OSI Model
Attacks
Scenario
Miscellaneous
Protocol Ports
100

Which of the following steps of the troubleshooting methodology would most likel checking through each level of the OSI model after the problem has been identified?

a) A reservation for the server based on the MAC address 

b) A SLAAC for the server 

c) A separate scope for the file server using a /32 subnet 

d) A static IP address within the DHCP IP range

A reservation for the server based on the MAC address 


100

Which network functions can be interfered with by a DNS poisoning attack?

A.Routing table updates

B.Name resolution

C.Password protection

D.Network switching

Name resolution

100

A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configurations would meet this requirement?

a) Native VLAN 

b) Full duplex 

c) 802.1Q tagging 

d) Link aggregation

Link aggregation

100

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)


A. Least privilege network access

B. Dynamic inventories

C. Central policy management

D. Zero-touch provisioning

Least privilege network access

Central policy management

100

Which of the following ports is used for secure email?



A. 25

B. 110

C. 143

D. 587

587

200

A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

Layer 2

200

Which of the following attacks utilizes a network packet that contains multiple network tags? 

a) ARP poisoning 

b) DNS spoofing 

c) VLAN hopping 

d) MAC flooding

VLAN hopping

200

A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?


a) Enterprise authentication 

b) Captive portal 

c) Ad hoc network 

d) WPA3

Captive portal

200

Which of the following technologies are X.509 certificates most commonly associated with? 

a) VLAN tagging 

b) MFA 

c) LDAP 

d) PKI

PKI

200

What is the purpose of the Remote Desktop Protocol (RDP)?

A. It is used for the management of servers and network devices.

B. It is an application protocol for web data communications.

C. It is used for connecting to another Microsoft computer or server for remote administration.

D. It provides encryption transfers via Secure Sockets Layer (SSL).

It is used for connecting to another Microsoft computer or server for remote administration

300

According to the OSI model, at which of the following layers is data encapsulated into a packet?

A. Layer 2

B. Layer 3

C. Layer 4

D. Layer 5

Layer 3

300

Double Points

Some of your organization’s employees are receiving fishy emails. A seemingly genuine email from the project manager asks for the web server’s login details. Others were targeted at administrators and were aimed at learning habits. What kind of attack are the employees experiencing?

A.Phishing attacks

B.ePhishing attacks

C.Spear phishing attacks

D.On-path attacks

Spear phishing attacks

300

A user is unable to navigate to a website because the provided URL is not resolving correct IP address. Other users are able to navigate to the intended website without is of the following is most likely causing this issue? 

a) Nameserver record 

b) Hosts file 

c) IP helper 

d) Self-signed certificate

Hosts file 

300

Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?

A. traceroute

B. ping

C. nslookup

D. netstat

traceroute

300

Which port does Lightweight Directory Access Protocol over SSL (LDAPS) use?

A. TCP port 389

B. TCP port 636

C. UDP port 389

D. TCP port 143

TCP port 636

400

Double Points

Which protocols provide connectionless delivery service at the Transport layer of the Open Systems Interconnection (OSI) model? 


A.TCP

B.HTTP

C.UDP

D.ARP

UDP

400

Which of the following methods is a mitigation technique to slow down a hacker and study the attack vector?

A.Honeypots

B.Network attacks

C.Switch port protection types

D.Firewall filters

Honeypots

400

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?  

a) Multitenancy 

b) NFV 

c) VPC 

d) SaaS

Multitenancy

400

Double Points

You are responsible for the security of an organization’s server farm. You are considering server hardening procedures to ensure optimum security against major threat actors. Which of the following can be considered viable server-hardening techniques?

A.Installing additional memory

B.Disabling unnecessary services

C.Creating privileged user accounts

D.Enabling all TCP and UDP ports

Disabling unnecessary services

400

Double Points

Which of the following statements about SNMP is correct?

A. SNMP only operates on TCP

B. SNMP monitors servers and network devices using HTTP

C. The NMS is notified of problems through SNMP traps sent to UDP port 161

D. SNMP agents and servers listen for requests on UDP port 161

SNMP agents and servers listen for requests on UDP port 161

500

How does the Session layer allow session establishment between processes running on different stations?

A.By forwarding to the Syntax layer

B.By synchronizing and sending to ports

C.By performing packet routing

D.By fragmenting packets into frames

By synchronizing and sending to ports

500

An employee in your company was terminated from the job two weeks ago. When you arrived at the office on Monday, you found that the data from all the hosts in a web server farm had been deleted. No authorized entries were found in the data center records. However, you suspect that the disgruntled employee might be behind it. Which of the following attacks was performed at the web server farm?

A.Evil twin

B.Logic bomb

C.ARP poisoning

D.DNS poisoning

Logic bomb

500

Double Points

You’re configuring a wired home network with four Windows computers, a switch, and a cable router that provides Internet access. All the computers can access the Internet, but none can access filesystem shares on each other. What is the most likely cause of the problem on the four network computers?

A.Incorrect IP addresses

B.Incorrect subnet mask

C.Incorrect default gateway address

D.Incorrect access control list (ACL) settings

Incorrect access control list (ACL) settings

500

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases

B. Helper addresses

C. Scopes

D. Reservations

Reservations

500

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?

A. 23

B. 25

C. 110

D. 143

25

M
e
n
u