8.1
8.2
8.3 & 4
8.4 & 5
8.5 & 6
100

What is recommended to avoid when making network schematics?


Representing too much in a single diagram

Using representative icons

Including a legend for color schemes

Creating separate diagrams for different layers

Representing too much in a single diagram

100

Which Nmap switch is used to perform only host discovery, suppressing the port scan?

-sn

--script

--traceroute

-p

-sn

100

A network administrator is monitoring a large network with multiple SNMP agents. They notice that the SNMP monitor is receiving a high volume of trap messages, indicating various notable events from different devices.

What action should the administrator take to ensure that the SNMP monitor can effectively manage and respond to these trap messages?

Increase the polling interval for all SNMP agents.

Switch to using community strings for device authentication.

Configure the SNMP agents to send trap messages only for critical

events.

Disable all trap messages to reduce the load on the SNMP monitor.

Configure the SNMP agents to send trap messages only for critical

100

What is the primary purpose of performing log reviews in network security?

To increase the network speed

To replace the need for real-time monitoring

To identify and respond to performance problems

To configure network devices and software

To identify and respond to performance problems

100

Why might frames with errors not be mirrored in a SPAN/port mirroring setup?

Because frames with errors will not be mirrored and may be dropped

Because frames with errors are encrypted

Because the switch is designed to correct errors automatically

Because the sniffer software filters out errors

Because frames with errors will not be mirrored and may be dropped

200

What type of information might not be captured by a backup of the configuration file only?

User accounts

State information

Device model

Version history

State information

200

What is the purpose of a community string in SNMP?

To serve as a type of password

To increase network speed

To identify the network topology

To encrypt data packets

To serve as a type of password

200

Why are complex applications likely to write to multiple log files?

To separate different types of events

To confuse potential hackers

To ensure data redundancy

To increase the storage used by logs

To separate different types of events

200

What is one primary function of a protocol analyzer?

To physically connect different network devices

To increase the speed of network communications

To encrypt data packets for secure transmission

To parse each frame in a stream of traffic

To parse each frame in a stream of traffic

200

During a video conference, participants experience sudden drops in video quality and occasional freezes.

Which of the following metrics should be closely monitored to diagnose the issue?

Bandwidth

Latency and jitter

CPU usage of the conferencing server

Number of connected users

Latency and jitter

300

Why is it important to track software license usage in an asset inventory?

To track the company's profit margins

To evaluate the company's branding strategies

To monitor employee internet usage

To ensure compliance with the vendor's licensing agreement

To ensure compliance with the vendor's licensing agreement

300

What does throttling client connections help with?

Increasing the speed of the network

Enhancing the security of the network

Decreasing server storage space

Reducing network congestion

Reducing network congestion

300

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host.

Which protocol will the software use to detect the problem?

SNMP

TCP/IP

IPX

UDP

SNMP

300

Which tool is another non-graphic useful packet capture and analysis tool alongside tcpdump?

Netcat

Nmap

Wireshark

ngrep

ngrep

300

A small software development company has recently moved to a new office. The IT manager is tasked with setting up the network infrastructure. The company relies heavily on cloud based services for development and collaboration, and there's a need to ensure that these services have reliable connectivity.

Additionally, the company plans to use VoIP for all internal and external communications.

Considering the need for both reliable cloud service connectivity and high-quality VoIP calls, which of the following should the IT manager prioritize when configuring the network?

Implementing DiffServ for traffic classification and prioritization.

Setting up a VLAN for guest Wi-Fi access.

Purchasing the highest bandwidth internet connection available.

Enforcing strict access controls on all network devices.

Implementing DiffServ for traffic classification and prioritization.

400

You are an IT manager responsible for the lifecycle management of your company's assets.

You've noticed that several workstations are running an operating system that has reached its EOS.

What should be your immediate course of action?

Continue using the EOS operating system until hardware failures occur.

Sell the outdated workstations and purchase new ones.

Upgrade to a supported operating system as soon as possible.

Disconnect the workstations from the Internet but continue using them for offline tasks.

Upgrade to a supported operating system as soon as possible.

400

What is a major security weakness of SNMP v2c?

It uses strong encryption by default.

It restricts management operations to known hosts.

It supports too many users.

It sends community strings in plaintext.

It sends community strings in plaintext.

400

What is a major benefit of using log collectors and SIEMs (Security Information and Event Management systems) in log analysis?

They eliminate the need for manual log reviews.

They can automatically adjust network settings based on log data.

They can plot metrics in a graph for better visualization.

They guarantee 100% prevention of security breaches

They can plot metrics in a graph for better visualization.

400

What type of data transfer is described as bursty?

Voice over IP (VoIP)

File transfer

Real-time video streaming

Live audio broadcasting

File transfer

400

What is a potential drawback of using an Active TAP?

It cannot monitor gigabit signaling.

It can only be used with fiber optic cabling.

It automatically encrypts all traffic.

It becomes a point of failure with a power loss

It becomes a point of failure with a power loss

500

What is a golden configuration in network management?

A template for the desired state of a device

The initial configuration of a device when it is first installed

The maximum configuration a device can handle

The configuration that achieves the highest speed

A template for the desired state of a device

500

You are configuring SNMP on a network of routers and switches for a small business. You decide to use SNMP v3 because of its enhanced security features.

Which of the following configurations would provide the highest level of security for SNMP communication in this scenario?

noAuthNoPriv

Using community strings

authPriv

authNoPriv

authPriv

500

A security analyst is investigating a series of unusual network activities that suggest a potential breach in their organization's network.

The analyst suspects that the traffic is being routed through an unknown intermediary device within the network.

To map the path that the network traffic is taking to reach its destination, which Nmap command option should the security analyst use?

nmap --traceroute 10.10.1.0/24

nmap -A 10.10.1.0/24

nmap -p 80,443 10.10.1.0/24

nmap -sn 10.10.1.0/24

nmap --traceroute 10.10.1.0/24

500

What feature of Wireshark can help identify delays in a TCP conversation during a session between two devices?

The "Color Coding" scheme

The "Statistics" tab

The "Follow TCP Stream" option

The "Capture Filters" setting

The "Statistics" tab

500

What is a network bottleneck?

A point of poor performance that reduces overall network productivity

A security feature that prevents unauthorized access

An optimization technique to increase data transfer speeds

A method for encrypting data packets

A point of poor performance that reduces overall network productivity