Networking 1
Networking 1
Networking 1
Networking 1
Networking 1
100

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the
problem has been identified?

Establish a theory.

100

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Hosts file

100

Which of the following ports is used for secure email?

587

100

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types
of attacks is this scenario an example of?

MAC flooding

100

Which of the following is the next step to take after successfully testing a root cause theory?

Determine resolution steps.

200

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port.
The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

LLDP

200

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party
users. Which of the following concepts describes this arrangement?

Multitenancy

200

A client wants to increase overall security after a recent breach. Which of the following would be best to implement?

Least privilege network access, Central policy management

200

A company's office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate network by plugging personal laptops into open network ports. Which of the following should the company implement to prevent this in the future?

NAC

200

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Enable port security.

300

A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up?

A reservation for the server based on the MAC address

300

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

Out-of-band management

300

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Cloud-based traffic flows outside of the company's network.

300

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and
verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?

nmap

300

A customer needs six usable IP addresses. Which of the following best meets this requirement?

255.255.255.240

400

Which of the following technologies are X.509 certificates most commonly associated with?

PKI

400

Which of the following attacks utilizes a network packet that contains multiple network tags?

VLAN hopping

400

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which
of the following tools should the technician use to determine which link is being used for the web application?

tracert

400

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

Load balancer

400

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Heat map

500

A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following
technologies would facilitate this process?

Captive portal

500

A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configurations would meet this requirement?

Link aggregation

500

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

DNS poisoning

500

A company is hosting a secure server that requires all connections to the server to be encrypted. A junior administrator needs to harden the web
server. The following ports on the web server are open: 443,80,22,587. Which of the following ports should be disabled?

80

500

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

Public

M
e
n
u