• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back

A technician configures a firewall in the following manner in order to allow HTTP traffic


SourceIPZone Dest IPZonePortAction


AnyUntrustAnyDMZ80Allow


The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

Application Aware Firewall

During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls?

Man traps


Biometrics


Cipher Locks



Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

MPLS

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit?

Install Recommended Updates

A wireless network technician for a local retail store is installing encrypted access points within the store for real time inventory verification, as well as remote price checking capabilities, while employee are away from registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store's wireless network. Which of the following is the BEST security method to implement on the access points?

MAC Filtering

A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following MOST likely the source of the problem?

802.1q is not configured on the switch port

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?

SNMPv3

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees?

Memorandum of Understanding


Acceptable Use Policy

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation?

Spanning Tree

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside?

Layer 2


Data Link

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server. In regard to the managers inquiry, which of the following did the administrator forget to do FIRST?

Submit a change request

Which of the following physical security controls prevents an attacker from gaining access to a network closet?

Proximity Readers

Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN?

UC Gateway

A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website?

SSL

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?

Bluejacking

Which of the following allows a telecommunication company to test circuits to customers remotely?

Smart Jack

A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, which looking at a logical diagram?

Naming conventions

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?

PoE

A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?

Star

Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DHCP address. Which of the following is the MOST likely reason why the router is not receiving a DHCP address?

The administrator has implemented a feature that only allows white-listed MAC addresses

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue?

Increase the number of virtual terminals available

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network. Which of the following could the technician implement?

Quarantine

Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless?

Evil twin

A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?

SNMPv3

A user is unable to connect to a server in another building. A technican is troubleshooting the issue and determines the follwoing:


1) Client PC 1 has an IP address of 192.168.10.25/25


2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A


3) Server A is named 'BLDGBFILESRVR01' and has an IP address of 192.168.10.145/25


4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A




However when PC 1 pings server A, it receives a destination host unreachable response. Which of the following is the MOST likely cause?

Link from router A to PC 1 are on different subnets

A network technician is replacing security devices that protect the DMZ for a client. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users are unable to connect remotely to the application. Which of the following is MOST likely misconfigured?

Firewall

An F-connector is used on which of the following types of cabling

RG6

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the cause of this issue?

RADIUS

After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrators password. Which of the following will allow the administrator to log onto the firewall via HTTPS if the managements IP address is unknown and the administrator workstation IP address is 192.168.0.10/23?

Run the following command on the administrators workstation: arp -s 192.168.1.200 01:4a:d1:fa:b1:0e

A network engineer is troubleshooting an issue with a computer that is unable to connect to the internet. The network engineer analyzes the following output from a command line utility:




NetworkDestinationNetmaskGatewayInterface


192.168.1.0 255.255.255.0 192.168.1.254eth0


192.168.1.10 255.255.255.255 192.168.1.10eth0


127.0.0.1255.0.0.0On-Linlo


127.0.0.0255.0.0.0On-Linklo


255.255.255.255 255.255.255.255 102.168.1.10eth0

Missing default gateway

Users are reporting extreme slowness across the network every Friday. Which of the following should the network technician review first to narrow down the root cause of the problem?

Utilization

Which of the following can be issued from the command line to find the layer 3 hops to a remote destination?

traceroute

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC's, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines. After deploying the virtual machines, which of the following should the administrator do to meet these requirements?

The administrator should create a virtual switch to bridge all of the connection to the network. The virtual heartbeat NICs should be set to addresses in an unused range.

Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?

IPSEC

A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?

Jamming

A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue?

Establish a theory of probable cause

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?

The administrator should set the MTU to 9000 on each of the participants in the vSAN

An administrator hosts all the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. Which of the following cloud services is the administrator using?

Public Iaas

A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps?

Block ICMP at the firewall

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. Which of the following standards should be used?

802.11a