What is the primary purpose of using physical network diagrams?
To document the physical location of employees
To capture the complex relationships between network elements
To track software installations on network devices
To track software installations on network devices
To capture the complex relationships between network elements
What is the primary purpose of using physical network diagrams?
To document the physical location of employees
To capture the complex relationships between network elements
To track software installations on network devices
To track software installations on network devices
To capture the complex relationships between network elements
What is the role of encryption in an access control solution?
To give readable access to data
To physically secure devices and resources
To serve as the only method of access control
To convert plaintext into ciphertext
To convert plaintext into ciphertext
What is the primary purpose of monitoring individual interface statistics in a network?
To reduce the cost of network maintenance
To increase the network speed
To enhance the security of network communications
To diagnose performance issues
To diagnose performance issues
What layer of the OSI model does the Transmission Control Protocol (TCP) operate at?
Transport
You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.
Which of the following steps is essential for you to achieve this?
Implement a CAPTCHA system on your website.
Increase your website's bandwidth.
Install a web analytics tool.
Obtain and install a digital certificate.
Obtain and install a digital certificate.
What does an IP scanner do?
Creates spreadsheets
Establishes the logical topology of the network
Edits images
Encrypts network traffic
Establishes the logical topology of the network
What is the primary purpose of threat assessment in cybersecurity?
To install antivirus software on all company devices
To train employees on cybersecurity best practices
To develop new cybersecurity tools
To identify and profile threat sources and actors
To identify and profile threat sources and actors
How do routers external to the network utilize CIDR?
By encrypting data packets based on the CIDR notation
By assigning dynamic IP addresses to devices within the network
By using the /22 prefix to simplify routing and reduce the complexity of their routing tables
By directly managing the LAN's internal subnet configurations
By using the /22 prefix to simplify routing and reduce the complexity of their routing tables
Which TCP flag is set by the client to initiate the three-way handshake?
SYN
What is the primary purpose of the File Transfer Protocol (FTP)?
To send email messages
To transfer files between a client and server
To stream video content
To encrypt web traffic
To transfer files between a client and server
Which version of SNMP supports encryption and strong user-based authentication?
SNMP v3
SNMP v1
SNMP v4
SNMP v2c
SNMP v3
What is VLAN hopping?
A method to increase the speed of VLAN traffic
An attack designed to send traffic to a VLAN other than the one the host system is in
A technique to reduce network congestion
A security feature of 802.1Q to enhance VLAN compatibility
An attack designed to send traffic to a VLAN other than the one the host system is in
A network technician is setting up IPv6 global addressing.
Which of the following is NOT part of an IPv6 unicast address?
Subnet
Network ID
Starts with 001
Starts with fe80
Starts with fe80
How many fiber strands are required for a 40 Gbps link comprising 4 x 10 Gbps lanes using Multi-fiber Push On (MPO) connectors?
8 Strands
What is the primary function of the Simple Mail Transfer Protocol (SMTP)?
To manage email contacts
To encrypt email messages
To provide persistent storage of messages
To deliver email from one system to another
To deliver email from one system to another
What is an automated event management system configured to generate?
Detailed reports for every event
Some sort of alert
A backup of the logging system
A list of all devices on the network
Some sort of alert
Which of the following can be considered a rogue device?
A wireless access point installed without IT approval
A company-issued laptop with up-to-date security software
A firewall configured by the network security team
An officially sanctioned DHCP server
A wireless access point installed without IT approval
Which characters are allowed in a DNS label?
Only letters and digits
Any characters, including spaces
Letters, digits, and hyphens
Letters, digits, hyphens, and punctuation characters
Letters, digits, and hyphens
Which of the following is a unique identifier for each Ethernet network interface port?
MAC Address
What does disaster recovery focus on?
Expanding the business to new markets
Developing new products
Increasing the number of employees
Switching services to failover systems or sites
Switching services to failover systems or sites
What is the role of a packet sniffer in the context of a protocol analyzer?
To increase the bandwidth of the network
To capture frames moving over the network medium
To provide encryption for data packets
To physically connect different network segments
To capture frames moving over the network medium
A software developer is working at a coffee shop when a friendly stranger strikes up a conversation about technology. During the chat, the stranger offers the developer a USB drive, claiming it contains a beta version of an innovative software tool that could be useful for their work.
The software developer is tempted by the offer but recalls a recent security training session at their company.
How should the software developer respond to the stranger's offer of the USB drive in the safest way possible?
Take the USB drive and give it to the developer's company's IT department for evaluation.
Accept the USB drive and use it immediately to see if the software is beneficial.
Accept the USB drive but plan to scan it with antivirus software before using it.
Politely decline the offer, citing company policy.
Politely decline the offer, citing company policy.
What is the primary purpose of using fiber distribution panels in a fiber optic network?
To provide a centralized location for connecting and managing fiber optic cables
To enhance the speed of data transmission over the network
To increase the signal strength of the fiber optic cables
To convert electrical signals into optical signals
To provide a centralized location for connecting and managing fiber optic cables
Which network component connects a device to transmission media and allows the device to send and receive messages?
NIC