Uploaded by ALLYN CROPPER

NETWORK+ STUDY GUIDE 2024

advertisement
Introduction to Networking


What is Networking?

Definition and basic understanding of networks.

Importance of networking in today’s world.
Basic Network Concepts

Data transmission fundamentals: Understanding bits, bytes, and binary
data.

Types of networks: LAN (Local Area Network), WAN (Wide Area Network),
WLAN (Wireless Local Area Network), MAN (Metropolitan Area Network),
and PAN (Personal Area Network).
Understanding Network Hardware



Routers and Switches

Functionality and differences.

Basic configuration and usage.
Wireless Access Points and Controllers

How they connect wireless devices to networks.

Basic setup and security considerations.
Other Networking Devices

Modems, firewalls, repeaters, hubs, bridges, and gateways.

Purpose and basic operational principles.
Network Topologies and Types


Common Network Topologies

Star, ring, bus, mesh, and hybrid topologies.

Advantages and disadvantages of each topology.
Wired vs. Wireless Networks

Comparison, including speed, security, and reliability.

Use cases and examples.
IP Addressing and Subnets


Understanding IP Addresses

IPv4 vs. IPv6 differences.

Public vs. private IP addresses, static vs. dynamic IP addressing.
Subnetting Basics

Concept of subnetting, subnet masks, and CIDR notation.

Practical examples and exercises.
Networking Protocols


OSI and TCP/IP Models

Layers, functions, and examples of protocols at each layer.

Understanding how data flows through these models.
Key Protocols

HTTP, HTTPS, FTP, SSH, DNS, DHCP, SNMP, and others.

Purpose and basic functionality.
Network Security Fundamentals


Threats and Vulnerabilities

Types of security threats and potential vulnerabilities in a network.

Basic security concepts and best practices.
Security Protocols

Encryption, firewalls, VPNs, and other security measures.

How they protect network data.
Network Troubleshooting


Common Network Issues

Identifying and troubleshooting common network problems.

Tools: Ping, tracert/traceroute, ipconfig/ifconfig, nslookup, and more.
Troubleshooting Methodology

Steps for systematic troubleshooting: Identify the problem, establish a
theory, test the theory, create an action plan, and document the outcome.
Practical Application and Study Tips



Hands-On Practice

Setting up a home lab.

Using simulation tools like Packet Tracer or GNS3.
Exam Preparation

Familiarizing yourself with the exam objectives.

Practice tests, study groups, and training courses.
Continued Learning

Staying updated with the latest networking trends and technologies.

Joining forums, attending workshops, and engaging with the IT
community.
Conclusion

Recap of the key points.

Encouragement and motivational tips for the certification journey.
For the 2024 Network+ certification exam, candidates should be prepared to:

Understand and explain the basic concepts and importance of networking.

Identify different types of networks and their typical scopes, use cases, and
technologies.

Explain the significance of data transmission fundamentals, including how data is
represented, encoded, and transmitted over a network.
Introduction to Networking
What is Networking?
Networking, in the context of information technology, refers to the practice of connecting
computers, servers, mainframes, network devices, peripherals, or other devices to
exchange information and share resources. The essence of networking lies in enabling
devices to communicate and collaborate over a digital medium, typically using protocols
to govern the exchange of data.
Definition and Basic Understanding of Networks
A network is essentially a collection of interconnected devices that can communicate
with each other, share resources, and exchange information. These networks can vary
in size, design, and functionality, catering to different needs, from sharing a printer in a
small office to enabling complex data exchanges across multinational corporations.
Importance of Networking in Today’s World
Networking is foundational to the modern digital landscape. It underpins the internet,
enabling global connectivity, communication, and data exchange. It's crucial for
business operations, allowing for resource sharing, collaboration, and access to
information. On a broader scale, networking facilitates the functionalities of the internet
of things (IoT), cloud computing, and is pivotal in areas like healthcare, finance,
education, and more, driving innovation and efficiency.
Basic Network Concepts
Data Transmission Fundamentals:

Bits and Bytes: The most basic form of data in computing and digital
communications is the bit, which can have a value of either 0 or 1. Bytes,
consisting of eight bits, represent larger units of data, serving as the fundamental
building block for most types of digital information.

Binary Data: This refers to data that is represented or stored in binary form,
which is a series of 0s and 1s. In networking, binary data is used to encode
information sent across the network, regardless of the type or complexity of the
data.
Types of Networks:

LAN (Local Area Network): This is a network confined to a small geographic
area, like a single building or a campus. LANs are typically used to connect
personal computers and workstations in office environments or homes to share
resources (like printers) and exchange information at high speeds.

WAN (Wide Area Network): WANs cover broad areas, such as cities, states, or
even countries. The internet is the largest WAN, connecting smaller networks
worldwide. WANs are used by businesses and government agencies to conduct
daily activities and facilitate long-distance communications.

WLAN (Wireless Local Area Network): A WLAN uses wireless network
technology, such as Wi-Fi, to connect devices within a limited area like a home,
school, or office building. It provides the flexibility to move around within the area
while maintaining a network connection.

MAN (Metropolitan Area Network): This type of network spans a city or a large
campus. MANs typically connect several LANs within a larger area than what
LANs cover, but smaller than the reach of WANs. They are used to provide
connectivity in areas like citywide government networks, educational networks, or
business networks.

PAN (Personal Area Network): A PAN is designed for personal use within a
range of a few meters. Bluetooth and NFC (Near Field Communication) are
common technologies used to create a PAN, connecting personal devices such
as smartphones, tablets, and wearable technology.
For the 2024 Network+ certification exam, candidates should be prepared to:

Understand the functionalities, configuration, and basic uses of routers and
switches.

Grasp how wireless access points and controllers connect devices to networks,
including their setup and security measures.

Recognize the roles and operational principles of other networking devices like
modems, firewalls, repeaters, hubs, bridges, and gateways.
Understanding Network Hardware
Network hardware is integral to the operation and management of a network, enabling
data communication between devices, internet connectivity, and the implementation of
security protocols. Here's an in-depth look at various network hardware components,
their functionalities, and key considerations for the Network+ certification exam.
Routers and Switches
Functionality and Differences:

Routers: These devices are used to connect multiple networks together and
direct network traffic. Routers operate at the network layer (Layer 3) of the OSI
model, making decisions based on IP addresses. They analyze the destination IP
address of incoming data packets and determine the best path for sending them
to their destination, enabling devices in different networks to communicate with
each other.

Switches: Switches operate at the data link layer (Layer 2) and sometimes at the
network layer. They connect devices within the same network (such as a LAN)
and use MAC addresses to forward data to the correct destination within the
network. By creating a virtual circuit, switches can send data directly to the
intended recipient, which enhances the efficiency and security of the network.
Basic Configuration and Usage:

Routers: Configuration can involve setting up internet connectivity, defining
network boundaries, and configuring routing protocols (like OSPF or EIGRP).
Security settings, such as firewall rules and VPN configurations, are also
essential.

Switches: Initial setup typically includes configuring VLANs (Virtual Local Area
Networks) to segment the network, setting up trunk ports to handle traffic from
multiple VLANs, and implementing Quality of Service (QoS) to prioritize network
traffic.
Wireless Access Points and Controllers
How They Connect Wireless Devices to Networks:

Wireless Access Points (WAPs) allow wireless devices to connect to a wired
network using Wi-Fi. They broadcast wireless signals that devices can detect and
connect to, enabling them to access the network and internet.

Wireless controllers are used to centrally manage multiple access points. They
simplify the deployment, management, and security enforcement of the wireless
network, providing a single point of control for tasks like configuring wireless
settings, managing connections, and applying security policies.
Basic Setup and Security Considerations:

Setup: Involves configuring network SSIDs (Service Set Identifiers), setting up
channels to avoid interference, and ensuring that the firmware is up-to-date for
optimal performance and security.

Security: Essential to protect the network from unauthorized access and threats.
Configurations include implementing WPA3 (Wi-Fi Protected Access 3), setting
up strong passwords, enabling network encryption, and isolating guest networks
from the main network.
Other Networking Devices
Modems, Firewalls, Repeaters, Hubs, Bridges, and Gateways:

Modems: Convert digital data from a computer to analog signals for transmission
over telephone lines (in the case of dial-up) or to digital signals for DSL or cable
systems, enabling internet connectivity.

Firewalls: Act as a barrier between your network and the outside world,
inspecting incoming and outgoing traffic based on a set of rules to block or allow
data, thereby protecting the network from malicious attacks and unauthorized
access.

Repeaters: Simply amplify the signal in a network to extend the transmission
distance. They work at the physical layer and have no intelligence to filter data or
traffic.

Hubs: Basic networking devices that connect multiple Ethernet devices together,
making them act as a single network segment. They operate at the physical layer
and broadcast all data to every port, which can lead to security vulnerabilities and
network inefficiencies.

Bridges: Operate at the data link layer, connecting two networks together and
making them act as a single network. Bridges can filter traffic between different
segments based on MAC addresses, reducing the amount of traffic on a LAN by
dividing it into two segments.

Gateways: Serve as a point of entrance and exit in a network, often connecting
two different networks that use different protocols. They operate at various layers
of the OSI model and translate between different networking formats, protocols,
or data types.
For the 2024 Network+ certification exam, candidates should understand the intricacies
of network topologies, the pros and cons of each, the distinctions between wired and
wireless networks, and the comprehensive details of IP addressing and subnetting.
Mastery of these concepts is crucial for network design, troubleshooting, and efficient
network management.
Network Topologies and Types
Common Network Topologies
Star Topology:

Description: All nodes are connected to a central device (like a switch or a hub)
with point-to-point connections.

Advantages: High reliability, as failure in one cable doesn't affect others; easy to
troubleshoot and manage.

Disadvantages: Dependency on the central device means if it fails, the entire
network goes down; requires more cable than a bus topology.
Ring Topology:

Description: Nodes are connected in a closed loop, with each node connected
to two others, forming a ring.

Advantages: Data is transferred in a predictable direction, reducing the chance
of packet collisions; simple to install and reconfigure.

Disadvantages: A break in the ring can disrupt the entire network; data transfer
delays are possible due to data passing through multiple nodes.
Bus Topology:

Description: All devices share a single communication line or bus.

Advantages: Easy to set up and requires less cable than star topology; costeffective.

Disadvantages: High traffic can slow the network; a fault or break in the main
cable stops all transmission.
Mesh Topology:

Description: Every node is connected to every other node, providing multiple
pathways for data.

Advantages: Provides high redundancy and reliability; eliminates the network
traffic problems.

Disadvantages: Expensive and labor-intensive to install and manage due to the
high number of connections.
Hybrid Topology:

Description: Combination of two or more different types of topologies.

Advantages: Flexible, as it can be designed based on requirements; scalable to
add new components.

Disadvantages: Can be complex to design and maintain; potentially expensive
depending on the complexities.
Wired vs. Wireless Networks
Comparison:

Speed: Wired networks typically offer faster speeds than wireless networks,
although the gap is narrowing with advancements in wireless technology like WiFi 6.

Security: Wired networks are generally considered more secure than wireless
networks, as physical access to the network is required for unauthorized
connections. Wireless networks, while convenient, are more susceptible to
eavesdropping and unauthorized access if not properly secured.

Reliability: Wired networks are less prone to interference and therefore can offer
more consistent connectivity. Wireless networks may be affected by various
forms of interference (e.g., from other wireless devices, physical obstructions, or
weather conditions).
Use Cases and Examples:

Wired Networks: Ideal for environments requiring high-speed connections and
where devices remain stationary, like office buildings, data centers, and gaming
setups.

Wireless Networks: Suited for environments where mobility is essential, or it's
impractical to run cables, like homes, cafes, and public spaces offering Wi-Fi
access.
IP Addressing and Subnets
Understanding IP Addresses
IPv4 vs. IPv6 Differences:

IPv4: Utilizes a 32-bit address scheme allowing for 4.3 billion unique addresses.
It's the most widely used IP address format.

IPv6: Uses a 128-bit address scheme, significantly increasing the number of
available addresses. It was developed to address the long-anticipated problem of
IPv4 address exhaustion.
Public vs. Private IP Addresses:

Public IP Addresses: Unique on the internet and assigned to networking
devices, allowing them to connect to the internet.

Private IP Addresses: Used within private networks and not routable on the
internet. They allow multiple devices to have unique addresses within the
network without using a public IP.
Static vs. Dynamic IP Addressing:

Static IP Addressing: IP addresses are manually assigned to a computer or
device and remain constant.

Dynamic IP Addressing: IP addresses are assigned by a DHCP server,
changing over time.
Subnetting Basics
Concept of Subnetting:

Dividing a larger network into smaller, manageable subnetworks. It enhances
routing efficiency, improves network performance, and enhances security.
Subnet Masks and CIDR Notation:

Subnet Mask: Determines the network portion of an IP address. It's used to
differentiate the network segment of the address from the host segment.

CIDR (Classless Inter-Domain Routing) Notation: A method used to create
unique identifiers for networks and individual devices. It uses a syntax like IPv4
address followed by a slash and a number (e.g., 192.168.1.0/24) indicating how
many bits are used for the network address.
Practical Examples and Exercises:

Creating subnets by dividing a network into smaller parts. For instance, taking a
192.168.1.0 network with a 255.255.255.0 subnet mask (or /24 in CIDR notation)
and subdividing it into smaller subnets, like 192.168.1.0/25 and
192.168.1.128/25, each hosting up to 126 hosts.
For the 2024 Network+ certification exam, it is crucial to understand the functions of the
OSI and TCP/IP models, how data flows through these layers, and the roles of various
key networking protocols. A deep comprehension of these elements is fundamental to
network design, troubleshooting, and security.
Networking Protocols
OSI and TCP/IP Models
OSI Model:
The OSI (Open Systems Interconnection) model is a conceptual framework used to
understand network interactions in seven layers. Each layer serves specific functions
and communicates with the layers directly above and below it.
1. Physical Layer (Layer 1):

Function: Transmits raw bit streams over physical mediums (like cables,
fiber optics).

Protocols/Examples: Ethernet, DSL, ISDN.
2. Data Link Layer (Layer 2):

Function: Defines protocols for data framing, MAC addressing, and error
handling.

Protocols/Examples: Ethernet, PPP, Switch, MAC (Media Access
Control).
3. Network Layer (Layer 3):

Function: Manages device addressing, tracks the location of devices on
the network, and determines the best way to move data.

Protocols/Examples: IP (Internet Protocol), ICMP, IPSec, routers.
4. Transport Layer (Layer 4):

Function: Provides reliable, transparent transfer of data between end
systems.

Protocols/Examples: TCP (Transmission Control Protocol), UDP (User
Datagram Protocol).
5. Session Layer (Layer 5):

Function: Manages sessions or connections between applications.

Protocols/Examples: NetBIOS, SSH, TLS.
6. Presentation Layer (Layer 6):

Function: Translates data between the application layer and the network
format.

Protocols/Examples: SSL, TLS, ASCII, JPEG, MPEG.
7. Application Layer (Layer 7):

Function: Provides network services to end-user applications.

Protocols/Examples: HTTP, FTP, SMTP, DNS.
TCP/IP Model:
The TCP/IP model is a more practical model that has been used to develop the Internet.
It has four layers:
1. Link Layer (Network Interface Layer):

Corresponds to the OSI’s physical and data link layers.

Function: Handles the physical transmission of data.
2. Internet Layer (Network Layer):

Corresponds to the OSI’s network layer.

Function: Manages logical addressing, routing, and packet forwarding.

Protocols/Examples: IP, ICMP.
3. Transport Layer:

Similar to the OSI’s transport layer.

Function: Provides end-to-end data transfer services and can establish a
connection between hosts.

Protocols/Examples: TCP, UDP.
4. Application Layer:

Combines the OSI model’s application, presentation, and session layers.

Function: Supports application and end-user processes.

Protocols/Examples: HTTP, FTP, DNS.
Understanding Data Flow Through These Models:
Data flows down from the application layer to the physical layer when sent and flows up
from the physical layer to the application layer when received. Each layer adds or
removes its headers or trailers, encapsulating data as it goes down and decapsulating it
as it comes up.
Key Protocols


HTTP (Hypertext Transfer Protocol):

Purpose: The foundation of data communication for the World Wide Web;
used for transmitting web pages.

Functionality: Uses a request-response model where a client sends a
request and the server responds, usually with a web page.
HTTPS (HTTP Secure):






Purpose: An extension of HTTP, it is used for secure communication over
a computer network within a web browser.

Functionality: Utilizes TLS/SSL to encrypt the session.
FTP (File Transfer Protocol):

Purpose: Used for the transfer of computer files between a client and
server on a network.

Functionality: Supports both active and passive modes, allowing for data
to be uploaded or downloaded.
SSH (Secure Shell):

Purpose: A cryptographic network protocol for operating network services
securely over an unsecured network.

Functionality: Provides a secure channel over an unsecured network in a
client-server architecture.
DNS (Domain Name System):

Purpose: Translates human-readable domain names (like
www.example.com) into machine-readable IP addresses.

Functionality: Prevents the need for humans to memorize IP addresses.
DHCP (Dynamic Host Configuration Protocol):

Purpose: Assigns IP addresses and other network configurations to
devices (clients) automatically, allowing them to communicate on the
network.

Functionality: Automates the IP configuration process, including IP
address, subnet mask, default gateway, and DNS server information.
SNMP (Simple Network Management Protocol):

Purpose: Collects and organizes information about managed devices on
IP networks and modifies that information to change device behavior.

Functionality: Used mostly in network management systems to monitor
network-attached devices for conditions that warrant administrative
attention.
In preparing for the 2024 Network+ certification exam, understanding these aspects of
network security is vital. Candidates should be well-versed in recognizing different types
of security threats, understanding the vulnerabilities that might exist in a network,
knowing the fundamental security principles and best practices, and being familiar with
the various security protocols and measures that can be implemented to protect
network data.
Network Security Fundamentals
Understanding network security is crucial for protecting data, maintaining privacy, and
ensuring the integrity of network infrastructure. The Network+ certification exam in 2024
will likely cover a comprehensive range of topics related to network security
fundamentals, including threats, vulnerabilities, security concepts, best practices, and
security protocols.
Threats and Vulnerabilities
Types of Security Threats:

Malware: Malicious software, including viruses, worms, trojans, ransomware,
and spyware, designed to harm or exploit any programmable device, service, or
network.

Phishing: A social engineering attack aiming to steal user data, including login
credentials and credit card numbers, by masquerading as a trustworthy entity in
electronic communication.

Man-in-the-Middle (MitM) Attacks: Where the attacker secretly intercepts and
possibly alters the communication between two parties who believe they are
directly communicating with each other.

Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks:
Inundating the target with a flood of internet traffic to overload the resources and
bandwidth, rendering the network or system unavailable.

Insider Threats: Security threats originating from within the organization, often
by employees or former employees accessing the network maliciously, or
negligently.

Advanced Persistent Threats (APTs): Prolonged and targeted cyberattacks in
which an intruder gains access to a network and remains undetected for an
extended period.
Potential Vulnerabilities in a Network:

Weak Passwords: Simple or commonly used passwords can be easily guessed
or cracked.

Outdated Software: Unpatched software can contain exploitable vulnerabilities.

Configuration Errors: Improperly configured networks can expose
vulnerabilities and open the door to unauthorized access.

Lack of Encryption: Unencrypted data can be intercepted and read by
unauthorized parties.

Insufficient Network Segmentation: Lack of segmentation can allow lateral
movement across the network for a compromised host.
Basic Security Concepts and Best Practices
Basic Security Concepts:

Confidentiality, Integrity, and Availability (CIA Triad): Fundamental principles
guiding IT security policies where data should remain confidential, accurate, and
available when needed.

Least Privilege: Ensuring users only have the access that is strictly necessary to
perform their jobs.

Defense in Depth: Employing multiple layers of security controls throughout the
IT system.
Best Practices:

Regular Updates and Patch Management: Keeping systems and software
updated to protect against known vulnerabilities.

Strong Password Policies: Enforcing complex passwords and regular changes
to prevent unauthorized access.

Employee Training: Educating staff on recognizing phishing attempts, the
importance of security practices, and how to report suspicious activity.

Backup and Recovery: Implementing regular backups and a solid disaster
recovery plan to ensure data can be restored in case of a security incident or
data loss.
Security Protocols
Encryption:

Encrypts data to ensure that it is secure and unreadable to unauthorized users,
both in transit and at rest. Common encryption standards include AES (Advanced
Encryption Standard) and TLS (Transport Layer Security).
Firewalls:

Act as a barrier between secure internal networks and untrusted external
networks, such as the internet. They use a set of defined rules to allow or block
traffic and can be hardware-based, software-based, or both.
Virtual Private Networks (VPNs):

Create a secure and encrypted connection over a less secure network, typically
the internet. VPNs allow remote users to securely connect to the organization's
network and shield browsing activity from prying eyes on public Wi-Fi.
Other Security Measures:

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS):
Monitor network traffic for suspicious activity and known threats, sending alerts,
and taking preventive action.

Secure Socket Layer (SSL)/Transport Layer Security (TLS): Protocols for
establishing authenticated and encrypted links between networked computers.

Multi-Factor Authentication (MFA): Requires more than one method of
authentication from independent categories of credentials to verify the user's
identity for a login or other transaction.
For the 2024 Network+ certification exam, candidates should be well-prepared to
tackle questions on network troubleshooting. They should understand how to
effectively use common network diagnostic tools and be familiar with a
structured approach to identifying and resolving network issues, ensuring they
can maintain the reliability and efficiency of network infrastructure.
Network Troubleshooting
Network troubleshooting is a critical skill for IT professionals, essential for identifying,
diagnosing, and resolving network problems. The Network+ certification exam in 2024
will likely cover various aspects of network troubleshooting, including common network
issues, essential tools, and a systematic methodology for resolving problems.
Common Network Issues
Network professionals frequently encounter several common issues, including:

Connectivity Problems: Users may be unable to connect to the network, the
internet, or specific network resources. Causes can range from incorrect
configurations, faulty cables, or hardware failures to issues with network services
like DHCP or DNS.

Slow Network Performance: This can be caused by congestion, inadequate
bandwidth, hardware malfunctions, or misconfigurations leading to high latency
or packet loss.

Intermittent Connectivity: This includes connections that frequently drop and
reconnect, often due to wireless interference, faulty hardware, or unstable
network services.

IP Address Conflicts: Occur when two devices on the same network are
assigned or claim the same IP address, leading to network access issues for one
or both devices.

DNS Resolution Issues: Problems resolving domain names to IP addresses can
lead to users being unable to access websites or network services.
Tools for Network Troubleshooting
Several essential tools are commonly used for diagnosing network issues:

Ping: A utility that sends ICMP echo requests to a target host and listens for
replies. It's used to verify that a host is operational and reachable over the
network.

Tracert/Traceroute: These tools trace the path that a packet takes to reach a
destination. They are useful for identifying points of failure or delays in the
network.

Ipconfig/Ifconfig: These commands display the current network configuration,
including IP address, subnet mask, default gateway, and more. They're crucial for
verifying the correct setup of network interfaces.

Nslookup/Dig: These tools query DNS servers to find the IP address associated
with a domain name, helping diagnose DNS resolution problems.
Using these tools, technicians can quickly pinpoint the nature and location of a network
issue, which is the first step in resolving the problem.
Troubleshooting Methodology
A systematic approach to troubleshooting involves several key steps:
1. Identify the Problem:

Gather information from users and monitor the network to understand the
symptoms and pinpoint the affected areas. Clear documentation of the
problem's symptoms and affected users or systems is crucial.
2. Establish a Theory of Probable Cause:

Based on the information gathered, hypothesize what might be causing
the problem. Consider the most common causes first, then move to the
less obvious.
3. Test the Theory:

Implement testing to confirm if your theory is correct. This might involve
reproducing the issue, checking and swapping hardware, or using
diagnostic tools to monitor the network.
4. Create an Action Plan:

Once the cause is confirmed, develop a plan to resolve the issue. This
plan should include steps to fix the problem, potential impacts on the
network, and a rollback plan if the solution doesn't work as expected.
5. Implement the Solution:

Execute the action plan, monitoring the network's response to ensure the
problem is resolved and no new issues are introduced.
6. Verify Full System Functionality:

Confirm that the system is fully operational and that the original issue has
been resolved. Check with the end-users or affected services to ensure
that everything is functioning correctly.
7. Document the Outcome:

Record the problem, the solution implemented, and any follow-up steps or
preventive measures taken. This documentation can be invaluable for
addressing future incidents or preventing recurring issues.
1. Which layer of the OSI model is responsible for end-to-end data transmission?
A. Presentation
B. Transport
C. Network
D. Data Link
2. What does the subnet mask 255.255.255.0 correspond to in CIDR notation?
A. /24
B. /25
C. /16
D. /32
3. Which protocol is used to automatically assign IP addresses to network devices?
A. DNS
B. DHCP
C. FTP
D. SNMP
4. What type of address is FE80::1?
A. Global Unicast
B. Link-Local
C. Unique Local
D. Multicast
5. Which device interconnects multiple networks and determines the optimal path for
data packets?
A. Switch
B. Router
C. Bridge
D. Repeater
6. What is the primary function of a firewall?
A. To connect different network segments
B. To provide a DHCP service
C. To filter incoming and outgoing network traffic
D. To amplify the signal strength
7. In which situation would you use a crossover cable?
A. To connect a PC to a switch
B. To connect a PC to a router
C. To connect two switches together
D. To connect a PC directly to another PC
8. What wireless networking standard operates at 5 GHz and offers speeds up to 3.5
Gbps?
A. 802.11n
B. 802.11ac
C. 802.11b
D. 802.11g
9. Which of the following is a characteristic of a mesh topology?
A. Devices are connected to a central hub.
B. Each device is connected to every other device.
C. Data travels along a single path through connected devices.
D. Uses a token to prevent collisions.
10. What is the main purpose of STP (Spanning Tree Protocol)?
A. To enable routing on a multilayer switch
B. To prevent routing loops in a network
C. To prevent broadcast storms and loops in a network
D. To encrypt data packets
11. Which protocol is used to encrypt packets over an untrusted network?
A. SNMP
B. SSH
C. HTTPS
D. TLS
12. What is the purpose of QoS in networking?
A. To prioritize certain types of network traffic
B. To distribute IP addresses
C. To provide a secure connection over the internet
D. To connect multiple branch offices over the internet
13. In a DNS hierarchy, what is the term used for the record that translates a domain
name into an IP address?
A. MX record
B. CNAME record
C. A record
D. PTR record
14. Which of these is a valid IPv6 address?
A. 2001:db8::8a2e:370:7334
B. 192.168.1.1
C. 2001:db8:85a3
D. FE80:CD00:0000:0CDE:1257:0000:211E:729C
15. What technology allows multiple VLANs to run on a single physical Ethernet link?
A. VPN
B. NAT
C. Trunking
D. Bridging
16. Which protocol is responsible for mapping IP addresses to MAC addresses?
A. ARP
B. RARP
C. ICMP
D. PPP
17. What is the maximum transmission speed of Cat6 cable?
A. 10 Gbps
B. 100 Mbps
C. 1 Gbps
D. 10 Mbps
18. What type of DNS record is used to map a domain to another domain name?
A. A record
B. MX record
C. CNAME record
D. SRV record
19. Which IEEE standard is associated with Ethernet?
A. 802.3
B. 802.11
C. 802.5
D. 802.15
20. What is the function of the command "traceroute"?
A. It displays the route that packets take to reach a network host.
B. It converts IP addresses into domain names.
C. It displays the current TCP/IP network configuration values.
D. It modifies the routing table.
21. Which of the following is a benefit of VLANs?
A. They can increase the speed of network connections.
B. They consolidate broadcast domains.
C. They simplify software installations.
D. They segment a network into separate broadcast domains.
22. What is the primary purpose of SNMP?
A. To provide network encryption
B. To manage networked devices
C. To facilitate network routing
D. To offer an alternative to TCP/IP
23. In which layer of the OSI model do switches operate?
A. Application
B. Network
C. Data Link
D. Transport
24. What is the typical use of an IPSec VPN?
A. To connect a device to a wireless network
B. To encrypt traffic between secure sites over the internet
C. To broadcast wireless signals
D. To assign IP addresses to devices on a network
25. Which term describes the isolation of network services from one another or from the
internet for security purposes?
A. Network Address Translation (NAT)
B. Demilitarized Zone (DMZ)
C. Subnetting
D. Segmentation
26. What is the main difference between TCP and UDP?
A. TCP is connection-oriented, whereas UDP is connectionless.
B. TCP is faster than UDP.
C. UDP provides reliable data transmission, whereas TCP does not.
D. TCP is used for voice traffic, whereas UDP is used for video traffic.
27. Which device is used to connect multiple devices within one LAN and operates at
the data link layer of the OSI model?
A. Router
B. Switch
C. Modem
D. Access Point
28. What is the primary function of a VPN?
A. To create a private network over a public network
B. To increase internet speed
C. To replace wired networks
D. To broadcast Wi-Fi signals
29. Which protocol is commonly used for automated network device configuration?
A. HTTP
B. SNMP
C. FTP
D. TFTP
30. What is the main advantage of using fiber optic cables over copper cables?
A. Lower cost
B. Better security
C. Higher data transmission speed and longer distances
D. Easier to splice
31. Which Wi-Fi encryption method is considered the most secure?
A. WEP
B. WPA
C. WPA2
D. WPA3
32. What is the purpose of port forwarding in a network?
A. To redirect network traffic from one port to another port
B. To filter spam emails
C. To encrypt data packets
D. To assign IP addresses
33. Which of the following is considered a best practice for securing IoT devices?
A. Using default passwords for convenience
B. Connecting directly to the internet without a firewall
C. Regularly updating device firmware
D. Disabling unused protocols and ports
34. In the context of data networking, what does the acronym MTU stand for?
A. Maximum Transmission Unit
B. Multi-Transmission User
C. Minimum Transfer Usage
D. Maximum Throughput Utility
35. Which of the following is NOT a common feature of NGFW (Next-Generation
Firewall)?
A. Stateful inspection
B. Integrated intrusion prevention
C. Application awareness and control
D. Simple packet filtering
36. Which command is used to display the MAC address table on a switch?
A. show mac-address-table
B. show ip interface
C. display mac-address-table
D. get mac-addr
37. What is a characteristic of a Layer 3 switch?
A. It cannot make routing decisions.
B. It operates only in the data link layer.
C. It can perform routing functions based on IP addresses.
D. It is primarily used for WAN connections.
38. Which wireless topology involves devices communicating directly with each other
rather than through a central access point?
A. Mesh
B. Ad-hoc
C. Star
D. Ring
39. What is the main function of a load balancer in a network?
A. To distribute incoming network traffic across multiple servers
B. To balance the power supply to networking equipment
C. To equalize the storage space used by multiple applications
D. To distribute IP addresses to client devices
40. Which network monitoring tool is used to capture and analyze the traffic passing
through a network?
A. NetFlow
B. Wireshark
C. SolarWinds
D. Nagios
41. In network security, what is the purpose of a honeypot?
A. To attract and detect potential hackers
B. To encrypt data traffic
C. To filter out spam emails
D. To provide redundant network connections
42. Which of the following describes the purpose of a VLAN?
A. To extend a network over long distances
B. To provide a backup network route
C. To divide a network into logical segments
D. To encrypt network traffic
43. What is indicated by a subnet mask of 255.255.255.248?
A. 30 usable IP addresses
B. 8 usable IP addresses
C. 6 usable IP addresses
D. 16 usable IP addresses
44. Which command on a Cisco router is used to view the current routing table?
A. show routing-table
B. display ip route
C. show ip route
D. view routing-table
45. What mechanism do MPLS networks use to ensure that packets follow a predefined
path?
A. IP addressing
B. Label switching
C. Circuit switching
D. Path vectors
46. What does the "S" in HTTPS stand for?
A. Secure
B. Speed
C. Simple
D. Standard
47. In a wireless network, what does SSID stand for?
A. System Signal Identification
B. Secure Set Identifier
C. Service Set Identifier
D. Subnet Service Identifier
48. Which type of backup strategy involves copying only the data that has changed
since the last full backup?
A. Differential backup
B. Incremental backup
C. Mirror backup
D. Full backup
49. What is typically used in a data center to reduce the number of physical servers
required?
A. SDN
B. Virtualization
C. VLAN
D. VPN
50. Which protocol provides secure file transfer capabilities over a secure shell (SSH)
connection?
A. SFTP
B. SCP
C. FTPS
D. TFTP
50-question practice test:
1. B - Transport
2. A - /24
3. B - DHCP
4. B - Link-Local
5. B - Router
6. C - To filter incoming and outgoing network traffic
7. D - To connect a PC directly to another PC
8. B - 802.11ac
9. B - Each device is connected to every other device.
10. C - To prevent broadcast storms and loops in a network
11. B - SSH
12. A - To prioritize certain types of network traffic
13. C - A record
14. A - 2001:db8::8a2e:370:7334
15. C - Trunking
16. A - ARP
17. A - 10 Gbps
18. C - CNAME record
19. A - 802.3
20. A - It displays the route that packets take to reach a network host.
21. D - They segment a network into separate broadcast domains.
22. B - To manage networked devices
23. C - Data Link
24. B - To encrypt traffic between secure sites over the internet
25. D - Segmentation
26. A - TCP is connection-oriented, whereas UDP is connectionless.
27. B - Switch
28. A - To create a private network over a public network
29. D - TFTP
30. C - Higher data transmission speed and longer distances
31. D - WPA3
32. A - To redirect network traffic from one port to another port
33. C - Regularly updating device firmware
34. A - Maximum Transmission Unit
35. D - Simple packet filtering
36. A - show mac-address-table
37. C - It can perform routing functions based on IP addresses.
38. B - Ad-hoc
39. A - To distribute incoming network traffic across multiple servers
40. B - Wireshark
41. A - To attract and detect potential hackers
42. C - To divide a network into logical segments
43. C - 6 usable IP addresses
44. C - show ip route
45. B - Label switching
46. A - Secure
47. C - Service Set Identifier
48. A - Differential backup
49. B - Virtualization
50. A – SFTP
1. Configure a Router:

Configure a router with a given IP address, subnet mask, and default
gateway.
2. Set Up VLANs:

Create two VLANs on a switch and assign ports to each VLAN.
3. Implement a Wireless Network:

Configure a wireless access point with a specific SSID and WPA2 security.
4. Troubleshoot Connectivity Issues:

Identify the misconfiguration causing a lack of connectivity between two
hosts.
5. Subnetting Exercise:

Given a network address and subnet mask, determine the usable IP
address range.
6. Configure NAT:

Set up NAT on a router to translate private IP addresses to a public IP
address.
7. Firewall Configuration:

Implement firewall rules to block a specific IP address and allow HTTP
traffic.
8. Set Up DHCP:

Configure a DHCP server with a specific IP address pool and lease time.
9. VPN Configuration:

Establish a VPN connection using provided credentials and verify
connectivity.
10. Optimize QoS:

Configure Quality of Service to prioritize VoIP traffic on a network.
11. Diagnose DNS Issues:

Identify and fix a DNS configuration error preventing a client from
accessing a website.
12. Install a Certificate:

Install and verify a security certificate on a web server.
13. Patch Management:

Schedule a patch update on a network device to fix a known vulnerability.
14. Network Monitoring:

Set up a network monitoring tool to alert on high bandwidth usage.
15. Configure SNMP:

Set up SNMP on a network device for monitoring purposes with a specific
community string.
16. Traffic Analysis:

Analyze network traffic to identify the source of unusual traffic patterns.
17. Restore from Backup:

Restore network configuration from a backup file after a device failure.
18. Wireless Security:

Enhance the security of a wireless network by implementing MAC address
filtering.
19. Cable Management:

Document a patch panel and switch configuration in a rack diagram.
20. Inter-VLAN Routing:

Configure a router to enable communication between two VLANs.
21. Bandwidth Utilization:

Adjust bandwidth settings to alleviate network congestion based on traffic
analysis.
22. Threat Identification:

Identify the type of security threat in a given network log excerpt.
23. Data Recovery Plan:

Create a data recovery plan for a network following a data breach incident.
24. Switch Security:

Configure port security on a switch to limit access to authorized MAC
addresses.
25. Load Balancing:

Set up a load balancer to distribute web traffic evenly across three
servers.
26. Secure Network Architecture:

Design a secure network layout incorporating firewalls, DMZ, and
segregated networks.
27. Protocol Analysis:

Use a packet sniffer to identify protocols in the network traffic and report
on the predominant protocol used.
28. Cloud Connectivity:

Configure a secure connection to a cloud service provider for data
storage.
29. Mobile Networking:

Set up a network configuration for secure mobile device connectivity in a
corporate environment.
30. Incident Response:

Develop an incident response plan for a suspected network intrusion.
31. Disaster Recovery Simulation:

Execute a disaster recovery plan for a network following a simulated
catastrophic failure.
32. Remote Access Configuration:

Set up a remote access solution for employees to access the corporate
network securely from home.
33. Network Upgrade Plan:

Plan a network upgrade to increase capacity, including the selection of
new devices and configuration changes.
34. IPv6 Implementation:

Configure a network device to use IPv6 addressing and verify connectivity.
35. Change Management:

Document a change management procedure for a network configuration
change.
36. Compliance Auditing:

Perform a network audit to ensure compliance with industry security
standards.
37. Multicast Configuration:

Configure multicast routing on a network and verify that multicast traffic is
being routed correctly.
38. Encryption Configuration:

Configure end-to-end encryption on a network communication channel.
39. Network Troubleshooting Simulation:

Troubleshoot a simulated network issue based on provided symptoms and
resolve the problem.
40. Root Cause Analysis:

Conduct a root cause analysis for a recurring network issue and propose a
solution.
41. Link Aggregation:

Configure link aggregation on a switch to increase bandwidth and provide
redundancy.
42. Power Over Ethernet (PoE):

Set up a PoE switch to power IP cameras and VoIP phones efficiently.
43. Content Filtering:

Implement content filtering on a network to block access to specific
websites.
44. Network Segmentation:

Create a segmented network design to isolate critical devices and data.
45. Failover Testing:

Conduct failover testing to ensure network redundancy mechanisms are
functional.
46. Security Policy Review:

Review and update a network security policy to address new threats.
47. Automated Alert System:

Configure an automated alert system for network performance
degradation.
48. VoIP Configuration:

Set up a VoIP system on the network, ensuring proper configuration for
voice quality.
49. Physical Security Integration:

Integrate physical security controls with the network, such as IP-based
surveillance cameras.
50. IoT Device Integration:

Securely integrate IoT devices into the network, ensuring they are isolated
from critical network resources.
PERFORMANCE BASED ANSWERS
1. Configure a Router:
 Access the router’s configuration interface (CLI/GUI).
 Enter the configuration mode.
 Assign the IP address and subnet mask to the interface.
 Set the default gateway.
 Save the configuration.
2. Set Up VLANs:
Access the switch’s configuration mode.
Create VLANs and assign them identifiers.
Assign switch ports to the VLANs.
Configure trunking on ports connecting to other VLAN-aware devices.
Save the configuration.
3. Implement a Wireless Network:
 Log into the wireless access point’s admin interface.
 Configure the SSID name.
 Set the security mode to WPA2 and enter a strong password.
 Apply and save settings.
4. Troubleshoot Connectivity Issues:
 Verify physical connectivity.
 Check IP configuration settings.
 Use ping or traceroute to isolate the problem.
 Check for any misconfigurations or hardware issues.
5. Subnetting Exercise:
 Calculate the subnet’s range based on the given IP address and subnet
mask.
 Determine the network, broadcast, and usable IP addresses.
 Ensure the subnetting meets the network design requirements.
6. Configure NAT:
 Access the router’s configuration interface.
 Define the inside and outside interfaces.
 Configure the NAT translation rules.
 Test the NAT implementation.
7. Firewall Configuration:
 Log into the firewall interface.
 Create or modify an access control list (ACL).
 Specify the IP address to block or the service/protocol to allow.
 Apply and save the ACL.
8. Set Up DHCP:
 Access the DHCP server or router’s DHCP settings.
 Define the IP address range (pool).
 Set the subnet mask, default gateway, and DNS.
 Activate the DHCP service.
9. VPN Configuration:
 Access the VPN server or appliance settings.
 Configure the VPN type and enter the required credentials.
 Set up any required routing or security settings.
 Test the VPN connection for functionality.
10. Optimize QoS:
 Access the network device’s QoS settings.
 Define traffic classes or identify VoIP traffic.
 Assign a high priority level to VoIP traffic.
 Apply and verify the QoS settings.





11. Diagnose DNS Issues:
 Verify the DNS server settings.
 Use nslookup or dig to test DNS resolution.
 Check for incorrect DNS entries or connectivity issues.
 Correct any misconfigurations or update DNS records as necessary.
12. Install a Certificate:
 Access the web server’s configuration interface.
 Navigate to the security or certificate settings.
 Import and install the provided certificate.
 Verify the installation by accessing the server via HTTPS.
13. Patch Management:
 Identify the network device requiring updates.
 Download the appropriate firmware or software patch.
 Apply the update according to the manufacturer’s instructions.
 Verify that the patch has been applied successfully.
14. Network Monitoring:
 Install or access a network monitoring tool.
 Configure the tool to monitor network traffic and set thresholds.
 Enable alerts for high bandwidth usage.
 Review the monitoring reports and adjust configurations if necessary.
15. Configure SNMP:
 Access the device’s SNMP settings.
 Set the community string and SNMP version.
 Configure SNMP permissions and target monitoring system.
 Test SNMP communication with the monitoring system.
16. Traffic Analysis:
 Use a network analyzer tool to capture network traffic.
 Review the captured data to identify traffic patterns.
 Determine the source of unusual traffic.
 Implement measures to mitigate any identified issues.
17. Restore from Backup:
 Locate the network configuration backup file.
 Access the device needing restoration.
 Use the device’s interface to restore the configuration from the backup.
 Verify that the restoration was successful and that the device is
functioning correctly.
18. Wireless Security:
 Access the wireless access point settings.
 Navigate to the MAC address filtering section.
 Add the approved MAC addresses to the filter list.
 Enable MAC address filtering and save the settings.
19. Cable Management:
 Document each cable’s origin and destination in the network setup.
 Update the network diagram to reflect the current cabling configuration.

Ensure all cables are labeled and organized according to the
documentation.
20. Inter-VLAN Routing:
 Configure a router or a Layer 3 switch for inter-VLAN routing.
 Assign appropriate IP addresses to each VLAN interface.
 Enable routing protocols if necessary or configure static routes.
 Test connectivity between VLANs to ensure proper routing.
21. Bandwidth Utilization:
 Analyze network traffic to identify high bandwidth usage.
 Determine if the bandwidth usage is legitimate or due to unnecessary
services.
 Implement bandwidth limits or QoS policies to manage usage.
 Monitor the effects of the changes and adjust as necessary.
22. Threat Identification:
 Review network logs or security alerts to identify the threat.
 Analyze the nature of the threat and its potential impact.
 Implement appropriate security measures to mitigate the threat.
 Update security policies and systems to protect against future
occurrences.
23. Data Recovery Plan:
 Develop a plan outlining steps to recover lost data, including backup
sources, recovery sites, and personnel involved.
 Ensure the plan includes regular backup schedules, testing, and validation
processes.
 Document the plan and communicate it to the relevant stakeholders.
24. Switch Security:
 Access switch port security settings.
 Configure the switch to restrict access to each port by limiting the number
of MAC addresses or by specifying allowed MAC addresses.
 Enable port security features like sticky MAC or shutdown modes.
 Test the configuration to ensure unauthorized devices are denied access.
25. Load Balancing:
 Configure the load balancer with the IP addresses of the servers that will
share the load.
 Set up the load balancing method (e.g., round-robin, least connections).
 Define health checks to ensure traffic is only sent to operational servers.
 Test the load balancer to ensure it distributes traffic evenly and fails over
correctly.
26. Secure Network Architecture:
 Design a network diagram that includes firewalls, DMZ zones, and
segregated internal networks.
 Ensure proper placement of security appliances and correct routing paths.
 Incorporate best practices for secure network design, such as least
privilege access.
 Review the design for potential security flaws or vulnerabilities.
27. Protocol Analysis:



Capture a segment of network traffic using a protocol analyzer.
Review the captured data to identify the protocols in use.
Analyze the protocol distribution to determine the network’s primary traffic
type.
 Report findings and suggest optimizations based on the analysis.
28. Cloud Connectivity:
 Establish a secure connection to the cloud provider using VPN or direct
connect solutions.
 Configure the network to allow for seamless data transfer to the cloud
environment.
 Implement security controls to protect data in transit and at rest.
 Validate the connection and data transfer integrity.
29. Mobile Networking:
 Configure network access controls for mobile devices, including VPN
access and secure Wi-Fi.
 Implement security policies specific to mobile devices, such as encryption
requirements and remote wipe capabilities.
 Test the mobile network access to ensure connectivity and security
measures function as intended.
30. Incident Response:
 Draft an incident response plan detailing the steps to take in the event of a
network breach or failure.
 Include procedures for containment, eradication, and recovery, as well as
communication strategies.
 Conduct a tabletop exercise to simulate the response to an incident.
 Refine the plan based on feedback from the simulation.
31. Disaster Recovery Simulation:
 Simulate a network outage or catastrophic event.
 Follow the disaster recovery plan to restore network services, using
backups and redundant systems.
 Document any issues encountered during the simulation and update the
recovery plan accordingly.
 Review the effectiveness of the simulation and make necessary
adjustments to the plan.
32. Remote Access Configuration:
 Set up a secure remote access solution, such as a VPN, with appropriate
authentication methods.
 Configure network policies to allow remote users access to necessary
resources.
 Test the remote access solution to ensure it works securely and efficiently.
 Monitor remote connections for any unusual activity or security breaches.
33. Network Upgrade Plan:
 Evaluate the current network infrastructure and identify components that
require upgrading.
 Plan the upgrade process, including selecting new hardware, scheduling
downtime, and notifying affected users.


Execute the upgrade, ensuring minimal disruption to network services.
Verify that the upgraded network meets the new performance and
capacity requirements.
34. IPv6 Implementation:
 Plan the IPv6 addressing scheme for the network.
 Configure network devices and services to support IPv6.
 Test IPv6 connectivity internally and externally.
 Monitor the network to ensure a smooth transition and resolve any issues
encountered.
35. Change Management:
 Document the proposed network change, including the rationale and
expected impact.
 Follow the organization’s change management procedures to approve and
schedule the change.
 Implement the change in a controlled manner, preferably in a staging
environment first.
 Verify that the change has been implemented successfully and monitor
the network for any unintended consequences.
36. Compliance Auditing:
 Conduct a thorough audit of the network against the specified compliance
standards.
 Identify any areas of non-compliance or potential risk.
 Implement remediation measures to address compliance gaps.
 Document the audit findings and remediation steps, and schedule regular
compliance reviews.
37. Multicast Configuration:
 Enable multicast routing on the network devices.
 Configure the appropriate multicast addresses and IGMP settings.
 Verify that multicast traffic is being distributed correctly to all intended
recipients.
 Troubleshoot any issues related to multicast delivery.
38. Encryption Configuration:
 Identify the data flows that require encryption.
 Select and configure the appropriate encryption protocols and tools.
 Test the encrypted communications to ensure data security and integrity.
 Monitor the performance impact and adjust the encryption settings as
needed.
39. Network Troubleshooting Simulation:
 Analyze the provided network symptoms to identify potential causes.
 Use diagnostic tools and commands to investigate the issues.
 Apply logical troubleshooting steps to isolate and resolve the problem.
 Document the troubleshooting process and the solution implemented.
40. Root Cause Analysis:
 Investigate the recurring network issue using systematic troubleshooting
methods.
 Identify the root cause of the problem through analysis and testing.


Implement a permanent fix to prevent the issue from recurring.
Document the issue, the root cause, and the solution for future reference.
41. Link Aggregation:
 Combine multiple network connections in parallel to increase throughput
and provide redundancy.
 Configure the link aggregation settings on the network devices.
 Test the aggregated link to ensure it provides the expected bandwidth and
redundancy.
 Monitor the link aggregation for errors or configuration issues.
42. Power Over Ethernet (PoE):
 Configure the network switch to provide PoE to the connected devices.
 Verify that the connected PoE devices are receiving power and functioning
correctly.
 Adjust the power settings as necessary to optimize performance and
energy usage.
 Monitor the PoE status and power consumption of the connected devices.
43. Content Filtering:
 Implement content filtering on the network to block access to specified
websites or services.
 Configure the filtering rules and categories according to the organization’s
policy.
 Test the content filter to ensure it blocks inappropriate or harmful content
while allowing access to legitimate sites.
 Adjust the filtering settings based on user feedback and monitoring
results.
44. Network Segmentation:
 Divide the network into segments or zones to enhance security and
performance.
 Configure segmentation using VLANs, firewalls, or other technologies.
 Test inter-segment connectivity to ensure proper isolation and
functionality.
 Monitor traffic between segments to detect potential security violations or
configuration errors.
45. Failover Testing:
 Set up and configure network redundancy and failover mechanisms.
 Simulate failure scenarios to test the failover processes.
 Evaluate the failover time and the system’s ability to recover smoothly.
 Document the failover test results and make any necessary adjustments
to the configuration.
46. Security Policy Review:
 Review the existing network security policies to ensure they align with
current threats and best practices.
 Update the policies to address any new security requirements or
vulnerabilities.
 Communicate the updated policies to all relevant stakeholders.

Implement any technical controls or changes needed to enforce the
updated policies.
47. Automated Alert System:
 Configure automated alerts to notify administrators of critical network
events or performance issues.
 Define the criteria for triggering alerts, such as high usage, security
incidents, or system failures.
 Test the alert system to ensure it functions as expected and reaches the
intended recipients.
 Review and adjust the alert settings based on the effectiveness and
feedback.
48. VoIP Configuration:
 Set up VoIP devices and configure them with the correct network settings.
 Configure Quality of Service (QoS) to prioritize VoIP traffic on the network.
 Test the VoIP system to ensure clear audio quality and reliable
connectivity.
 Monitor the system for any issues with call quality or connectivity.
49. Physical Security Integration:
 Integrate physical security systems, such as surveillance cameras, with
the network.
 Ensure that the network can support the data bandwidth and storage
requirements of the security devices.
 Test the integration to confirm that the security systems are functioning
correctly and accessible through the network.
 Review the security footage and data regularly to ensure the system’s
reliability and effectiveness.
50. IoT Device Integration:
 Connect IoT devices to the network and configure them according to the
manufacturer’s specifications.
 Implement security measures to protect the IoT devices and the network,
such as network segmentation, firewalls, and regular updates.
 Test the connectivity and functionality of the IoT devices within the
network.
 Monitor the network for any unusual activity that could indicate security
threats related to IoT devices.
Question 1: Match the Protocol to Its Default Port Number.
Drag the protocols on the left to match them with their corresponding default port
numbers on the right.
Protocols:



HTTP
HTTPS
FTP

SSH
Port Numbers: A. 22 B. 80 C. 21 D. 443
Correct Match:




HTTP - B. 80
HTTPS - D. 443
FTP - C. 21
SSH - A. 22
Question 2: Match the Layer of the OSI Model to Its Function.
Drag the OSI layers on the left to match them with their corresponding functions on the
right.
OSI Layers:




Transport
Network
Data Link
Physical
Functions: A. Provides media access control and performs error detection B. Transmits
raw bit stream over the physical medium C. Provides logical addressing and routing D.
Ensures reliable data transfer
Correct Match:




Transport - D. Ensures reliable data transfer
Network - C. Provides logical addressing and routing
Data Link - A. Provides media access control and performs error detection
Physical - B. Transmits raw bit stream over the physical medium
Question 3: Arrange the Steps for the DHCP Lease Process.
Sequence the DHCP messages in the order they occur during the process.
DHCP Messages:




DHCPDISCOVER
DHCPACK
DHCPREQUEST
DHCPOFFER
Correct Order:




DHCPDISCOVER
DHCPOFFER
DHCPREQUEST
DHCPACK
Question 4: Match the Network Device to Its Description.
Drag the network devices on the left to match them with their corresponding
descriptions on the right.
Network Devices:




Router
Switch
Modem
Firewall
Descriptions: A. Connects multiple devices within one LAN B. Translates data from a
digital format into an analog format for transmission C. Filters incoming and outgoing
network traffic D. Connects multiple networks and routes network traffic
Correct Match:




Router - D. Connects multiple networks and routes network traffic
Switch - A. Connects multiple devices within one LAN
Modem - B. Translates data from a digital format into an analog format for
transmission
Firewall - C. Filters incoming and outgoing network traffic
Question 5: Match the Type of Address to Its Description.
Drag the address types on the left to match them with their corresponding descriptions
on the right.
Address Types:



Unicast
Broadcast
Multicast
Descriptions: A. Sent from one sender to multiple specific recipients B. Sent from one
sender to an entire network segment C. Sent from one sender to a single specific
recipient
Correct Match:



Unicast - C. Sent from one sender to a single specific recipient
Broadcast - B. Sent from one sender to an entire network segment
Multicast - A. Sent from one sender to multiple specific recipients
Question 6: Arrange the Layers of the TCP/IP Model.
Sequence the TCP/IP layers in the order from top (closest to the user) to bottom
(closest to the physical transmission).
TCP/IP Layers:




Application
Transport
Internet
Network Access
Correct Order:




Application
Transport
Internet
Network Access
Question 7: Match the Wireless Standard to Its Characteristics.
Drag the wireless standards on the left to match them with their corresponding
characteristics on the right.
Wireless Standards:




802.11b
802.11g
802.11n
802.11ac
Characteristics: A. Speed up to 600 Mbps, operates on 2.4 GHz and 5 GHz B. Speed
up to 54 Mbps, operates on 2.4 GHz C. Speed up to 11 Mbps, operates on 2.4 GHz D.
Speed up to 1 Gbps, operates on 5 GHz
Correct Match:


802.11b - C. Speed up to 11 Mbps, operates on 2.4 GHz
802.11g - B. Speed up to 54 Mbps, operates on 2.4 GHz


802.11n - A. Speed up to 600 Mbps, operates on 2.4 GHz and 5 GHz
802.11ac - D. Speed up to 1 Gbps, operates on 5 GHz
Question 8: Match the RAID Level to Its Description.
Drag the RAID levels on the left to match them with their corresponding descriptions on
the right.
RAID Levels:



RAID 0
RAID 1
RAID 5
Descriptions: A. Data striping without parity or mirroring B. Disk mirroring C. Data
striping with distributed parity
Correct Match:



RAID 0 - A. Data striping without parity or mirroring
RAID 1 - B. Disk mirroring
RAID 5 - C. Data striping with distributed parity
Question 9: Arrange the Sequence of Events in Symmetric Encryption.
Sequence the steps in symmetric encryption from the beginning to the end.
Encryption Steps:




Plaintext is encrypted using a secret key
Ciphertext is transmitted to the recipient
The recipient decrypts the ciphertext using the same secret key
The recipient obtains the original plaintext
Correct Order:




Plaintext is encrypted using a secret key
Ciphertext is transmitted to the recipient
The recipient decrypts the ciphertext using the same secret key
The recipient obtains the original plaintext
Question 10: Match the Subnet Mask to the Correct CIDR Notation.
Drag the subnet masks on the left to match them with the corresponding CIDR notation
on the right.
Subnet Masks:




255.255.255.0
255.255.0.0
255.255.255.128
255.0.0.0
CIDR Notations: A. /16 B. /8 C. /25 D. /24
Correct Match:




255.255.255.0 - D. /24
255.255.0.0 - A. /16
255.255.255.128 - C. /25
255.0.0.0 - B. /8
Question 11: Match the Type of Malware to Its Description.
Drag the types of malware on the left to match them with their corresponding
descriptions on the right.
Types of Malware:




Virus
Worm
Trojan
Ransomware
Descriptions: A. Malicious software that replicates itself to spread to other computers B.
Disguises itself as legitimate software but performs malicious actions C. Locks or
encrypts the user’s data, demanding payment for decryption D. Requires user
interaction to spread and typically attaches itself to a file or program
Correct Match:




Virus - D. Requires user interaction to spread and typically attaches itself to a file
or program
Worm - A. Malicious software that replicates itself to spread to other computers
Trojan - B. Disguises itself as legitimate software but performs malicious actions
Ransomware - C. Locks or encrypts the user’s data, demanding payment for
decryption
Question 12: Arrange the OSI Model Layers in Order.
Sequence the OSI model layers from the top layer (application) to the bottom layer
(physical).
OSI Model Layers:







Application
Presentation
Session
Transport
Network
Data Link
Physical
Correct Order:







Application
Presentation
Session
Transport
Network
Data Link
Physical
Question 13: Match the Type of Network to Its Typical Use Case.
Drag the types of networks on the left to match them with their corresponding typical
use cases on the right.
Types of Networks:




LAN (Local Area Network)
WAN (Wide Area Network)
MAN (Metropolitan Area Network)
WLAN (Wireless Local Area Network)
Use Cases: A. Connects network devices over short distances, such as within a building
or campus B. Extends over large geographic areas, such as cities or countries, to
connect multiple LANs C. Provides network connectivity within a metropolitan area,
such as a city or large campus D. A LAN that uses wireless network technology
Correct Match:

LAN (Local Area Network) - A. Connects network devices over short distances,
such as within a building or campus



WAN (Wide Area Network) - B. Extends over large geographic areas, such as
cities or countries, to connect multiple LANs
MAN (Metropolitan Area Network) - C. Provides network connectivity within a
metropolitan area, such as a city or large campus
WLAN (Wireless Local Area Network) - D. A LAN that uses wireless network
technology
Question 14: Arrange the Network Troubleshooting Steps in Logical Order.
Sequence the network troubleshooting steps in the order they should typically be
performed.
Troubleshooting Steps:





Verify physical connectivity
Test with ping or traceroute
Check IP configuration settings
Consult network documentation
Escalate the issue if unresolved
Correct Order:





Verify physical connectivity
Check IP configuration settings
Test with ping or traceroute
Consult network documentation
Escalate the issue if unresolved
Question 15: Match the Cloud Computing Service Model to Its Description.
Drag the cloud service models on the left to match them with their corresponding
descriptions on the right.
Cloud Service Models:



IaaS (Infrastructure as a Service)
PaaS (Platform as a Service)
SaaS (Software as a Service)
Descriptions: A. Provides virtualized computing resources over the internet B. Delivers
hardware and software tools over the internet, typically for application development C.
Delivers software applications over the internet, on a subscription basis
Correct Match:



IaaS (Infrastructure as a Service) - A. Provides virtualized computing resources
over the internet
PaaS (Platform as a Service) - B. Delivers hardware and software tools over the
internet, typically for application development
SaaS (Software as a Service) - C. Delivers software applications over the
internet, on a subscription basis
Question 16: Match the IPv6 Address to Its Type.
Drag the IPv6 addresses on the left to match them with their corresponding types on the
right.
IPv6 Addresses:




fe80::1
2001:0db8::/32
ff02::1
::1
Types: A. Link-local address B. Global unicast address C. Multicast address D.
Loopback address
Correct Match:




fe80::1 - A. Link-local address
2001:0db8::/32 - B. Global unicast address
ff02::1 - C. Multicast address
::1 - D. Loopback address
Question 17: Arrange the Steps of the Data Encapsulation Process.
Sequence the steps of data encapsulation when a device sends data over a network.
Encapsulation Steps:





Data
Segment
Packet
Frame
Bits
Correct Order:


Data
Segment



Packet
Frame
Bits
Question 18: Match the Security Protocol to Its Primary Use.
Drag the security protocols on the left to match them with their primary uses on the
right.
Security Protocols:




SSL/TLS
SSH
IPSec
WPA2
Primary Uses: A. Secures data transmission over insecure networks like the Internet B.
Provides a secure channel over an insecure network, often used for logins, file
transfers, and remote management C. Ensures secure IP communications by
authenticating and encrypting each IP packet in a data stream D. Security protocol used
to secure wireless computer networks
Correct Match:




SSL/TLS - A. Secures data transmission over insecure networks like the Internet
SSH - B. Provides a secure channel over an insecure network, often used for
logins, file transfers, and remote management
IPSec - C. Ensures secure IP communications by authenticating and encrypting
each IP packet in a data stream
WPA2 - D. Security protocol used to secure wireless computer networks
Question 19: Match the Subnet Mask to the Correct Number of Usable Hosts.
Drag the subnet masks on the left to match them with the number of usable hosts on
the right.
Subnet Masks:




255.255.255.0
255.255.255.248
255.255.255.192
255.255.255.224
Number of Usable Hosts: A. 30 B. 62 C. 6 D. 254
Correct Match:




255.255.255.0 - D. 254
255.255.255.248 - C. 6
255.255.255.192 - B. 62
255.255.255.224 - A. 30
Question 20: Arrange the Fiber Optic Cable Types Based on Increasing
Bandwidth Capacity.
Sequence the fiber optic cable types from lowest to highest bandwidth capacity.
Fiber Optic Cable Types:




OM1
OM2
OM3
OM4
Correct Order:




OM1
OM2
OM3
OM4
Question 21: Match the Firewall Type to Its Function.
Drag the firewall types on the left to match them with their functions on the right.
Firewall Types:



Packet Filtering Firewall
Stateful Inspection Firewall
Proxy Firewall
Functions: A. Examines each packet without considering the state of the connection B.
Makes decisions based on the context of the traffic, maintaining the state of active
connections C. Acts as an intermediary, inspecting packets at the application layer
Correct Match:

Packet Filtering Firewall - A. Examines each packet without considering the state
of the connection


Stateful Inspection Firewall - B. Makes decisions based on the context of the
traffic, maintaining the state of active connections
Proxy Firewall - C. Acts as an intermediary, inspecting packets at the application
layer
Question 22: Arrange the Disaster Recovery Plan Phases in Correct Sequence.
Sequence the phases typically involved in a disaster recovery plan.
Disaster Recovery Plan Phases:





Risk Assessment
Business Impact Analysis
Recovery Strategy Development
Plan Implementation
Testing and Maintenance
Correct Order:





Risk Assessment
Business Impact Analysis
Recovery Strategy Development
Plan Implementation
Testing and Maintenance
Question 23: Match the Network Monitoring Tool to Its Description.
Drag the network monitoring tools on the left to match them with their descriptions on
the right.
Network Monitoring Tools:




Wireshark
Nagios
SolarWinds
NetFlow Analyzer
Descriptions: A. A network protocol analyzer that lets you capture and interactively
browse the traffic running on a computer network B. Provides comprehensive network
monitoring capable of alerting and visualizing performance C. Offers network and
system monitoring solutions with customizable features to monitor your IT infrastructure
D. A tool that uses flow technology to provide real-time visibility into the network
bandwidth performance
Correct Match:




Wireshark - A. A network protocol analyzer that lets you capture and interactively
browse the traffic running on a computer network
Nagios - C. Provides comprehensive network monitoring capable of alerting and
visualizing performance
SolarWinds - B. Offers network and system monitoring solutions with
customizable features to monitor your IT infrastructure
NetFlow Analyzer - D. A tool that uses flow technology to provide real-time
visibility into the network bandwidth performance
Question 24: Arrange the IP Addressing Steps in a Logical Order for Configuring
a New Network.
Sequence the steps for IP addressing when configuring a new network.
IP Addressing Steps:




Define the network address range
Subnet the network if necessary
Assign IP addresses to devices
Configure gateways and routers
Correct Order:




Define the network address range
Subnet the network if necessary
Assign IP addresses to devices
Configure gateways and routers
Question 25: Match the Network Utility to Its Primary Use.
Drag the network utilities on the left to match them with their primary uses on the right.
Network Utilities:




ping
tracert/traceroute
ipconfig/ifconfig
nslookup
Primary Uses: A. Displays the route path and measures transit delays of packets across
a network B. Used to query DNS and retrieve domain name or IP address mapping C.
Tests connectivity between two network devices using ICMP D. Displays or configures
the network configuration of a computer
Correct Match:




ping - C. Tests connectivity between two network devices using ICMP
tracert/traceroute - A. Displays the route path and measures transit delays of
packets across a network
ipconfig/ifconfig - D. Displays or configures the network configuration of a
computer
nslookup - B. Used to query DNS and retrieve domain name or IP address
mapping
Question 26: Arrange the Network Security Measures from Basic to Advanced.
Sequence the network security measures from the most basic protection to the most
advanced.
Network Security Measures:




Antivirus software
Firewall implementation
Intrusion Detection System (IDS)
Security Information and Event Management (SIEM)
Correct Order:




Antivirus software
Firewall implementation
Intrusion Detection System (IDS)
Security Information and Event Management (SIEM)
Question 27: Match the VPN Type to Its Appropriate Use Case.
Drag the VPN types on the left to match them with their appropriate use cases on the
right.
VPN Types:



Site-to-Site VPN
Remote Access VPN
Client-to-Site VPN
Use Cases: A. Connects a user’s device to the corporate network, allowing access to
internal resources B. Securely connects two or more networks, such as branch offices
to the main office C. Allows remote users secure access to the company network from
any location
Correct Match:



Site-to-Site VPN - B. Securely connects two or more networks, such as branch
offices to the main office
Remote Access VPN - C. Allows remote users secure access to the company
network from any location
Client-to-Site VPN - A. Connects a user’s device to the corporate network,
allowing access to internal resources
Question 28: Match the Subnet Mask to the Appropriate Network Type Based on
Size.
Drag the subnet masks on the left to match them with the appropriate network type
based on size.
Subnet Masks:




255.255.255.0
255.255.255.192
255.255.255.240
255.255.0.0
Network Types: A. Small network with up to 14 hosts B. Medium-sized network with up
to 254 hosts C. Large network with up to 65,534 hosts D. Very small network with up to
62 hosts
Correct Match:




255.255.255.0 - B. Medium-sized network with up to 254 hosts
255.255.255.192 - D. Very small network with up to 62 hosts
255.255.255.240 - A. Small network with up to 14 hosts
255.255.0.0 - C. Large network with up to 65,534 hosts
Question 29: Arrange the Wireless Security Protocols from Least to Most Secure.
Sequence the wireless security protocols from the least secure to the most secure.
Wireless Security Protocols:




WEP
WPA
WPA2
WPA3
Correct Order:

WEP



WPA
WPA2
WPA3
Question 30: Match the Network Appliance to Its Function.
Drag the network appliances on the left to match them with their functions on the right.
Network Appliances:




Load Balancer
Proxy Server
Content Filter
Network Attached Storage (NAS)
Functions: A. Distributes incoming network traffic across multiple servers B. Filters
incoming and outgoing content based on the company’s policy C. Acts as an
intermediary for requests from clients seeking resources from other servers D. Provides
centralized data storage accessible over the network
Correct Match:




Load Balancer - A. Distributes incoming network traffic across multiple servers
Proxy Server - C. Acts as an intermediary for requests from clients seeking
resources from other servers
Content Filter - B. Filters incoming and outgoing content based on the company’s
policy
Network Attached Storage (NAS) - D. Provides centralized data storage
accessible over the network
Download