage and a
single connection to your ISP.
You want to provide redundancy so that a failure on a single component doesn't
cause the website to become unavailable. What should you add to your configuration
to accomplish this?
Answer
On each server, add a second network connection to connect the server to the
shared storage device.
Correct Answer:
Connect one server to the internet through a different ISP.
Explanation
In this scenario, the ISP is the single point of failure. If the ISP connection goes
down, the website will be unavailable. Connecting one server to a different ISP or
both servers to two ISPs provides redundancy for the connection.
Adding multiple network connections to the shared storage or the same ISP is
unnecessary because if the single network connection on one server fails, the other
server will still be available. Reconfiguring the storage as a RAID 1+0 allows multiple
disk failures, but RAID 1 can sustain a failure on a single disk.
References
Question 2:
Correct
Why should you store backup media off site?
Answer
Explanation
Backup media should be stored off site to prevent the same disaster from affecting
the network and the backup media. If your primary facility is destroyed, your only
hope of recovery is off site data storage.
Off site storage does not significantly reduce the possibility of media theft because it
can be stolen while in transit or at your storage location.
Off site storage is not a government regulation.
Off site storage does not make the restoration process more efficient because
additional time is spent retrieving backup media from the offsite storage location.
References
Question 3:
Correct
In addition to performing regular backups, what must you do to protect your system
from data loss?
Answer
Correct Answer:
Regularly test restoration procedures.
Explanation
The only way to ensure that you have protection against data loss is to regularly test
your restoration procedures. This activity reveals whether or not your backup
process functions properly and your restoration and recovery procedures are
accurate.
It's a good idea to store backup media in a fireproof vault, but it's a better idea to
store it off site.
You should restrict restoration privileges to trusted staff to prevent confidentiality
violations. However, this does not address the issue of data loss protection.
Write-protecting backup media provides little real security for the stored data
because anyone can flip the switch on the media to remove the protection.
References
Question 4:
Correct
You have purchased a solar backup power device to provide temporary electrical
power to critical systems in your data center should the power provided by the
electrical utility company go out. The solar panel array captures sunlight, converts it
into direct current (DC), and stores it in large batteries.
The power supplies on the servers, switches, and routers in your data center require
alternating current (AC) to operate.
Which electrical device should you implement to convert the DC power stored in the
batteries into AC power that can be used in the data center?
Answer
Correct Answer:
Inverter
Capacitor
Transformer
Transistor
Explanation
A power inverter changes direct current (DC) power to alternating current (AC)
power. In this scenario, you can use a power inverter to convert the DC power stored
in the batteries to AC power that your servers, switches, and routers can use in an
emergency.
A transformer is typically used to increase or decrease AC power voltage.
A capacitor temporarily stores an electrical charge. Capacitors are used with the
chips on a computer memory module that store data.
A transistor is used to amplify and switch electrical signals.
References
Question 5:
Correct
Which of the following is the least effective power loss protection for computer
systems?
Answer
Explanation
References
Question 6:
Correct
You are adding a new rack to your data center, which will house two new blade
servers and a new switch. The new servers will be used for virtualization.
The only space you have available in the data center is on the opposite side of the
room from your existing rack, which already houses several servers, a switch, and a
router. You plan to configure a trunk port on each switch and connect them with a
straight-through UTP cable that will run across the floor of the data center.
To protect equipment from power failures, you also plan to install a UPS on the rack
along with redundant power supplies for the server.
Will this configuration work?
Answer
No, you must use a cross-over cable to connect the two switches together.
No, you must implement the UPS and power supplies on the rack externally.
In this scenario, running a cable across the data center floor represents a tripping
hazard. It also represents a point of failure, as the cable will be walked on constantly,
resulting in it being kicked out of one or both jacks. It will also likely fail prematurely
due to the excessive wear. A better option would be to run the cable through the
ceiling plenum.
Blade servers work well for virtualization as long as they meet the system
requirements for the hypervisor software. In the early days of networking, crossover
cables were required to uplink two hubs or switches together. However, most
modern switches implement auto-MDIX, which detects whether crossover is required
and automatically configures the interface for you, making a crossover cable
unnecessary. Rack-mounted power supplies and UPS devices are commonly used
in data centers.
References
Question 7:
Correct
You are adding a new rack to your data center, which will house two new blade
servers and a new switch. The new servers will be used for file storage and a
database server.
The only space you have available in the data center is on the opposite side of the
room from your existing rack, which already houses several servers, a switch, and a
router. You plan to configure a trunk port on each switch and connect them with a
crossover UTP plenum cable that will run through the suspended tile ceiling in the
data center.
To provide power for the new devices, you had an electrician install several new 20-
amp wall outlets near the new rack. Each device on the rack will be plugged directly
into one of these new wall outlets.
What is wrong with this configuration? (Select two.)
Answer
Correct Answer:
You should implement redundant power supplies for the network devices.
Correct Answer:
You should implement a UPS between the wall outlet and the network devices.
You must use a straight-through cable to connect the two switches together.
You should not run a plenum cable through a suspended tile ceiling.
Explanation
In this scenario, all the devices on the new rack will go down if the power from the
wall outlet fails for some reason (such as a power outage). To prevent this from
happening, you should implement a UPS between the wall outlets and the network
devices. In addition, the power supplies used by computing equipment have finite life
spans and fail frequently. Because these are mission-critical devices, you should
consider implementing redundant power supplies.
Plenum network cabling is specifically designed to run through a suspended tile
ceiling. The space between the suspended tile and the physical ceiling is called a
ceiling plenum.
In the early days of networking, crossover cables were required to uplink two hubs or
switches together. However, most modern switches implement auto-MDIX, which
detects whether crossover is required and automatically configures the interface,
allowing you to use either a crossover or straight-through cable. Using a 20-amp
circuit for networking equipment is considered a data center best practice.
Connecting too many devices to a standard 15-amp wall circuit can overload it and
trip its breaker.
References
Question 8:
Correct
Which of the following devices accepts incoming client requests and distributes
those requests to specific servers?
Answer
Correct Answer:
Load balancer
CSU/DSU
Media converter
Caching engine
Explanation
A load balancer is a device that accepts incoming client requests and distributes
those requests to multiple servers. One goal of load balancing is to distribute client
requests evenly between multiple servers to improve performance.
A CSU/DSU (Channel Service Unit/Data Service Unit) is a device that converts the
signal received from the WAN provider into a signal that can be used by equipment
at the customer site. An intrusion prevention system (IPS) can detect and respond to
security events.
A caching engine saves copies of frequently used content, eliminating the need to
download the content each time it's requested.
A media converter converts signals used on one media type (such as twisted-pair
Ethernet) to another media type (such as fiber optic).
References
Question 9:
Correct
What is the purpose of using Ethernet bonding? (Select two.)
Answer
Correct Answer:
Provides a failover solution for network adapters
Increases read and write operations between the system bus and network adapters
Explanation
For a true fault-tolerant strategy, you must consider all system components. Ethernet
bonding (also called adapter teaming) is a fault-tolerant strategy that uses multiple
network adapters configured on a failover solution. In the event of a NIC failure,
other adapters automatically provide link redundancy. Multiple adapters can also
increase performance by distributing the network load between adapters.
Ethernet bonding does not provide increased bus speeds, increase read and write
operations between the system bus and network adapters, or enable dual remote
access (DRA) over a WAN link.
References
Question 10:
Correct
A web server on your network hosts your company's public website. You want to
make sure that a NIC failure on the server does not prevent the website from being
accessible on the internet.
Which solution should you implement?
Answer
QoS
Correct Answer:
Ethernet bonding
Spanning Tree
Traffic shaping
Explanation
Ethernet bonding (also called NIC teaming) logically groups two or more physical
connections to the same network. If one NIC fails, the second NIC with a connection
to the same network can still be used.
Spanning Tree is a protocol on a switch that allows it to maintain multiple paths
within a subnet.
A traffic shaper (also called a bandwidth shaper) is a device that's capable of
modifying the flow of data through a network in response to network traffic
conditions.
Quality of Service (QoS) refers to a set of mechanisms that try to guarantee timely
delivery or minimal delay of important or time-sensitive communications. QoS is
particularly important when you implement Voice over IP (VoIP), Video over IP, or
online gaming, where delay or data loss make the overall experience unacceptable.
References
Only files that have been added since the last full or incremental backup.
Only files that have changed since the last full or incremental backup.
Correct Answer:
Only files that have changed since the last full backup.
Only files that have changed since the last full or differential backup.
Explanation
A differential backup only captures files that have changed since the last full backup.
This backup strategy can create a shorter restoration time than an incremental
backup, but this may consume more disk space, depending on the frequency of file
changes. Restoration is a two-step process. You first load the last full backup and
then finish the restoration by loading the last differential backup.
References
Question 2:
Correct
Which backup strategy backs up only files that have the archive bit set and does not
mark them?
Answer
Incremental
Full
Normal
Correct Answer:
Differential
Explanation
A differential backup backs up only files that have the archive bit set, and it does not
mark them as having been backed up.
A full backup backs up all files regardless of whether the archive bit is set or not. An
incremental backup backs up only files that have the archive bit set, but it marks
them as having been backed up. A normal backup is a type of backup that is unique
to the [Link] utility on the Windows server. This type also flags the files
as having been backed up.
References
Question 3:
Correct
Which backup strategy backs up all files from a computer's file system (regardless of
whether the file's archive bit is set or not) and then marks them as backed up?
Answer
Copy
Correct Answer:
Full
Differential
Incremental
Explanation
A full backup backs up all files from a computer's file system regardless of whether a
file's archive bit is turned on or off. It also marks them as backed up.
Incremental and differential backups only back up files that have their archive bit set.
The copy backup strategy is used by the [Link] backup utility on
Windows servers. It backs up all files regardless of whether the archive bit is set.
However, it does not mark them as backed up.
References
Question 4:
Correct
Your network performs a full backup every night. Each Sunday, the previous night's
backup tape is archived.
On a Wednesday morning, the storage system fails. How many restore operations
would you need to perform to recover all of the data?
Answer
Correct Answer:
One
Two
Three
Four
Explanation
You would need to perform a single restore procedure. You would simply restore the
last full backup from Wednesday to restore all of the data.
The fact that you archived one backup each week is irrelevant to restoring the latest
data. The archived copy is only used to restore something to a specific point in time.
If you had used full and differential backups, you would restore the last full and last
differential backups. If you had used full and incremental backups, you would restore
the last full and each subsequent incremental backup.
References
Question 5:
Correct
Of the following restoration processes, which would result in the fastest restoration of
all data if a system failure occurred on Friday?
Answer
Restore the full backup from Sunday and the last incremental backup.
Correct Answer:
Restore the full backup from Sunday and the last differential backup.
Restore the full backup from Sunday and all incremental backups.
Restore the full backup from Sunday and all differential backups.
Explanation
The fastest method for restoring data to its most current state is to restore the full
backup and then the last differential backup. Differential backups include all changes
since the last full backup (or any other backup method that reset the archive bit).
Restoring the full backup and the last incremental backup is an incomplete restore
because all of the incremental backups must be used. However, restoring several
backup sets rather than a single set is slower. You only need to use the last
differential backup.
References
Question 6:
Correct
Your disaster recovery plan (DRP) calls for backup media to be stored at a different
location. The location is a safe deposit box at the local bank. Because of this, the
disaster recovery plan specifies that you must choose a method that uses the least
amount of backup media but also allows you to quickly back up and restore files.
Which backup strategy would BEST meet the DRP's specifications?
Answer
Perform a full backup once per week and an incremental backup the other days of
the week.
Perform a full backup once per month and an incremental backup the other days of
the month.
Correct Answer:
Perform a full backup once per week and a differential backup the other days of the
week.
Explanation
Performing a full backup once per week and a differential backup the other days of
the week would best meet this disaster recovery plan's specifications. The full
backup backs up all files, usually to one tape, but the process can be time-
consuming. The differential backup backs up all files since the last full backup.
Performing a full backup each day would meet the requirement of using as few tapes
as possible, but that backup process would be very time-consuming each day.
Performing a full backup once per week and an incremental backup the other days of
the week would be one of the fastest methods for backing up files, but it would
require many tapes to complete the restore. The incremental backup only backs up
files added or changed since the last backup. Because of this, in order to do a
complete restore of the file system, you'd need a tape for each day of the week that
the incremental backup ran.
Performing a full backup once per month and an incremental backup the other days
of the month would be the fastest method to back up files, but it would require many
tapes to complete. This process only backs up files added or changed since the last
backup. Because of this, in order to do a complete restore of the file system, you'd
need a tape for each day of the month that the incremental backup ran.
References
Question 7:
Correct
Your network uses the following backup strategy. You create:
• Full backups every Sunday night.
• Differential backups Monday night through Saturday night.
On Thursday morning, the storage system fails. How many restore operations would
you need to perform to recover all of the data?
Answer
One
Correct Answer:
Two
Three
Four
Explanation
You would need to perform two restore procedures. You would do the following:
1. Restore the full backup from Sunday.
2. Restore the differential backup from Wednesday.
If you did a full backup every night, you would restore only a single backup
(Wednesday's backup). If you did full backups with incremental backups, you would
restore the last full backup along with each incremental backup.
References
Question 8:
Correct
Which of the following are backed up during an incremental backup?
Answer
Only files that are new since the last full or incremental backup.
Only files that have changed since the last full backup.
Correct Answer:
Only files that have changed since the last full or incremental backup.
Only files that have changed since the last full or differential backup.
Explanation
An incremental backup only captures files that have changed since the last full or
incremental backup. The primary attraction to this backup plan is that it requires less
storage space and processing time to complete. Restoration starts from the last full
backup and then requires the loading of each subsequent incremental backup for a
full restoration.
References
Question 9:
Correct
Your network uses the following backup strategy. You create:
• Full backups every Sunday night.
• Incremental backups Monday night through Saturday night.
On a Thursday morning, the storage system fails. How many restore operations
would you need to perform to recover all of the data?
Answer
One
Two
Three
Correct Answer:
Four
Five
Explanation
In this scenario, you would need to perform the following four restore procedures:
1. Restore the full backup from Sunday.
2. Restore the incremental backup from Monday.
3. Restore the incremental backup from Tuesday.
4. Restore the incremental backup from Wednesday.
If you did a full backup every night, you would restore only a single backup
(Wednesday's backup). If you did full backups with differential backups, you would
restore the last full backup along with the last differential backup.
References
Question 10:
Correct
Which of the following describe a system image backup?
Answer
A system image does not include operating system files, program files, encrypted
files, files in the Recycle Bin, user profile settings, or temporary files.
A system image includes only specified files and folders backed up to a compressed
file.
Correct Answer:
A system image contains everything on the system volume, including the operating
system, installed programs, drivers, and user data files.
A system image only contains the operating system, installed programs, drivers, and
user profile settings.
Explanation
References
Port 135
Correct Answer:
Port 3389
Port 23
Port 22
Explanation
References
Question 2:
Correct
Which of the following is a tool that allows access to the graphical desktop
environment of another Windows client system over a network connection?
Answer
VPN
Correct Answer:
Remote Desktop
SSH
Explanation
Remote Desktop is a software tool that allows access to the graphical desktop
environment of another Windows client system over a network connection.
While SSH and VPNs help to provide remote access, they are not specific to
Windows client systems.
The Remote Desktop Gateway is not the software tool used to directly provide the
graphical desktop environment to the user.
References
Question 3:
Correct
Which of the following is a role service that allows users with the Remote Desktop
Connection client and an internet connection to connect on an internal network.
Answer
Remote Desktop
RD RAP
Correct Answer:
RD Gateway
RD CAP
Explanation
Remote Desktop Gateway (RD Gateway) is a role service that allows users with the
Remote Desktop Connection client and an internet connection to connect on an
internal network.
A Remote Desktop Resource Authorization Policy (RD RAP) identifies the internal
resources that users can access.
A Remote Desktop Connection Authorization Policy (RD CAP) identifies the users
who can establish a connection through the RD Gateway server.
Remote Desktop is a software tool.
References
Question 4:
Correct
You are the desktop administrator for your company. You would like to manage the
computers remotely using a tool with a graphical user interface (GUI).
Which of the following actions can you take to accomplish this?
Answer
Explanation
To remotely manage computers using a graphical user interface, you can use
Remote Desktop to establish a connection to each computer.
Use Remote Shell and Telnet to execute commands on a remote computer.
You initiate a Remote Assistance session by sending an assistance invitation.
References
Question 5:
Correct
You manage a server at work that has just been configured with a new application.
Consequently, the server has crashed several times during the last week. You think
that you've resolved the problem, but you'd like to be able to manage the server
remotely just in case more issues occur.
Which of the following protocols should you use for remote management? (Select
two.)
Answer
Correct Answer:
VNC
L2TP
Correct Answer:
ICA
PPP
PPTP
Explanation
References
Question 6:
Correct
Which of the following protocols or services would you associate with Windows
Remote Desktop network traffic?
Answer
Correct Answer:
RDP
WPA
NNTP
RD RAP
Explanation
References
•
11.8.1 Remote Management
•
11.8.2 Use Remote Desktop
•
11.8.4 Remote Management Facts
q_remote_manage_rdp_01_np6.[Link]
Question 7:
Correct
You are in the middle of a big project at work. All of your work files are on a server at
the office. You want to be able to access the server desktop, open and edit files,
save the files on the server, and print files to a printer that's connected to a computer
at home.
Which protocol should you use?
Answer
Correct Answer:
RDP
SSH
Telnet
FTP
Explanation
To access the server's desktop, use Remote Desktop Protocol (RDP). RDP is
Microsoft's own remote access protocol, but other available protocols include VNC
and ICA. With this remote desktop solution, you can access a device's desktop and
work with applications and files on that device. Device redirection allows you to
redirect sound, drives, or printing at the remote computer to your local computer.
Telnet and SSH are command line utilities used for remote management.
FTP (File Transfer Protocol) is used for file transfer. While you might use this
protocol to transfer files, it does not give you access to a remote system's desktop.
References
Question 8:
Correct
You just deployed a new Cisco router that connects several network segments in
your organization.
The router is physically located in a server room that requires an ID card for access.
You backed up the router configuration to a remote location with an encrypted file.
You access the router configuration interface from your notebook computer using a
Telnet client with the username admin and the password admin. You used the MD5
hashing algorithm to protect the password.
What else should you do to increase the security of this device? (Select two.)
Answer
Use a web browser to access the router configuration using an HTTP connection.
Explanation
In this scenario, you need to address the following two key security issues:
• You should use an SSH (Secure Shell) client to access the router
configuration. Telnet transfers data over the network connection in
cleartext, exposing sensitive data to sniffing.
• You should change the default administrative username and password.
Default usernames and passwords are readily available from websites on
the internet.
Encrypted Type 7 passwords on a Cisco device are less secure than those protected
with MD5.
Using HTTP and TFTP (Trivial File Transfer Protocol) to manage the router
configuration could expose sensitive information to sniffers, as they transmit data in
cleartext.
References
• 11.8.1 Remote Management
• 11.8.2 Use Remote Desktop
• 11.8.4 Remote Management Facts
q_remote_manage_ssh_01_np6.[Link]
Question 9:
Correct
Which of the following is a protocol used for terminal emulation?
Answer
RDP
ICA
Correct Answer:
SSH
VNC
Explanation
References
Question 10:
Correct
Which of the following remote protocols was originally designed for UNIX?
Answer
VPN
RDP
ICA
Correct Answer:
VNC
Explanation
Virtual Network Computing (VNC) was originally designed for UNIX.
ICA, VPN, and RDP are remote desktop protocols. However, they were not originally
designed for UNIX.
You can use a virtual private network (VPN) for remote access, but it is not a
protocol that was originally designed for UNIX.
References
Explanation
An insider could be a customer, a janitor, or even a security guard. But most of the
time, it's an employee. Employees pose one of the biggest threats to any
organization, as an unintentional threat actor is the most common insider threat.
A hacker is any threat agent who uses their technical knowledge to bypass security,
exploit a vulnerability, or gain access to protected information.
An authorized hacker is a good individual who tries to help a company see the
vulnerabilities that exist in their security infrastructure.
Attacks from nation states are generally extremely well-supported and funded.
References
Question 2:
Correct
Which of the following is an example of an internal threat?
Answer
A server backdoor allows an attacker on the internet to gain access to the intranet
site.
A delivery man is able to walk into a controlled area and steal a laptop.
Correct Answer:
A user accidentally deletes the new product designs.
Explanation
References
Question 3:
Correct
Telnet is inherently unsecure because its communication is in plaintext and is easily
intercepted. Which of the following is an acceptable alternative to Telnet?
Answer
PPP
Correct Answer:
SSH
Remote Desktop
SLIP
Explanation
SSH (Secure Shell) is a secure and acceptable alternative to Telnet. SSH allows
secure interactive control of remote systems. SSH uses RSA public key
cryptography for both connection and authentication. SSH also uses the IDEA
algorithm for encryption by default but is able to use Blowfish and DES as well.
Remote Desktop, while a remote control mechanism, is limited to a few versions of
Windows and is not very secure.
Point-to-Point Protocol (PPP) and Serial Line Interface Protocol (SLIP) are not
remote access authentication protocols. They are used to establish a connection, not
provide authentication.
References
Question 4:
Correct
Which of the following protocols can you use to securely manage a network device
from a remote connection?
Answer
Telnet
SFTP
TLS
Correct Answer:
SSH
Explanation
References
•
12.1.6 Secure Protocol Facts
q_secure_protocols_ssh_02_np6.[Link]
Question 5:
Correct
Which protocol does HTTPS use to offer greater security for web transactions?
Answer
CHAP
PAP
IPsec
Correct Answer:
SSL
Explanation
HTTPS (HyperText Transfer Protocol Secure) uses Secure Sockets Layer (SSL) to
offer greater security for web transactions.
IPsec uses HMAC (Hash-Based Message Authentication Code) to provide message
integrity checks.
Password Authentication Protocol (PAP) transmits login credentials in cleartext.
Challenge Handshake Authentication Protocol (CHAP) protects login credentials
using a hash and allows periodic re-authentication.
References
Question 6:
Correct
You want to allow traveling users to connect to your private network through the
internet. Users will connect from various locations, including airports, hotels, and
public access points (like coffee shops and libraries). As such, you won't be able to
configure the firewalls that might be controlling access to the internet in these
locations.
Which of the following protocols is MOST likely to be allowed through the widest
number of firewalls?
Answer
PPTP
L2TP
Correct Answer:
SSL
IPsec
Explanation
Ports must be open on firewalls to allow VPN protocols. For this reason, using SSL
(Secure Sockets Layer) for a VPN often works through firewalls when other solutions
do not because SSL uses port 443, which is a port that's often already open to allow
HTTPS traffic. In addition, some NAT (Network Address Translation) solutions do not
work well with VPN connections.
PPTP (Point-to-Point Tunneling Protocol) uses port 1723. L2TP (Layer 2 Tunneling
Protocol) uses ports 1701 and 500. IPsec uses UDP port 500 for IKE (Internet Key
Exchange).
References
•
12.1.6 Secure Protocol Facts
q_secure_protocols_ssl_02_np6.[Link]
Question 7:
Correct
Which of the following protocols are often added to other protocols to provide secure
data transmission? (Select two.)
Answer
SMTP
HTTPS
SNMP
Correct Answer:
SSL
Correct Answer:
TLS
Explanation
Both Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols
that are used with other protocols to add security. In addition, you can use Secure
Shell (SSH) to add security when using unsecure protocols.
HTTPS (HyperText Transfer Protocol Secure) is the secure form of HTTP that uses
SSL. SMTP (Simple Mail Transfer Protocol) is used for sending email. SNMP
(Simple Network Management Protocol) is for network management tasks.
References
•
12.1.6 Secure Protocol Facts
q_secure_protocols_ssl_tls_np6.[Link]
Question 8:
Correct
Which of the following intrusion detection and prevention systems uses fake
resources to entice intruders by displaying a vulnerability, configuration flaw, or
valuable data?
Answer
Botnet
Correct Answer:
Honeypot
Trojan horse
Zombie
Explanation
References
Question 9:
Correct
Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of
the following main intrusion detection and prevention goals? (Select two.)
Answer
Entices attackers to reveal their IDS signatures, which can then be matched to
known attack patterns.
Detects anomalous behavior that varies from standard activity patterns, also referred
to as heuristic recognition.
Correct Answer:
Offers attackers a target that occupies their time and attention while distracting them
from valid resources.
Correct Answer:
Reveals information about an attacker's methods and gathers evidence for
identification or prosecution purposes.
Lures attackers into a non-critical network segment where their actions are passively
monitored and logged, after which their connection is simply dropped.
Detects attacks that are unique to the services on valid system resources and
monitors application activity.
Explanation
By using honeypots, honeynets, and tarpits, you can fulfill the following intrusion
detection and protection goals:
• Attackers are offered targets that will occupy their time and attention,
distracting them from valid resources.
• You can observe attackers and gather information about their attack
methods or gather evidence for identification or prosecution purposes.
References
Question 10:
Correct
Members of the sales team use laptops to connect to the company network. While
traveling, they connect their laptops to the internet through airport and hotel
networks.
You are concerned that these computers will pick up viruses that could spread to
your private network. You would like to implement a solution that prevents the
laptops from connecting to your network unless antivirus software and the latest
operating system patches have been installed.
Which solution should you use?
Answer
VLAN
Screened subnet
NAT
NIDS
Correct Answer:
NAC
Explanation
References
Quarantine
Remediation
Port security
Correct Answer:
Posture assessment
Explanation
When a wired or wireless host tries to connect to a network, a NAC agent on the
host checks it to make sure it has all of the latest operating system updates installed
and that the latest antivirus definitions have been applied. This is called a posture
assessment. The agent then submits the results of the assessment as a Statement
of Health (SoH) to the system health validator (SHV).
If the host does not meet the client health requirements configured in the NAC
system, the host is placed on a quarantine network to be remediated.
Port security is configured on a switch to restrict connections to hosts with specific
MAC addresses.
References
Question 2:
Correct
When analyzing assets, which analysis method assigns financial values to assets?
Answer
Transfer
Acceptance
Correct Answer:
Quantitative
Qualitative
Explanation
Quantitative analysis assigns a financial value, or a real number (and the cost
required to recover from a loss) to each asset.
Qualitative analysis seeks to identify costs that cannot be concretely defined.
Transfer and acceptance are responses to risk, not risk analysis methods.
References
Question 3:
Correct
What is the main difference between vulnerability scanning and penetration testing?
Answer
Vulnerability scanning uses approved methods and tools; penetration testing uses
hacking tools.
Explanation
Penetration testing simulates an actual attack on the network and is conducted from
outside the organization's security perimeter. Vulnerability scanning is typically
performed internally by users with administrative access to the system.
The goal of both vulnerability scanning and penetration testing is to identify the
effectiveness of security measures and identify weaknesses that can be fixed. While
some penetration testing is performed with no knowledge of the network, penetration
testing could be performed by testers with detailed information about the systems.
Both vulnerability scanning and penetration testing can use similar tools, although
you should avoid illegal tools in both activities.
References
• 12.2.4 Penetration Testing Facts
q_pen_test_differences_np6.[Link]
Question 4:
Correct
A security administrator is conducting a penetration test on a network. She connects
a notebook system running Linux to the wireless network and then uses Nmap to
probe various network hosts to see which operating system they are running.
Which process did the administrator use for the penetration test in this scenario?
Answer
Network enumeration
Passive fingerprinting
Firewalking
Correct Answer:
Active fingerprinting
Explanation
References
Question 5:
Correct
Drag each penetration test characteristic on the left to the appropriate penetration
test name on the right.
Known test
The tester has detailed information about the target system prior to starting the
test.
correct answer:
Partially known test
The tester has the same amount of information that would be available to a typical
insider in the organization.
correct answer:
Unknown test
Either the attacker has prior knowledge about the target system or the
administrator knows that the test is being performed.
correct answer:
Double-blind test
The tester does not have prior information about the system, and the administrator
has no knowledge that the test is being performed.
correct answer:
Keyboard Instructions
Explanation
Penetration testing is classified by the knowledge that the attacker and system
personnel have prior to the attack.
• In an unknown test, the tester has no prior knowledge of the target
system.
• In a known test, the tester has detailed information prior to starting the
test.
• In a partially known test, the tester has the same amount of information
that would be available to a typical insider in the organization.
• In a single-blind test, one side has advanced knowledge. Either the
attacker has prior knowledge about the target system or the defender has
knowledge about the impending attack.
• In a double-blind test, the penetration tester does not have prior
information about the system, and the network administrator has no
knowledge that the test is being performed. A double-blind test provides
more accurate information about a system's security.
References
Question 6:
Correct
Which SIEM component is responsible for gathering all event logs from configured
devices and securely sending them to the SIEM system?
Answer
Correct Answer:
Collectors
Security automation
Data handling
SIEM alerts
Explanation
Collectors are responsible for gathering all event logs from configured devices and
securely sending them to the Security Information and Event Management (SIEM)
system. Collectors are basically the middleman between devices and the SIEM
system.
The data handling component receives the data from the collectors and then reads,
analyzes, and separates the data into different categories.
SIEM alerts are responsible for triggering alerts if any data exceeds the established
thresholds.
Security automation is a feature of a SOAR system.
References
Question 7:
Correct
Which of the following Security Orchestration, Automation, and Response (SOAR)
system components helps to document the processes and procedures that are to be
used by a human during a manual intervention?
Answer
Orchestration
Runbook
Response
Correct Answer:
Playbook
Explanation
Playbooks are linear checklists of required steps and actions that are to be taken to
respond to an alert. While playbooks do support automated actions, they are often
used to document the processes and procedures that are to be used by a human
during a manual intervention.
Runbooks consist of a series of conditional steps to perform actions, such as
sending notifications or threat containment. They are not used to document the
processes and procedures for a manual intervention.
The Orchestration component of the Security Orchestration, Automation, and
Response (SOAR) system is responsible for gathering data and information from
across the network. This is not used to document the processes and procedures for
a manual intervention.
The Response component of a SOAR system allows the system to automatically
take actions against threats. It is not used to document the processes and
procedures for a manual intervention.
References
Question 8:
Correct
You want to make sure that a set of servers only accepts traffic for specific network
services. You have verified that the servers are only running the necessary services,
but you also want to make sure that the servers do not accept packets sent to those
services.
Which tool should you use?
Answer
Packet sniffer
Correct Answer:
Port scanner
IDS
System logs
IPS
Explanation
Use a port scanner to check for open ports on a system or firewall. Compare the list
of open ports with the list of ports allowed by your Network Design and Security
Policy. Typically, a port is open when a service starts or is configured on a device.
Open ports for unused services expose the server to attacks directed at that port.
Use a packet sniffer to examine packets on a network. With a packet sniffer, you can
identify packets directed toward specific ports, but you won't be able to tell if those
ports are open. Examine system logs to look for events that have happened on your
system. These events might include a service starting up, but this would not likely
reflect open ports.
An intrusion detection system (IDS) is a special network device that can detect
attacks and suspicious activity. A passive IDS monitors, logs, and detects security
breaches, but it takes no action to stop or prevent an attack. An active IDS (also
called an intrusion protection system, or IPS) performs the functions of an IDS but
can also react when security breaches occur.
References
Question 9:
Correct
A security administrator logs on to a Windows server on her organization's network.
Then she runs a vulnerability scan on that server.
Which type of scan did she conduct in this scenario?
Answer
Non-credentialed scan
Non-intrusive scan
Intrusive scan
Correct Answer:
Credentialed scan
Explanation
In a credentialed scan, the security administrator authenticates to the system prior to
starting the scan. A credentialed scan usually provides detailed information about
potential vulnerabilities. For example, a credentialed scan of a Windows workstation
allows you to probe the Registry for security vulnerabilities.
With a non-credentialed scan, the security administrator does not authenticate to the
system prior to running the scan.
A non-intrusive scan is the most common type of scan you will see performed. It
looks for vulnerabilities and gives you a report on what it found.
An intrusive scan finds a potential vulnerability and then actively attempts to exploit
it.
References
Question 10:
Correct
You want to be able to identify the services running on a set of servers on your
network. Which tool would BEST give you the information you need?
Answer
Port scanner
Network mapper
Protocol analyzer
Correct Answer:
Vulnerability scanner
Explanation
Use a vulnerability scanner to gather information about systems, such as the running
applications or services. A vulnerability scanner often combines functions found in
other tools and can perform additional functions, such as identifying open firewall
ports, missing patches, and default or blank passwords.
A port scanner is a tool that probes systems for open ports. A port scanner tells you
which ports are open in the firewall, but it cannot identify services running on a
server if the firewall port has been closed.
A network mapper is a tool that can discover devices on a network and show those
devices in a graphical representation. Network mappers typically use a ping scan to
discover devices and a port scanner to identify open ports on those devices.
Use a protocol analyzer to identify traffic that is sent on the network medium and
traffic sources. Services could still be running on a server that do not generate the
network traffic that a protocol analyzer would catch.
References
Explanation
The main concern, in this case, is with laptops being stolen. The best protection
against physical theft is to secure the laptops in place using a cable lock.
Requiring strong passwords or using encryption might prevent unauthorized users
from accessing data on the laptops, but this does not prevent physical theft.
References
Question 2:
Correct
What is the primary benefit of CCTV?
Answer
Explanation
A primary benefit of CCTV is that it expands the area visible to security guards. This
helps fewer guards oversee and monitor a larger area.
CCTV does not reduce the need for locks and sensors on doors.
CCTV does not provide a corrective control (it is a preventative, deterrent, or
detective control).
CCTV does not increase security protection throughout an environment. It only does
so in the area where it is aimed.
References
Question 3:
Correct
Which of the following CCTV types would you use in areas with little or no light?
Answer
C-mount
PTZ
Correct Answer:
Infrared
Explanation
References
Question 4:
Correct
Match each physical security control on the left with an appropriate example of that
control on the right. Each security control may be used once, more than once, or not
at all.
Hardened carrier
Protected cable distribution
correct answer:
Biometric authentication
Door locks
correct answer:
Barricades
Perimeter barrier
correct answer:
Emergency escape plans
Safety
correct answer:
Alarmed carrier
Safety
correct answer:
Exterior floodlights
Perimeter barrier
correct answer:
Keyboard Instructions
Explanation
References
Question 5:
Correct
You want to use CCTV as a preventative security measure. Which of the following is
a requirement for your plan?
Answer
Sufficient lighting
PTZ camera
Correct Answer:
Security guards
Explanation
When used in a preventative way, you must have a guard or other person available
who monitors one or more cameras. Only a security guard can interpret what the
camera sees to make appropriate security decisions.
Even with sufficient lighting on a low-LUX or infrared camera, cameras are not a
useful preventative measure without a security guard present to interpret images and
make security decisions.
A pan tilt zoom (PTZ) camera lets you dynamically move the camera and zoom in on
specific areas.
References
Explanation
To control access to the switch console, you must keep it in a locked room. A
console connection can only be established with a direct physical connection to the
device. If the switch is in a locked room, only those with access will be able to make
a console connection. In addition, even if you had set console passwords, users with
physical access to the device could perform password recovery and gain access.
References
Question 7:
Correct
Which of the following controls is an example of a physical access control method?
Answer
Passwords
Smart cards
Explanation
Locks on doors is an example of a physical access control method. Physical controls
restrict or control physical access.
Passwords, access control lists, and smart cards are all examples of technical
controls. Even though a smart card is a physical object, the card by itself is part of a
technical implementation. Requiring background checks for hiring is an example of a
policy or an administrative control.
References
Question 8:
Correct
Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry?
Answer
Explanation
References
Replace the USB hard disks used for server backups with a tape drive.
Correct Answer:
Control access to the work area with locking doors and card readers.
Replace the key lock on the server closet with a card reader.
Explanation
In this scenario, you should recommend the client make the following changes:
• Relocate the switch to the locked server closet. Keeping it in a cubicle
could allow an attacker to configure port mirroring on the switch and
capture network traffic.
• Control access to the work area with locking doors and card readers.
Controlling access to the building is critical for preventing unauthorized
people from gaining access to computers. In this scenario, you were able
to walk unescorted into the work area without any kind of physical access
control other than the receptionist.
Because the office manager will control who has access to the server closet key, it
isn't necessary to implement a card reader on the server closet door. Using tape
drives instead of hard disks wouldn't increase the security of the backups. Using
separate perimeter security devices instead of an all-in-one device would be unlikely
to increase network security.
References
Question 10:
Correct
Which of the following is a secure doorway that can be used with a mantrap to allow
an easy exit but actively prevents re-entrance through the exit portal?
Answer
Egress mantraps
Explanation
Turnstiles allow an easy exit from a secured environment but actively prevent re-
entrance through the exit portal. Turnstiles are a common exit portal used with
entrance portal mantraps. A turnstile can't be used to enter into a secured facility, as
it only functions in one direction.
Egress mantraps are not easy exit portals. Plus, they are a tremendously
unnecessary expense and administrative burden. Any form of door, including self-
locking doors with push bars or credential readers, can be hijacked to allow an
outsider to enter.
References
Commitment
Correct Answer:
Authority
Persuasive
Social validation
Explanation
Authority social engineering entails an attacker either lying about having authority or
using their high status in a company to force victims to perform actions that exceed
their authorization level.
Persuasive social engineering entails an attacker convincing a person to give them
information or access that he or she shouldn't.
Social validation entails an attacker using peer pressure to coerce someone else to
bend rules or give information he or she shouldn't.
Commitment social engineering entails convincing someone to buy into an overall
idea and then demanding or including further specifics that were not presented up
front.
References
Question 2:
Correct
What is the primary countermeasure to social engineering?
Answer
Traffic filters
Correct Answer:
Awareness
Explanation
References
Question 3:
Correct
Match each social engineering description on the left with the appropriate attack type
on the right.
Phishing
An attacker gathers personal information about the target individual, who is a CEO.
correct answer:
Spear phishing
Explanation
References
Question 4:
Correct
What is the definition of any attack involving human interaction of some kind?
Answer
Attacker manipulation
An authorized hacker
Correct Answer:
Social engineering
An opportunistic attack
Explanation
Social engineering refers to any attack involving human interaction of some kind.
Attackers who use social engineering try to convince a victim to perform actions or
give out information they wouldn't under normal circumstances.
An opportunistic attack is typically automated and involves scanning a wide range of
systems for known vulnerabilities, such as old software, exposed ports, poorly
secured networks, and default configurations.
An authorized hacker helps companies find vulnerabilities in their security
infrastructure.
Social engineers are master manipulators and use multiple tactics on their victims.
References
Question 5:
Correct
Dumpster diving is a low-tech way of gathering information that may be useful for
gaining unauthorized access or as a starting point for more advanced attacks. How
can a company reduce the risk associated with dumpster diving?
Answer
Explanation
Dumpster diving is best addressed with a Document Destruction Policy. All sensitive
documents should be shredded or burned, and employees should be trained on the
proper use of disposal equipment and the policies governing the disposal of sensitive
information.
A strong password policy, authentication types, and screensaver passwords are not
enough to prevent the risks associated with dumpster diving. Username and
password complexity efforts are wasted if employees document and dispose of this
information in an unsecure fashion.
References
Question 6:
Correct
You have just received a generic-looking email that is addressed as coming from the
administrator of your company. The email says that as part of a system upgrade, you
need enter your username and password in a new website so you can manage your
email and spam using the new service.
What should you do?
Answer
Open a web browser, type in the URL included in the email, and follow the directions
to enter your login credentials.
Correct Answer:
Verify that the email was sent by the administrator and that this new service is
legitimate.
Click on the link in the email and look for company graphics or information before
you enter the login information.
Explanation
You should verify that the email is legitimate and has come from your administrator.
It is possible that the network administrator has signed up for a new service. If you
ignore the message or delete it, you might not get the benefits the company has
signed up for. However, the email might be a phishing attack. An attacker might be
trying to capture personal information. By verifying the email with the administrator,
you will be able to tell if it is legitimate.
References
Question 7:
Correct
Which of the following is a common social engineering attack?
Answer
Explanation
Hoax virus information emails are a form of social engineering attack. This type of
attack preys on email recipients who are fearful and will believe most information if it
is presented in a professional manner. All too often, the victims of these attacks fail
to double-check the information or instructions with a reputable third-party antivirus
software vendor before implementing the recommendations. Usually, these hoax
messages instruct the reader to delete key system files or download Trojan horses.
Social engineering relies on the trusting nature of individuals to incentivize them to
take an action or allow an unauthorized action.
References
• 12.4.2 Social Engineering Facts
q_social_engineering_hoax_np6.[Link]
Question 8:
Correct
On your way into the back entrance of your work building one morning, a man
dressed as a plumber asks you to let him in so he can fix the restroom. What should
you do?
Answer
Let him in and help him find the restroom. Then let him work.
Explanation
You should direct him to the front entrance where he can check in with the proper
authorities in your organization. Letting him in without knowing if he should be there
could compromise security. Turning him away would be unprofessional.
References
Question 9:
Correct
Which of the following are examples of social engineering attacks? (Select two.)
Answer
Port scanning
Correct Answer:
Dumpster diving
Correct Answer:
Shoulder surfing
Impersonation
War dialing
Explanation
Social engineering leverages human nature. Internal employees are often the targets
of trickery, and false trust can quickly lead to a serious breach of information
security. Shoulder surfing and dumpster diving are examples of social engineering.
Shoulder surfing is the act of looking over an authorized user's shoulder in hopes of
obtaining an access code or credentials. Social engineers often employ keystroke
loggers to capture usernames and passwords. These low-tech attack methods are
often the first course of action that a hacker pursues.
Port scanning and war dialing are technical attacks that seek to take advantage of
vulnerabilities in systems or networks.
Impersonation is pretending to be trustworthy and having a legitimate reason for
approaching the target. This is done with the purpose of asking for sensitive
information or access to protected systems.
References
Question 10:
Correct
A senior executive reports that she received a suspicious email concerning a
sensitive internal project that is behind production. The email was sent from
someone she doesn't know, and he is asking for immediate clarification on several of
the project's details so the project can get back on schedule.
Which type of attack BEST describes the scenario?
Answer
Correct Answer:
Whaling
MAC spoofing
Masquerading
Passive
Explanation
Whaling is a form of social engineering attack that targets senior executives and
high-profile victims. Social engineering is an attack that exploits human nature by
convincing someone to reveal information or perform an activity.
Masquerading is convincing personnel to grant access to sensitive information or
protected systems by pretending to be someone who is authorized and/or requires
that access. Passive social engineering attacks take advantage of the unintentional
actions of others to gather information or gain access to a secure facility. MAC
spoofing is changing the source MAC address on frames sent by the attacker. MAC
spoofing can be used to hide the identity of the attacker's computer or to
impersonate another device on the network.
References