Concepts
Implementations
Operations
Security
Troubleshooting
100

What is an SSH host key used for?

Storing user passwords securely

Speeding up the SSH connection process

Identifying the SSH server

Encrypting all data sent over the network


Identifying the SSH server

100

he owner of a hotel has contracted with you to implement a wireless network to provide internet access for guests. The owner has asked that you implement security controls so that only paying guests are allowed to use the wireless network.

The owner wants guests to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at check-in, guests should then be allowed full access to the Internet. If a user does not provide the correct code, he or she should not be allowed to access the Internet.

What should you do?

answer

Implement MAC address filtering.

Implement pre-shared key authentication.

Implement 802.1x authentication using a RADIUS server.

Implement a captive portal.


Implement a captive portal.

100

What is the primary purpose of using internal DNS zones?


To perform recursive queries for nonauthoritative domains

To allow internal clients access to private network resources

To manage authoritative zone records for domains managed by a company

To provide name resolution services to the public internet

To allow internal clients access to private network resources

100

A system administrator is setting up a new Linux server for their company. The administrator needs to ensure that all user passwords are stored securely and that the authentication process is robust.

The system administrator decides to configure the system so that when users log in, their passwords are checked against a hash stored in a specific file.

Which file should the system administrator configure to store the hashed passwords for user authentication?

/etc/passwd

/home/user

/etc/shadow

/usr/local/bin

/etc/shadow

100

A system administrator is reviewing an alert for the firewall. There was an alert that a piece of malware was downloaded to a computer on the network. The system administrator followed through by checking to make sure that the malware was downloaded.

Which of the following steps should the sysadmin do next to help mitigate this in the future?


Determine if anything has changed.

Confirm the theory.

Establish a plan of action.

Implement preventative measures.

Establish a plan of action.

200

What is the primary use of microwave dishes in satellite systems?

To align with orbital satellites for signal relay

To generate electricity from solar power

To measure the temperature of the Earth's atmosphere

To broadcast radio signals to submarines

To align with orbital satellites for signal relay

200

Why should user data traffic be avoided over the default VLAN?

It increases the risk of VLAN hopping attacks.

It automatically encrypts the data, making it unreadable.

It limits the bandwidth available for management traffic.

It is a best practice to reserve the default VLAN for voice traffic only.

It increases the risk of VLAN hopping attacks.


200

A network administrator notices unusual activity on their company's network. The administrator suspects there might be an unauthorized application running on one of the servers, potentially causing security vulnerabilities.

To investigate, the network administrator decides to review the logs.

Given the administrator's suspicion, which type of log should they primarily focus on to identify the unauthorized application?


System log

Audit log

Performance/Traffic log

Application log


Application log

200

You are concerned about the security of your IoT devices. You have read about vulnerabilities that could allow hackers to gain unauthorized access to your smart home devices, such as your smart locks and security cameras.

Which of the following measures should you prioritize to enhance the security of your IoT devices?


Using proprietary operating systems for your devices

Increasing the battery life of the devices

Regularly updating the firmware of the devices

Connecting all devices to a high-capacity external storage

Regularly updating the firmware of the devices

200

What should you suspect if you cannot ping a local host and the error is "destination unreachable"?

Incorrect IP address or netmask in the IP configuration


ICMP is blocked by a firewall or other security software

The network protocol stack needs to be reinstalled

The default gateway parameter on the local host is incorrect

Incorrect IP address or netmask in the IP configuration

300

You are a network engineer tasked with upgrading the network infrastructure of a medium-sized enterprise. The current setup involves a mix of copper and fiber optic connections, with an increasing demand for higher data throughput due to the company's expansion into data-intensive services.

You've decided to implement modular transceivers to provide the flexibility needed for future expansions and to support various connection types. One critical requirement is to ensure that the network can support connections to a newly installed storage area network (SAN) that operates over Fibre Channel for high-speed data access.

Which type of modular transceiver should you ensure is included in your upgrade plan to meet the specific requirement for connecting to the Fibre Channel SAN?


Transceivers supporting the Fibre Channel Storage Area Network (SAN) protocol

QSFP28 transceivers

WDM transceivers

SFP+ transceivers


Transceivers supporting the Fibre Channel Storage Area Network (SAN) protocol


300

Why is convergence important in a dynamic routing environment?

It decreases the overall security of the network by sharing routing information.

It prevents the manual configuration of network devices.

It ensures that routing tables are manually updated in a timely manner.

It allows routers to adapt to network changes, such as failures or additions.


It allows routers to adapt to network changes, such as failures or additions.

300

What does running the command ipconfig /registerdns in Windows accomplish?

It clears the DNS cache.

It attempts to use Dynamic DNS (DDNS).

It displays the current DNS configuration.

It renews the DHCP lease.

It attempts to use Dynamic DNS (DDNS).

300

In the context of port security, what is a "sticky MAC"?

A MAC address that is permanently hard-coded into the switch's firmware

A MAC address that is blocked from connecting to any port on the switch

A MAC address that is dynamically learned and stored until the switch is rebooted

A MAC address that can only be used for wireless connections

A MAC address that is dynamically learned and stored until the switch is rebooted

300

During an audit of external DNS records, you need to verify the mail servers configured for your public domain example.com.

Which nslookup command would you use to find this information?

nslookup -type=ns example.com

nslookup -type=a example.com

nslookup -type=mx example.com

nslookup example.com

nslookup -type=mx example.com

400

Why is tagging important in managing cloud instances?


It helps identify ownership and roles of instances.

It reduces the cost of cloud services.

It enhances the physical security of cloud data centers.

It increases the processing power of instances.


It helps identify ownership and roles of instances.

400

What is the purpose of maintaining correct polarity in duplex fiber optic patch cords?

To enhance the aesthetic appeal of the fiber optic installation

To ensure that the power supply is evenly distributed across all fibers

To guarantee that the Tx port on the transmitter is linked to the Rx port on the receiver and vice versa

To increase the speed of data transmission over the fiber optic cable

To guarantee that the Tx port on the transmitter is linked to the Rx port on the receiver and vice versa


400

What type of information might not be captured by a backup of the configuration file only?


Device model

Version history

User accounts

State information


State information

400

You are configuring a network access control system for your company's wired network. You want to ensure that devices are authenticated before they are allowed to communicate on the network.

You also want to implement a system where the authentication credentials do not need to be stored on the network switches but can be validated by a server positioned in a secure zone within the private network.

Which of the following setups should you implement?


IEEE 802.1X using RADIUS server for authentication

VPN with pre-shared keys

Direct authentication using LDAP

SSH key pairs for device authentication

IEEE 802.1X using RADIUS server for authentication

400

You are a network administrator and receive reports of intermittent network connectivity issues from several users. Upon investigation, you suspect a duplicate IP address issue.

What should be your first step in troubleshooting this problem?

Reboot all network devices to clear any temporary issues.

Increase the DHCP lease time to avoid future IP conflicts.

Immediately reassign new IP addresses to all reporting users.

Use the ping command to test connectivity to the suspected duplicate IP and then use arp -a to check the ARP cache.


Use the ping command to test connectivity to the suspected duplicate IP and then use arp -a to check the ARP cache.

500

university is planning to upgrade its campus-wide Wi-Fi network to support a surge in online video lectures and virtual reality (VR) applications for educational purposes. The network needs to support high data rates and low latency for a seamless experience.

Considering the requirements, which Wi-Fi standard should the university implement?


Wi-Fi 5, because it supports channel bonding up to 160 MHz.

Wi-Fi 5, because it is designed to work in the 5 GHz band.

Wi-Fi 6, because it aims to approximate 10G connection speeds.

Wi-Fi 6, because it prioritizes voice over IP (VoIP) traffic.


Wi-Fi 6, because it aims to approximate 10G connection speeds.

500

What is the primary purpose of trunking in a network?

To increase the security of the network

To interconnect multiple switches and build the network fabric

To connect a computer to the Internet

To replace wireless connections with wired connections

To interconnect multiple switches and build the network fabric

500

A remote employee needs to access their company's internal resources securely from their home office. However, they also need to ensure that their personal internet browsing does not go through the company's network to maintain privacy and avoid unnecessary load on the corporate VPN.

Which VPN configuration should the employee use to meet these requirements?

Full tunnel

Split tunnel

Secure tunnel

Direct access

Split tunnel

500

Which of the following is an example of passive social engineering?

Dumpster diving for useful documents

Phishing attacks via email

Tailgating to enter a secure area

Impersonating an IT support staff member over the phone

Dumpster diving for useful documents

500

You are a network technician for a small consulting firm. One of your responsibilities is to manage the intranet site and configuration. You recently had to update the site's IP mapping due to a server upgrade.

A user is having an issue with connecting to the intranet site now. When the user attempts to connect through their web browser, they receive a message that the page cannot be displayed. If you type in the IP address, the page loads fine.

Which of the following commands should you use to fix this issue?

ipconfig /displaydns

ipconfig /registerdns

ipconfig /flushdns

ipconfig /release 

ipconfig /flushdns

M
e
n
u