TCP/UDP
DRP
VOIP
NTP
extra
100

You are configuring a new file server for your company's local network. The network includes a variety of devices, including some legacy systems that still require SMB1 for file sharing.

However, you are aware of the security vulnerabilities associated with SMB1. You want to ensure that the network is secure while still accommodating the legacy systems.

What is the BEST approach for you to take in this situation?

Enable SMB1 on the file server and disable all other versions of SMB.

Enable SMB1 but also enable SMB3 and configure message encryption for sensitive shares.

Completely disable SMB on the file server and use FTP for file sharing instead.

Disable SMB1 and require all devices to use SMB3.

Enable SMB1 but also enable SMB3 and configure message encryption for sensitive shares.

100

What should be done with data that has been lost between the Recovery Point Objective (RPO) and the present time?


It should trigger an immediate system shutdown.

It should be immediately backed up again.

It should be accepted as a loss or reconstructed.

It should be ignored as it is not critical.

It should be accepted as a loss or reconstructed.

100

Why would an organization choose to upgrade from a TDM-based PBX to a VoIP PBX?

To increase the cost of international calls

To reduce flexibility in call routing

To integrate voice and data communications over the same network

To limit the features available for voice communications

To integrate voice and data communications over the same network

100

What is the purpose of configuring multiple reference time sources for NTP?


To decrease the load on the primary time server

To allow the NTP algorithm to detect drifting or incorrect time values

To comply with international timekeeping standards

To increase the network bandwidth



To allow the NTP algorithm to detect drifting or incorrect time values

100

What does SMTP use to discover the IP address of the recipient's SMTP server?

The sender's IP address

The recipient's email password

The domain name part of the recipient's email address

The recipient's physical address

The domain name part of the recipient's email address

200

What does the term "stateless protocol" imply about HTTP?

Each request from a client to a server is treated as a new request.

The server requires authentication for every request.

The server retains information about client requests indefinitely.

The server stores data in a centralized database for all requests.

Each request from a client to a server is treated as a new request.

200

During a routine audit, it's discovered that the Recovery Time Objective (RTO) for a critical system is set to 24 hours. However, the business impact analysis (BIA) indicates that any downtime longer than 12 hours could result in significant financial and reputational damage.

What should be the immediate course of action?


Adjust the RTO to align with the findings of the BIA.

Conduct a tabletop exercise focusing on other non-critical systems.

Increase the RTO to 48 hours to provide more flexibility.

Ignore the BIA findings as the current RTO has been effective so far.

Adjust the RTO to align with the findings of the BIA.

200

You are setting up a new office for your company, which includes installing VoIP phones for all employees.

You want to ensure that voice traffic does not interfere with the company's data traffic and vice versa. You also want to make sure that the VoIP phones can be used even if there are power outages.

What should you do to meet these requirements?

Configure separate VLAN IDs for voice and data traffic and use traditional power cables for the VoIP phones.

Configure separate VLAN IDs for voice and data traffic and ensure the VoIP phones support Power over Ethernet (PoE).

Use digital certificates and connect phones directly to the Internet without a LAN.

Connect all VoIP phones to a dedicated Wi-Fi network separate from the company's main network

Configure separate VLAN IDs for voice and data traffic and ensure the VoIP phones support Power over Ethernet (PoE).

200

Which IEEE standard defines the Precision Time Protocol (PTP)?

IEEE 1149.1

IEEE 802.11

IEEE 802.3

IEEE 1588


IEEE 1588

200

What is the purpose of the STARTTLS command in SMTP?


o downgrade the connection to an unsecure state

To create a new email account

To encrypt the entire email message content

To upgrade an existing unsecure connection to use TLS



To upgrade an existing unsecure connection to use TLS

300

What is the default port for IMAPS, the secure version of IMAP?

TCP/443

TCP/25

TCP/143

TCP/993



TCP/993

300

While performing a resiliency test for availability, a technician is trying to calculate the amount of data loss that a system can sustain before the data is unrecoverable if it was targeted by a virus, and just how far back in time from the disaster that would be.

What is the technician testing for?

Recovery point objective

Recovery time objective

Work recovery time

Maximum tolerable downtime

Recovery point objective

300

What does the secure version of SIP (SIPS) use to authenticate the endpoints and establish a TLS tunnel?

VLAN IDs

Power over Ethernet

Echo test calls

Digital certificates


Digital certificates

300

Which of the following time standards does NTP use?

UTC

PDT

EDT

CDT

UTC

300

What does the term "stateless protocol" imply about HTTP?

Each request from a client to a server is treated as a new request.

The server requires authentication for every request.

The server retains information about client requests indefinitely.

The server stores data in a centralized database for all requests.


Each request from a client to a server is treated as a new request.



400

What can be configured to require encryption and drop connections if a valid security profile is not available?

The database's replication process

The database server or the client

The database's graphical user interface

The database's storage capacity

The database server or the client

400

What is the significance of conducting validation tests in disaster recovery?

To assess the effectiveness of marketing strategies

To ensure services can be restored

To evaluate the company's financial health

To increase the company's market share

To ensure services can be restored

400

What is the primary function of a Private Branch Exchange (PBX)?

To serve as a firewall for an organization's network

To provide internet access to an organization

To act as an automated switchboard for voice lines

To encrypt voice communications

To act as an automated switchboard for voice lines

400

Why is SSL now considered completely obsolete?

It was too complex to implement.

It increased data transmission costs.

It was only compatible with HTTP.

It has been replaced by more secure versions of TLS.


It has been replaced by more secure versions of TLS.

400

You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.

Which of the following steps is essential for you to achieve this?


Obtain and install a digital certificate.

Increase your website's bandwidth.

Implement a CAPTCHA system on your website.

Install a web analytics tool.

Obtain and install a digital certificate.

500

What is a major benefit of using RAID with NAS devices?

It enhances the firewall capabilities.

It spreads information between disks for data availability.

It reduces the need for physical storage space.

It increases the internet speed.

It spreads information between disks for data availability.

500

In the event of a nationwide emergency, what is a potential issue with leased disaster recovery sites?

Demand for services is likely to exceed supply.

They are always readily available.

They are less expensive than other options.

They offer immediate failover without any setup.

Demand for services is likely to exceed supply.

500

What is the primary purpose of Transport Layer Security (TLS)?

To authenticate and encrypt TCP connections

To increase the speed of data transmission over the Internet

To manage network traffic and reduce congestion

To compress data for efficient storage

To authenticate and encrypt TCP connections

500

In FTP active mode, how does the data connection get established?


The client sends a PORT command specifying its data connection port number to the server.

The client sends a PASV command to the server.

The server initiates the connection without client interaction.

The server sends a PORT command to the client.

The client sends a PORT command specifying its data connection port number to the server.

500

What can happen if a server or host is configured with the incorrect time?


It will increase the security of network communications

It may not be able to access network services

It can lead to increased network speed

It will automatically correct itself without NTP

It may not be able to access network services