What is recommended to avoid when making network schematics?
Representing too much in a single diagram
Using representative icons
Including a legend for color schemes
Creating separate diagrams for different layers
Representing too much in a single diagram
Which Nmap switch is used to perform only host discovery, suppressing the port scan?
-sn
--script
--traceroute
-p
-sn
A network administrator is monitoring a large network with multiple SNMP agents. They notice that the SNMP monitor is receiving a high volume of trap messages, indicating various notable events from different devices.
What action should the administrator take to ensure that the SNMP monitor can effectively manage and respond to these trap messages?
Increase the polling interval for all SNMP agents.
Switch to using community strings for device authentication.
Configure the SNMP agents to send trap messages only for critical
events.
Disable all trap messages to reduce the load on the SNMP monitor.
Configure the SNMP agents to send trap messages only for critical
What is the primary purpose of performing log reviews in network security?
To increase the network speed
To replace the need for real-time monitoring
To identify and respond to performance problems
To configure network devices and software
To identify and respond to performance problems
Why might frames with errors not be mirrored in a SPAN/port mirroring setup?
Because frames with errors will not be mirrored and may be dropped
Because frames with errors are encrypted
Because the switch is designed to correct errors automatically
Because the sniffer software filters out errors
Because frames with errors will not be mirrored and may be dropped
What type of information might not be captured by a backup of the configuration file only?
User accounts
State information
Device model
Version history
State information
What is the purpose of a community string in SNMP?
To serve as a type of password
To increase network speed
To identify the network topology
To encrypt data packets
To serve as a type of password
Why are complex applications likely to write to multiple log files?
To separate different types of events
To confuse potential hackers
To ensure data redundancy
To increase the storage used by logs
To separate different types of events
What is one primary function of a protocol analyzer?
To physically connect different network devices
To increase the speed of network communications
To encrypt data packets for secure transmission
To parse each frame in a stream of traffic
To parse each frame in a stream of traffic
During a video conference, participants experience sudden drops in video quality and occasional freezes.
Which of the following metrics should be closely monitored to diagnose the issue?
Bandwidth
Latency and jitter
CPU usage of the conferencing server
Number of connected users
Latency and jitter
Why is it important to track software license usage in an asset inventory?
To track the company's profit margins
To evaluate the company's branding strategies
To monitor employee internet usage
To ensure compliance with the vendor's licensing agreement
To ensure compliance with the vendor's licensing agreement
What does throttling client connections help with?
Increasing the speed of the network
Enhancing the security of the network
Decreasing server storage space
Reducing network congestion
Reducing network congestion
Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host.
Which protocol will the software use to detect the problem?
SNMP
TCP/IP
IPX
UDP
SNMP
Which tool is another non-graphic useful packet capture and analysis tool alongside tcpdump?
Netcat
Nmap
Wireshark
ngrep
ngrep
A small software development company has recently moved to a new office. The IT manager is tasked with setting up the network infrastructure. The company relies heavily on cloud based services for development and collaboration, and there's a need to ensure that these services have reliable connectivity.
Additionally, the company plans to use VoIP for all internal and external communications.
Considering the need for both reliable cloud service connectivity and high-quality VoIP calls, which of the following should the IT manager prioritize when configuring the network?
Implementing DiffServ for traffic classification and prioritization.
Setting up a VLAN for guest Wi-Fi access.
Purchasing the highest bandwidth internet connection available.
Enforcing strict access controls on all network devices.
Implementing DiffServ for traffic classification and prioritization.
You are an IT manager responsible for the lifecycle management of your company's assets.
You've noticed that several workstations are running an operating system that has reached its EOS.
What should be your immediate course of action?
Continue using the EOS operating system until hardware failures occur.
Sell the outdated workstations and purchase new ones.
Upgrade to a supported operating system as soon as possible.
Disconnect the workstations from the Internet but continue using them for offline tasks.
Upgrade to a supported operating system as soon as possible.
What is a major security weakness of SNMP v2c?
It uses strong encryption by default.
It restricts management operations to known hosts.
It supports too many users.
It sends community strings in plaintext.
It sends community strings in plaintext.
What is a major benefit of using log collectors and SIEMs (Security Information and Event Management systems) in log analysis?
They eliminate the need for manual log reviews.
They can automatically adjust network settings based on log data.
They can plot metrics in a graph for better visualization.
They guarantee 100% prevention of security breaches
They can plot metrics in a graph for better visualization.
What type of data transfer is described as bursty?
Voice over IP (VoIP)
File transfer
Real-time video streaming
Live audio broadcasting
File transfer
What is a potential drawback of using an Active TAP?
It cannot monitor gigabit signaling.
It can only be used with fiber optic cabling.
It automatically encrypts all traffic.
It becomes a point of failure with a power loss
It becomes a point of failure with a power loss
What is a golden configuration in network management?
A template for the desired state of a device
The initial configuration of a device when it is first installed
The maximum configuration a device can handle
The configuration that achieves the highest speed
A template for the desired state of a device
You are configuring SNMP on a network of routers and switches for a small business. You decide to use SNMP v3 because of its enhanced security features.
Which of the following configurations would provide the highest level of security for SNMP communication in this scenario?
noAuthNoPriv
Using community strings
authPriv
authNoPriv
authPriv
A security analyst is investigating a series of unusual network activities that suggest a potential breach in their organization's network.
The analyst suspects that the traffic is being routed through an unknown intermediary device within the network.
To map the path that the network traffic is taking to reach its destination, which Nmap command option should the security analyst use?
nmap --traceroute 10.10.1.0/24
nmap -A 10.10.1.0/24
nmap -p 80,443 10.10.1.0/24
nmap -sn 10.10.1.0/24
nmap --traceroute 10.10.1.0/24
What feature of Wireshark can help identify delays in a TCP conversation during a session between two devices?
The "Color Coding" scheme
The "Statistics" tab
The "Follow TCP Stream" option
The "Capture Filters" setting
The "Statistics" tab
What is a network bottleneck?
A point of poor performance that reduces overall network productivity
A security feature that prevents unauthorized access
An optimization technique to increase data transfer speeds
A method for encrypting data packets
A point of poor performance that reduces overall network productivity