0 of 90 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 90 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
According to Cisco’s guidelines, which of the following temperatures would be too high or too low for a server room? Select all that apply.
On a Windows system, you want to verify that the path to a host supports an MTU of 1500. It should continue to send packets until you tell it to stop. What command should you use? Choose the best answer.
Your workplace has a significant number of wireless APs. Which of the folllowing guidelines are good for avoiding interference due to overlapping? Select all that apply.
Which of the following threats is most likely to be detected by a site survey? Choose the best answer.
After replacing a failed SFP transceiver with a spare you’re receiving low signal alerts. Which TWO of the following are the most likely causes? Select all that apply.
Which of the following are characteristics of syslog? Select all that apply.
Which of the following ports are commonly used by web servers? Select all that apply.
What distinguishes an SNMP trap from other SNMP communications? Choose the best answer.
What Wi-Fi “security” features should you never use because they introduce security vulnerabilities? Select all that apply.
You’re placing a wireless AP near the middle of the second floor of your three-story house, hoping that it will give acceptable coverage everywhere. What antenna types would best suit your strategy? Select all that apply.
You discovered malware on the network that modifies the infected system’s hosts file to redirect traffic. What kind of network attack could you classify this as? Choose the best answer.
A network bridge is using its MAC table to direct Ethernet frames. Which of the following would NOT be normal behavior? Choose the best answer.
A Wi-Fi analyzer has an “RSSI” value listed as a negative number. What does it indicate, and how do you know if it is good or bad? Each answer is a partial solution. Select all that apply.
Which of the following protocols are part of the OSI Network layer? Select all that apply.
What is a primary advantage of static routing? Choose the best answer.
Where can you find the hosts file on a Linux system? Choose the best answer.
What properties distinguish a spine-and-leaf data center from a three-tier hierarchical data center? Each answer indicates a partial solution. Select all that apply.
A Cisco switch port shows an “administratively down” port status. The coworker who was just configuring it says they were doing some interface-level troubleshooting but didn’t see any problems. What should you do? Choose the best answer.
Which statement correctly describes a virtual IP address in the context of FHRPs? Choose the best answer.
You’re testing recovery procedures to a secondary site. Which of the following validation tests gives the best assurance of the system’s resilience? Choose the best answer.
You’re troubleshooting an ICS network with a complex topology. The previous administrator configured its devices to use a higher TTL than the default. How could that hurt performance? Choose the best answer.
Which of the following is NOT an example of security via network segmentation? Choose the best answer.
A VLAN trunk interface on a managed switch receives a frame that doesn’t have any VLAN tagging. What does it typically do? Choose the best answer.
You’re receiving many unauthorized network scans using methods carefully designed to get by existing firewall rules. What device or feature would be the best way to recognize and block those scans? Choose the best answer.
You’re testing Gigabit Ethernet interfaces. Which of the following packet errors will probably never be zero, but aren’t a sign of configuration issues at low levels? Choose the best answer.
You’re using automated provisioning to deploy VM instances on the cloud. What is the primary benefit of defining security groups? Choose the best answer.
Which of the following are important questions to be addressed at a lessons-learned meeting? Select all that apply.
Which TWO of the following solutions will do the most to solve cable attenuation issues? Select all that apply.
In a Zero Trust architecture, which of the folllowing reflect the idea of adaptive identity? Select all that apply.
What is the primary role of LDAP in a typical Windows-based IAM environment? Choose the best answer.
You’ve traced some anomalous network activity to malware that’s infected a whole department’s computers. The computers are processing a distributed task using spare CPU cycles, communicating with a remote server, and sending emails to random targets. What kind of malware is it? Choose the best answer.
What are the primary benefits of configuring link aggregation on a switch? Select all that apply.
Which of the following statements accurately describe SLAAC on IPv6 networks? Select all that apply.
Some users are reporting poor network performance today, but others seem to be just fine. Which of the following is LEAST useful as an initial information gathering approach? Choose the best answer.
You’re documenting the outcome of a network troubleshooting process. Which is the LEAST important factor to include in your report? Choose the best answer.
After configuring a series of hosts to use static IP addresses, you realize you may have given some of them the wrong subnet mask. What is the most likely result they will experience, if so? Choose the best answer.
Which of the following are important steps in verifying system functionality after responding to a problem report and implementing a solution? Select all that apply.
A coworker is considering implementing Network Time Security (NTS) on a network that previously only used NTP. Which of the following should you make sure they know? Choose the best answer.
Which of the following are critical components of a SASE network infrastructure? Select all that apply.
What is the defining characteristic of a multilayer switch? Choose the best answer.
Which of the following cable substitutions is most likely to cause network problems? Choose the best answer.
A wireless router lists support for IEEE 802.11h. What is the primary purpose of that feature? Choose the best answer.
Department procedures include instructions for managing Cisco switches and routers with IOS commands. What kind of remote access are you most likely performing? Choose the best answer.
Another organization in your field was discovered to have knowingly disregarded PCI-DSS rules for a regulated network. What are the likely consequences they might face? Select all that apply.
Management wants a fixed fire suppression system to protect a data center with extremely expensive supercomputing equipment. It is essential that a false alarm not cause equipment damage. What kind of system should you recommend, and what primary safety precaution would you give with it? Each answer represents a partial solution? Select all that apply.
You always use static IP addresses for servers, but recent network deployments have made duplicate IP addresses a common problem. What is the easiest alternative for making sure server addresses don’t change? Choose the best answer.
What kind of attack is a bigger risk for employees outside of the office? Choose the best answer.
You’re upgrading an ancient office WAP. Assuming the devices on the network are mostly Wi-Fi 5, what’s the minimum IEEE standard you should look for to get the best performance from them? Choose the best answer.
Which of the following host types are likely to use PTP rather than NTP? Choose the best answer.
What IOS command would show you information specific to Power over Ethernet configurations? Choose the best answer.
After configuring new TCP/IP settings on a server, clients can’t connect to it reliably. When you’re logged into it locally it shows intermittent network connectivity. However, it always seems to be reachable by ping. What is the most likely issue with its settings? Choose the best answer.
What method of traffic analysis is most appropriate for identifying specific protocol versions on the network? Choose the best answer.
Youu installed a Power over Ethernet switch to power some network devices, and some ports keep shutting down with “Power budget exceeded” errors. The switch is set to allow its maxumum power delivery. Which of the following solutions is LEAST likely to fix your problem? Choose the best answer.
A medium sized corporate network experiences generalized network slowdowns at about 10am every day, affecting cloud services, internal web services, and VoIP services. It lasts for about an hour before it improves. Which of the following should NOT be initial avenues of investigation? Select all that apply.
Which of the following standards is NOT a physical media type? Choose the best answer.
Which of the following are typical disadvantages of mesh network topologies? Select all that apply.
What are the primary advantages of using subinterfaces for routing on a small network? Select all that apply.
What is the term for the location where an entire building’s core network switches and routers connect to the CAN or WAN? Choose the best answer.
How does a link-local IPv6 address differ from an IPv4 APIPA address? Choose the best answer.
What is the primary reason for a North American server room to operate at 208V-240V, when most consumer systems operate at 100V-120V? Choose the best answer.
A user complains that their workstation occasionally lacks network connectivity when they first power it on in the morning. The first time they reported it it had resolved itself by the time you got there, but this time you see is configured to use DHCP but currently has an APIPA address. The user in the next cubicle is on the same subnet but has a working address. Which of the following problems should you check for first? Choose the best answer.
What is the most common MTU for typical Ethernet networks? Choose the best answer.
Why is it important to use plenum grade cable inside of drop ceilings or raised floors? Choose the best answer.
Your secure IoT network is isolated enough to prevent direct logins from the main corporate network, but you want to manage IoT devices from your workstation. What technology can you configure to do so? Choose the best answer.
What value in an IPv4 header keeps a misrouted packet from endlessly circling a network loop? Choose the best answer.
The NAT settings on your SOHO router include a “port forwarding” feature. What kind of situation is it intended for?” Choose the best answer.
One morning you suddenly get a wave of reports about both a non-responsive web server and inability to make VOIP calls. The two services aren’t operating on the same system, but you can’t rule out a connection. What should you do? Choose the best answer.
What is the primary purpose of a private VLAN feature on a switch? Choose the best answer.
What is the primary problem caused by an unmanaged switching loop? Choose the best answer.
Which TWO of the following factors are the most important when choosing what data to back up and how often to do it? Select all that apply.
Which of the following elements is least likely likely to be found in a configuation management database (CMDB)? Choose the best answer.
You want to deploy display screens in a transit terminal, powered by PoE. The model you’re using has a 40W maximum power draw. When you choose a switch to power it, what is the minimum standard should you look for? Choose the best answer.
Increasingly, discrete physical nodes and network appliances in the data center are being replaced with virtual devices running on more generic hardware. What is the term for this approach to network architecture? Choose the best answer.
In what way does a given layer of the OSI model engage in “horizontal” communication? Choose the best answer.
You added a new rule to a network ACL to block RDP traffic, but some still is coming through. What is the most likely explanation? Choose the best answer.
Your department just deployed some fake DNS servers which only interact with automated scripts, never legitimate clients. When they receive unexpected requests, they send an alert to the SIEM. What technique is being used? Choose the best answer.
From an policy perspective, what is the primary purpose of keeping an accurate asset inventory? Choose the best answer.
In Zero Trust Architecture, what is the role of microsegmentation? Choose the best answer.
In the PKI trust model, when is a self-signed certificate acceptable? Choose the best answer.
Which of the following are essential security steps on all IoT and embedded devices? Each correct answer represents a complete solution. Select all that apply.
Your new SDN deployment uses Zero-Touch Provisioning (ZTP) to configure new network devices. What roles does a DHCP server have in such a network? Select all that apply.
Which of the following privacy regulations are multinational in scope? Select all that apply.
A load balancer you were testing tends to switch users between back-end servers between requests, causing session information to be lost. What load balancer settings could correct that? Select all that apply.
When you’re troubleshooting a network problem, what is the LEAST appropriate reason to escalate? Choose the best answer.
Which of the following problems are likely to cause poor Wi-Fi performance even with a strong signal? Select all that apply.
Also known as after-action meetings and reports, what alternate name for these bears evidence to the importance of discussing and documenting the outcome of an a troubleshooting process? Choose the best answer.
What kind of security camera is most useful in low-traffic areas? Choose the best answer.
Which of the following are NOT valid subnet masks? Select all that apply.
Since your network now has end-to-end IPv6 continuity, you’re trying SLAAC instead of DHCPv6 for hosts o a new network segment. The first one you’ve tried is reachable by ping and can ping the gateway router, but is still having trouble reaching known servers. What settings should you check first? Choose the best answer.
What does the VA rating on a UPS signify? Choose the best answer.