Uploaded by Dixan Sanchez Blanco

preguntas y respuestas

advertisement
®
1
CompTIA Network+ N10-007 Practice Tests 2020®
Published by: Examsdigest LLC., Holzmarktstraße 73, Berlin, Germany,
www.examsdigest.com Copyright © 2020 by Examsdigest LLC.
No part of this publication may be reproduced, stored in a retrieval system or
transmitted in any form, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976
United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the
Permissions Department, Examsdigest, LLC., Holzmarktstraße 73, Berlin,
Germany or online at https://www.examsdigest.com/contact.
Trademarks: Examsdigest, examsdigest.com and related trade dress are trademarks
or registered trademarks of Examsdigest LLC. and may not be used without written
permission. Amazon is a registered trademark of Amazon, Inc. All other trademarks
are the property of their respective owners. Examsdigest, LLC. is not associated with
any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE
AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO
THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND
SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL
PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT
THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A
CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION
DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE
INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE.
2
CONTENTS AT A GLANCE
Contents at a glance ........................................................................4
Introduction ........................................................................................5
Chapter 1 Networking Concepts ...................................................10
Questions 1-38 ...................................................................................10
Chapter 2 Infrastructure ..................................................................64
Questions 39-65 ...............................................................................64
Answers 39-65 ..................................................................................74
Chapter 3 Network Operations .....................................................102
Questions 66-86 ...............................................................................102
Answers 66-86 ..................................................................................109
Chapter 4 Network Security...........................................................129
Questions 87-110 ...............................................................................129
Answers 87-110 ..................................................................................137
Chapter 5 Network Troubleshooting and Tools........................158
Questions 111-125 ..............................................................................158
Examsdigest publishes in a variety of print and electronic formats and by print-ondemand. Some material included with standard print versions of this book may not
be included in e-books or in print-on-demand. If this book refers to media such as a
CD or DVD that is not included in the version you purchased, you may find this material at https://examsdigest.com
3
Answers 111-125 .................................................................................164
THE END .............................................................................................179
4
✓ Review a reference book: CompTIA Network+ N10-007 by
INTRODUCTION
The CompTIA Network+ N10-007 examination is intended for
helping individuals to develop a career in IT covering topics
such us infrastructure troubleshooting, configuring, and managing networks.
Examsdigest is designed to give you sample questions to help
you prepare for the style of questions you will receive on the
real certification exam. However, it is not a reference book that
teaches the concepts in detail. That said, I recommend that you
review a reference book before attacking these questions so
that the theory is fresh in your mind.
✓ Get some practical, hands-on experience: After you re-
About This Book
view the theory, I highly recommend getting your hands on us-
CompTIA Network+ N10-007 Practice Tests 2020 by Examsdigest is designed to be a practical practice exam guide that will
help you prepare for the CompTIA Network+ N10-007 exams.
As the book title says, it includes 120+ questions, organized by
exam so that you can prepare for the final exam.
This book has been designed to help you prepare for the style
of questions you will receive on the CompTIA Network+
N10-007 exams. It also helps you understand the topics you
can expect to be tested on for each exam.
In order to properly prepare for the CompTIA Network+
N10-007, I recommend that you:
ing tools such us packet tracer or GNS3. Also use the command line tools from your OS to get a better understanding
about ping, tracert, netstat and more commands. The more
hands-on experience you have, the easier the exams will be.
✓ Do practice test questions: After you review a reference
book and perform some hands-on work, attack the questions
in this book to get you “exam ready”! Also claim your free 1month access on our platform to dive into to more questions,
flashcards and much much more.
Beyond The Book
This book gives you plenty of CompTIA Network+ N10-007
questions to work on, but maybe you want to track your
5
6
progress as you tackle the questions, or maybe you’re having
a couple dozen, and whether you focus on a few types of prob-
trouble with certain types of questions and wish they were all
lems or practice every type, the online program keeps track of
presented in one place where you could methodically make
the questions you get right and wrong so that you can monitor
your way through them. You’re in luck. Your book purchase
your progress and spend time studying exactly what you need.
comes with a free one-month subscription to all practice questions online and more. You get on-the-go access any way you
You can access these online tools by sending an email to the
want it — from your computer, smartphone, or tablet. Track
info@examsdigest.com to claim access on our platform. Once
your progress and view personalized reports that show where
we confirm the purchase you can enjoy your free access.
you need to study the most. Study what, where, when, and
how you want!
CompTIA Network+ N10-007 Exam Details
What you’ll find online
The online practice that comes free with this book offers you
The online practice that comes free with this book offers you
more.
the same questions and answers that are available here and
the same questions and answers that are available here and
more.
✓ Format - Multiple choice, multiple answer and performancebased
The beauty of the online questions is that you can customize
✓ Type - Associate
your online practice to focus on the topic areas that give you
✓ Delivery Method - Testing center or online proctored exam
the most trouble.
✓ Time - 90 minutes to complete the exam
✓ Cost - $329
So if you need help with the domain Network Security, then se-
✓ Language - Available in English, Japanese, German
lect questions related to this topic online and start practicing.
Whether you practice a few hundred problems in one sitting or
7
8
CHAPTER 1
NETWORKING CONCEPTS
Exam Content
Content Outline
CompTIA Network+ N10-007 has been updated and reorga-
Questions 1-38
nized to address the current networking technologies with expanded coverage of several domains by adding:
1. Critical security concepts to helping networking professionals work with security practitioners
2. Key cloud computing best practices and typical service
models
3. Coverage of newer hardware and virtualization techniques
4. Concepts to give individuals the combination of skills to
keep the network resilient
The following topics are general guidelines for the content likely
to be included on the exam. However, other related topics may
also appear on any specific delivery of the exam. To better re-
Question 1. You are responsible to install a new wired network
that allows for network expansion with the least amount of disruption for the current network users. Which of the following
network topologies would you choose?
(A)
Star Topology
(B)
Bus Topology
(C)
Ring Topology
(D)
Wireless Mesh Topology
Question 2. Given the Decimal mask: 255.255.192.0. Which of
the following is the equivalent to Binary mask?
(A)
11111111.11111111.11111111.11100000
guidelines below may change at any time without notice.
(B)
11111111.11111111.11000000.00000000
(C)
11111111.11111111.11111000.00000000
1.0: Networking Concepts (23%)
(D)
11111111.11111111.00000000.00000000
flect the contents of the exam and for clarity purposes, the
2.0: Infrastructure (18%)
3.0: Network Operations (17%)
Question 3. Given the Decimal mask: 255.255.128.0. Which of
4.0: Network Security (20%)
the following is the equivalent to Binary mask?
5.0: Network Troubleshooting and Tools (22%)
(A)
11111111.11111111.11111111.11100000
9
10
(B)
11111111.11111111.11000000.00000000
Question 7. At which two OSI layers can a switch operate?
(C)
11111111.11111111.11111000.00000000
(Choose two)
(D)
11111111.11111111.10000000.00000000
(A)
Layer 1
(B)
Layer 2
Question 4. Given the Binary mask:
(C)
Layer 3
11111111.11111111.11111111.11110000. Which of the following is
(D)
Layer 4
the equivalent to Decimal mask?
(E)
Layer 5
(A)
255.255.255.128
(F)
Layer 6
(B)
255.255.240.0
(G)
Layer 7
(C)
255.255.255.240
(D)
255.255.255.254
Question 8. Which of the following addresses are not valid
Class A network IDs? (Choose all that apply)
Question 5. Which of the following subnet masks is the default
(A)
1.0.0.0
mask of the IP: 204.203.202.201?
(B)
5.0.0.0
(A)
255.255.255.0
(C)
140.0.0.0
(B)
255.255.255.255
(D)
127.0.0.0
(C)
255.0.0.0
(E)
195.0.0.0
(D)
255.255.0.0
(F)
9.0.0.0
Question 6. Which of the following subnet masks is the default
Question 9. Physical network topology is a higher-level idea of
mask of the IP: 55.44.22.11?
how the network is set up, including which nodes connect to
(A)
255.255.255.0
each other and in which ways, as well as how data is transmit-
(B)
255.255.255.255
ted through the network.
(C)
255.0.0.0
(A)
TRUE
(D)
255.255.0.0
(B)
FALSE
11
12
Question 13. Given the following DNS Records, which one is
Question 10. Which of the following 802.11 wireless standards
used to point a domain or subdomain to another hostname?
operate on the 5GHz frequency band? (Choose all that apply)
(A)
CNAME
AAAA
(A)
802.11
(B)
(B)
802.11a
(C)
NS
(C)
802.11b
(D)
A
(D)
802.11g
(E)
802.11n
Question 14. Which of the following wireless topology is nor-
(F)
802.11ac
mally used to extend a wired LAN to connect wireless-capable
devices?
Question 11. TCP doesn’t establish a session between the
(A)
Infrastructure wireless topology
sending and receiving hosts, which is why TCP is called a con-
(B)
Ad Hoc Wireless Topology
nectionless protocol, while UDP establishes a mutually ac-
(C)
Wireless Mesh Topology
knowledged session between two hosts before communication
(D)
Extend LAN Topology
takes place.
(A)
TRUE
Question 15. Which of the following is a computer network in
(B)
FALSE
a defined area that links buildings and consists of multiple
LANs within that limited geographical area?
Question 12. Given the following DNS Records, which one is
(A)
Local-area Network (LAN)
used to map hostnames to an IPv4 address of the host?
(B)
Wide-area Network (WAN)
(A)
CNAME
(C)
Metropolitan-area Network (MAN)
(B)
AAAA
(D)
Campus-Area Network (CAN)
(C)
NS
(D)
A
Question 16. The protocol that uses the port 68 is called
_________________.
13
14
(A)
DNS
(C)
DHCP
Question 20. Which of the following functions is the function
(C)
Telnet
of ARP?
(D)
POP3
(A)
Resolves hostnames to IP addresses
(B)
Resolves IP addresses to MAC addresses
Question 17. Which of the following protocols uses the port 22
(C)
Resolves MAC addresses to IP addresses
for its service?
(D)
Resolves IP addresses to hostnames
(A)
DNS
(B)
HTTP
Question 21. Which of the following statements are true about
(C)
SSH
Bluetooth, NFC, and Z-Wave? (Choose all that apply)
(D)
SMTP
(A)
Bluetooth is based on the IEEE 802.15.1 standard
(B)
Bluetooth uses the 3.4 to 3.485 GHz band
Question 18. Which of the following protocols uses the port
(C)
Near-field communication transmits data through elec-
53 for its service?
tromagnetic radio fields to enable two devices to communicate
(A)
DNS
with each other
(B)
HTTP
(D)
(C)
SSH
less connectivity technology that lets NFC-enabled devices
(D)
SMTP
communicate with each other
Near-field communication (NFC) is a long-range wire-
(E)
Z-Wave is a wired communication protocol
Question 19. A broadcast address is an IP address that you
(F)
Z-Wave essentially focus on connectivity within the
can use to target all systems on a subnet or network instead of
smart home
single hosts.
(A)
TRUE
Question 22. You have been tasked to create a wired topology
(B)
FALSE
so as each device in the network have to be connected to a
central device. Which of the following topologies will you im15
16
plement?
(A)
Bus topology
Question 25. You are installing a wireless network solution
(B)
Star topology
that uses a feature known as MU-MIMO. Which wireless net-
(C)
Mesh topology
working standard are you using?
(D)
Ring topology
(A)
802.11n
(B)
802.11b
Question 23. You have been tasked to create a wired topology
(C)
802.11a
so as each device have to be connected with the two devices
(D)
802.11ac
on either side of it. Which of the following topologies will you
implement?
Question 26. Which of the following IEEE 802.11 Wi-Fi stan-
(A)
Bus topology
dards use the 2.4 GHz band? (Choose all that apply)
(B)
Star topology
(A)
802.11
(C)
Mesh topology
(B)
802.11b
(D)
Ring topology
(C)
802.11g
(D)
802.11a
Question 24. Which of the following statements are consid-
(E)
802.11n
ered advantages using Virtual Local Area Networks (VLANs)?
(F)
802.11ac
(Choose all that apply)
(G)
802.11ax
(A)
With the creation of logical (virtual) boundaries, network
segments can be isolated
(B)
Question 27. Which of the following cloud services requires
VLANs reduce broadcast traffic throughout the network,
so free up bandwidth
the least amount of user management, as a service provider is
responsible for managing everything, and the end-user just
(C)
A VLAN can not pass the traffic to another VLAN
uses the software.
(D)
VLANs can be used to build broadcast domains that
(A)
Infrastructure as a service (IaaS)
(B)
Platform as a service (PaaS)
remove the need for costly routers
17
(C)
Software as a service (SaaS)
(D)
Infrastructure as a service (IaaS) and Platform as a ser-
vice (PaaS)
18
Question 31. Port __________ copies packets entering or exiting
a port or entering a VLAN and sends the copies to a local interface for local monitoring or to a VLAN for remote monitoring.
Question 28. Network Address Translation (NAT) is designed
(A)
Copying
for IP address conservation. It enables private IP networks that
(B)
Learning
use unregistered IP addresses to connect to the Internet.
(C)
Trunking
(D)
Mirroring
(A)
TRUE
(B)
FALSE
Question 32. Choose the shortest valid abbreviation for the
Question 29. Which of the following performance concepts
IPv6 address 5000:0400:0030:0006:
delays the flow of certain types of network packets in order to
8000:0800:0010:0002.
ensure network performance for higher priority applications?
(A)
5000:400:30:6:8000:800:10:2
5000:400:30:6:8000:8:10:2
(A)
Traffic shaping
(B)
(B)
QoS
(C)
5000:400::2
(C)
CoS
(D)
5:4:3:6:8:8:1:2
(D)
Diffserv
Question 33. A common use case scenario using
Question 30. Which of the following performance concepts is
______________ cloud deployment method is that web ap-
the process of managing network resources to reduce packet
plications or blog sites are deployed on hardware and resources
loss?
that are owned by a cloud provider.
(A)
Traffic shaping
(A)
Public
(B)
QoS
(B)
Private
(C)
CoS
(C)
Hybrid
(D)
Diffserv
(D)
Semipublic
19
20
(A)
RIP
Question 34. Which of the following statements are true about
(B)
OSPF
Software-Defined Networking (SDN)? (Choose all that apply)
(C)
EIGRP
SDN enables network behavior to be controlled by the
(D)
BGP
(A)
software that resides beyond the networking devices
(B)
SDN simplifies provisioning and management of net-
Question 37. Which of the following is a proprietary protocol
worked resources, everywhere from the data center to the
from Cisco used to reduce administration in the switched net-
campus or wide area network
work?
(A)
VTP
work devices from the underlying data plane that forwards
(B)
SMTP
network traffic
(C)
FTP
(D)
HTTP
(C)
(D)
SDN separates the control plane management of net-
SDN reduces the complexity of statically defined net-
works
Question 38. Which of the following protocols is used to reQuestion 35. Assuming you are working on a Windows envi-
move redundant links between switches and build loop-free
ronment. Which command will you type to discover your NIC’s
Ethernet networks?
MAC address?
(A)
Spanning Tree Protocol (STP)
(A)
ipconfig/all
(B)
Loop-Free Protocol (LFP)
(B)
netstat/all
(C)
Redundant Link Protocol (RLP)
(C)
ping/all
(D)
Redundant-Free Protocol (RFP)
(D)
route/all
Question 36. The routing protocol that does not rely on periodic advertisement of all the network prefixes in an autonomous system is called _______________.
21
Answers 1-38
Question 1. You are responsible to install a new wired network
that allows for network expansion with the least amount of disruption for the current network users. Which of the following
network topologies would you choose?
(A)
Star Topology
(B)
Bus Topology
(C)
Ring Topology
(D)
Wireless Mesh Topology
Explanation 1. Star Topology is the correct answer.
On a star topology, each of the nodes is independently connected to the central hub, should one go down, the rest of the
22
Wireless Mesh Topology is incorrect because it isn’t a wired
network topology.
Question 2. Given the Decimal mask: 255.255.192.0. Which of
the following is the equivalent to Binary mask?
(A)
11111111.11111111.11111111.11100000
(B)
11111111.11111111.11000000.00000000
(C)
11111111.11111111.11111000.00000000
(D)
11111111.11111111.00000000.00000000
Explanation 2. 11111111.11111111.11000000.00000000 is
the correct answer.
There are only nine possible values in one octet of a subnet
mask as shown in the table below.
network will continue functioning unaffected. With such a configuration, a new device can be added to the network by at-
Binary Mask
Octet
Decimal
Equivalent
Number of
Binary 1s
0
0
0
10000000
128
1
don’t allow network expansion without disrupting the existing
11000000
192
2
users.
11100000
224
3
taching the new device to the hub or switch with its own cable.
This process does not disrupt the users who are currently on
the network.
Bus Topology and Ring Topology are incorrect because they
23
24
11110000
240
4
11111000
248
5
Binary Mask
Octet
Decimal
Equivalent
Number of
Binary 1s
11111100
252
6
0
0
0
11111110
254
7
10000000
128
1
11111111
255
8
11000000
192
2
11100000
224
3
11110000
240
4
the following is the equivalent to Binary mask?
11111000
248
5
(A)
11111111.11111111.11111111.11100000
(B)
11111111.11111111.11000000.00000000
11111100
252
6
(C)
11111111.11111111.11111000.00000000
11111110
254
7
(D)
11111111.11111111.10000000.00000000
11111111
255
8
Question 3. Given the Decimal mask: 255.255.128.0. Which of
Explanation 3. 11111111.11111111.10000000.00000000 is
the correct answer.
There are only nine possible values in one octet of a subnet
mask as shown in the table below.
Question 4. Given the Binary mask:
11111111.11111111.11111111.11110000. Which of the following is
the equivalent to Decimal mask?
(A)
255.255.255.128
(B)
255.255.240.0
(C)
255.255.255.240
(D)
255.255.255.254
(B)
255.255.255.255
Explanation 4. 255.255.255.240 is the correct answer.
(C)
255.0.0.0
There are only nine possible values in one octet of a subnet
(D)
255.255.0.0
25
26
mask as shown in the table below.
Explanation 5. 255.255.255.0 is the correct answer.
Binary Mask
Octet
Decimal
Equivalent
Number of
Binary 1s
0
0
0
10000000
128
1
11000000
192
2
11100000
224
3
11110000
240
4
11111000
248
5
11111100
252
6
11111110
254
7
11111111
255
8
Class A networks have the first octet in the range of 1–126.
The default subnet mask for the Class A networks is
255.0.0.0
Class B networks have the first octet in the range of 128–191
The default subnet mask for the Class B networks is
255.255.0.0
Class C networks have the first octet in the range of 192–223
The default subnet mask for the Class C networks is
255.255.255.0
In this case, the IP address 204.203.202.201 is a Class C
network so the default subnet mask is 255.255.255.0.
Question 6. Which of the following subnet masks is the default
mask of the IP: 55.44.22.11?
Question 5. Which of the following subnet masks is the default
mask of the IP: 204.203.202.201?
(A)
255.255.255.0
27
(A)
255.255.255.0
(B)
255.255.255.255
(C)
255.0.0.0
28
(D)
255.255.0.0
(F)
Layer 6
(G)
Layer 7
Explanation 6. 255.0.0.0 is the correct answer.
Class A networks have the first octet in the range of 1–126.
Explanation 7. Layer 2 and Layer 3 are the correct answers.
The default subnet mask for the Class A networks is
A switch uses the MAC addresses of connected devices to
255.0.0.0
make its forwarding decisions. Therefore, it is called a data link,
or Layer 2, network device. It can also operate at Layer 3 or be
Class B networks have the first octet in the range of 128–191
a multilayer switch.
The default subnet mask for the Class B networks is
Devices or components that operate at Layer 1 typically are
255.255.0.0
media-based, such as cables or connectors so switches don’t
Class C networks have the first octet in the range of 192–223
operate at this layer.
The default subnet mask for the Class C networks is
The components from Layer 4 to Layer 7 are software-based,
255.255.255.0
not hardware-based.
In this case, the IP address 55.44.22.11 is a Class A network
so the default subnet mask is 255.0.0.0.
Question 8. Which of the following addresses are not valid
Class A network IDs? (Choose all that apply)
Question 7. At which two OSI layers can a switch operate?
(A)
1.0.0.0
(Choose two)
(B)
5.0.0.0
(A)
Layer 1
(C)
140.0.0.0
(B)
Layer 2
(D)
127.0.0.0
(C)
Layer 3
(E)
195.0.0.0
(D)
Layer 4
(F)
9.0.0.0
(E)
Layer 5
29
30
Explanation 8. C, D and E are the correct answers.
Class A networks have the first octet in the range of 1–126, in-
Logical – The logical network topology is a higher-level idea of
clusive, and their network IDs have a 0 in the last three octets.
how the network is set up, including which nodes connect to
each other and in which ways, as well as how data is transmit-
Invalid Class A network IDs are:
ted through the network. Logical network topology includes
140.0.0.0
any virtual and cloud resources.
127.0.0.0
195.0.0.0
Question 10. Which of the following 802.11 wireless standards
operate on the 5GHz frequency band? (Choose all that apply)
The network 140.0.0.0 is a Class B network ID.
(A)
802.11
The network 127.0.0.0 is a Loopback address.
(B)
802.11a
The network 195.0.0.0 is a Class C network ID.
(C)
802.11b
(D)
802.11g
Question 9. Physical network topology is a higher-level idea of
(E)
802.11n
how the network is set up, including which nodes connect to
(F)
802.11ac
each other and in which ways, as well as how data is transmitted through the network.
Explanation 10. B, E and F are the correct answers.
(A)
TRUE
The table below highlights the characteristics of the various
(B)
FALSE
802.11 wireless standards.
Explanation 9. FALSE is the correct answer.
Physical – The physical network topology refers to the actual
connections (wires, cables, etc.) of how the network is
IEEE Standards
Frequency/Medium
Speed
802.11
2.4 GHz
1 to 2Mbps
arranged. Setup, maintenance, and provisioning tasks require
insight into the physical network.
31
32
802.11a
5 GHz
Up to
54Mbps
802.11b
2.4 GHz
Up to 11Mbps
802.11g
2.4 GHz
Up to
54Mbps
802.11n
2.4 GHz / 5 GHz
Up to
600Mbps
802.11ac
5 GHz
Up to
1.3Gbps
establish a connection before sending data.
TCP is slower than UDP because it has a lot more to do. TCP
has to establish a connection, error-check, and guarantee that
files are received in the order they were sent.
TCP is best suited to be used for applications that require
high reliability where timing is less of a concern.
1. World Wide Web (HTTP, HTTPS)
2. Secure Shell (SSH)
3. File Transfer Protocol (FTP)
Question 11. TCP doesn’t establish a session between the
sending and receiving hosts, which is why TCP is called a connectionless protocol, while UDP establishes a mutually acknowledged session between two hosts before communication
takes place.
(A)
TRUE
(B)
FALSE
4. Email (SMTP, IMAP/POP)
UDP is best suited for applications that require speed and
efficiency.
1. VPN tunneling
2. Streaming videos
3. Online games
Explanation 11. FALSE is the correct answer.
TCP is a connection-oriented protocol and UDP is a connection-less protocol. TCP establishes a connection between
a sender and receiver before data can be sent. UDP does not
4. Live broadcasts
5. Domain Name System (DNS)
6. Voice over Internet Protocol (VoIP)
7. Trivial File Transfer Protocol (TFTP)
33
34
Question 12. Given the following DNS Records, which one is
text files written in what is known as DNS syntax. DNS syntax is
used to map hostnames to an IPv4 address of the host?
just a string of characters used as commands which tell the
(A)
CNAME
DNS server what to do.
(B)
AAAA
(C)
NS
The most common types of DNS are:
(D)
A
A is used to map hostnames to an IPv4 address of the host.
AAAA is used to map hostnames to an IPv6 address of the
Explanation 12. A is the correct answer.
host.
The Domain Name System (DNS) is the phonebook of the In-
CNAME is used to point a domain or subdomain to another
ternet. Humans access information online through domain
hostname.
names, like examsdigest.com or youtube.com. Web browsers
SRV is used to identify computers that host specific services.
interact through Internet Protocol (IP) addresses. DNS trans-
MX is used to help route emails.
lates domain names to IP addresses so browsers can load In-
TXT is used to provide the ability to associate text with a zone.
ternet resources.
NS indicates which DNS server is authoritative for that domain.
PTR is used for the Reverse DNS (Domain Name System)
Each device connected to the Internet has a unique IP address
lookup.
that other machines use to find the device. DNS servers eliminate the need for humans to memorize IP addresses such as
Question 13. Given the following DNS Records, which one is
192.168.1.1 (in IPv4), or more complex newer alphanumeric IP
used to point a domain or subdomain to another hostname?
addresses such as 2100:bb22:3272:1::2133:b1a4 (in IPv6).
(A)
CNAME
(B)
AAAA
DNS records are instructions that live in authoritative DNS
(C)
NS
servers and provide information about a domain including what
(D)
A
IP address is associated with that domain and how to handle
requests for that domain. These records consist of a series of
35
36
Explanation 13. CNAME is the correct answer.
wired LAN to connect wireless-capable devices. A wireless
The most common types of DNS are:
network infrastructure device called wireless Access Point
A is used to map hostnames to an IPv4 address of the host.
(AP) is used to extend wired LAN to wireless LAN.
AAAA is used to map hostnames to an IPv6 address of the
host.
The AP forms a bridge between a wireless and wired LAN, and
CNAME is used to point a domain or subdomain to another
all transmissions between wireless stations, or between a sys-
hostname.
tem and a wired network client, go through the AP. APs are not
SRV is used to identify computers that host specific services.
mobile and have to stay connected to the wired network.
MX is used to help route emails.
TXT is used to provide the ability to associate text with a zone.
Question 15. Which of the following is a computer network in
NS indicates which DNS server is authoritative for that domain.
a defined area that links buildings and consists of multiple
PTR is used for the Reverse DNS (Domain Name System)
LANs within that limited geographical area?
lookup.
(A)
Local-area Network (LAN)
(B)
Wide-area Network (WAN)
Question 14. Which of the following wireless topology is nor-
(C)
Metropolitan-area Network (MAN)
mally used to extend a wired LAN to connect wireless-capable
(D)
Campus-Area Network (CAN)
devices?
(A)
Infrastructure wireless topology
Explanation 15. Campus-Area Network (CAN) is the correct
(B)
Ad Hoc Wireless Topology
answer.
(C)
Wireless Mesh Topology
Campus-Area Network (CAN) is a computer network made
(D)
Extend LAN Topology
up of an interconnection of local area networks (LANs) within a
limited geographical area. The networking equipment (switch-
Explanation 14. Infrastructure wireless topology is the cor-
es, routers) and transmission media (optical fiber, copper plant,
rect answer.
Cat5 cabling, etc.) are almost entirely owned by the campus
Infrastructure wireless topology is normally used to extend a
tenant/owner: an enterprise, university, government, etc.
37
38
A campus area network is larger than a local area network but
With DHCP, this entire process is automated and managed
smaller than a Metropolitan-area network (MAN) or a Wide-
centrally. The DHCP server maintains a pool of IP addresses
area network (WAN).
and leases an address to any DHCP-enabled client when it
starts up on the network.
Question 16. The protocol that uses the port 68 is called
_________________.
DHCP operations fall into four phases: server discovery, IP
(A)
DNS
lease offer, IP lease request, and IP lease acknowledgment.
(B)
DHCP
These stages are often abbreviated as DORA for discovery, of-
(C)
Telnet
fer, request, and acknowledgment.
(D)
POP3
Question 17. Which of the following protocols uses the port 22
Explanation 16. DHCP is the correct answer.
for its service?
The protocol that uses port 68 is called DHCP. Dynamic
(A)
DNS
Host Configuration Protocol (DHCP) is a client/server protocol
(B)
HTTP
that automatically provides an Internet Protocol (IP) host with its
(C)
SSH
IP address and other related configuration information such as
(D)
SMTP
the subnet mask and default gateway.
Explanation 17. SSH is the correct answer.
Every device on a TCP/IP-based network must have a unique
The standard TCP port for SSH is 22. SSH or Secure Shell is a
unicast IP address to access the network and its resources.
remote administration protocol that allows users to control and
Without DHCP, IP addresses for new computers or computers
modify their remote servers over the Internet.
that are moved from one subnet to another must be configured
manually; IP addresses for computers that are removed from
Question 18. Which of the following protocols uses the port
the network must be manually reclaimed.
53 for its service?
(A)
39
DNS
40
(B)
HTTP
vices like printers and scanners without knowing their IP ad-
(C)
SSH
dresses.
(D)
SMTP
Question 20. Which of the following functions is the function
Explanation 18. DNS is the correct answer.
of ARP?
DNS uses port 53. The Domain Name System (DNS) is the
(A)
Resolves hostnames to IP addresses
phonebook of the Internet. Humans access information online
(B)
Resolves IP addresses to MAC addresses
through domain names, like examsdigest.com or youtube.com.
(C)
Resolves MAC addresses to IP addresses
Web browsers interact through Internet Protocol (IP) addresses.
(D)
Resolves IP addresses to hostnames
DNS translates domain names to IP addresses so browsers can
load Internet resources.
Explanation 20. Resolves IP addresses to MAC addresses
is the correct answer.
Question 19. A broadcast address is an IP address that you
The Address Resolution Protocol (ARP) is responsible for re-
can use to target all systems on a subnet or network instead of
solving the link-layer address, such as a MAC address, associ-
single hosts.
ated with a given internet layer address, typically an IPv4 ad-
(A)
TRUE
dress.
(B)
FALSE
RARP is responsible for resolving MAC addresses to IP ad-
Explanation 19. TRUE is the correct answer.
dresses.
A Broadcast Address is an IP address that you can use to target all systems on a subnet or network instead of single hosts.
DNS is responsible for resolving hostnames to IP addresses.
In other words, a broadcast message goes to everyone on the
network.
Reverse DNS is responsible for resolving IP addresses to hostnames.
Using broadcast, computers can also locate any network de41
42
Question 21. Which of the following statements are true about
municate with each other.
Bluetooth, NFC, and Z-Wave? (Choose all that apply)
6. Z-Wave is a wireless communication protocol.
(A)
Bluetooth is based on the IEEE 802.15.1 standard
(B)
Bluetooth uses the 3.4 to 3.485 GHz band
False statements:
(C)
Near-field communication transmits data through
1. Bluetooth uses the 3.4 to 3.485 GHz band.
electromagnetic radio fields to enable two devices to
2. Near-field communication (NFC) is a long-range wireless
communicate with each other
connectivity technology that lets NFC-enabled devices com-
(D)
municate with each other.
Near-field communication (NFC) is a long-range wire-
less connectivity technology that lets NFC-enabled devices
3. Z-Wave is a wired communication protocol.
communicate with each other
(E)
Z-Wave is a wired communication protocol
Question 22. You have been tasked to create a wired topology
(F)
Z-Wave essentially focus on connectivity within the
so as each device in the network have to be connected to a
central device. Which of the following topologies will you im-
smart home
plement?
Explanation 21. A, C and F are the correct answers.
(A)
Bus topology
True statements:
(B)
Star topology
1. Bluetooth is based on the IEEE 802.15.1 standard
(C)
Mesh topology
2. Near-field communication transmits data through electro-
(D)
Ring topology
magnetic radio fields to enable two devices to communicate
with each other.
Explanation 22. Star topology is the correct answer.
3. Z-Wave essentially focus on connectivity within the smart
In the star topology each device in the network is connected to
home.
a central device called a hub.
4. Bluetooth uses the 2.4 to 2.485 GHz band.
5. Near-field communication (NFC) is a short-range wireless
connectivity technology that lets NFC-enabled devices com43
44
on either side of it. Which of the following topologies will you
implement?
(A)
Bus topology
(B)
Star topology
(C)
Mesh topology
(D)
Ring topology
Explanation 23. Ring topology is the correct answer.
In the ring topology each device is connected with the two devices on either side of it.
Advantages:
1. Each of the nodes is independently connected to the central
hub, should one go down, the rest of the network will continue
functioning unaffected.
2. Star networks are easily expanded without disruption to the
network.
Disadvantages:
1. Requires more cable than most of the other topologies.
2. The overall bandwidth and performance of the network are
also limited by the central node’s configurations and technical
specifications.
Question 23. You have been tasked to create a wired topology
so as each device have to be connected with the two devices
Advantages:
1. Cable faults are easily located, making troubleshooting easi-
45
46
er.
crease network security. A VLAN is a group of connected com-
2. Only one station on the network is permitted to send data at
puters that act as if they are on their own network segment,
a time, which greatly reduces the risk of packet collisions
even though they might not be.
Disadvantages:
Advantages of using VLANs:
1. All the devices on the network share bandwidth, so the addi-
1. With the creation of logical (virtual) boundaries, network
tion of more devices can contribute to overall communication
segments can be isolated, so VLANs increase security on net-
delays.
works
2. A single break in the cable can disrupt the entire network.
2. VLANs reduce broadcast traffic throughout the network, so
free up bandwidth.
Question 24. Which of the following statements are consid-
3. VLAN’s can be used to build broadcast domains that remove
ered advantages using Virtual Local Area Networks (VLANs)?
the need for costly routers.
(Choose all that apply)
(A)
With the creation of logical (virtual) boundaries,
Question 25. You are installing a wireless network solution
network segments can be isolated
that uses a feature known as MU-MIMO. Which wireless net-
(B)
working standard are you using?
VLANs reduce broadcast traffic throughout the net-
work, so free up bandwidth
(A)
802.11n
(C)
A VLAN can not pass the traffic to another VLAN
(B)
802.11b
(D)
VLANs can be used to build broadcast domains that
(C)
802.11a
remove the need for costly routers
(D)
802.11ac
Explanation 24. A, B and D are the correct answers.
Explanation 25. 802.11ac is the correct answer.
VLANs are used for network segmentation, a strategy that sig-
Multi-user, multiple-input, multiple-output technology—
nificantly increases the network’s performance capability re-
better known as MU-MIMO allows a Wi-Fi router to communi-
moves potential performance bottlenecks, and can even in-
cate with multiple devices simultaneously. This decreases the
47
48
time each device has to wait for a signal and dramatically
(D)
802.11a
speeds up your network. Considering that the average house-
(E)
802.11n
hold has upwards of eight devices battling for bandwidth si-
(F)
802.11ac
multaneously, MU-MIMO will increasingly improve your WiFi
(G)
802.11ax
experience.
Explanation 26. A, B, C, E and G are the correct answers.
For home WiFi users, annoyances such as choppy video and
The following table provides all the needed information to an-
continual buffering can really put a damper on the fun, but any-
swer any question either on the interview as a junior network
one who uses a WiFi network will benefit from the performance
engineer or for the CompTIA Network+ and CCNA exams. Make
improvements of MU-MIMO. Here are some of the ways MU-
sure to memorize it.
MIMO kicks common WiFi problems to the curb:
1. Both MU-MIMO and non-MU-MIMO (SU-MIMO) devices operate faster because all devices on the network have less time
to wait to get data from the WiFi router.
2. MU-MIMO technology increases the capacity and efficiency
of your router, allowing it to handle more WiFi-intensive activities such as streaming and gaming.
Question 26. Which of the following IEEE 802.11 Wi-Fi standards use the 2.4 GHz band? (Choose all that apply)
(A)
802.11
(B)
802.11b
(C)
802.11g
IEEE
Standard
2.4
GHz
5 GHz
Max Data Rate
802.11
Yes
No
2 Mbps
802.11b
Yes
No
11 Mbps
802.11g
Yes
No
54 Mbps
802.11a
No
Yes
54 Mbps
802.11n
Yes
Yes
600 Mbps
802.11ac
No
Yes
6.93 Gbps
802.11ax
Yes
Yes
4x higher than
802.11ac
49
Question 27. Which of the following cloud services requires
50
(A)
TRUE
(B)
FALSE
the least amount of user management, as a service provider is
responsible for managing everything, and the end-user just
Explanation 28. TRUE is the correct answer.
uses the software.
Network Address Translation (NAT) is designed for IP ad-
(A)
Infrastructure as a service (IaaS)
dress conservation. It enables private IP networks that use un-
(B)
Platform as a service (PaaS)
registered IP addresses to connect to the Internet.
(C)
Software as a service (SaaS)
(D)
Infrastructure as a service (IaaS) and Platform as a ser-
vice (PaaS)
To access the Internet, one public IP address is needed, but we
can use a private IP address in our private network. The idea of
NAT is to allow multiple devices to access the Internet through
Explanation 27. Software as a service (SaaS) is the correct
a single public address.
answer.
SaaS is software that is centrally hosted and managed for the
To achieve this, the translation of private IP address to a public
end customer. It is usually based on an architecture where one
IP address is required. Network Address Translation (NAT) is
version of the application is used for all customers, and li-
a process in which one or more local IP address is translated
censed through a monthly or annual subscription.
into one or more Global IP address and vice versa.
SaaS requires the least amount of management. The cloud
Question 29. Which of the following performance concepts
provider is responsible for managing everything, and the end-
delays the flow of certain types of network packets in order to
user just uses the software.
ensure network performance for higher priority applications?
(A)
Traffic shaping
Question 28. Network Address Translation (NAT) is designed
(B)
QoS
for IP address conservation. It enables private IP networks that
(C)
CoS
use unregistered IP addresses to connect to the Internet.
(D)
Diffserv
51
52
aging network resources to reduce packet loss as well as lower
Explanation 29. Traffic shaping is the correct answer.
network jitter and latency. QoS technology can manage re-
Traffic shaping (also known as packet shaping) is a bandwidth
sources by assigning the various types of network data differ-
management technique that delays the flow of certain types of
ent priority levels.
network packets in order to ensure network performance for
higher priority applications.
QoS is usually applied on networks that cater to traffic that carry resource-intensive data like:
Traffic shaping essentially limits the amount of bandwidth that
1. Video-on-demand
can be consumed by certain types of applications. It is primarily
2. Voice over IP (VoIP)
used to ensure a high quality of service for business-related
3. Internet Protocol television (IPTV),
network traffic.
4. Streamed media
5. Video conferencing
The most common type of traffic shaping is application-based
6. Online gaming
traffic shaping
Question 31. Port __________ copies packets entering or exiting
Question 30. Which of the following performance concepts is
a port or entering a VLAN and sends the copies to a local inter-
the process of managing network resources to reduce packet
face for local monitoring or to a VLAN for remote monitoring.
loss?
(A)
Copying
Learning
(A)
Traffic shaping
(B)
(B)
QoS
(C)
Trunking
(C)
CoS
(D)
Mirroring
(D)
Diffserv
Explanation 31. Mirroring is the correct answer.
Explanation 30. QoS is the correct answer.
Port mirroring copies packets entering or exiting a port or en-
Quality of Service (QoS) in networking is the process of man-
tering a VLAN and sends the copies to a local interface for local
53
54
monitoring or to a VLAN for remote monitoring.
Question 33. A common use case scenario using
Use port mirroring to send traffic to applications that analyze
______________ cloud deployment method is that web ap-
traffic for purposes such as monitoring compliance, enforcing
plications or blog sites are deployed on hardware and resources
policies, detecting intrusions, monitoring and predicting traffic
that are owned by a cloud provider.
patterns, correlating events, and so on.
(A)
Public
(B)
Private
Port mirroring is needed for traffic analysis on a switch because
(C)
Hybrid
a switch normally sends packets only to the port to which the
(D)
Semipublic
destination device is connected.
Explanation 33. Public is the correct answer.
Question 32. Choose the shortest valid abbreviation for the
A common use case scenario using public cloud deployment
IPv6 address 5000:0400:0030:0006:
method is that web applications or blog sites are deployed on
8000:0800:0010:0002.
hardware and resources that are owned by a cloud provider.
(A)
5000:400:30:6:8000:800:10:2
(B)
5000:400:30:6:8000:8:10:2
This is the most common deployment model. In this case, you
(C)
5000:400::2
have no local hardware to manage or keep up-to-date – every-
(D)
5:4:3:6:8:8:1:2
thing runs on your cloud provider’s hardware. In some cases,
you can save additional costs by sharing computing resources
Explanation 32. 5000:400:30:6:8000:800:10:2 is the cor-
with other cloud users.
rect answer.
To abbreviate IPv6 addresses, only leading 0s in a quartet (one
A common use case scenario is deploying a web application or
set of four hex digits) should be removed. Many of the quartets
a blog site on hardware and resources that are owned by a
have trailing 0s (0s on the right side of the quartet), so make
cloud provider. Using a public cloud in this scenario allows
sure to not remove those 0s.
cloud users to get their website or blog up quickly, and then fo55
56
cus on maintaining the site without having to worry about purchasing, managing, or maintaining the hardware on which it
There are four critical areas in which SDN technology can make
runs.
a difference for an organization.
Question 34. Which of the following statements are true about
1. Network programmability: SDN enables network behavior
Software-Defined Networking (SDN)? (Choose all that apply)
to be controlled by the software that resides beyond the net-
(A)
working devices that provide physical connectivity
SDN enables network behavior to be controlled by
the software that resides beyond the networking devices
(B)
SDN simplifies provisioning and management of
2. Logically centralize intelligence and control: SDN is built
networked resources, everywhere from the data center to
on logically centralized network topologies, which enable intel-
the campus or wide area network
ligent control and management of network resources. Tradi-
(C)
tional network control methods are distributed. Devices func-
SDN separates the control plane management of
network devices from the underlying data plane that for-
tion autonomously with limited awareness of the state of the
wards network traffic
network.
(D)
SDN reduces the complexity of statically defined
3. Abstraction of the network: Services and applications run-
networks
ning on SDN technology are abstracted from the underlying
Explanation 34. A, B, C and D are the correct answers.
technologies and hardware that provide physical connectivity
All statements are correct.
from network control.
Software-Defined Networking (SDN) is a network architecture approach that enables the network to be intelligently and
4. Openness: SDN architectures usher in a new era of open-
centrally controlled, or ‘programmed,’ using software ap-
ness—enabling multi-vendor interoperability as well as foster-
plications. This helps operators manage the entire network
ing a vendor-neutral ecosystem. Openness comes from the
consistently and holistically, regardless of the underlying net-
SDN approach itself.
work technology.
57
58
Question 35. Assuming you are working on a Windows envi-
ment of all the network prefixes in an autonomous system is
ronment. Which command will you type to discover your NIC’s
called EIGRP. The protocol advertises incremental updates only
MAC address?
as topology changes occur within a network.
(A)
ipconfig/all
(B)
netstat/all
Enhanced Interior Gateway Routing Protocol (EIGRP) over-
(C)
ping/all
comes the deficiencies of other distance vector routing proto-
(D)
route/all
cols, such as Routing Information Protocol (RIP), with features
such as unequal-cost load balancing, support for networks 255
Explanation 35. ipconfig/all is the correct answer.
hops away, and rapid convergence features.
The command to discover your NIC’s MAC address on Win-
EIGRP uses a diffusing update algorithm (DUAL) to identify
dows environment is: ipconfig /all
network paths and provides for fast convergence using precalculated loop-free backup paths.
The command to discover your NIC’s MAC address on Linux &
Mac is: ifconfig -a
Some of the many advantages of EIGRP are:
1. Very low usage of network resources during normal opera-
Question 36. The routing protocol that does not rely on peri-
tion; only hello packets are transmitted on a stable network
odic advertisement of all the network prefixes in an au-
2. When a change occurs, only routing table changes are prop-
tonomous system is called _______________.
agated, not the entire routing table; this reduces the load the
(A)
RIP
routing protocol itself places on the network
(B)
OSPF
3. Rapid convergence times for changes in the network topolo-
(C)
EIGRP
gy (in some situations convergence can be almost instanta-
(D)
BGP
neous)
Explanation 36. EIGRP is the correct answer.
EIGRP is an enhanced distance vector protocol, relying on the
The routing protocol that does not rely on periodic advertise-
Diffused Update Algorithm (DUAL) to calculate the shortest
59
60
path to a destination within a network.
The VLAN Trunking Protocol (VTP) can manage the addition,
Question 37. Which of the following is a proprietary protocol
deletion, and renaming of VLANs from a central point without
from Cisco used to reduce administration in the switched net-
manual intervention and VLAN Trunk Protocol (VTP) thus re-
work?
duces network administration in a switched network.
(A)
VTP
(B)
SMTP
Question 38. Which of the following protocols is used to re-
(C)
FTP
move redundant links between switches and build loop-free
(D)
HTTP
Ethernet networks?
(A)
Spanning Tree Protocol (STP)
Explanation 37. VTP is the correct answer.
(B)
Loop-Free Protocol (LFP)
VLAN Trunking Protocol (VTP) is a proprietary protocol from
(C)
Redundant Link Protocol (RLP)
Cisco used to reduce administration in the switched network.
(D)
Redundant-Free Protocol (RFP)
With VTP, you can synchronize VLAN information (such as
VLAN ID or VLAN name) with switches inside the same VTP
Explanation 38. Spanning Tree Protocol (STP) is the correct
domain.
answer.
Spanning Tree Protocol (STP) is used to remove redundant
A VTP domain is a set of trunked switches with the matching
links between switches and build loop-free Ethernet networks.
VTP settings (the domain name, password and VTP version).
All switches inside the same VTP domain share their VLAN in-
Spanning Tree Protocol (STP) is a Layer 2 protocol that runs
formation with each other.
on bridges and switches. The specification for STP is IEEE
802.1D. The main purpose of STP is to ensure that you do not
The VLAN Trunking Protocol (VTP) is a very useful protocol to
create loops when you have redundant paths in your
create, manage, and maintain a large network with many inter-
network. Loops are deadly to a network.
connected switches.
61
62
It actively monitors all links of the network. To finds a redundant
link, it uses an algorithm, known as the STA (spanning-tree al-
CHAPTER 2
INFRASTRUCTURE
gorithm). The STA algorithm first creates a topology database
then it finds and disables the redundant links.
Once redundant links are disabled, only the STP-chosen links
Questions 39-65
remain active. If a new link is added or an existing link is removed, the STP re-runs the STA algorithm and re-adjusts all
Question 39. Which of the following statements are true about
links to reflect the change.
NAS and SAN. (Choose all that apply)
(A)
SAN is a file-level data storage device attached to a
TCP/IP network, usually Ethernet
(B)
SAN stands for Storage Area Network
(C)
SAN is a dedicated high-performance network for con-
solidated block-level storage. The network interconnects storage devices, switches, and hosts
(D)
NAS stands for Network-Attached Storage
(E)
NAS uses SCSI protocol to communicate with servers
(F)
SAN used in enterprise environments while NAS used in
small to medium-sized businesses
Question 40. Which of the following statements is true regarding crossover cables.
63
(A)
Wires 1 and 3 and wires 2 and 6 are crossed
(B)
Wires 1 and 6 and wires 2 and 3 are crossed
(C)
Wires 1 and 2 and wires 3 and 4 are crossed
64
Wires 1 and 4 and wires 2 and 6 are crossed
(B)
Question 41. AAA stands for Authentication, Authorization,
(C)
Hub
______________________. AAA is a system for tracking user activi-
(D)
L3 Switch
(D)
L2 Switch
ties on an IP-based network and controlling their access to
network resources.
Question 45. You have been tasked to establish a WAN con-
(A)
Access
nection between two offices: one office is in Berlin and the oth-
(B)
Accounting
er one in Hamburg. The transmission speed can be no less
(C)
Auditing
than 5 Mbps. Which of the following technologies would you
(D)
Activity
choose?
(A)
ISDN
Question 42. Routers forward packets based on the MAC ad-
(B)
T1
dress.
(C)
T3
(D)
Frame Relay
(A)
TRUE
(B)
FALSE
Question 46. When an IP packet is to be forwarded, a router
Question 43. A connection between devices that requires a
uses its forwarding table to determine the next hop for the
crossover cable is: switch to _______________.
packet’s destination based on the ____________ address.
(A)
Switch
(A)
destination IP
(B)
Router
(B)
source IP
(C)
PC
(C)
destination MAC
(D)
AP
(D)
source MAC
Question 44. Which of the following devices forwards data
Question 47. One of the key differences between Baseband
packets to all connected ports?
and Broadband transmissions is that Broadband transmission
(A)
Router
uses digital signaling over a single wire.
65
66
(A)
TRUE
(D)
VPN concentrator
(B)
FALSE
Question 51. The forwarding technology that uses labels instead of looking in a routing table to forward data is called
Question 48. Which of the following advanced networking de-
________________.
vices manages wireless network access points that allow wire-
(A)
PLSM
less devices to connect to the network?
(B)
MPLS
(A)
Proxy server
(C)
SLPM
(B)
Load balancer
(D)
LMSP
(C)
Wireless controller
(D)
VPN concentrator
Question 52. Which of the following tools is used to identify
malicious activity, record detected threats, report detected
Question 49. Which of the following advanced networking de-
threats, and take preventative action to stop a threat from doing
vices improves the overall performance of applications by de-
damage?
creasing the burden on servers?
(A)
Intrusion Prevention System
(A)
Proxy server
(B)
Content filter
(B)
Load balancer
(C)
UTM appliance
(C)
Wireless controller
(D)
VoIP gateway
(D)
VPN concentrator
Question 53. Which of the following tools is a single security
Question 50. Which of the following advanced networking de-
appliance, that provides multiple security functions such as an-
vices is an intermediary server separating end users from the
tivirus, anti-spyware, anti-spam, network firewalling, intrusion
websites they browse?
detection and prevention, content filtering and leak prevention?
(A)
Proxy server
(A)
Intrusion Prevention System
(B)
Load balancer
(B)
Content filter
(C)
Wireless controller
(C)
UTM appliance
67
68
(D)
VoIP gateway
Question 54. Given the following visual, your task is to identify
(A)
MTRJ
the fiber connector type.
(B)
SC
(C)
LC
(D)
ST
Question 56. The twisted-pair cable category 5 can transmit
data up to _________________ Mbps.
(A)
1
(B)
16
(A)
MTRJ
(C)
4
(B)
SC
(D)
100
(C)
LC
(D)
ST
Question 57. Which of the following statements are true regarding the Next-Generation Firewall (NGFW)?
Question 55. Given the following visual, your task is to identify
(A)
NGFW can't block modern threats such as advanced
the fiber connector type.
malware and application-layer attacks
(B)
NGFW filter packets based on applications
(C)
NGFW integrates intrusion prevention system
(D)
NGFW can be a low-cost option for companies looking
to improve their security
(E)
NGFW is considered a more advanced version of the
traditional firewall
Question 58. Which of the following connection types simplify
69
70
the network connectivity by unifying input/out ports and reduc-
(B)
Virtual Router
ing the number of cables and interface cards?
(C)
Virtual Switch
(D)
Virtual Firewall
(A)
FCoE
(B)
Fibre Channel
(C)
iSCSI
Question 62. It has been noticed that your co-workers spend
(D)
InfiniBand
a tremendous amount of time on social media and their productivity has been reduced dramatically. Which of the following
Question 59. Which of the following connection types is used
program would you use to mitigate this phenomenon?
for transmitting data among data centers, computer servers,
(A)
Content Filtering
switches and storage at data rates of up to 128 Gbps.
(B)
Social media Filtering
(A)
FCoE
(C)
Internet Filtering
(B)
Fibre Channel
(D)
Website Filtering
(C)
iSCSI
(D)
InfiniBand
Question 63. Which of the following networking device connects multiple switches, to form an even larger network?
Question 60. A virtual network adapter uses the host physical
(A)
Switch
network adapter to initiate and manage network communica-
(B)
Router
tions.
(C)
Wireless Access Point
(D)
Firewall
(A)
TRUE
(B)
FALSE
Question 64. Which of the following networking device con-
Question 61. Which of the following Virtual networking com-
trols data access between networks?
ponents provides network traffic filtering and monitoring for vir-
(A)
Switch
tual machines (VMs) in a virtualized environment?
(B)
Router
(C)
Wireless Access Point
(A)
Virtual NIC
71
72
(D)
Firewall
Answers 39-65
Question 65. Given the following visual, your task is to identify
Question 39. Which of the following statements are true about
the fiber connector type.
NAS and SAN. (Choose all that apply)
(A)
SAN is a file-level data storage device attached to a
TCP/IP network, usually Ethernet
(B)
SAN stands for Storage Area Network
(C)
SAN is a dedicated high-performance network for
consolidated block-level storage. The network interconnects storage devices, switches, and hosts
(D)
NAS stands for Network-Attached Storage
(E)
NAS uses SCSI protocol to communicate with servers
SAN used in enterprise environments while NAS
(A)
MTRJ
(F)
(B)
SC
used in small to medium-sized businesses
(C)
LC
(D)
ST
Explanation 39. B, C, D and F are the correct answers.
Storage Area Network (SAN) is a dedicated high-performance network for consolidated block-level storage allowing
multiple clients to access files at the same time with very high
performance. SAN uses the SCSI protocol to communicate with
servers. The network interconnects storage devices, switches,
and hosts.
SAN used in enterprise environments while.
SAN Benefits:
73
74
1. Extremely fast data access.
Question 40. Which of the following statements is true regard-
2. Dedicated network for storage relieves stress on LAN.
ing crossover cables.
3. Highly expandable.
(A)
Wires 1 and 3 and wires 2 and 6 are crossed
4. OS level (block-level) access to files.
(B)
Wires 1 and 6 and wires 2 and 3 are crossed
5. High quality-of-service for demanding applications such as
(C)
Wires 1 and 2 and wires 3 and 4 are crossed
video editing.
(D)
Wires 1 and 4 and wires 2 and 6 are crossed
Network-Attached Storage (NAS) is a file-level data storage
Explanation 40. Wires 1 and 3 and wires 2 and 6 are
device attached to a TCP/IP network, usually Ethernet. NAS
crossed is the correct answer.
used in small to medium-sized businesses.
A crossover cable is a type of twisted-pair copper wire cable
for LANs (local area network) in which the wires on the cable
The device itself is a network node, much like computers and
are crossed over so that the receive signal pins on the RJ-45
other TCP/IP devices, all of which maintain their own IP address
connector on one end are connected to the transmit signal pins
and can effectively communicate with other networked de-
on the RJ-45 connector on the other end.
vices.
Wires 1 and 3 and wires 2 and 6 are crossed.
NAS Benefits:
Crossover cables are used to connect two devices of the same
1. Relatively inexpensive.
type, e.g. two computers or two switches to each other.
2. 24/7 and remote data availability.
3. Good expandability.
Question 41. AAA stands for Authentication, Authorization,
4. Redundant storage architecture.
______________________. AAA is a system for tracking user activi-
5. Automatic backups to other devices and cloud.
ties on an IP-based network and controlling their access to
6. Flexibility.
network resources.
75
(A)
Access
(B)
Accounting
76
(C)
Auditing
rate authentication, authorization, and accounting as separate
(D)
Activity
and independent functions. This is why TACACS+ is so commonly used for device administration, even though RADIUS is
Explanation 41. Accounting is the correct answer.
still certainly capable of providing device administration AAA.
AAA stands for Authentication, Authorization, Accounting.
AAA is a system for tracking user activities on an IP-based
2. RADIUS: Radius is a network protocol that controls user
network and controlling their access to network resources.
network access via authentication and accounting. Commonly
Authentication, authorization, and accounting (AAA) man-
used by Internet Service Providers (ISPs), cellular network
age user activity to and through systems.
providers, and corporate and educational networks.
You can think of AAA in the following manner:
The RADIUS protocol serves three primary functions:
1. Authentication: Who is the user?
Authenticates users or devices before allowing them access
2. Authorization: What is the user allowed to do?
to a network.
3. Accounting: What did the user do?
Authorizes those users or devices for specific network services.
Cisco implements AAA services in its Identity Services Engine
Accounts for the usage of those services.
(ISE) platform.
Question 42. Routers forward packets based on the MAC adAAA servers support the following two protocols to com-
dress.
municate with enterprise resources:
(A)
TRUE
1. TACACS+: TACACS+ A Cisco proprietary protocol that sepa-
(B)
FALSE
rates each of the AAA functions. Communication is secure and
encrypted over TCP port 49.
Explanation 42. FALSE is the correct answer.
The main purpose of a router is to connect multiple networks
One of the key differentiators of TACACS+ is its ability to sepa-
and forward packets destined either for its own networks or
77
other networks.
78
A crossover cable is a type of twisted-pair copper wire cable for
LANs (local area network) in which the wires on the cable are
A router is considered a layer-3 device because its primary for-
crossed over so that the receive signal pins on the RJ-45 con-
warding decision is based on the information in the layer-3 IP
nector on one end are connected to the transmit signal pins on
packet, specifically the destination IP address.
the RJ-45 connector on the other end.
When a router receives a packet, it searches its routing table to
Crossover cables are used to connect two devices of the same
find the best match between the destination IP address of the
type, e.g. two computers or two switches to each other.
packet and one of the addresses in the routing table.
Question 44. Which of the following devices forwards data
Switches are responsible to forward data based on the
packets to all connected ports?
MAC address. Routers using the destination IP address for
(A)
Router
routing decisions.
(B)
L2 Switch
(C)
Hub
(D)
L3 Switch
Question 43. A connection between devices that requires a
crossover cable is: switch to _______________.
(A)
Switch
Explanation 44. Hub is the correct answer.
(B)
Router
A hub also called a network hub, is a common connection point
(C)
PC
for devices in a network. Hubs are devices commonly used to
(D)
AP
connect segments of a LAN. The hub contains multiple ports.
When a packet arrives at one port, forwards that packet to all
Explanation 43. Switch is the correct answer.
connected ports.
A connection between devices that requires a crossover cable
is: switch to switch.
Question 45. You have been tasked to establish a WAN connection between two offices: one office is in Berlin and the oth79
80
er one in Hamburg. The transmission speed can be no less
Explanation 46. destination IP is the correct answer.
than 5 Mbps. Which of the following technologies would you
When an IP packet is to be forwarded, a router uses its forward-
choose?
ing table to determine the next hop for the packet’s destination
(A)
ISDN
based on the destination IP address.
(B)
T1
(C)
T3
Question 47. One of the key differences between Baseband
(D)
Frame Relay
and Broadband transmissions is that Broadband transmission
uses digital signaling over a single wire.
Explanation 45. T3 is the correct answer.
(A)
TRUE
A T3 line is a point-to-point Internet connection capable of
(B)
FALSE
transmitting up to 44.736 Mbps.
Explanation 47. FALSE is the correct answer.
A T3 line is composed of 28 bundled T1-level circuits. Each T1
Baseband transmissions use digital signaling over a single
circuit operates at 1.544 megabits per second (Mbps), for a to-
wire. Communication on baseband transmissions is bidirec-
tal connection speed of 44.736 Mbps. A T3 line is also often
tional, allowing signals to be sent and received, but not at the
referred to as a Digital Signal 3 (DS3) connection.
same time. To send multiple signals on a single cable, baseband uses something called time-division multiplexing (TDM).
Question 46. When an IP packet is to be forwarded, a router
uses its forwarding table to determine the next hop for the
Broadband transmissions use analog transmissions. For
packet’s destination based on the ____________ address.
broadband transmissions to be sent and received, the medium
(A)
destination IP
must be split into two channels. (Alternatively, two cables can
(B)
source IP
be used: one to send and one to receive transmissions.) Multi-
(C)
destination MAC
ple channels are created using frequency-division multiplexing
(D)
source MAC
(FDM).
81
82
Question 48. Which of the following advanced networking de-
through this interface.The management interface is assigned
vices manages wireless network access points that allow wire-
an IP address and is the initial point of contact for Lightweight
less devices to connect to the network?
Access Point Protocol (LWAPP) communication and registra-
(A)
Proxy server
tion.
(B)
Load balancer
(C)
Wireless controller
3. AP-manager interface: This interface is used to control and
(D)
VPN concentrator
manage all Layer 3 communications between the WLC and
lightweight APs.
Explanation 48. Wireless controller is the correct answer.
A wireless controller manages wireless network access points
4. Virtual interface: This interface is used to support mobility
that allow wireless devices to connect to the network.
management features, such as DHCP relay and Guest Web Authentication.
Most Cisco Wireless LAN Controllers (WLCs) supports the
5. Service-port interface: This interface is used to communi-
following features:
cate to the service port and must have an IP address that be1. Distribution system ports: These ports are used to connect
longs to a different IP subnet than that of the AP-manager in-
the WLC to a network switch and act as a path for data.
terface and any other dynamic interface.
2. Service port: This port is used as a management or console
6. Dynamic interfaces: These are VLAN interfaces created by
port. This port is active during the boot mode of the WLC.
you to allow for communication to various VLANs.
3. Management interface: This interface is used for in-band
Question 49. Which of the following advanced networking de-
management and provides connectivity to network devices
vices improves the overall performance of applications by de-
(such as DHCP servers or Radius servers). If you want to con-
creasing the burden on servers?
nect to the controller’s web management interface, it would be
(A)
83
Proxy server
84
(B)
Load balancer
(A)
Proxy server
(C)
Wireless controller
(B)
Load balancer
(D)
VPN concentrator
(C)
Wireless controller
(D)
VPN concentrator
Explanation 49. Load balancer is the correct answer.
A load balancer is a device that acts as a reverse proxy and
Explanation 50. Proxy server is the correct answer.
distributes network or application traffic across a number of
The proxy server is an intermediary server separating end
servers.
users from the websites they browse.
Load balancers are used to increase capacity (concurrent
If you’re using a proxy server, internet traffic flows through
users) and reliability of applications. They improve the overall
the proxy server on its way to the address you requested.
performance of applications by decreasing the burden on
servers associated with managing and maintaining application
The request then comes back through that same proxy server
and network sessions, as well as by performing application-
(there are exceptions to this rule), and then the proxy server
specific tasks.
forwards the data received from the website to you.
Load balancers are generally grouped into two categories: Lay-
Modern proxy servers do much more than forwarding web re-
er 4 and Layer 7. Layer 4 load balancers act upon data found in
quests, all in the name of data security and network perfor-
network and transport layer protocols (IP, TCP, FTP, UDP). Lay-
mance.
er 7 load balancers distribute requests based upon data found
in application layer protocols such as HTTP.
Proxy servers act as a firewall and web filter, provide shared
network connections, and cache data to speed up common re-
Question 50. Which of the following advanced networking de-
quests.
vices is an intermediary server separating end users from the
websites they browse?
85
86
Question 51. The forwarding technology that uses labels in-
cides the LSP the packet will take until it reaches its destination
stead of looking in a routing table to forward data is called
address.
________________.
(A)
PLSM
All the subsequent label-switching routers (LSRs) perform
(B)
MPLS
packet forwarding based only on those MPLS labels — they
(C)
SLPM
never look as far as the IP header. Finally, the egress router re-
(D)
LMSP
moves the labels and forwards the original IP packet toward its
final destination.
Explanation 51. MPLS is the correct answer.
The forwarding technology that uses labels instead of looking
Question 52. Which of the following tools is used to identify
in a routing table to forward data is called MPLS.
malicious activity, record detected threats, report detected
threats, and take preventative action to stop a threat from doing
Multiprotocol Label Switching (MPLS) is a data forwarding
damage?
technology that increases the speed and controls the flow of
(A)
Intrusion Prevention System
network traffic. With MPLS, data is directed through a path via
(B)
Content filter
labels instead of requiring complex lookups in a routing table at
(C)
UTM appliance
every stop.
(D)
VoIP gateway
MPLS allows most data packets to be forwarded at Layer 2 of
Explanation 52. Intrusion Prevention System is the correct
the Open Systems Interconnection (OSI) model, rather than
answer.
having to be passed up to Layer 3.
An Intrusion Prevention System (IPS) is used to identify malicious activity, record detected threats, report detected threats,
In an MPLS network, each packet gets labeled on entry into
and take preventative action to stop a threat from doing dam-
the service provider’s network by the ingress router, also known
age. An IPS tool can be used to continually monitor a network in
as the label edge router (LER). This is also the router that de-
real-time.
87
88
routing, network address translation (NAT), and virtual private
Intrusion prevention is a threat detection method that can be
network (VPN) support.
utilized in a secure environment by system and security administrators. These tools are useful for systems as a prevention ac-
Question 54. Given the following visual, your task is to identify
tion for observed events.
the fiber connector type.
Question 53. Which of the following tools is a single security
appliance, that provides multiple security functions such as antivirus, anti-spyware, anti-spam, network firewalling, intrusion
detection and prevention, content filtering and leak prevention?
(A)
Intrusion Prevention System
(B)
Content filter
(C)
UTM appliance
(D)
VoIP gateway
(A)
MTRJ
(B)
SC
Explanation 53. UTM appliance is the correct answer.
(C)
LC
Unified threat management (UTM) is an information security
(D)
ST
term that refers to a single security solution, and usually a single security appliance, that provides multiple security functions
Explanation 54. MTRJ is the correct answer.
at a single point on the network.
Question 55. Given the following visual, your task is to identify
A UTM appliance will usually include functions such as an-
the fiber connector type.
tivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak
prevention. Some units also provide services such as remote
89
90
Below is a summary of the Copper cable standards with their
speeds.
Catego Maximum
ry
data rate
(A)
MTRJ
(B)
SC
(C)
LC
(D)
ST
Explanation 55. SC is the correct answer.
Question 56. The twisted-pair cable category 5 can transmit
data up to _________________ Mbps.
(A)
1
(B)
16
(C)
4
(D)
100
Usual application
CAT 1
Up to 1
Mbps (1
MHz)
analog voice (POTS)
Basic Rate Interface in ISDN
Doorbell wiring
CAT 2
4 Mbps
Mainly used in the IBM cabling
system for Token Ring
networks
CAT 3
16 Mbps
Voice (analog most popular
implementation)
10BASE-T Ethernet
CAT 4
20 Mbps
Used in 16 Mbps Token Ring,
otherwise not used much. Was
only a standard briefly and
never widely installed.
Explanation 56. 100 is the correct answer.
The twisted-pair cable category 5 can transmit data up to
100Mbps.
91
92
CAT 5
100 MHz
100 Mbps TPDDI
155 Mbps ATM
No longer supported; replaced
by 5E.
10/100BASE-T
4/16MBps Token Ring
Analog Voice
CAT 5E
100 MHz
100 Mbps TPDDI
155 Mbps ATM
Gigabit Ethernet
Offers better near-end
crosstalk than CAT 5
CAT 6
Up to 250
MHz
Minimum cabling for data
centers in TIA-942.
Quickly replacing category 5e.
CAT 6E
MHz
(fieldtested to
500 MHz)
Support for 10 Gigabit
Ethernet (10GBASE-T)
May be either shielded (STP,
ScTP, S/FTP) or unshielded
(UTP)
This standard published in
Feb. 2008.
Minimum for Data Centers in
ISO data center standard.
CAT 7
(ISO
Class
F)
600 MHz
1.2 GHz in
pairs with
Siemon
connector
Full-motion video
Teleradiology
Government and
manufacturing environments
Fully Shielded (S/FTP) system
using non-RJ45 connectors
but backwards compatible with
hybrid cords.
Until February 2008, the only
standard (published in 2002)
to support 10GBASE-T for a
full 100m.
Question 57. Which of the following statements are true regarding the Next-Generation Firewall (NGFW)?
(A)
NGFW can't block modern threats such as advanced
malware and application-layer attacks
(B)
NGFW filter packets based on applications
(C)
NGFW integrates intrusion prevention system
(D)
NGFW can be a low-cost option for companies look-
ing to improve their security
(E)
NGFW is considered a more advanced version of the
traditional firewall
Explanation 57. B, C, D and E are the correct answers.
93
Next-generation firewalls filter network traffic to protect an
94
organization from external threats. Next-generation firewalls are
Explanation 58. FCoE is the correct answer.
a more advanced version of the traditional firewall, and they of-
Fiber Channel over Ethernet (FCoE) is a storage protocol that
fer the same benefits.
ensures that Fiber Channel communications are transmitted directly over Ethernet. FCoE moves Fiber Channel traffic to exist
There are also fundamental differences between the tradition-
high-speed Ethernet infrastructures and then integrates stor-
al firewall and next-generation firewalls.
age and IP protocols into a single cable transport and interface.
The most obvious differences between the two are:
The purpose of FCoE is to unify input/output (I / O) ports,
1. NGFW can block modern threats such as advanced malware
simplify switching, and reduce counting of cables and in-
and application-layer attacks.
terface cards.
2. NGFW filter packets based on applications.
3. NGFW integrates intrusion prevention system.
With so many NICs, HBAs, switches, and cables to deal with,
4. NGFW can be a low-cost option for companies looking to
both capital and operational costs to run a data center can in-
improve their security.
crease significantly. FCoE represents a way to drastically re-
5. NGFW is considered a more advanced version of the tradi-
duce the number of cards, switches, adapters, and assorted
tional firewall.
cabling by running LANs and SANs over the same infrastructure.
Question 58. Which of the following connection types simplify
the network connectivity by unifying input/out ports and reduc-
Question 59. Which of the following connection types is used
ing the number of cables and interface cards?
for transmitting data among data centers, computer servers,
(A)
FCoE
switches and storage at data rates of up to 128 Gbps.
(B)
Fibre Channel
(A)
FCoE
(C)
iSCSI
(B)
Fibre Channel
(D)
InfiniBand
(C)
iSCSI
(D)
InfiniBand
95
96
adapter to initiate and manage network communications. A virExplanation 59. Fibre Channel is the correct answer.
tual network adapter is the logical or software instance of a
Fibre Channel is a high-speed networking technology primari-
physical network adapter that allows a physical computer, vir-
ly used for transmitting data among data centers, computer
tual machine, or another computer to simultaneously connect
servers, switches and storage at data rates of up to 128 Gbps.
to a network or the Internet.
In the switched fabric topology that requires switches, all the
Question 61. Which of the following Virtual networking com-
devices are connected and communicated via switches. A Fi-
ponents provides network traffic filtering and monitoring for vir-
bre Channel switch, namely, is a networking device that is
tual machines (VMs) in a virtualized environment?
compatible with the Fibre Channel Protocol (FCP), and features
(A)
Virtual NIC
with high-performance, low-latency, and lossless-transmission
(B)
Virtual Router
in a Fibre Channel fabric.
(C)
Virtual Switch
(D)
Virtual Firewall
Known as one of the main components used in SANs, the Fibre
Channel switch plays an important role in interconnecting mul-
Explanation 60. Virtual Firewall is the correct answer.
tiple storage ports and servers.
A virtual firewall is a firewall device or service that provides
network traffic filtering and monitoring for virtual machines
Question 60. A virtual network adapter uses the host physical
(VMs) in a virtualized environment. Like a traditional network
network adapter to initiate and manage network communica-
firewall, a virtual firewall inspects packets and uses security
tions.
policy rules to block unapproved communication between VMs.
(A)
TRUE
(B)
FALSE
A virtual firewall is often deployed as a software appliance.
Question 62. It has been noticed that your co-workers spend
Explanation 60. TRUE is the correct answer.
a tremendous amount of time on social media and their pro-
A virtual network adapter uses the host physical network
ductivity has been reduced dramatically. Which of the following
97
98
program would you use to mitigate this phenomenon?
Question 63. Which of the following networking device con-
(A)
Content Filtering
nects multiple switches, to form an even larger network?
(B)
Social media Filtering
(A)
Switch
(C)
Internet Filtering
(B)
Router
(D)
Website Filtering
(C)
Wireless Access Point
(D)
Firewall
Explanation 62. Content Filtering is the correct answer.
A content filter is any software that controls what a user is al-
Explanation 63. Router is the correct answer.
lowed to peruse and is most often associated with websites.
Router connects multiple switches, to form an even larger net-
Using a content filter, an employer can block access to social
work.
media sites to all users, some users, or even just an individual
user.
Routers work as a dispatcher, directing traffic and choosing the
most efficient route for information, in the form of data packets,
Content filtering works by specifying content patterns – such as
to travel across a network.
text strings or objects within images – that, if matched, indicate
undesirable content that is to be screened out. A content filter
A router connects your business to the world, protects informa-
will then block access to this content.
tion from security threats, and even decides which devices
have priority over others.
Content filters are often part of Internet firewalls but can be implemented as either hardware or software. In such usage, con-
Question 64. Which of the following networking device con-
tent filtering is serving a security purpose – but content filtering
trols data access between networks?
is also used to implement company policies related to informa-
(A)
Switch
tion system usage.
(B)
Router
99
(C)
Wireless Access Point
(D)
Firewall
100
CHAPTER 3
NETWORK OPERATIONS
Explanation 64. Firewall is the correct answer.
Firewall controls data access between networks. Firewalls are
either a physical device or software that monitors incoming and
outgoing network traffic and decides whether to allow or block
Questions 66-86
specific traffic based on a defined set of security rules.
Question 65. Given the following visual, your task is to identify
the fiber connector type.
Question 66. Which of the following tool is designed to reveal
the ports which are open on a network, and determine if those
open ports need to be closed to provide more network security
and fewer vulnerabilities?
(A)
Log review
(B)
Port scanner
(C)
Vulnerability scanner
(D)
Packet analyzer
Question 67. Which of the following statements are true re(A)
MTRJ
(B)
SC
(C)
LC
(D)
ST
garding Security information and event management (SIEM)?
(A)
Provide reports on security-related incidents and
events, such as successful and failed logins
(B)
Send alerts if analysis shows that an activity runs
against the rules you set up
Explanation 65. LC is the correct answer.
(C)
Can't monitor and manage networks in real-time
(D)
Analyze data to discover and detect threats
(E)
SIEM applications can distinguish between sanctioned
file activity from suspicious activity
101
102
(A)
UPS
Question 68. One of the features of SNMPv3 is called mes-
(B)
Power generators
sage integrity.
(C)
Dual power supplies
(D)
Redundant circuits
(A)
TRUE
(B)
FALSE
Question 72. Which of the following protocols uses the port 22
Question 69. Which of the following VPN related term is a
for its service?
standard security technology for establishing an encrypted link
(A)
SSH
between a server and a client?
(B)
RDP
(A)
IPsec (Internet Protocol Security)
(C)
Telnet
(B)
Secure Sockets Layer (SSL)
(D)
HTTPS
(C)
site-to-site virtual private network (VPN)
(D)
VPN client-to-site
Question 73. Which of the following protocols uses the port
443 for its service?
Question 70. Which of the following process consist of scan-
(A)
SSH
ning devices (computers, mobile) or other machines on a net-
(B)
RDP
work for missing software updates and keep the systems up-
(C)
Telnet
dated to avoid security threats?
(D)
HTTPS
(A)
Software updater
(B)
Patch management
Question 74. Which of the following terms refer to an organiza-
(C)
Patch scanning
tion’s documented rules about what is to be done, or not done
(D)
Software scanning
and who can access particular network resources?
(A)
Configurations
Question 71. Which of the following options provides only
(B)
Regulations
temporary power, when the primary power source is lost?
(C)
Policies
103
104
(D)
Procedures
Question 78. FTP uses port numbers 20 and ______ for command control and data transfer.
Question 75. _________________ is a metric that represents the
(A)
23
average amount of time required to fix a failed component or
(B)
22
device and return it to the production stage.
(C)
21
(D)
19
(A)
MTTR
(B)
TTRM
(C)
RTMR
Question 79. Which of the following backup types back up
(D)
TMRT
only the data that has changed since the previous backup?
(A)
Partial Backups
Question 76. The process of combining multiple network
(B)
Differential backups
cards is known as NIC __________________.
(C)
Incremental backups
(D)
Full backups
(A)
Binding
(B)
Teaming
(C)
Combining
Question 80. Which of the following protocols is not used pri-
(D)
Merging
marily for file transfers? (Choose all that apply)
(A)
FTP
Question 77. The ability of a system (computer, network, cloud
(B)
FTPS
cluster, etc.) to continue operating without interruption when
(C)
SFTP
one or more of its components fail is called:
(D)
TFTP
(A)
Load balancing
(E)
HTTP
(B)
Port aggregation
(F)
HTTPS
(C)
Clustering
(D)
Fault tolerance
105
106
Question 81. ______________ measures how many packets arrive
(B)
Warm site
at their destinations successfully.
(C)
Cold site
(D)
Mirror site
(A)
Bandwidth
(B)
Throughput
(C)
Error rate
Question 85. Which of the following stages of disaster recov-
(D)
Utilization
ery sites is a backup facility that has the network connectivity
and the necessary hardware equipment already pre-installed
Question 82. Out-of-band management provides a way to log
but cannot perform on the same level as the production center?
into a network device without going through the same network
(A)
Hot site
through which the data passing through.
(B)
Warm site
(A)
TRUE
(C)
Cold site
(B)
FALSE
(D)
Mirror site
Question 83. _____________ is a service that allows you to con-
Question 86. A physical diagram represents how a network
nect to the Internet via an encrypted tunnel to ensure your on-
looks, while a logical diagram represents how the traffic flows
line privacy and protect your sensitive data.
on the network.
(A)
RDP
(A)
TRUE
(B)
SSH
(B)
FALSE
(C)
VPN
(D)
VNC
Question 84. Which of the following stages of disaster recovery sites represents a mirrored copy of the primary production
center?
(A)
Hot site
107
108
Answers 66-86
(B)
Send alerts if analysis shows that an activity runs
against the rules you set up
Question 66. Which of the following tool is designed to reveal
(C)
Can't monitor and manage networks in real-time
the ports which are open on a network, and determine if those
(D)
Analyze data to discover and detect threats
open ports need to be closed to provide more network security
(E)
SIEM applications can distinguish between sanctioned
and fewer vulnerabilities?
file activity from suspicious activity
(A)
Log review
(B)
Port scanner
Explanation 67. A, B and D are the correct answers.
(C)
Vulnerability scanner
Security information and event management (SIEM) tools are
(D)
Packet analyzer
an important part of the data security ecosystem, they aggregate data from multiple systems and analyze that data to catch
Explanation 66. Port scanner is the correct answer.
Port scanner tool is designed to reveal which ports are open
on a network and determine if those open ports need to be
closed to provide more network security and fewer vulnerabilities.
SIEM tools:
1. Provide reports on security-related incidents and events,
such as successful and failed logins.
The tool is used by administrators to verify the security policies
of their networks and by attackers to identify network services
running on a host and exploit vulnerabilities.
Question 67. Which of the following statements are true regarding Security information and event management (SIEM)?
(A)
abnormal behavior or potential attacks.
Provide reports on security-related incidents and
events, such as successful and failed logins
109
(A)
TRUE
(B)
FALSE
2. Send alerts if analysis shows that an activity runs against the
rules you set up.
3. Analyze data to discover and detect threats.
4. SIEM applications can’t distinguish between sanctioned file
activity from suspicious activity.
5. Can monitor and manage networks in real-time.
Question 68. One of the features of SNMPv3 is called message integrity.
110
The following are SNMPv3 features:
Message integrity: This mechanism, applied to all SNMPv3
Explanation 68. TRUE is the correct answer.
messages, confirms whether or not each message has been
Simple Network Management Protocol (SNMP) is a way for
changed during transit.
different devices on a network to share information with one
another. It allows devices to communicate even if the devices
Authentication: This optional feature adds authentication with
are different hardware and run different software.
both a username and password, with the password never sent
as clear text. Instead, it uses a hashing method like many other
Without a protocol like SNMP, there would be no way for net-
modern authentication processes.
work management tools to identify devices, monitor network
performance, keep track of changes to the network, or deter-
Encryption (privacy): This optional feature encrypts the con-
mine the status of network devices in real-time.
tents of SNMPv3 messages so that attackers who intercept the
messages cannot read their contents.
Simple Network Management Protocol (SNMP) provides a
message format for communication between what are termed,
Question 69. Which of the following VPN related term is a
managers, and agents. An SNMP manager is a network man-
standard security technology for establishing an encrypted link
agement application running on a PC or server, with that host
between a server and a client?
typically being called a Network Management Station (NMS).
(A)
IPsec (Internet Protocol Security)
(B)
Secure Sockets Layer (SSL)
As for the SNMP protocol messages, all versions of SNMP sup-
(C)
site-to-site virtual private network (VPN)
port a basic clear-text password mechanism, although none of
(D)
VPN client-to-site
those versions refer to the mechanism as using a password.
SNMP Version 3 (SNMPv3) adds more modern security as well.
Explanation 69. Secure Sockets Layer (SSL) is the correct
answer.
111
112
Secure Sockets Layer (SSL) is a standard security technology
ploying those patches as soon as they become available.
for establishing an encrypted link between a server and a client
—typically a web server (website) and a browser, or a mail
Question 71. Which of the following options provides only
server and a mail client.
temporary power, when the primary power source is lost?
(A)
UPS
Question 70. Which of the following process consist of scan-
(B)
Power generators
ning devices (computers, mobile) or other machines on a net-
(C)
Dual power supplies
work for missing software updates and keep the systems up-
(D)
Redundant circuits
dated to avoid security threats?
(A)
Software updater
Explanation 71. Secure Sockets Layer (SSL) is the correct
(B)
Patch management
answer.
(C)
Patch scanning
An uninterruptible power supply (UPS) is a device that al-
(D)
Software scanning
lows a computer to keep running for at least a short time when
the primary power source is lost. UPS devices also provide pro-
Explanation 70. Patch management is the correct answer.
tection from power surges.
Patch management is the process of updating operating systems and applications to avoid security threats. Patch man-
Question 72. Which of the following protocols uses the port 22
agement helps to test and installs multiple code modifications
for its service?
on existing applications and software tools on a computer,
(A)
SSH
keeping systems updated and determines which patches are
(B)
RDP
the appropriate ones.
(C)
Telnet
(D)
HTTPS
Patch management consists of scanning computers, mobile
devices, or other machines on a network for missing software
Explanation 72. SSH is the correct answer.
updates, known as “patches” and fixing the problem by de113
Question 73. Which of the following protocols uses the port
443 for its service?
(A)
SSH
(B)
RDP
(C)
Telnet
(D)
HTTPS
to allow employees to use their personal smartphones, laptops,
and tablets for work.
Non Disclosure Agreements (NDAs)
Question 74. Which of the following terms refer to an organization’s documented rules about what is to be done, or not done
and who can access particular network resources?
Configurations
(B)
Regulations
(C)
Policies
(D)
Procedures
Bring your own device (BYOD) policy
Bring-your-own-device (BYOD) policies are set by companies
Explanation 73. HTTPS is the correct answer.
(A)
114
A non-disclosure agreement is a legally binding contract that
establishes a confidential relationship. The party or parties
signing the agreement agree that sensitive information they
may obtain will not be made available to any others.
Acceptable use policy (AUP)
An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a
corporate network or the Internet. Many businesses and edu-
Explanation 74. Policies is the correct answer.
By definition, policies refer to an organization’s documented
rules about what is to be done, or not done, and why. Policies
dictate who can and cannot access particular network resources, server rooms, backup media, and more.
cational facilities require that employees or students sign an
acceptable use policy before being granted a network ID.
Password policy
A password policy is a set of rules which were created to improve computer security by motivating users to create depend-
Although networks might have different policies depending on
able, secure passwords and then store and utilize them proper-
their needs, some common policies include the following:
ly.
115
116
(D)
International export controls
International export controls are a number of laws and regulations that govern what can and cannot be exported when it
comes to software and hardware to various countries. Employees should take every precaution to make sure they are adhering to the letter of the law.
TMRT
Explanation 75. MTTR is the correct answer.
MTTR (mean time to repair) is a metric that represents the
average amount of time required to fix a failed component or
device and return it to the production stage.
MTTR (Mean time to repair) includes the time it takes to find out
Data loss prevention
about the failure, diagnose the problem, and repair it. MTTR is a
A data loss prevention policy defines how organizations can
basic measure of how maintainable an organization’s equip-
share and protect data. It guides how data can be used in deci-
ment is and, ultimately, is a reflection of how efficiently an or-
sion making without it being exposed to anyone who should
ganization can fix a problem.
not have access to it.
Question 76. The process of combining multiple network
Remote access policies
cards is known as NIC __________________.
A remote access policy defines the conditions, remote access
permissions, and creates a profile for every remote connection
made to the corporate network.
Question 75. _________________ is a metric that represents the
average amount of time required to fix a failed component or
device and return it to the production stage.
(A)
MTTR
(B)
TTRM
(C)
RTMR
(A)
Binding
(B)
Teaming
(C)
Combining
(D)
Merging
Explanation 76. Teaming is the correct answer.
The process of combining multiple network cards is known as
NIC Teaming.
NIC Teaming allows you to group between one and 32 physi-
117
118
cal Ethernet network adapters into one or more software-based
Question 78. FTP uses port numbers 20 and ______ for com-
virtual network adapters.
mand control and data transfer.
(A)
23
These virtual network adapters provide fast performance and
(B)
22
fault tolerance in the event of a network adapter failure.
(C)
21
(D)
19
Question 77. The ability of a system (computer, network, cloud
cluster, etc.) to continue operating without interruption when
Explanation 78. 21 is the correct answer.
one or more of its components fail is called:
FTP uses port numbers 20 and 21 for command control and
(A)
Load balancing
data transfer. FTP stands for File Transfer Protocol. A proto-
(B)
Port aggregation
col is a system of rules that networked computers use to com-
(C)
Clustering
municate with one another. FTP is a client-server protocol that
(D)
Fault tolerance
may be used to transfer files between computers on the internet. The client asks for the files and the server provides them.
Explanation 77. Fault tolerance is the correct answer.
The ability of a system (computer, network, cloud cluster, etc.)
An FTP server offers access to a directory, with sub-directories.
to continue operating without interruption when one or more of
Users connect to these servers with an FTP client, a piece of
its components fail is called: Fault tolerance.
software that lets you download files from the server, as well as
upload files to it.
The goal of fault-tolerant computer systems is to ensure business continuity and high availability by preventing disruptions
Question 79. Which of the following backup types back up
arising from a single point of failure. Fault tolerance solutions,
only the data that has changed since the previous backup?
therefore, tend to focus most on mission-critical applications or
(A)
Partial Backups
systems.
(B)
Differential backups
(C)
Incremental backups
119
120
(D)
Full backups
is a client-server protocol where a client will ask for a file, and a
local or remote server will provide it the files.
Explanation 79. Incremental backups is the correct answer.
Incremental backups backups trying to decrease the amount
FTPS is also known FTP over TLS. At its core, FTPS (FTP over
of time and the storage space that it takes to do a full backup.
SSL) is a secure file transfer protocol that allows you to connect
Incremental backups only back up the data that has changed
securely with your trading partners, customers, and users.
since the previous backup.
FTPS implements strong algorithms like AES and Triple DES to
Question 80. Which of the following protocols is not used pri-
encrypt file transfers. For authentication when connecting to
marily for file transfers? (Choose all that apply)
trading partner servers and vice versa, FTPS uses a combina-
(A)
FTP
tion of user IDs, passwords, and/or certificates to verify authen-
(B)
FTPS
ticity.
(C)
SFTP
(D)
TFTP
SFTP stands for SSH File Transfer Protocol, or Secure File
(E)
HTTP
Transfer Protocol is a separate protocol packaged with SSH
(F)
HTTPS
that works in a similar way over a secure connection. The advantage is the ability to leverage a secure connection to trans-
Explanation 80. HTTP and HTTPS are the correct answers.
fer files and traverse the filesystem on both the local and re-
HTTP and HTTPS aren’t used for file transfer, they are primarily
mote systems.
used to deliver Web pages and content to browsers, not for uploading and downloading files.
Trivial File Transfer Protocol (TFTP) is a simple protocol used
for transferring files. TFTP uses the User Datagram Protocol
FTP stands for File Transfer Protocol. File Transfer Protocol
(UDP) to transport data from one end to another. TFTP is most-
(FTP) is a standard Internet protocol for transmitting files be-
ly used to read and write files/mail to or from a remote server.
tween computers or servers on the Internet, using port 21. FTP
121
122
Question 81. ______________ measures how many packets arrive
bandwidth used in the network. While high network utilization
at their destinations successfully.
indicates the network is busy, low network utilization indicates
(A)
Bandwidth
the network is idle.
(B)
Throughput
(C)
Error rate
Question 82. Out-of-band management provides a way to log
(D)
Utilization
into a network device without going through the same network
through which the data passing through.
Explanation 81. Throughput is the correct answer.
(A)
TRUE
Throughput measures how many packets arrive at their desti-
(B)
FALSE
nations successfully. For the most part, throughput capacity is
measured in bits per second, but it can also be measured in
Explanation 82. TRUE is the correct answer.
data per second.
Out-of-band management provides a way to log into a network
device without going through the same network through which
Bandwidth is measured as the amount of data that can be
the data passing through.
transferred from one point to another within a network in a specific amount of time. Typically, bandwidth is expressed as a bi-
That means the management traffic is confined to the console
trate and measured in bits per second (bps).
port (from the PC connecting with rollover cable) and AUX port
(through a modem and the phone line) and does not mix in with
Error rates refer to the frequency of errors occurred, defined as
any of the network’s data.
“the ratio of a total number of data units in error to the total
number of data units transmitted.” As the error rate increases,
Question 83. _____________ is a service that allows you to con-
the data transmission reliability decreases.
nect to the Internet via an encrypted tunnel to ensure your online privacy and protect your sensitive data.
Network utilization is the ratio of current network traffic to the
(A)
RDP
maximum traffic that the port can handle. It indicates the
(B)
SSH
123
124
(C)
VPN
the primary production center. The most important feature of-
(D)
VNC
fered from a hot site is that the production environment(s) are
running with your main datacenter at the same time.
Explanation 83. VPN is the correct answer.
is a service that allows you to connect to the Internet via an en-
This syncing allows for minimal downtime to business opera-
crypted tunnel to ensure your online privacy and protect your
tions. In the event of a significant outage event to your main
sensitive data.
data center, the hot site can take the place of the impacted site
immediately.
You can use a Virtual Private Network (VPN) to:
1. Bypass geographic restrictions on websites or streaming au-
Question 85. Which of the following stages of disaster recov-
dio and video.
ery sites is a backup facility that has the network connectivity
2. Protect yourself from snooping on untrustworthy Wi-Fi
and the necessary hardware equipment already pre-installed
hotspots.
but cannot perform on the same level as the production center?
3. Gain anonymity online by hiding your true location.
(A)
Hot site
(B)
Warm site
Question 84. Which of the following stages of disaster recov-
(C)
Cold site
ery sites represents a mirrored copy of the primary production
(D)
Mirror site
center?
(A)
Hot site
Explanation 85. Warm site is the correct answer.
(B)
Warm site
Warm Site is a backup facility that has the network connectivi-
(C)
Cold site
ty and the necessary hardware equipment already pre-installed
(D)
Mirror site
but cannot perform on the same level as the production center.
Explanation 84. Hot site is the correct answer.
The difference between a hot site and a warm site is that while
Hot Site is a backup facility that represents a mirrored copy of
the hot site provides a mirror of the production data-center and
125
its environment(s), a warm site will contain only servers ready
126
plan.
for the installation of production environments.
A logical network diagram describes the way information
Therefore, a warm site has less operational capacity than the
flows through a network. Therefore, logical network diagrams
primary site. Moreover, data synchronization between the pri-
typically show subnets (including VLAN IDs, masks, and ad-
mary and secondary sites is performed daily or weekly, which
dresses), network devices like routers and firewalls, and routing
can result in minor data loss. A warm site is perfect for organi-
protocols.
zations that operate with less critical data and can tolerate a
short period of downtime.
Question 86. A physical diagram represents how a network
looks, while a logical diagram represents how the traffic flows
on the network.
(A)
TRUE
(B)
FALSE
Explanation 86. TRUE is the correct answer.
A physical diagram represents how a network looks, while
a logical diagram represents how the traffic flows on the network.
A physical network diagram shows the actual physical
arrangement of the components that make up the network, including cables and hardware. Typically, the diagram gives a
bird’s eye view of the network in its physical space, like a floor127
128
CHAPTER 4
NETWORK SECURITY
Questions 87-110
Question 87. What is used as the authentication server in
802.1X?
(A)
RADIUS server
(B)
DHCP server
(C)
TACACS+ server
(D)
DNS server
advantage of is known as:
(B)
Penetration Testing
(C)
Attack Testing
(D)
Identify Weak Spots
(B)
netstat
(C)
ipconfig
(D)
tracert
Question 90. Multifactor authentication combines two or more
independent credentials: what the user knows (password),
metric verification).
the purpose of identifying weak spots that attackers could take
Simulated Attack
ping
what the user has (security token) and what the user is (bio-
Question 88. An authorized simulated attack on a system with
(A)
(A)
Question 89. You have been tasked to identify all connections
and listening ports on your device. Assuming you are working
on a Windows environment. Which command will you type to
complete the task?
(A)
TRUE
(B)
FALSE
Question 91. Which of the following switch port protection
techniques ensures that you do not create loops when you
have redundant paths in your network?
(A)
Flood guard
(B)
Root guard
(C)
Spanning tree
(D)
DHCP snooping
Question 92. Which of the following switch port protection
techniques protects switches against MAC flood attacks?
(A)
Flood guard
(B)
Root guard
(C)
Spanning tree
129
(D)
DHCP snooping
130
(C)
DMZ
(D)
VLAN
Question 93. You have been tasked to blacklist certain computers to connect on the Wi-Fi, based on their MAC address.
Question 96. Which of the following attacks doesn’t require
Which of the following tools will you use in order to complete
the use of technology in order to get access to sensitive data?
the task?
(A)
Social engineering
(A)
EAP
(B)
Man-in-the-middle
(B)
Preshared key
(C)
VLAN Hopping
(C)
Geofencing
(D)
Ransomware
(D)
MAC Filtering
Question 97. Which of the following attacks typically function
Question 94. What can be accomplished with a brute-force
by overwhelming or flooding a targeted machine with requests
attack?
until normal traffic is unable to be processed?
(A)
Make a server unavailable
(A)
DoS
(B)
Guess a user’s password
(B)
Spoofing
(C)
Spoof every possible IP address
(C)
Reconnaissance
(D)
Alter a routing table
(D)
Phising
Question 95. __________________ is a physical or logical subnet
Question 98. Exploits are a weakness in software systems,
aiming to separate an internal LAN from other untrusted net-
while vulnerabilities are attacks made to take advantage of ex-
works. External-facing servers, resources, and/or services are
ploits.
located in that place, so they are accessible from the internet,
(A)
TRUE
but the rest of the internal LAN remains unreachable and safe.
(B)
FALSE
(A)
ACL
(B)
Honeynet
131
132
Question 99. Which of the following networking attacks re-
(A)
Rogue Access Point
direct online traffic to a fraudulent website that resembles its in-
(B)
Logic Bomb
tended destination?
(C)
Evil Twin
(D)
Social Engineering
(A)
DNS poisoning
(B)
Phishing
(C)
War-driving
Question 103. File _____________ is used to verify that the con-
(D)
ARP poisoning
tent of files isn’t modified while transferring over the network.
Question 100. Which encryption algorithm is used by WPA2?
(A)
Checking
(B)
Hashing
(A)
DES
(C)
Altering
(B)
CCMP-AES
(D)
Modifying
(C)
3DES
(D)
RSA
Question 104. Biometrics uses a unique physical characteristic
of a person to permit access to a controlled IT resource.
Question 101. Which networking attack uses psychological
(A)
TRUE
manipulation to trick users into making security mistakes or
(B)
FALSE
giving away sensitive information
(A)
Rogue Access Point
Question 105. Which one of the following attacks requires the
(B)
Logic Bomb
attacker to be on the same network as the victim?
(C)
Evil Twin
(A)
DNS poisoning
(D)
Social Engineering
(B)
Social engineering
(C)
Logic bomb
(D)
ARP poisoning
Question 102. Which networking attack is a fake Wi-Fi network that looks like a legitimate access point to steal victims’
sensitive details
133
134
Question 106. Which of the following protocols are considered
Question 109. A Logic bomb is a malicious program that is
secure protocols? (Choose all that apply)
triggered when a logical condition is met, such as after a num-
(A)
HTTP
ber of transactions have been processed.
(B)
FTP
(A)
TRUE
(C)
SSH
(B)
FALSE
(D)
HTTPS
(E)
Telnet
Question 110. The act of locating and exploiting connections
to wireless local area networks while driving around a city is
Question 107. Given the following passwords, which of these
called:
you would choose to make your account harder to hack?
(A)
Exploit WLAN
(Choose all that apply)
(B)
Social engineering
(A)
3x@m$d1g3$td0tC0m
(C)
War driving
(B)
1234567
(D)
City poisoning
(C)
Mike1978
(D)
rcfPEj43gvRGC23
(E)
admin
Question 108. AAA servers usually support the protocol
TACACS+ and _________________ to communicate with enterprise
resources.
(A)
HTTP
(B)
RADIUS
(C)
FTP
(D)
DNS
135
136
Answers 87-110
Question 87. What is used as the authentication server in
802.1X?
(A)
RADIUS server
(B)
DHCP server
(C)
TACACS+ server
(D)
DNS server
(A)
Simulated Attack
(B)
Penetration Testing
(C)
Attack Testing
(D)
Identify Weak Spots
Explanation 88. Penetration Testing is the correct answer.
An authorized simulated attack on a system with the purpose
of identifying weak spots that attackers could take advantage
of is known as Penetration Testing.
Explanation 87. RADIUS server is the correct answer.
802.1x is a network authentication protocol that opens ports for
network access when an organization authenticates a user’s
identity and authorizes them for access to the network. The
user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server.
The 802.1X standard is designed to enhance the security of
The attacks are made from security experts to find and exploit
vulnerabilities in a computer system.
Types of pen tests:
1. White box pen test – In a white box test, the hacker will be
provided with some information ahead of time regarding the
target company’s security info.
wireless local area networks (WLANs) that follow the IEEE
802.11 standard. 802.1X provides an authentication framework
for wireless LANs, allowing a user to be authenticated by a central authority.
where the hacker is given no background information besides
the name of the target company.
Question 88. An authorized simulated attack on a system with
the purpose of identifying weak spots that attackers could take
advantage of is known as:
2. Black box pen test – Also known as a ‘blind’ test, this is one
3. Covert pen test – Also known as a ‘double-blind’ pen test,
this is a situation where almost no one in the company is aware
137
138
that the pen test is happening, including the IT and security
(C)
ipconfig
professionals who will be responding to the attack. For covert
(D)
tracert
tests, it is especially important for the hacker to have the scope
and other details of the test in writing beforehand to avoid any
Explanation 89. netstat is the correct answer.
problems with law enforcement.
The command netstat identifies all connections and listening
ports on your device.
4. External pen test – In an external test, the ethical hacker
goes up against the company’s external-facing technology,
Netstat derived from the words network and statistics is a
such as their website and external network servers. In some
command line tool that delivers statistics on all network activi-
cases, the hacker may not even be allowed to enter the com-
ties and informs users on which portsand addresses the corre-
pany’s building. This can mean conducting the attack from a
sponding connections (TCP, UDP) are running and which ports
remote location or carrying out the test from a truck or van
are open for tasks.
parked nearby.
Question 90. Multifactor authentication combines two or more
5. Internal pen test – In an internal test, the ethical hacker per-
independent credentials: what the user knows (password),
forms the test from the company’s internal network. This kind
what the user has (security token) and what the user is (bio-
of test is useful in determining how much damage a disgruntled
metric verification).
employee can cause from behind the company’s firewall.
(A)
TRUE
(B)
FALSE
Question 89. You have been tasked to identify all connections
and listening ports on your device. Assuming you are working
Explanation 90. TRUE is the correct answer.
on a Windows environment. Which command will you type to
Multifactor authentication combines two or more indepen-
complete the task?
dent credentials: what the user knows (password), what the
(A)
ping
user has (security token) and what the user is (biometric verifi-
(B)
netstat
cation).
139
140
your network.
Something you know: A user name, a password, a
passphrase, or a personal identification number (PIN).
A switching loop or bridge loop occurs in computer networks
when there is more than one path between two endpoints. The
Something you have: A physical security device that authen-
loop creates broadcast storms as broadcasts and multicasts
ticates you, such as a smart card, badge, or key fob.
are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flood-
Something you are: Some distinguishing, unique characteris-
ing the network.
tic, such as a biometric.
Question 92. Which of the following switch port protection
Somewhere you are: The location factor; requires you to be in
techniques protects switches against MAC flood attacks?
a space to authenticate.
(A)
Flood guard
(B)
Root guard
Question 91. Which of the following switch port protection
(C)
Spanning tree
techniques ensures that you do not create loops when you
(D)
DHCP snooping
have redundant paths in your network?
(A)
Flood guard
Explanation 92. Flood guard is the correct answer.
(B)
Root guard
Flood guard is a feature that is included in many switches that
(C)
Spanning tree
protect them against MAC flood attacks. When enabled, the
(D)
DHCP snooping
switch will limit the amount of memory used to store MAC addresses for each port.
Explanation 91. Spanning tree is the correct answer.
Spanning Tree Protocol (STP) is a Layer 2 protocol that runs
For example, the switch can limit the number of entries for any
on switches. The main purpose of STP is to ensure that you do
port to 5 entries. Then, if the switch detects an attempt to store
not create bridge loops when you have redundant paths in
more than 5 entries, it raises an alert.
141
142
(D)
Alter a routing table
Question 93. You have been tasked to blacklist certain computers to connect on the Wi-Fi, based on their MAC address.
Explanation 94. Guess a user’s password is the correct an-
Which of the following tools will you use in order to complete
swer.
the task?
A brute force attack is an attempt to crack a password or
(A)
EAP
username using a trial and error approach. In a brute-force at-
(B)
Preshared key
tack, an attacker’s software tries every combination of letters,
(C)
Geofencing
numbers, and special characters to eventually find a string that
(D)
MAC Filtering
matches a user’s password.
Explanation 93. MAC Filtering is the correct answer.
Question 95. __________________ is a physical or logical subnet
MAC filtering is a security method based on access control.
aiming to separate an internal LAN from other untrusted net-
MAC filtering helps in listing a set of allowed devices that you
works. External-facing servers, resources, and/or services are
want on your Wi-Fi and the list of denied devices that you don’t
located in that place, so they are accessible from the internet,
want on your Wi-Fi.
but the rest of the internal LAN remains unreachable and safe.
(A)
ACL
It helps in preventing unwanted access to the network. In a
(B)
Honeynet
way, we can blacklist or white list certain computers based on
(C)
DMZ
their MAC address.
(D)
VLAN
Question 94. What can be accomplished with a brute-force
Explanation 95. DMZ is the correct answer.
attack?
(Demilitarized Zone) also known as perimeter network is a
(A)
Make a server unavailable
physical or logical subnet aiming to separate an internal LAN
(B)
Guess a user’s password
from other untrusted networks.
(C)
Spoof every possible IP address
143
144
External-facing servers, resources, and/or services are located
(B)
Spoofing
in that place, so they are accessible from the internet, but the
(C)
Reconnaissance
rest of the internal LAN remains unreachable and safe.
(D)
Phising
Question 96. Which of the following attacks doesn’t require
Explanation 97. DoS is the correct answer.
the use of technology in order to get access to sensitive data?
A denial-of-service (DoS) attack is a type of cyber attack in
(A)
Social engineering
which a malicious actor aims to render a computer or other de-
(B)
Man-in-the-middle
vice unavailable to its intended users by interrupting the de-
(C)
VLAN Hopping
vice’s normal functioning.
(D)
Ransomware
DoS attacks typically function by overwhelming or flooding a
Explanation 96. Social engineering is the correct answer.
targeted machine with requests until normal traffic is unable to
Social engineering is used for a variety of malicious actions
be processed, resulting in denial-of-service to additional users.
accomplished through human interactions. It uses psychologi-
A DoS attack is characterized by using a single computer to
cal manipulation to trick users into making security mistakes or
launch the attack.
giving away sensitive information.
Question 98. Exploits are a weakness in software systems,
A perpetrator first investigates the intended victim to gather
while vulnerabilities are attacks made to take advantage of ex-
necessary information, such as potential points of entry and
ploits.
weak security protocols, needed to proceed with the attack.
(A)
TRUE
(B)
FALSE
Question 97. Which of the following attacks typically function
by overwhelming or flooding a targeted machine with requests
Explanation 98. FALSE is the correct answer.
until normal traffic is unable to be processed?
Vulnerabilities are a weakness in software systems, while ex-
(A)
ploits are attacks made to take advantage of vulnerabilities.
DoS
145
146
WPA2 uses CCMP-AES. CCMP stands for Counter Mode with
Vulnerabilities are essentially weak points in software code and
Cipher Block Chaining Message Authentication. CCMP pro-
exploits are software programs that were specifically designed
vides authentication, confidentiality, and integrity checking ser-
to attack systems with vulnerabilities.
vices to any cryptographic system in which it is used. Under
the hood of CCMP is the AES algorithm.
Question 99. Which of the following networking attacks redirect online traffic to a fraudulent website that resembles its in-
CCMP is an encryption protocol designed for Wireless LAN
tended destination?
products. It’s an enhanced data cryptographic encapsulation
(A)
DNS poisoning
mechanism designed for data confidentiality and based upon
(B)
Phishing
the Counter Mode with CBC-MAC (CCM mode) of the Ad-
(C)
War-driving
vanced Encryption Standard (AES) standard.
(D)
ARP poisoning
It was created to address the vulnerabilities presented by Wired
Explanation 99. DNS poisoning is the correct answer.
Equivalent Privacy (WEP), a dated, insecure protocol.
DNS poisoning is a networking attack in which the DNS
records are altered aiming to redirect online traffic to a fraudu-
Question 101. Which networking attack uses psychological
lent website that resembles its intended destination.
manipulation to trick users into making security mistakes or
giving away sensitive information
Question 100. Which encryption algorithm is used by WPA2?
(A)
Rogue Access Point
(A)
DES
(B)
Logic Bomb
(B)
CCMP-AES
(C)
Evil Twin
(C)
3DES
(D)
Social Engineering
(D)
RSA
Explanation 101. Social Engineering is the correct answer.
Explanation 100. CCMP-AES is the correct answer.
147
Social engineering is used for a variety of malicious actions
148
accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or
An evil twin access point can also be used in a phishing scam.
giving away sensitive information.
In this type of attack, victims will connect to the evil twin and
will be lured to a phishing site.
A perpetrator first investigates the intended victim to gather
necessary information, such as potential points of entry and
Question 103. File _____________ is used to verify that the con-
weak security protocols, needed to proceed with the attack.
tent of files isn’t modified while transferring over the network.
(A)
Checking
Question 102. Which networking attack is a fake Wi-Fi net-
(B)
Hashing
work that looks like a legitimate access point to steal victims’
(C)
Altering
sensitive details
(D)
Modifying
(A)
Rogue Access Point
(B)
Logic Bomb
Explanation 103. Hashing is the correct answer.
(C)
Evil Twin
File hashing is used to verify that the content of files isn’t mod-
(D)
Social Engineering
ified while transferring over the network.
Explanation 102. Evil Twin is the correct answer.
Question 104. Biometrics uses a unique physical characteristic
An Evil twin is a fake Wi-Fi network that looks like a legitimate
of a person to permit access to a controlled IT resource.
access point to steal victims’ sensitive details. The fake Wi-Fi
(A)
TRUE
access point is used to eavesdrop on users and steal their login
(B)
FALSE
credentials or other sensitive information.
Explanation 104. TRUE is the correct answer.
Because the hacker owns the equipment being used, the victim
Biometrics uses a unique physical characteristic of a person to
will have no idea that the hacker might be intercepting things
permit access to a controlled IT resource.
like bank transactions.
149
150
Question 105. Which one of the following attacks requires the
attacker to be on the same network as the victim?
Explanation 106. SSH and HTTPS are the correct answers.
(A)
DNS poisoning
The only difference between Hypertext Transfer Protocol
(B)
Social engineering
(HTTP) and Hypertext transfer protocol secure
(C)
Logic bomb
(HTTPS) protocols is that HTTPS uses TLS (SSL) to encrypt
(D)
ARP poisoning
normal HTTP requests and responses. As a result, HTTPS is far
more secure than HTTP.
Explanation 105. ARP poisoning is the correct answer.
Address Resolution Protocol (ARP) poisoning is when an at-
File Transfer Protocol (FTP) is a standard Internet protocol for
tacker sends falsified ARP messages over a local area network
transmitting files between computers or servers on the Internet,
(LAN) to link an attacker’s MAC address with the IP address of a
using port 21. FTP is a client-server protocol where a client will
legitimate computer or server on the network.
ask for a file, and a local or remote server will provide it the files.
Once the attacker’s MAC address is linked to an authentic IP
The secure version of the FTP is FTPS (FTP over SSL) which is
address, the attacker can receive any messages directed to the
a secure file transfer protocol that allows you to connect se-
legitimate MAC address. As a result, the attacker can intercept,
curely with your trading partners, customers, and users.
modify, or block communicates to the legitimate MAC address.
SSH, or Secure Shell, is a remote administration protocol that
Question 106. Which of the following protocols are considered
allows users to control and modify their remote servers over the
secure protocols? (Choose all that apply)
Internet. The service was created as a secure replacement for
(A)
HTTP
the unencrypted Telnet and uses cryptographic techniques to
(B)
FTP
ensure that all communication to and from the remote server
(C)
SSH
happens in an encrypted manner.
(D)
HTTPS
(E)
Telnet
Question 107. Given the following passwords, which of these
151
152
you would choose to make your account harder to hack?
TACACS+ and _________________ to communicate with enterprise
(Choose all that apply)
resources.
(A)
3x@m$d1g3$td0tC0m
(A)
HTTP
(B)
1234567
(B)
RADIUS
(C)
Mike1978
(C)
FTP
(D)
rcfPEj43gvRGC23
(D)
DNS
(E)
admin
Explanation 108. RADIUS is the correct answer.
Explanation 107. A and D are the correct answers.
AAA servers usually support the protocol TACACS+ and RA-
One of the most common ways that hackers break into com-
DIUS to communicate with enterprise resources.
puters is by guessing passwords. Simple and commonly used
passwords enable intruders to easily gain access and control of
Authentication, authorization, and accounting (AAA) manage
a computing device.
user activity to and through systems.
You can think of AAA in the following manner:
Here are some useful tips for ensuring your passwords are
1) Authentication: Who is the user?
as strong as possible:
2) Authorization: What is the user allowed to do?
3) Accounting: What did the user do?
1. The longer the password the better
2. Include numbers, symbols, lowercase and uppercase
Cisco implements AAA services in its Identity Services Engine
3. Avoid using personal information such as your name, sur-
(ISE) platform.
name, and birthday
4. Avoid using the same password across multiple sites
AAA servers support the following two protocols to com-
Change your password regularly
municate with enterprise resources:
TACACS+: TACACS+ A Cisco proprietary protocol that sepa-
Question 108. AAA servers usually support the protocol
rates each of the AAA functions. Communication is secure and
153
154
encrypted over TCP port 49.
Explanation 109. TRUE is the correct answer.
One of the key differentiators of TACACS+ is its ability to sepa-
A Logic bomb is a malicious program that is triggered when a
rate authentication, authorization, and accounting as separate
logical condition is met, such as after a number of transactions
and independent functions. This is why TACACS+ is so com-
have been processed or on a specific date (also called a time
monly used for device administration, even though RADIUS is
bomb).
still certainly capable of providing device administration AAA.
Malware such as worms often contains logic bombs, which beRADIUS: Radius is a network protocol that controls user net-
have in one manner and then change tactics on a specific date
work access via authentication and accounting. Commonly
and time.
used by Internet Service Providers (ISPs), cellular network
providers, and corporate and educational networks.
Question 110. The act of locating and exploiting connections
to wireless local area networks while driving around a city is
The RADIUS protocol serves three primary functions:
called:
1. Authenticates users or devices before allowing them access
(A)
Exploit WLAN
to a network
(B)
Social engineering
2. Authorizes those users or devices for specific network ser-
(C)
War driving
vices
(D)
City poisoning
3. Accounts for the usage of those services
Explanation 110. War driving is the correct answer.
Question 109. A Logic bomb is a malicious program that is
War driving, is the act of locating and exploiting connections to
triggered when a logical condition is met, such as after a num-
wireless local area networks while driving around a city, neigh-
ber of transactions have been processed.
borhood, or elsewhere.
(A)
TRUE
(B)
FALSE
To do war driving, you need a vehicle (car), a computer, a wire155
156
less Ethernet card set to work in promiscuous mode, and some
kind of an antenna that can be mounted on top of or positioned
inside the car.
CHAPTER 5
NETWORK TROUBLESHOOTING
AND TOOLS
Because a wireless LAN may have a range that extends beyond
Questions 111-125
an office building, an outside user may be able to intrude into
the network, obtain a free Internet connection, and possibly
gain access to company records and other resources.
Question 111. You have been tasked to label the cables in a
wiring closet. Which of the following tools are you most likely to
use to locate the physical ends of the cable?
(A)
Light meter
(B)
Tone generator
(C)
Loopback adapter
(D)
Spectrum analyzer
Question 112. Identify the hardware tool from the photo below:
157
158
(A)
Cable tester
Question 115. Assuming you are working on a Windows envi-
(B)
Crimper tool
ronment. Type the missing command to discover your IP infor-
(C)
Tone generator
mation, including DHCP and DNS server addresses.
(D)
Punch down tool
(A)
ipconfig/stats
(B)
ipconfig/info
Question 113. Users complain that they can’t reach the site
(C)
ipconfig/all
www.examsdigest.com but they can reach other sites. You try
(D)
ipconfig/address
to access the site and discover you can’t connect either, but
you can ping the site with its IP address. Which of the following
Question 116. Any device that uses the same frequency range
is the most possible cause?
as the wireless device can cause interference.
(A)
Users have wrong IP settings
(A)
TRUE
(B)
The router is doesn't work
(B)
FALSE
(C)
The site www.examsdigest.com
(D)
The DNS server is down
Question 117. Switch 1 port 1 is configured for native VLAN: 1,
allowed VLANs: all. This port connects to switch 2 port 10
Question 114. Assuming you are on a Windows environment,
which is configured for native VLAN: 1, allowed VLANs: 1, 2,
what command will you type to check if a networked device is
and 4 only. In this scenario, a host in VLAN 3 on switch 1 would
reachable?
not be able to communicate with a host on switch 2 in the
(A)
ping
same VLAN.
(B)
nslookup
The above issue is known as a VLAN ________________.
(C)
ipconfig
(A)
error
(D)
route
(B)
mismatch
(C)
misconfiguration
(D)
conflict
159
160
Question 118. Which of the following describes the loss of
signal strength as a signal travels through a particular medium?
(A)
Fake
(A)
Crosstalk
(B)
Untrust
(B)
Jitter
(C)
Clone
(C)
Attenuation
(D)
Rogue
(D)
Latency
Question 121. Which of the following options can’t affect the
Question 119. PC1 can ping the printer device on the Market-
wireless signal in the network?
ing team network but can’t ping the printer on the Sales team
(A)
Refraction
network. Assuming you are working on a Windows environ-
(B)
Reflection
ment, what command will you type to get details about the
(C)
Crosstalk
route that packets go through from the PC1 to the printer on the
(D)
Absorption
Sales team network?
(A)
ping
Question 122. Which of the following tools aids in monitoring
(B)
tracert
network traffic and troubleshooting a network by capturing and
(C)
nslookup
analyzing packets that flow through that network?
(D)
route
(A)
Port scanner
(B)
Packet sniffer
Question 120. A/an _______________ DHCP server is a DHCP
(C)
Protocol analyzer
server set up on a network by an unauthorized user, usually an
(D)
Bandwidth speed tester
attacker. The unauthorized device is commonly a modem with
DHCP capabilities which a user has attached to the network
Question 123. Your co-worker tells you that he is having a
aiming to use it for network attacks such as man in the middle.
problem accessing his email. What is the first step in the troubleshooting process?
(A)
Establish a theory of probable cause
161
(B)
Document the issue
(C)
Establish a plan of action to resolve the problem
(D)
Gather information by asking questions
162
Answers 111-125
Question 111. You have been tasked to label the cables in a
wiring closet. Which of the following tools are you most likely to
Question 124. Which of the following tools can you use to per-
use to locate the physical ends of the cable?
form manual DNS lookups? Assuming you are working on a
(A)
Light meter
Linux environment. (Choose all that apply)
(B)
Tone generator
(A)
route
(C)
Loopback adapter
(B)
pathping
(D)
Spectrum analyzer
(C)
dig
(D)
nslookup
Explanation 111. Tone generator is the correct answer.
(E)
ifconfig
Tone generator. A tone generator applies a tone signal to a
wire pair or single conductor, and trace with an amplifier probe.
Question 125. Which of the following steps is the final step in
When used with the amplifier probe, the tone generator allows
the network troubleshooting process?
technicians to identify a wire within a bundle, at a cross-con-
(A)
Verify full system functionality and, if applicable, imple-
nect or at a remote end.
ment preventive measures
(B)
Implement the solution or escalate as necessary
(C)
Document findings, actions, and outcomes
(D)
Establish a plan of action to resolve the problem and
identify potential effects
163
164
Question 112. Identify the hardware tool from the photo below:
to access the site and discover you can’t connect either, but
you can ping the site with its IP address. Which of the following
is the most possible cause?
(A)
Users have wrong IP settings
(B)
The router is doesn't work
(C)
The site www.examsdigest.com
(D)
The DNS server is down
Explanation 113. The DNS server is down is the correct answer.
(A)
Cable tester
(B)
Crimper tool
(C)
Tone generator
(D)
Punch down tool
The above scenario describes a DNS issue, so the DNS server
is down. By pinging the site with its IP address, you have established that the site is up and running.
Also, users have correct IP settings, and the router works fine,
Explanation 112. Crimper tool is the correct answer.
The crimping tool is a special device used to attach a connector to the end of a phone or network cable. RJ-11 and RJ-45
connectors are the most common connectors used for cables
and they can be attached to the end of a cable only with a
crimping tool.
Question 113. Users complain that they can’t reach the site
www.examsdigest.com but they can reach other sites. You try
as the users can access other sites.
Question 114. Assuming you are on a Windows environment,
what command will you type to check if a networked device is
reachable?
(A)
ping
(B)
nslookup
(C)
ipconfig
(D)
route
165
166
Explanation 114. ping is the correct answer.
(A)
TRUE
In order to check if a networked device is reachable you should
(B)
FALSE
type the command ping in the command line.
Explanation 116. TRUE is the correct answer.
Question 115. Assuming you are working on a Windows envi-
Your wireless network is most probably affected by wireless in-
ronment. Type the missing command to discover your IP infor-
terference when the following symptoms occur: intermittent
mation, including DHCP and DNS server addresses.
connectivity or unexpected disconnections, delays in connec-
(A)
ipconfig/stats
tion and data transfer, slow network speeds, and poor signal
(B)
ipconfig/info
strength.
(C)
ipconfig/all
(D)
ipconfig/address
The usual source for Wi-Fi interference is something that causes radio frequency interference:
Explanation 115. ipconfig/all is the correct answer.
1. The way wireless router is positioned
The command ipconfig/all displays full configuration informa-
2. Physical obstacles, like walls, floors, trees and buildings
tion.
3. Any other wireless appliances that uses the same frequency
range (baby monitors, garage door openers, etc.)
You can discover your IP address, subnet mask, Default gate-
4. Kitchen appliances, such as microwave or fridge
way, DHCP, and DNS IP addresses.The command ipconfig/all
5. Other Wi-Fi networks in the same space
displays full configuration information.
6. Weather conditions can have an impact on wireless signal
You can discover your IP address, subnet mask, Default gate-
Question 117. Switch 1 port 1 is configured for native VLAN: 1,
way, DHCP, and DNS IP addresses.
allowed VLANs: all. This port connects to switch 2 port 10
which is configured for native VLAN: 1, allowed VLANs: 1, 2,
Question 116. Any device that uses the same frequency range
and 4 only. In this scenario, a host in VLAN 3 on switch 1 would
as the wireless device can cause interference.
not be able to communicate with a host on switch 2 in the
167
168
same VLAN.
network.
The above issue is known as a VLAN ________________.
(A)
error
This issue is known as a VLAN mismatch.
(B)
mismatch
(C)
misconfiguration
Question 118. Which of the following describes the loss of
(D)
conflict
signal strength as a signal travels through a particular medium?
(A)
Crosstalk
Explanation 117. mismatch is the correct answer.
(B)
Jitter
VLANs provide a method to segment and organize the net-
(C)
Attenuation
work. Segmenting the network offers some advantages. It pro-
(D)
Latency
vides increased security because devices can communicate
only with other systems in the VLAN.
Explanation 118. Attenuation is the correct answer.
VLANs provide a method to segment and organize the net
Users can see only the systems in their VLAN segment. This
Attenuation refers to any reduction in signal loss, calculated as
can help control broadcast traffic and makes it easier to move
a ratio of the power input signal to the output signal.
end systems around the network.
Network media vary in their resistance to attenuation. Coaxial
Problems can arise when users are moved or otherwise con-
cable generally is more resistant than unshielded twisted-pair
nected to the wrong VLAN. Administrators have to ensure that
(UTP); shielded twisted- pair (STP) is slightly more resistant
the user system is plugged into the correct VLAN port.
than UTP; and fiber-optic cable does not suffer from attenuation.
For example, suppose a network is using port-based VLANs to
assign ports 1 through 4 to the marketing department and ports
Attenuation occurs on computer networks for several rea-
5 through 10 to the sales department. Plugging a sales client
sons including:
into port 2 would make that sales client part of the marketing
1. Range for wireless or length of run for wired networks
169
170
2. Interference from other networks or physical obstructions for
To use tracert, type the tracert command followed by the host-
wireless systems
name of the computer to which you want to trace the route.
3. Wire size, thicker wires are better
For example, suppose that the printer on the Sales team netReducing attenuation in an electrical system and improving
work has an IP of 123.123.123.123 then you can use the com-
performance can be achieved by increasing the power of a sig-
mand tracert 123.123.123.123
nal through a signal amplifier or repeaters.
Question 120. A/an _______________ DHCP server is a DHCP
Question 119. PC1 can ping the printer device on the Market-
server set up on a network by an unauthorized user, usually an
ing team network but can’t ping the printer on the Sales team
attacker. The unauthorized device is commonly a modem with
network. Assuming you are working on a Windows environ-
DHCP capabilities which a user has attached to the network
ment, what command will you type to get details about the
aiming to use it for network attacks such as man in the middle.
route that packets go through from the PC1 to the printer on the
(A)
Fake
Sales team network?
(B)
Untrust
(A)
ping
(C)
Clone
(B)
tracert
(D)
Rogue
(C)
nslookup
(D)
route
Explanation 120. Rogue is the correct answer.
A Rogue DHCP server is a DHCP server set up on a network by
Explanation 119. tracert is the correct answer.
an unauthorized user, usually an attacker. The unauthorized
The tracert command is one of the key diagnostic tools for
device is commonly a modem with DHCP capabilities which a
TCP/IP. It displays a list of all the routers that a packet must go
user has attached to the network aiming to use it for network
through to get from the computer where tracert is run to any
attacks such as man in the middle.
other computer on the Internet.
171
172
Question 121. Which of the following options can’t affect the
causes multipath propagation of signals. This makes the sig-
wireless signal in the network?
nals vulnerable to interference and even fading. Furthermore,
(A)
Refraction
wireless access points (WAPs) get overworked when a signal
(B)
Reflection
sent by one device takes many different paths to get to the re-
(C)
Crosstalk
ceiving systems.
(D)
Absorption
Absorption happens when an RF signal passes into a material
Explanation 121. Crosstalk is the correct answer.
that can absorb some of its energy, then the signal will be at-
Crosstalk is a form of interference in which signals in one cable
tenuated. The more dense the material, the more the signal will
induce electromagnetic interference (EMI) in an adjacent cable.
be attenuated.
The twisting in twisted-pair cabling reduces the amount of
crosstalk that occurs, and crosstalk can be further reduced by
Question 122. Which of the following tools aids in monitoring
shielding cables or physically separating them. Crosstalk is a
network traffic and troubleshooting a network by capturing and
feature of copper cables only – fiber-optic cables do not expe-
analyzing packets that flow through that network?
rience crosstalk.
(A)
Port scanner
(B)
Packet sniffer
Crosstalk is the only option that involves cables so it can’t
(C)
Protocol analyzer
affect a wireless signal.
(D)
Bandwidth speed tester
Refraction is the bending of signals as it passes from one
Explanation 122. Packet sniffer is the correct answer.
medium to another. Refraction causes degradation in signal
A packet sniffer is essentially a tool that aids in monitoring
strength and sometimes loss of communication in Point to
network traffic and troubleshooting a network.
Point links.
It works by capturing and analyzing packets of data that flow
Reflection is caused by light bouncing off of objects, which
through a particular network. Some sniffers come as programs
173
174
you run on a computer, while others manifest as dedicated
Bandwidth speed tester is a way to measure the data flow in
hardware devices.
a network. It’s an indication of how fast the data are transferred
through a network.
A Port scanner is a method for determining which ports on a
network are open. As ports on a computer are the place where
Question 123. Your co-worker tells you that he is having a
information is sent and received. Ports are points at which in-
problem accessing his email. What is the first step in the trou-
formation comes and goes from a computer, so by scanning for
bleshooting process?
open ports, attackers can find weakened pathways with which
(A)
Establish a theory of probable cause
to enter your computer
(B)
Document the issue
(C)
Establish a plan of action to resolve the problem
(D)
Gather information by asking questions
Port scanning is one of the most popular techniques attackers
use to discover services they can exploit to break into your
computer system.
Explanation 123. Gather information by asking questions is
the correct answer.
A Protocol analyzer protocol analyzer captures and analyzes
The information you have at hand is not sufficient to come up
signals and data traffic over a communication channel (not a
with a solution. In this case, the first troubleshooting step would
network).
be to talk to your co-worker and gather more information
about the problem
The difference between a protocol analyzer and packet sniffer
are:
All the other answers are valid troubleshooting steps but only
1. A packet sniffer records packets observed on a network in-
after the information gathering has been completed.
terface.
2. A packet analyzer looks at packets and tries to make some
Question 124. Which of the following tools can you use to per-
inferences about what they contain.
form manual DNS lookups? Assuming you are working on a
Linux environment. (Choose all that apply)
175
176
(A)
route
(A)
Verify full system functionality and, if applicable, imple-
(B)
pathping
ment preventive measures
(C)
dig
(B)
Implement the solution or escalate as necessary
(D)
nslookup
(C)
Document findings, actions, and outcomes
(E)
ifconfig
(D)
Establish a plan of action to resolve the problem and
identify potential effects
Explanation 124. dig and nslookup are the correct answers.
The commands dig and nslookup can be used to perform
Explanation 125. Document findings, actions, and out-
manual DNS lookups on a Linux system.
comes is the correct answer.
The steps you need to follow in order to troubleshoot any net-
The command route displays or modifies the computer’s rout-
work is as follow:
ing table.
1. Identify the problem
2. Establish a theory of probable cause
The command pathping provides useful information about
3. Test the theory to determine the cause
network latency and network loss at intermediate hops be-
4. Establish a plan of action to resolve the problem and identify
tween a source address and a destination address. The com-
potential effects
mand pathping combines the functionality of ping with that of
5. Implement the solution or escalate as necessary
tracert.
6. Verify full system functionality and, if applicable, implement
preventive measures
The command ifconfig displays your IP address in Linux sys-
7. Document findings, actions, and outcomes
tems. The command ifconfig can also be used to configure,
disable and enable a network interface.
Question 125. Which of the following steps is the final step in
the network troubleshooting process?
177
178
Enrich your online experience with Examsdigest.
Your purchase of this product includes free access to all 100+
practice questions online and much more at examsdigest.com.
You will have access for one (1) month. You may also access
our full library of Practice exams and share with other learners.
Send us an email to info@examsdigest.com now and start your
online practice experience!
Examsdigest includes:
✓ Access to 1000+ Questions
THE END
✓ Access to 150+ Quizzes
✓ 6+ Certification Paths
✓ 24/7 Support
✓ Interactive Interview Questions
✓ Access on the go
About examsdigest.
Examsdigest started in 2019 and haven’t stopped smashing it
since. Examsdigest is a global, education tech-oriented company that doesn’t sleep. Their mission is to be a part of your life
transformation by providing you the necessary training to hit
your career goals.
179
180
Download