Which of the following steps of the troubleshooting methodology would most likel checking through each level of the OSI model after the problem has been identified?
a) A reservation for the server based on the MAC address
b) A SLAAC for the server
c) A separate scope for the file server using a /32 subnet
d) A static IP address within the DHCP IP range
A reservation for the server based on the MAC address
Which network functions can be interfered with by a DNS poisoning attack?
A.Routing table updates
B.Name resolution
C.Password protection
D.Network switching
Name resolution
A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configurations would meet this requirement?
a) Native VLAN
b) Full duplex
c) 802.1Q tagging
d) Link aggregation
Link aggregation
A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
A. Least privilege network access
B. Dynamic inventories
C. Central policy management
D. Zero-touch provisioning
Least privilege network access
Central policy management
Which of the following ports is used for secure email?
A. 25
B. 110
C. 143
D. 587
587
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Layer 2
Which of the following attacks utilizes a network packet that contains multiple network tags?
a) ARP poisoning
b) DNS spoofing
c) VLAN hopping
d) MAC flooding
VLAN hopping
A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?
a) Enterprise authentication
b) Captive portal
c) Ad hoc network
d) WPA3
Captive portal
Which of the following technologies are X.509 certificates most commonly associated with?
a) VLAN tagging
b) MFA
c) LDAP
d) PKI
PKI
What is the purpose of the Remote Desktop Protocol (RDP)?
A. It is used for the management of servers and network devices.
B. It is an application protocol for web data communications.
C. It is used for connecting to another Microsoft computer or server for remote administration.
D. It provides encryption transfers via Secure Sockets Layer (SSL).
It is used for connecting to another Microsoft computer or server for remote administration
According to the OSI model, at which of the following layers is data encapsulated into a packet?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
Layer 3
Double Points
Some of your organization’s employees are receiving fishy emails. A seemingly genuine email from the project manager asks for the web server’s login details. Others were targeted at administrators and were aimed at learning habits. What kind of attack are the employees experiencing?
A.Phishing attacks
B.ePhishing attacks
C.Spear phishing attacks
D.On-path attacks
Spear phishing attacks
A user is unable to navigate to a website because the provided URL is not resolving correct IP address. Other users are able to navigate to the intended website without is of the following is most likely causing this issue?
a) Nameserver record
b) Hosts file
c) IP helper
d) Self-signed certificate
Hosts file
Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
A. traceroute
B. ping
C. nslookup
D. netstat
traceroute
Which port does Lightweight Directory Access Protocol over SSL (LDAPS) use?
A. TCP port 389
B. TCP port 636
C. UDP port 389
D. TCP port 143
TCP port 636
Double Points
Which protocols provide connectionless delivery service at the Transport layer of the Open Systems Interconnection (OSI) model?
A.TCP
B.HTTP
C.UDP
D.ARP
UDP
Which of the following methods is a mitigation technique to slow down a hacker and study the attack vector?
A.Honeypots
B.Network attacks
C.Switch port protection types
D.Firewall filters
Honeypots
A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?
a) Multitenancy
b) NFV
c) VPC
d) SaaS
Multitenancy
Double Points
You are responsible for the security of an organization’s server farm. You are considering server hardening procedures to ensure optimum security against major threat actors. Which of the following can be considered viable server-hardening techniques?
A.Installing additional memory
B.Disabling unnecessary services
C.Creating privileged user accounts
D.Enabling all TCP and UDP ports
Disabling unnecessary services
Double Points
Which of the following statements about SNMP is correct?
A. SNMP only operates on TCP
B. SNMP monitors servers and network devices using HTTP
C. The NMS is notified of problems through SNMP traps sent to UDP port 161
D. SNMP agents and servers listen for requests on UDP port 161
SNMP agents and servers listen for requests on UDP port 161
An employee in your company was terminated from the job two weeks ago. When you arrived at the office on Monday, you found that the data from all the hosts in a web server farm had been deleted. No authorized entries were found in the data center records. However, you suspect that the disgruntled employee might be behind it. Which of the following attacks was performed at the web server farm?
A.Evil twin
B.Logic bomb
C.ARP poisoning
D.DNS poisoning
Logic bomb
Double Points
You’re configuring a wired home network with four Windows computers, a switch, and a cable router that provides Internet access. All the computers can access the Internet, but none can access filesystem shares on each other. What is the most likely cause of the problem on the four network computers?
A.Incorrect IP addresses
B.Incorrect subnet mask
C.Incorrect default gateway address
D.Incorrect access control list (ACL) settings
Incorrect access control list (ACL) settings
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?
A. Leases
B. Helper addresses
C. Scopes
D. Reservations
Reservations
A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?
A. 23
B. 25
C. 110
D. 143
25