Networking 7
Networking 7
Networking 7
Networking 7
Networking 7
100

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish

ACLs

100

Which of the following protocols is used to route traffic on the public internet?

BGP

100

Which of the following protocols provides remote access utilizing port 22?

SSH

100

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and
443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perform this testing?

nmap

100

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Rogue DHCP server

200

An organization wants better network visibility. The organization's requirements include: 

• Multivendor/OS-monitoring capabilities
• Real-time collection
• Data correlation
Which of the following meets these requirements?

SIEM

200

An administrator is evaluating the use of authentication within SNMP. Which of the following is the most secure way of authenticating devices using only SNMP?

Use version 3 of SNMP and set up trap messages for critical events on the network

200

A company has observed increased user traffic to gambling websites and would like to limit this behavior on work computers. Which of the following should the company most likely implement?

Content filter

200

Following a fire in a data center, the cabling was replaced. Soon after an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Choose two.)

The RJ45 cables were replaced with unshielded cables, The wrong transceiver type was used for the new termination

200

Cloud computing has the capability to meet increased and decreased demands for computing infrastructure for a short period of time. Which of the following best describes this characteristic?

Elasticity

300

Which of the following can also provide a security feature when implemented?

NAT

300

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Datagram

300

Which of the following is most likely to work with an FC connection and offers more scalability?

SAN

300

A company is moving to a hybrid cloud model. As part of this move the mail server will be moved to the cloud. The systems administrator needs to ensure the mail server continues to receive email. Which of the following types of DNS records should the systems administrator update?

MX

300

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

802.1X

400

A network administrator is expanding a network and wants to ensure no unauthorized redundant links are present. Which of the following should the administrator use to identify and block redundant links?

STP

400

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

East-west

400

Which of the following would be violated if an employee accidentally deleted a customer's data?

Availability

400

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

v3

400

A company recently acquired a number of sites and no documentation was provided. A network administrator needs to identify and document all of the digital assets in use. Which of the following is the best method for the administrator to use?

Network discovery

500

A network administrator recently upgraded a wireless infrastructure with new APs. Users are reporting that, when stationary, the wireless connection drops and reconnects after 20 to 30 seconds. While reviewing the logs, the administrator notices that the APs are changing channels. Which of the following is the most likely reason for the service interruptions?

Channel interference

500

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

224.0.0.0/24

500

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Clientless

500

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR concepts does this describe?

Cold site

500

A security analyst wants to control internet access based on site reputation and categorization. The analyst needs a solution that does not require
traffic flow changes. Which of the following solutions would most likely meet these requirements?

DNS filtering

M
e
n
u