Maybe 1
Maybe 2
Maybe 3
Maybe 4
Maybe 5
100

An administrator wants to ensure the data packets are encrypted before transmitting to prevent eavesdropping through symmetric encryption algorithms. Which Encapsulating Security Payload (ESP) component can provide the same confidentiality on both endpoints of the VPN?

A.Authentication Header (AH)

B.Confidentiality encryption

C.Data integrity

D.Authentication

B.Confidentiality encryption

100

Which security protocol can authenticate users without transmitting their passwords over the network?

A.Kerberos

B.802.1X

C.TKIP

D.LDAP

A.Kerberos

100

A company has a website in a US data center where 80% of its business is, and it wants to expand to an overseas location. The administrator strategically places the web server across both data centers. How can the administrator scale the website across several data centers worldwide?

A.Elastic computing

B.Network security groups

C.Load balancers

D.Multitenancy

C.Load balancers

100

Which of the following statements about the differences between network-attached storage (NAS) and storage area networks (SANs) are true? (Choose all that apply.)

A.NAS provides file-level storage access, whereas SAN provides block-level storage access.

B.NAS devices typically contain integrated iSCSI targets.

C.SAN devices have an operating system, whereas NAS devices do not.

D.NAS devices typically provide a filesystem, whereas SAN devices do not.

A.NAS provides file-level storage access, whereas SAN provides block-level storage access.

D.NAS devices typically provide a filesystem, whereas SAN devices do not.

100

Which category of load balancers acts upon the data that uses Internet Protocol, File Transfer Protocol, Transmission Control Protocol, and User Datagram Protocol?

A.Layer 7 load balancers

B.Layer 4 load balancers

C.Layer 2 load balancers

D.Layer 6 load balancers

B.Layer 4 load balancers

200

Which of the following is a term used to describe the cryptographic security for the NTP client-server mode, ensuring that the devices receive accurate time from a reliable source?

A.Stratum level

B.UDP client-server level

C.Network Time Security (NTS)

D.Time Sequence and Recording (TSR)

C.Network Time Security (NTS)

200

Which of the following Network layer protocols include a time to live (TTL) field? (Choose two.)

A.IPv4

B.IPv6

C.ICMP

D.IGMP

A.IPv4

B.IPv6

200

Which of the following is NOT an example of a Software as a Service (SaaS) model?

A.Microsoft Azure

B.Microsoft 365

C.Canva

D.Netflix

A.Microsoft Azure

200

A host-based intrusion detection system (HIDS) relies on _____________________, and these agents work closely with the operating system to observe activity.

A.Agents installed on a server

B.Agents installed directly on network devices

C.Input/output hosts

D.Agents installed directly on endpoints

D.Agents installed directly on endpoints

200

Which monitoring system monitors activities on endpoints and blocks malicious attacks by following specific rules?

A.Host Intrusion Prevention System

B.Endpoint Detection And Response

C.Host Intrusion Detection System

D.Host Intrusion Targeting System

A.Host Intrusion Prevention System

300

Which protocol uses TCP port 389 to access and query directory services systems such as Microsoft Active Directory?

A.Server Message Block (SMB)

B.Remote Desktop Protocol (RDP)

C.Lightweight Directory Access Protocol over SSL (LDAPS)

D.Lightweight Directory Access Protocol (LDAP)

D.Lightweight Directory Access Protocol (LDAP)

300

A network administrator applies quality of service (QoS) according to corporate policy, allowing users to have consistency and adequacy for their most important network applications. How can the administrator configure switches to implement the QoS settings?

A.Configuring the ‘Type of Service’ 8-bit field within an IP packet

B.Configuring the ‘Passthrough Service’ 16-bit field within an IP packet

C.Configuring the ‘Allow Config’ 16-bit field within an IP packet

D.Configuring the ‘Allow Config Service’ 8-bit field within an IP packet

A.Configuring the ‘Type of Service’ 8-bit field within an IP packet

300

When paired with the Layer 2 Tunneling Protocol (L2TP), which protocol offers encryption and protection similar to a VPN protocol?

A.IPSec

B.TLS

C.SSTP

D.IKEv2

A.IPSec

300

Which of the following is the primary Application layer protocol web browsers use to communicate with web servers?

A.HTTP

B.HTML

C.SMTP

D.FTP

A.HTTP

300

Which of the following involves converting raw bit streams into a format suitable for transmission over a physical medium?

A.Routing

B.Subnet traffic control

C.Media access control

D.Data encoding

D.Data encoding

400

Which protocols generate messages carried directly within Internet Protocol (IPv4) datagrams, with no intervening Transport layer protocol? (Choose two.)

A.ICMP

B.IGMP

C.SMTP

D.SNMP

A.ICMP

B.IGMP

400

Which of the following would be BEST to use to detect a MAC spoofing attack?

A. Internet Control Message Protocol

B. Reverse Address Resolution Protocol

C. Dynamic Host Configuration Protocol

D. Internet Message Access Protocol

B. Reverse Address Resolution Protocol

400

How does the Data Link layer provide flow control and sequencing of data frames between nodes?

A.It establishes and terminates the logical link between nodes.

B.It establishes session support between nodes.

C.It provides data encoding and health checks between nodes.

D.It manages segmentation from Application layer messages and acknowledgement.

A.It establishes and terminates the logical link between nodes.

400

How does the Session layer allow session establishment between processes running on different stations?

A.By forwarding to the Syntax layer

B.By synchronizing and sending to ports

C.By performing packet routing

D.By fragmenting packets into frames

B.By synchronizing and sending to ports

400

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

A. Evil twin

B. Tailgating

C. Piggybacking

D. Shoulder surfing

B. Tailgating

500

Ralph configures a new email client on a workstation to use the Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP3) email protocols. He wants SMTP to use encryption when communicating with the email server. Which of the following port numbers should Ralph use to create the POP3 connection and secure the SMTP connection with Transport Layer Security (TLS)? (Choose two.)

A.110

B.25

C.587

D.443

A.110

C.587

500

What is the comparable characteristic of Symmetrical Digital Subscriber Line (SDSL) to T1 leased lines?

A. Both are usually for small businesses

B. They deliver the same speed

C. They offer high speed for businesses

D. Both are expensive options for businesses

B. They deliver the same speed

500

Which of the following is NOT a protocol operating at the Network layer of the OSI model?

A.IP

B.ICMP

C.IGMP

D.TFTP

D.TFTP

500

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the<br>technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be<br>interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

A. NetFlow analyzer

B. Bandwidth analyzer

C. Protocol analyzer

D. Spectrum analyzer

D. Spectrum analyzer

500

Which layer handles the encryption and decryption required by the Application layer?

A.Sync layer

B.Syntax layer

C.End-user layer

D.Semantics layer

B.Syntax layer