0 of 90 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 90 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Since moisture is generally bad for electronics, what is the primary reason for a minimum recommended humidity listed on a piece of network equipment? Choose the best answer.
You’re experiencing low performance on a Layer 2 network. On further examination, it looks like an old access switch has been selected as root instead of the powerful core switch you wanted. What’s the best way to correct that? Choose the best answer.
Which of the following accurately describe Enhanced Interior Gateway Routing Protocol (EIGRP)? Choose the best answer.
What cause of weak signals is more likely on coaxial cable than on twisted-pair? Choose the best answer.
What steps can you take to harden a switch against VLAN hopping attacks? Select all that apply.
What is the primary purpose of hot and cold aisles in a data center? Choose the best answer.
What security features does DNSSEC provide? Select all that apply.
Workstations on one subnet have been redirecting web requests to phishing sites. On closer examination, their automatically assigned TCP/IP settings seem to be incorrect. What TWO attack techniques are most likely to be involved? Select all that apply.
You need to install a new fire extinguisher next to the server closet. What class of extinguisher would be most useful? Choose the best answer.
You want to connect your cloud resources to your on-premises network. What advantages does a site-to-site VPN have over DirectConnect? Select all that apply.
Which of the following IPv4 addresses is invalid? Choose the best answer.
Which of the following precautions is primarily intended to protect against on-path attacks? Choose the best answer.
What Wi-Fi band provides the most non-overlapping channels while retaining compatibility with most modern devices? Choose the best answer.
Even when cost is no object, what is the biggest limitation of most satellite internet technologies? Choose the best answer.
Which of the following security vulnerabilities is least likely to be addressed by patching? Choose the best answer.
What is the primary purpose of branching in a source control system? Choose the best answer.
Why is a central repository important for IaC source control? Choose the best answer.
Some laptops in the office are frequently disconnecting from the wireless network, even though they’re showing a good signal. What solution is most likely to fix it? Choose the best answer.
A router has conflicting routes for the packet it’s currently evaluating. What is the BIGGEST factor that will make it prioritize one rule over another? Choose the best answer.
What kind of cable is typically plugged into Ethernet patch panels? Choose the best answer.
What kind of wireless network topology uses simple peer-to-peer communications, with intermediate nodes relaying data for endpoints that aren’t in direct range of each other? Choose the best answer.
You’re helping to secure an airport terminal network. What technique are attackers most likely to use in order to conduct on-path attacks against travelers? Choose the best answer.
You’re evaluating agent-based web filters for company laptops. You want a filtering method that’s compatible with real-time content analysis and allows parts of certain websites to be blocked. What method should you evaluate first? Choose the best answer.
What primary advantage does a remote access GUI have over API or console access? Choose the best answer.
You’re looking through a list of open ports on a firewall and the rules aren’t labeled. Which of the following is most likely related to VoIP traffic? Choose the best answer.
Which of the following protocols uses encryption by default to protect data In transit? Choose the best answer.
What is the attacker’s typical goal in a MAC flooding attack? Choose the best answer.
In terms of network trust zones, what is a screened subnet? Choose the best answer.
In software-defined networking, what is the concept of “application awareness?” Choose the best answer.
What is the primary factor that distinguishes an authoriative DNS result from a non-authoritative result? Choose the best answer.
What is the most serious likely consequence of failing to configure NTP on the network? Choose the best answer.
A supplier sends you an alert that a recent batch of Ethernet patch cables they sold were poorly terminated. What problems should you watch for to see if you were affected? Select all that apply.
What’s typically the best way to identify potential channel overlap issues in your Wi-Fi network? Choose the best answer.
You’re creating backups of Cisco routers and switches. Which of the following backup types can you trust to include VLAN settings and network policies? Select all that apply.
What advantage does a smart PDU offer over a basic PDU in data center operations? Choose the best answer.
Which TWO of the following techniques are the most useful for hardening IAM systems against brute force cracking attacks? Select all that apply.
You just assigned a host the static IP address 10.10.10.55. It can reach internet addresses via the NAT gateway and other hosts on the 10.10.10.0/24 subnet, but it can’t reach hosts on the 10.10.20.0/24 subnet. What TCP/IP setting should you check first? Choose the best answer.
What is the primary advantage of RBAC over user-level MAC or DAC? Choose the best answer.
You want to configure layer 2 neighbor discovery on a Cisco switch in a multivendor network. What is the fist command you should type in the switch console? Choose the best answer.
You want to find information about a DNS zone using DNS queries. What kind of record would you look for? Choose the best answer.
Video conferencing applications on your network are plagued by poor audio quality and occasional video freezes. What network performance factor should you examine first? Choose the best answer.
Which of the following symptoms is most likely in a cable experiencing crosstalk? Choose the best answer.
You replaced a modular transceiver with a new one that had been recently tested and which fits propely in the slot. The other end of the link reports no signal. Which of the following are potential problems? Select all that apply.
A business building a network chooses a collapsed core model over a three-tier hierarchical model. What are possible reasons for that decision? Select all that apply.
What version of Spanning Tree Protocol is best for networks with complex VLAN configurations? Choose the best answer.
Which statements are true of Fibre Channel Over Ethernet (FCOE)? Select all that apply.
A user logs into their computer and is presented with a screen showing a US Department of Justice logo indicating the computer has been locked due to the user violating federal law. The screen gives several details of the violation and indicates that the user must pay a fine of $500 within 72 hours, or a warrant will be issued for their arrest. The user cannot unlock the system. What type of malware has likely infected the computer? Choose the best answer.
Which of the following describe an IPv4 APIPA address? Select all that apply.
You want to monitor traffic on a cross-campus network link, right by a repeater. What kind of tool would be most appropriate? Choose the best answer.
What are TWO common reasons for using VLANs instead of conventional physical segmentation? Select all that apply.
Your company rents a spare server room in a secondary location. It has all the necessary hardware, software, and network services, so you can power everything up, man it, and load backups of your production environment before taking over. What does this scenario refer to? Choose the best answer.
A host can reach servers on the local network but cannot contact the internet. Which of the following settings should you check first? Choose the best answer.
After diagnosing a network problem you’ve created a plan to fix it; however, doing so will cause some service disruptions. Which of the following are generally good advice? Select all that apply.
What network protocols are typically used in conjunction with 802.1X? Select all that apply.
How would a class C network be depicted in CIDR notation? Choose the best answer.
You’re troubleshooting connectivity issues between two hosts. Which of the following indicators is the clearest indication of a routing loop? Choose the best answer.
What is the primary difference between a stateful and stateless firewall? Choose the best answer.
A VoIP network intermittently experiences high packet loss, though in general latency and jitter are low. Which of the following troubleshooting steps would be most likely to identify the problem? Choose the best answer.
A freshly tested optical patch cable has a noisy connection once you actually put it into place. Since the cable run was very convoluted you don’t want to immediately swap in a new cable, so what TWO things should you try first? Select all that apply.
What was the original standard width of a Wi-Fi channel? Choose the best answer.
You saw some notes for switch configuration left by a previous student working on a freeform lab. Which of them are probably sensible? Select all that apply.
Which of the following statements are true of coaxial cables? Select all that apply.
What is the most common Ethernet standard used by modern workstations and consumer Ethernet appliances? Choose the best answer.
A network’s administration team is planning to replace RIP with a new routing protocol. The network uses both IPv4 and IPv6 and has routers from multiple vendors; while it is currently medium-sized, there are significant expansion plans. Which option is probably the best choice? Choose the best answer.
You want to monitor network traffic. What is the primary advantage of port mirroring over a TAP or NPB? Choose the best answer.
Which of the following VLAN hopping attacks often exploits protocols like Dynamic Trunking Protocol (DTP)? Choose the best answer.
You’re helping to plan the network in a newly refurbished office building. What are generally good guidelines for planning an IDF? Select all that apply.
An office has a single Ethernet drop in the wall serving both a workstation and a VoIP phone with the Voice VLAN feature. Which of the following would you expect to be true? Select all that apply.
Which of the following are Application Layer protocols? Select all that apply.
What OSI layer is unique for being divided into two sublayers? Choose the best answer.
Why is it important for a Data Center Interconnect (DCI) to use a protocol like QinQ or VXLAN? Choose the best answer.
You have a critical database server that continuously backs its files up to the cloud. Still, its software environment is so finicky that if it encountered a critical failure, it would take a long time to get it working again. Assuming these constraints are acceptable, how would you describe your recovery plan for that service? Choose the best answer.
What is the term for an link between two switches that carries traffic from multiple VLANs? Choose the best answer.
You need to find a modular transceiver to connect a 128GFC Fibre Channel HBA to a four-channel optical link. What kind should you look for? Choose the best answer.
What kind of VPN can be used even when you can’t install software on your system and have no control over the underlying network environment? Choose the best answer.
What protocol is typically used for point-to-point WAN connections? Choose the best answer.
Some network applications include a high volume of server-to-server communications. Your performance monitoring suggests a high rate of packet loss during peak times. What kind of solution is most likely to fix the issue until you can plan hardware upgrades? Choose the best answer.
How does NAT affect network security? Choose one positive effect and one negative effect. Each answer represents a partial solution. Select all that apply.
Hosts joining a busy wireless mesh network are having trouble getting IP addresses. In initial troubleshooting, you get a DHCP address pool exhaustion error. Which of the following solutions would be LEAST likely to fix the issue? Choose the best answer.
A switch you just bought has a port security feature. What does it do? Choose the best answer.
You’re examining settings on a Cisco router. What command would show you a simple list of assigned IP addresses anf their interface status? Choose the best answer.
Which of the following are sublayers of the Data Link layer? Select all that apply.
A development team at your company is trying to decide between AWS Elastic Beanstalk and Azure App Services for its newest web development project. What cloud service model do you think they’re planning to use? Choose the best answer.
How does a Dynamic Multipoint VPN (DMVPN) differ from other VPN solutions? Choose the best answer.
You’re shopping for a new A/C unit for your server room and are comparing manufacturer ratings. Which combination will minimize the time you’ll have to go without sufficient cooling? Choose the best answer.
What component of an SNMP system contains a list of properties that can be monitored on a specific managed device? Choose the best answer.
What VPN type is secure, compatible with nearly any application, and natively supported by most operating systems? Choose the best answer.
Remote users are reporting slow performance when connected to the VPN during business hours. What solution is most likely to improve performance without disrupting other network functions? Choose the best answer.
You want to configure secure, in-band console access to a remote system. What protocol is most appropriate? Choose the best answer.
Which of the folllowing accurately describe the principle of least privilege? Select all that apply.