7
8
9
Wild Card
Extra Wild
100

What is the primary purpose of using physical network diagrams?

To document the physical location of employees

To capture the complex relationships between network elements

To track software installations on network devices

To track software installations on network devices

To capture the complex relationships between network elements

100

What is the primary purpose of using physical network diagrams?

To document the physical location of employees

To capture the complex relationships between network elements

To track software installations on network devices

To track software installations on network devices

To capture the complex relationships between network elements

100

What is the role of encryption in an access control solution?

To give readable access to data

To physically secure devices and resources

To serve as the only method of access control

To convert plaintext into ciphertext

To convert plaintext into ciphertext

100

What is the primary purpose of monitoring individual interface statistics in a network?

To reduce the cost of network maintenance

To increase the network speed

To enhance the security of network communications

To diagnose performance issues

To diagnose performance issues

100

What layer of the OSI model does the Transmission Control Protocol (TCP) operate at?

Transport

200

You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.

Which of the following steps is essential for you to achieve this?

Implement a CAPTCHA system on your website.

Increase your website's bandwidth.

Install a web analytics tool.

Obtain and install a digital certificate.

Obtain and install a digital certificate.

200

What does an IP scanner do?

Creates spreadsheets

Establishes the logical topology of the network

Edits images

Encrypts network traffic

Establishes the logical topology of the network

200

What is the primary purpose of threat assessment in cybersecurity?

To install antivirus software on all company devices

To train employees on cybersecurity best practices

To develop new cybersecurity tools

To identify and profile threat sources and actors

To identify and profile threat sources and actors

200

How do routers external to the network utilize CIDR?

By encrypting data packets based on the CIDR notation

By assigning dynamic IP addresses to devices within the network

By using the /22 prefix to simplify routing and reduce the complexity of their routing tables

By directly managing the LAN's internal subnet configurations

By using the /22 prefix to simplify routing and reduce the complexity of their routing tables

200

Which TCP flag is set by the client to initiate the three-way handshake?


SYN

300

What is the primary purpose of the File Transfer Protocol (FTP)?

To send email messages

To transfer files between a client and server

To stream video content

To encrypt web traffic

To transfer files between a client and server

300

Which version of SNMP supports encryption and strong user-based authentication?

SNMP v3

SNMP v1

SNMP v4

SNMP v2c

SNMP v3

300

What is VLAN hopping?

A method to increase the speed of VLAN traffic

An attack designed to send traffic to a VLAN other than the one the host system is in

A technique to reduce network congestion

A security feature of 802.1Q to enhance VLAN compatibility

An attack designed to send traffic to a VLAN other than the one the host system is in

300

A network technician is setting up IPv6 global addressing.

Which of the following is NOT part of an IPv6 unicast address?

Subnet

Network ID

Starts with 001

Starts with fe80

Starts with fe80

300

How many fiber strands are required for a 40 Gbps link comprising 4 x 10 Gbps lanes using Multi-fiber Push On (MPO) connectors?


8 Strands

400

What is the primary function of the Simple Mail Transfer Protocol (SMTP)?

To manage email contacts

To encrypt email messages

To provide persistent storage of messages

To deliver email from one system to another

To deliver email from one system to another

400

What is an automated event management system configured to generate?

Detailed reports for every event

Some sort of alert

A backup of the logging system

A list of all devices on the network

Some sort of alert

400

Which of the following can be considered a rogue device?

A wireless access point installed without IT approval

A company-issued laptop with up-to-date security software

A firewall configured by the network security team

An officially sanctioned DHCP server

A wireless access point installed without IT approval

400

Which characters are allowed in a DNS label?

Only letters and digits

Any characters, including spaces

Letters, digits, and hyphens

Letters, digits, hyphens, and punctuation characters

Letters, digits, and hyphens

400

Which of the following is a unique identifier for each Ethernet network interface port?


MAC Address

500

What does disaster recovery focus on?

Expanding the business to new markets

Developing new products

Increasing the number of employees

Switching services to failover systems or sites

Switching services to failover systems or sites

500

What is the role of a packet sniffer in the context of a protocol analyzer?

To increase the bandwidth of the network

To capture frames moving over the network medium

To provide encryption for data packets

To physically connect different network segments

To capture frames moving over the network medium

500

A software developer is working at a coffee shop when a friendly stranger strikes up a conversation about technology. During the chat, the stranger offers the developer a USB drive, claiming it contains a beta version of an innovative software tool that could be useful for their work.

The software developer is tempted by the offer but recalls a recent security training session at their company.

How should the software developer respond to the stranger's offer of the USB drive in the safest way possible?

Take the USB drive and give it to the developer's company's IT department for evaluation.

Accept the USB drive and use it immediately to see if the software is beneficial.

Accept the USB drive but plan to scan it with antivirus software before using it.

Politely decline the offer, citing company policy.

Politely decline the offer, citing company policy.

500

What is the primary purpose of using fiber distribution panels in a fiber optic network?

To provide a centralized location for connecting and managing fiber optic cables

To enhance the speed of data transmission over the network

To increase the signal strength of the fiber optic cables

To convert electrical signals into optical signals

To provide a centralized location for connecting and managing fiber optic cables

500

Which network component connects a device to transmission media and allows the device to send and receive messages?


NIC