1
2
3
4
5
100

Which component of a change and configuration management policy identifies the need for a proposed change?

A) Feasibility analysis
B) Rollback
C) Change request
D) Authorized downtime

C) Change request

100

You are configuring a network firewall to allow STMP outbound email traffic and PO3 inbound email traffic.
Which of the following TCP/IP ports should you open on the firewall? (Select two.)

A) 143
B) 25
C) 110
D) 443
E) 21

B) 25
C) 110

100

You need to provide DHCP and file share services to a physical network. These services should be deployed using visualization. Which type of virtualization should you implement?

A) Virtual services
B) Virtual networks
C) Network as a service (NaaS)
D) Virtual desktop

A) Virtual services

100

Which of the following devices operate at the Data Link layer of the OSI model? (Select three.)

A) Repeaters
B) Switches
C) Bridges
D) Network interface cards (NICs)
E) Hubs
F) Routers

B) Switches
C) Bridges
D) Network interface cards (NICs)

100

Which of the following are examples of social engineering? (Select two.)

A) Dumpster diving
B) War dialing
C) Port scanning
D) Shoulder surfing

A) Dumpster diving
D) Shoulder surfing

200

Which of the following media types can you save backup files on? (Select two.)

A) External hard drives
B) Network attached storage (NAS)
C) The system disk
D) Tape drives

A) External hard drives
B) Network attached storage (NAS)

200

Which of the following CCTV types would you use in areas with little or no light?

A) PTZ
B) C-mount
C) Infrared
D) A camera with a high LUX rating

C) Infrared

200

You are an administrator of a growing network. You notice the network you have create is broadcasting, but you cannot ping systems on different segments of your network. What device should you use to fix this issue?

A) Range extender
B) Network hub
C) Access point
D) Network bridge

D) Network bridge

200

Which wireless networking component is used to connect multiple AP’s together?

A) STA
B) BSS
C) IBSS
D) DS

D) DS

200

Which of the following is not a valid response to a risk discovered during a risk analysis?

A) Assignment
B) Mitigation
C) Acceptance
D) Denial

D) Denial

300

Which protocol is well known for its use in the the home security and home automation industry, uses a mesh topology, makes devices act as repeaters, and has a low transfer rate?

A) Ant+
B) Z-Wave
C) 802.11AC
D) NFC

B) Z-Wave

300

Which of the following networking devices or services prevents the use of IPsec in most cases?

A) Switch
B) Router
C) NAT
D) Firewall

C) NAT

300

Which option is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously?

A) Outlook Express
B) Worm
C) ActiveX control
D) Trojan horse

D) Trojan horse

300

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

A) 2 Mbps
B) 10 Mbps
C) 11 Mbps
D) 56 Mbps

C) 11 Mbps

300

You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? (Select two)

A) Implement separation of duties
B) Remove any backdoors
C) Conduct privilege escalation
D) Apply all patches and updates
E) Change default account passwords

D) Apply all patches and updates
E) Change default account passwords

400

Which of the following internet connection technologies require that the location be within a limited distance of the telephone company central office?

A) DSL
B) Satellite
C) Cable Modem
D) Wireless

A) DSL

400

Which type of address is the IP address 198.162.12.254/24?

A) Multicast
B) Broadcast
C) Unicast
D) Private

C) Unicast

400

You have a small network that uses a switch to connect multiple devices. Which physical topology are you using?

A) Bus
B) Ring
C) Mesh
D) Star

D) Star

400

To increase security on your company’s internal network, the administrator has disabled as many ports as possible. Now, though you can browse the internet, you are able to perform secure credit card transactions.
Which port needs to be enabled to allow secure transactions?

A) 80
B) 21
C) 443
D) 23
E) 69

C) 443

400

Which of the following protocols can be used to centralize remote access authentication?

A) TACACS
B) EAP
C) SESAME
D) KERBEROS
E) CHAP

A) TACACS

500

Which of the following enterprise wireless deployment models uses access points with enough intelligence to allow the creation of guest WLANs for keeping public wireless traffic separate from private traffic?

A) Lightweight access point (LWAP) with wireless controller infrastructure
B) Hub-and-spoke infrastructure
C) Distributed wireless mesh infrastructure
D) Independent access points

C) Distributed wireless mesh infrastructure

500

You are connecting Cat 5e cables to a 110 block. What order should you connect the wires in to follow standard wiring conventions?

A) White/green, green, white/orange, blue, white/blue, range, white/brown, brown
B) White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
C) White/blue, blue, white/orange, orange, white/green, green, white/brown, brown
D) White/brown, brown, white/blue, blue, white/orange, orange, white/green, green

C) White/blue, blue, white/orange, orange, white/green, green, white/brown, brown

500

Which of the following activities are typically associated with a penetration test? (Select two.)

A) Running a vulnerability scanner on network servers
B)Interviewing employees to verify the security policy is being followed
C) Running a port scanner
D) Creating a performance baseline
E) Attempting social engineering

C) Running a port scanner
E) Attempting social engineering

500

What does the ip address dhcp command allow you to do?

A) Configure the switch to act as a DHCP server.
B) Send the DHCP server address to all connected devices.
C) Configure the switch to obtain an IP address from a DHCP server.
D) Specify the DHCP relay server for forwarding DHCP packets.

C) Configure the switch to obtain an IP address from a DHCP server.

500

What does an IDS that uses signature recognition use to identify attacks?

A) Current statistics compared to past statistics.
B) Potential attack activity compared to a database of known attacks.
C) Statistical analysis to find unusual deviations.
D) Exceeding threshold values.

B) Potential attack activity compared to a database of known attacks.