CH 15

9 September 2022
4.7 (114 reviews)
66 test answers
question
You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix?
answer
Test the hotfix, then apply it to all servers
question
Which of the following is the best recommendation for applying hotfixes to your servers?
answer
Apply only the hotfixes that apply to software running on your systems.
question
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a shortterm, periodic basis (typically monthly)?
answer
Hotfix
question
You provide IT support under contract for a dentist's office. The office has a limited number of wireless clients, so a simple wireless router is used to provide WiFi access. On your latest visit, you check the manufacturer's website and discover that an update has been released by the wireless router manufacturer. You decide to download and install the update. Click the option you should use in the wireless router's configuration interface to prepare the device for the update.
answer
Backup Configuration
question
Even if you perform regular backups, what must be done to ensure that you are protected against data loss?
answer
Regularly test restoration procedures
question
Why should backup media be stored offsite?
answer
To prevent the same disaster from affecting both the network and the backup media
question
Which of the following is true for a system image backup?
answer
Is saved as a .vhd file.
question
Which media types can backup files be saved to? (Select two.)
answer
Network Attached Storage (NAS) //External hard drives
question
You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a username of admin and a password of admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.)
answer
Use an SSH client to access the router configuration. //Change the default administrative username and password
question
Which of the following protocols or services would you associate with Window's Remote Desktop Services network traffic?
answer
RDP
question
You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have the problem resolved, but you would like to be able to manage the server remotely in case there is a problem. Which of the following protocols would you use for remote management? (Select two.)
answer
VNC //ICA
question
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?
answer
RDP
question
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them.
answer
Enroll the devices in a mobile device management system. //Configure and apply security policy settings in a mobile device management system.
question
Match each bring your own device (BYOD) security concern on the right with a possible remedy on the left. Each remedy may be used once, more than once, or not at all.
answer
-Users take pictures of proprietary processes and procedures. /Specify where and when mobile devices can be possessed in your acceptable use policy. -Devices with a data plan can email stolen data. /Specify where and when mobile devices can be possessed in your acceptable use policy. -Devices have no PIN or password configured. /Enroll devices in a mobile device management system. -Antimalware software is not installed. /Implement a network access control (NAC) solution. -A device containing sensitive data may be lost. /Enroll devices in a mobile device management system.
question
Your organization recently purchased 18 iPad tablets for use by the organization's management team. These devices have iOS preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings.
answer
Configure and apply security policy settings in a mobile device management system. //Enroll the devices in a mobile device management system.
question
Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?
answer
Sign up for a Microsoft Intune account to manage the tablets.
question
Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate.
answer
Most accurate GPS More accurate WiFi triangulation Less accurate Cell phone tower triangulation Least accurate IP address resolution
question
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take?
answer
Enable device encryption. //Implement storage segmentation.
question
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?
answer
Screen lock
question
Which of the following are not reasons to remote wipe a mobile device?
answer
When the device is inactive for a period of time.
question
A smart phone was lost at the airport. There is no way to recover the device. Which if the following will ensure data confidentiality on the device?
answer
Remote Swipe
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloudbased Microsoft Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
answer
Admin Portal
question
Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloudbased Microsoft Intune account and configure mobile device security policies. You now need to apply those security policies to the end users' mobile devices. What should you do?
answer
Enroll the devices with the Intune service. //Create a user account for each user who has a managed mobile device.
question
You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system?
answer
Signal strength
question
The outside sales reps from your company use notebook computers, tablets, and phones to connect to the internal company network. While traveling, they connect their devices to the Internet using airport and hotel networks. You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed. When a host tries to connect to the network, the host should be scanned to verify its health. If the host is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the host can then connect to the production network.
answer
NAC
question
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons. The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet. Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored.
answer
Implement a guest network.
question
Which of the following enterprise wireless configuration strategies best keeps public wireless access separate from private wireless access?
answer
Configure a guest access WLAN that uses open authentication and that isolates guest WLAN traffic from other clients on the same access point.
question
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems?
answer
Add a separate A/C unit in the server room
question
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?
answer
Positive pressure system
question
You are adding a new rack to your data center, which will house five new blade servers. The new servers will be installed in a cluster that will host a customer tracking database. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to connect each new server to the switch in the existing rack using straightthrough UTP cables that will be run along the floor around the perimeter of the data center.
answer
No, you should run the cable around the perimeter of the room in a cable tray.
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping.
answer
No, you should consider relocating the new rack next to the existing rack.
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and for a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will be run through the suspended tile ceiling of the data center
answer
You should implement redundant power supplies for the network devices. // You should implement a UPS between the wall outlet and the network devices.
question
You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. However, the power supplies in the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center?
answer
Inverter
question
Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center?
answer
Transformer
question
You have been struggling to keep the temperature in your server room under control. To address this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)
answer
The front of your servers should face the cold aisle. // The rear of your servers should face the hot aisle.
question
You've just installed a new 16U wallmounted rack in your data center. You need to install the following equipment in this rack: • A 4U redundant power supply • A 4U server • A 4U switch • A 2U router Which of the following equipment will also fit in this rack along with the above equipment?
answer
2U UPS
question
Consider the network diagram shown below. Click on the item in the diagram that does not follow a standardized labeling scheme.
answer
PC2
question
Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rackmounted environment monitoring device within the rack. Currently, the device shows the temperature within the rack to be 70 degrees Fahrenheit (21 degrees Celsius). What should you do?
answer
Nothing, the temperature within the rack is within acceptable limits.
question
You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.)
answer
Install racks with locking doors. // Install a biometric lock on the data center door.
question
Which of the following is the least effective power loss protection for computer systems?
answer
Surge Protecter
question
Besides protecting a computer from under voltages, a typical UPS also performs which two actions:
answer
Protects from over voltages Conditions the power signal
question
You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?
answer
Connect one server through a different ISP to the Internet.
question
You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use?
answer
Throughput tester
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer
question
You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?
answer
Mirroring
question
You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?
answer
Application log
question
You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?
answer
Event log
question
You suspect that your web server has been the target of a denialofservice attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
answer
Performance
question
You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use?
answer
Packet sniffer
question
You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?
answer
Load tester
question
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?
answer
Promiscuous mode
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer
question
You have heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log would you monitor?
answer
Firewall
question
You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?
answer
Run the packet sniffer application on Host B.
question
Which of the following functions can a port scanner provide? (Select two.)
answer
Discovering unadvertised servers. //Determining which ports are open on a firewall.
question
Each of the following are tools used to check the health of a network. Which of these is typically used for managing and sending messages from one computer system to another?
answer
syslog
question
Which of the following is a reason to use a protocol analyzer?
answer
Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS
question
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
answer
Use syslog to implement centralized logging.
question
Which of the following is a standard for sending log messages to a central logging server?
answer
Syslog
question
Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO5UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?
answer
%LINEPROTO
question
Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Autoduplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 Which of the following statements are true about the fa0/0 interface? (Select three.)
answer
//One cyclic redundancy check error has occurred. //Several collisions have occurred. //The interface has been dropping incoming packets.
question
Because of an unexplained network slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. What protocol will the software use to detect the problem?
answer
SNMP
question
Which protocol uses traps to send notifications from network devices?
answer
SNMP
question
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
answer
Implement version 3 of SNMP
question
Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.)
answer
Authentication for agents and managers //Encryption of SNMP messages
question
One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?
answer
Sends a message via email or SMS when an event occurs.
1 of 66

Unlock all answers in this set

Unlock answers (62)
question
You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix #568994 that has recently been released would have protected the server. Which of the following recommendations should you follow when applying the hotfix?
answer
Test the hotfix, then apply it to all servers
question
Which of the following is the best recommendation for applying hotfixes to your servers?
answer
Apply only the hotfixes that apply to software running on your systems.
question
Which of the following terms describes a Windows operating system patch that corrects a specific problem and is released on a shortterm, periodic basis (typically monthly)?
answer
Hotfix
question
You provide IT support under contract for a dentist's office. The office has a limited number of wireless clients, so a simple wireless router is used to provide WiFi access. On your latest visit, you check the manufacturer's website and discover that an update has been released by the wireless router manufacturer. You decide to download and install the update. Click the option you should use in the wireless router's configuration interface to prepare the device for the update.
answer
Backup Configuration
question
Even if you perform regular backups, what must be done to ensure that you are protected against data loss?
answer
Regularly test restoration procedures
question
Why should backup media be stored offsite?
answer
To prevent the same disaster from affecting both the network and the backup media
question
Which of the following is true for a system image backup?
answer
Is saved as a .vhd file.
question
Which media types can backup files be saved to? (Select two.)
answer
Network Attached Storage (NAS) //External hard drives
question
You just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a username of admin and a password of admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.)
answer
Use an SSH client to access the router configuration. //Change the default administrative username and password
question
Which of the following protocols or services would you associate with Window's Remote Desktop Services network traffic?
answer
RDP
question
You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have the problem resolved, but you would like to be able to manage the server remotely in case there is a problem. Which of the following protocols would you use for remote management? (Select two.)
answer
VNC //ICA
question
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?
answer
RDP
question
Your organization recently purchased 30 tablet devices for your traveling sales force. These devices have Windows RT preinstalled on them.
answer
Enroll the devices in a mobile device management system. //Configure and apply security policy settings in a mobile device management system.
question
Match each bring your own device (BYOD) security concern on the right with a possible remedy on the left. Each remedy may be used once, more than once, or not at all.
answer
-Users take pictures of proprietary processes and procedures. /Specify where and when mobile devices can be possessed in your acceptable use policy. -Devices with a data plan can email stolen data. /Specify where and when mobile devices can be possessed in your acceptable use policy. -Devices have no PIN or password configured. /Enroll devices in a mobile device management system. -Antimalware software is not installed. /Implement a network access control (NAC) solution. -A device containing sensitive data may be lost. /Enroll devices in a mobile device management system.
question
Your organization recently purchased 18 iPad tablets for use by the organization's management team. These devices have iOS preinstalled on them. To increase the security of these devices, you want to apply a default set of securityrelated configuration settings.
answer
Configure and apply security policy settings in a mobile device management system. //Enroll the devices in a mobile device management system.
question
Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internal network must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data from it. Your organization recently purchased several Windows RT tablets. Which should you do?
answer
Sign up for a Microsoft Intune account to manage the tablets.
question
Most mobile device management (MDM) systems can be configured to track the physical location of enrolled mobile devices. Arrange the location technology on the left in order of accuracy on the right, from most accurate to least accurate.
answer
Most accurate GPS More accurate WiFi triangulation Less accurate Cell phone tower triangulation Least accurate IP address resolution
question
Your organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions. You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible. Which actions should you take?
answer
Enable device encryption. //Implement storage segmentation.
question
Which of the following mobile device security consideration will disable the ability to use the device after a short period of inactivity?
answer
Screen lock
question
Which of the following are not reasons to remote wipe a mobile device?
answer
When the device is inactive for a period of time.
question
A smart phone was lost at the airport. There is no way to recover the device. Which if the following will ensure data confidentiality on the device?
answer
Remote Swipe
question
Your organization provides its sales force with Windows RT 8.1 tablets to use while visiting customer sites. You manage these devices by enrolling them in your cloudbased Microsoft Intune account. One of your sales representatives left her tablet at an airport. The device contains sensitive information and you need to remove it in case the device is compromised. Which Intune portal should you use to perform a remote wipe?
answer
Admin Portal
question
Many of the end users in your organization are bringing their own personal mobile devices to work and are storing sensitive data on them. To prevent the data from being compromised, you create a cloudbased Microsoft Intune account and configure mobile device security policies. You now need to apply those security policies to the end users' mobile devices. What should you do?
answer
Enroll the devices with the Intune service. //Create a user account for each user who has a managed mobile device.
question
You are considering using WiFi triangulation to track the location of wireless devices within your organization. However, you have read on the Internet that this type of tracking can produce inaccurate results. What is the most important consideration for getting reliable results when implementing this type of system?
answer
Signal strength
question
The outside sales reps from your company use notebook computers, tablets, and phones to connect to the internal company network. While traveling, they connect their devices to the Internet using airport and hotel networks. You are concerned that these devices will pick up viruses that could spread to your private network. You would like to implement a solution that prevents devices from connecting to your network unless antivirus software and the latest operating system patches have been installed. When a host tries to connect to the network, the host should be scanned to verify its health. If the host is not healthy, then it should be placed on a quarantine network where it can be remediated. Once healthy, the host can then connect to the production network.
answer
NAC
question
The owner of a hotel has contracted with you to implement a wireless network to provide Internet access for patrons. The owner has asked that you implement security controls such that only paying patrons are allowed to use the wireless network. She wants them to be presented with a login page when they initially connect to the wireless network. After entering a code provided by the concierge at checkin, they should then be allowed full access to the Internet. If a patron does not provide the correct code, they should not be allowed to access the Internet. Under no circumstances should patrons be able to access the internal hotel network where sensitive data is stored.
answer
Implement a guest network.
question
Which of the following enterprise wireless configuration strategies best keeps public wireless access separate from private wireless access?
answer
Configure a guest access WLAN that uses open authentication and that isolates guest WLAN traffic from other clients on the same access point.
question
Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% and the temperature is at 80 degrees. What should you do to help reduce problems?
answer
Add a separate A/C unit in the server room
question
You maintain the network for an industrial manufacturing company. You are concerned about the dust in the area getting into server components and affecting the availability of the network. Which of the following should you implement?
answer
Positive pressure system
question
You are adding a new rack to your data center, which will house five new blade servers. The new servers will be installed in a cluster that will host a customer tracking database. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to connect each new server to the switch in the existing rack using straightthrough UTP cables that will be run along the floor around the perimeter of the data center.
answer
No, you should run the cable around the perimeter of the room in a cable tray.
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for virtualization. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a straightthrough UTP cable that will be run along the floor around the perimeter of the data center to prevent tripping.
answer
No, you should consider relocating the new rack next to the existing rack.
question
You are adding a new rack to your data center, which will house two new blade servers and a new switch. The new servers will be used for file storage and for a database server. The only space you have available in the data center is on the opposite side of the room from your existing rack, which already houses several servers, a switch, and a router. You plan to configure a trunk port on each switch and connect them with a crossover UTP plenum cable that will be run through the suspended tile ceiling of the data center
answer
You should implement redundant power supplies for the network devices. // You should implement a UPS between the wall outlet and the network devices.
question
You have purchased a solar backup power device to provide temporary electrical power to critical systems in your data center should the power provided by the electrical utility company go out. The solar panel array captures sunlight, converts it into direct current (DC), and stores it in large batteries. However, the power supplies in the servers, switches, and routers in your data center require alternating current (AC) to operate. Which electrical device should you implement to convert the DC power stored in the batteries into AC power that can be used in the data center?
answer
Inverter
question
Which electrical device is used to convert the voltage of the alternating current (AC) from the utility company's transmission lines to 110 volts that can be used by devices in a data center?
answer
Transformer
question
You have been struggling to keep the temperature in your server room under control. To address this issue, you have decided to reconfigure the room to create hot and cold aisles. Which of the following are true concerning this configuration? (Select two.)
answer
The front of your servers should face the cold aisle. // The rear of your servers should face the hot aisle.
question
You've just installed a new 16U wallmounted rack in your data center. You need to install the following equipment in this rack: • A 4U redundant power supply • A 4U server • A 4U switch • A 2U router Which of the following equipment will also fit in this rack along with the above equipment?
answer
2U UPS
question
Consider the network diagram shown below. Click on the item in the diagram that does not follow a standardized labeling scheme.
answer
PC2
question
Your 24U rack currently houses two 4U server systems. To prevent overheating, you've installed a rackmounted environment monitoring device within the rack. Currently, the device shows the temperature within the rack to be 70 degrees Fahrenheit (21 degrees Celsius). What should you do?
answer
Nothing, the temperature within the rack is within acceptable limits.
question
You have been hired by a startup company to install a new data center. The company is small, so they have elected to use an unused employee break room as the data center. You are concerned about the physical security of the servers that will be installed in the data center. What should you do? (Select two.)
answer
Install racks with locking doors. // Install a biometric lock on the data center door.
question
Which of the following is the least effective power loss protection for computer systems?
answer
Surge Protecter
question
Besides protecting a computer from under voltages, a typical UPS also performs which two actions:
answer
Protects from over voltages Conditions the power signal
question
You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. The shared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a single connection to your ISP. You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. What should you add to your configuration to accomplish this?
answer
Connect one server through a different ISP to the Internet.
question
You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link. Which tool should you use?
answer
Throughput tester
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer
question
You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device. Which feature should you enable on the switch so you can see frames from all devices connected to the switch?
answer
Mirroring
question
You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding. Which tool should you consult to identify the problem?
answer
Application log
question
You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month. Which tool should you use?
answer
Event log
question
You suspect that your web server has been the target of a denialofservice attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine?
answer
Performance
question
You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use?
answer
Packet sniffer
question
You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted. Which tool should you use?
answer
Load tester
question
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation and not other devices. Which feature should you configure?
answer
Promiscuous mode
question
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device. Which tool should you use?
answer
Protocol analyzer
question
You have heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log would you monitor?
answer
Firewall
question
You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B. What should you do?
answer
Run the packet sniffer application on Host B.
question
Which of the following functions can a port scanner provide? (Select two.)
answer
Discovering unadvertised servers. //Determining which ports are open on a firewall.
question
Each of the following are tools used to check the health of a network. Which of these is typically used for managing and sending messages from one computer system to another?
answer
syslog
question
Which of the following is a reason to use a protocol analyzer?
answer
Find devices that might be using legacy protocols, such as IPX/SPX or NetBIOS
question
You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device's console. However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner. What should you do?
answer
Use syslog to implement centralized logging.
question
Which of the following is a standard for sending log messages to a central logging server?
answer
Syslog
question
Consider the following log message, generated on a router: *Aug 8 11:18:12.081: %LINEPROTO5UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to down What facility generated this message?
answer
%LINEPROTO
question
Consider the following output generated by the show interface fa0/0 command generated on a router: FastEthernet0/0 is up, line protocol is up [...] Autoduplex, 100Mb/s, 100BaseTX/FX [...] Input queue: 0/75/1771/0 (size/max/drops/flushes); Total output drops: 0 Which of the following statements are true about the fa0/0 interface? (Select three.)
answer
//One cyclic redundancy check error has occurred. //Several collisions have occurred. //The interface has been dropping incoming packets.
question
Because of an unexplained network slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host. What protocol will the software use to detect the problem?
answer
SNMP
question
Which protocol uses traps to send notifications from network devices?
answer
SNMP
question
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
answer
Implement version 3 of SNMP
question
Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two.)
answer
Authentication for agents and managers //Encryption of SNMP messages
question
One of the components of Simple Network Management Protocol (SNMP) is an alert. Which of the following best describes an SNMP alert?
answer
Sends a message via email or SMS when an event occurs.