Intro to Network Concepts Chapters 7-12

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/149

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:28 AM on 10/11/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

150 Terms

1
New cards

Which of the following will help evenly distribute traffic to each device in a cluster so every device carries a portion of the load?

A load balancer

CARP

Redundancy

An SDN controller

A load balancer

2
New cards

Ross is running a small data entry back office, for which he has contracted you for network management. Ross has made it very clear that because he has just started the company he wants to cut down on expenses wherever he can. One such option involves the router-he wants to exchange the router with a similar but less expensive alternative. Which of the following will you refer to Ross in such a situation?

A root port

An SDN controller

A layer 3 switch

Storm control

A layer 3 switch

3
New cards

Which cloud characteristic allows a provider to limit or charge by the amount of bandwidth, processing power, storage space, or client connections available to customers?

Rapid elasticity

Resource pooling

Measured service

Broad network access

Measured service

4
New cards

As a developer, you need frequent access to multiple platforms during the development process. Rather than purchasing and maintaining a separate device for each platform, you have decided to avail the cloud service option. You are looking to build and test the applications within these virtual, online environments, which are tailored to the specific needs of the project. The cloud service model should have servers that provide only the resources needed to run an application and also allow customers to run their code directly in the cloud without having to manage a server environment at all. Which of the following cloud service models do you think would be appropriate considering your requirements?

Iaas

Paas

Saas

Daas

PaaS

5
New cards

Basil Telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. You have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. Which of the following will you use in this scenario?  

Five 9s

Four 9s

Two 9s

Three 9s

Five 9s

6
New cards

Glenn, who is working as a network engineer, has been instructed to automate many tasks to work together in a complex and lengthy workflow. What is the term for this process?

Automation

Orchestration

Multitenacy

Cloud computing

Orchestration

7
New cards

Which of the following is a distinct network of storage devices that communicate directly with each other and with other portions of the network?

A BPDU guard

STP

SDN

A SAN

A SAN

8
New cards

Krypton Spares and Parts is an MNC dealing in motorcycle spare parts. The administration department of the company has constantly been complaining of severe network issues, and you have been hired to fix the issues. On inspection, it has come to your notice that these network fluctuations are primarily because of flooding attacks from broadcast and multicast traffic. Which of the following do you plan on using to fix this issue?

A BPDU guard

Storm control

A root guard

A BPDU filter

Storm control

9
New cards

You have been working as a network administrator at Yong Solutions, which is an ISP (Internet service provider). The switches used in the storage network of the ISP essentially use the STP (Spanning Tree Protocol) for detecting link failures. You have been asked to upgrade the STP because repeated reports of network transmissions being bogged down have been received. Which of the following will you use in this scenario?

SPB

RSTP

TRILL

iSCSI

SPB

10
New cards

Which of the following network technologies uses a transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet?

FCoE

iSCSI

IB

FC

iSCSI

11
New cards

Which of the following creates and manages a VM (virtual machine) and allocates hardware resources for the host and any of its guest VMs?

NFV

vSwitch

vNIC

Hypervisor

Hypervisor

12
New cards

You already have a running network in your organization, but because of the recent influx of network traffic and as a network engineer, you want to take a more organized approach in designing the network so that every device can function optimally. You have decided to add highly efficient multilayer switches to pass traffic in and out of a few backbone ports as quickly as possible. Which of the following layers of the network architecture will you use to bring in this change to your network?

The access layer

The distribution layer

The core layer

The aggregation layer

The core layer

13
New cards

Which of the following switches can be configured via a command-line interface or a web-based management GUI (graphical user interface)?

An unmanaged switch

A managed switch

Spine switches

Leaf switches

A managed switch

14
New cards

Jasper Infotech have an issue with their network system-a malfunctioning NIC on a router caused network outages. They have hired you specifically to ensure that the network system does not collapse when there is an unexpected hardware or software malfunction. Which of the following terms will you refer to while fixing this issue for Jasper Infotech?

SAN

SDN

Redundancy

Fault tolerance

Fault tolerance

15
New cards

Which of the following cloud models makes resources available to users through a WAN connection?

Hybrid cloud

Public cloud

Private cloud

Community cloud

Private cloud

16
New cards

For over a decade, Ramanathan has been working as a network engineer in an MNC that uses FC (Fibre Channel) networking architecture. His primary duty is to ensure that there are no issues in the network connections between servers and SAN (storage area network) devices, so that maximum throughput is achieved at all times. Recently, one of the connections of the FC device to the network malfunctioned, which Ramanathan has to fix. Analyze which of the following Ramanathan should do in this scenario.

Use NICs to connect the Fc devices to the network

Connect the FC devices to the network through HBAs

Install CNAs to connect to network servers

Use the iSCSI protocal

Connect the FC devices to the network through HBAs

17
New cards

What is the downtime per day for a system showing 99.9% availability?

0.4 seconds

1 minute and 26 seconds

14 minutes and 23 seconds

8 seconds

1 minute and 26 seconds

18
New cards

In order to achieve the utmost fault tolerance, as a network administrator, you want to ensure that critical devices are all equipped with redundant NICs, routers, and processors, which are able to immediately assume the duties of an identical component in case one of the components fails. Which of the following will help you ensure these devices contain the necessary components you require?

Hot-swappable parts

Automatic failover

Load balancing

Clustering

Automatic failover

19
New cards

As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?

NIC teaming

Port aggregation

Load balancing

Clustering

NIC teaming

20
New cards

You run a website called Offhand that sells exclusive handmade home decor items. On Mother's Day, the website unexpectedly receives a burst of traffic following the marketing campaign designed for this occasion. Thankfully, you are equipped with a good cloud service model and hence you are able to increase the cloud resources the website needs without disrupting your web services. Which of the following cloud characteristics helped you manage the situation easily?

Rapid elasticity

Resource pooling

Measured service

Broad network access

Rapid elasticity

21
New cards

The Centre for Equity Studies is a not-for-profit organization in Staten Island, New York, working in the human rights sector. Currently, because of the pandemic, the employees work from home. They work in association with three other initiatives, all of them involved in the same sector. Hence, there are a lot of resources that are routinely shared among all of them but not with the general public. You have been assigned the task of selecting one cloud model, keeping in mind the working conditions and the requirements of the users. Which of the following would suit this organization the most?

A private cloud

A public cloud

A community cloud

A hybrid cloud

A community cloud

22
New cards

Lewis has been hired as an assistant to the head network administrator. He needs to understand the basic functioning of certain STP (Spanning Tree Protocol) features that will block BPDUs (Bridge Protocol Data Units) on any port serving network hosts. Which of the following will he use for such purposes?

A BPDU guard

A BPDU filter

A root bridge

A root guard

A BPDU guard

23
New cards

Scott & Wayne Law Associates is a private law firm in Atlanta specializing in cases involving violation of environmental laws. The firm currently has approximately 50 employees who all work on various matters and in different departments. You have been hired as a network administrator and tasked with finding a suitable cloud model for the firm. The firm is looking for a comparatively low-cost cloud model that can be accessed only by the employees and senior management but not its clients or third parties. Which of the following cloud models would you choose?

A hybrid cloud

A public cloud

A private cloud

A community cloud

A private cloud

24
New cards

Cloud computing offers many significant advantages and opportunities for expansion, but it has its disadvantages as well. Which of the following options is the cheapest and simplest alternative to a cloud?

Internet

VPN

Remote access connection

Leased line

Internet

25
New cards

Which of the following protocols can detect and correct link failures in milliseconds?

TRILL

SPB

CARP

RSTP

RSTP

26
New cards

You as a network engineer want to create a subnet that supports 16 hosts. Which of the following subnet masks will you use in this scenario?

255.255.255.252

255.255.255.248

255.255.255.240

255.255.255.224

255.255.255.224

27
New cards

You are working on a network device that has a subnet mask of /26. How many IP addresses are available according to you?

62

64

32

30

62

28
New cards

Bilmain Manufactures has recruited you as a network administrator to handle the organization's network operations. You want to set up a class A IP address. What will be the subnet mask for this class A address?

255.255.255.0

255.255.255.255

255.255.0.0

255.0.0.0

255.0.0.0

29
New cards

Calculate the total number of hosts per subnet that you can derive from the network ID 192.168.1.0 255.255.255.224.

30

24

32

16

30

30
New cards

JVC Corporations is a multinational company that has a variety of products worldwide. You are working as a network engineer with the network management team of the company. The network administrator has requested you to submit a network document after subdividing the smaller network of Human Resources into a separate network segment so that it is convenient for troubleshooting. Under which of the following groupings will you place this network segment in this scenario?

Geographic locations

Departmental boundaries

Device types

VLANs

Departmental boundaries

31
New cards

The headquarters of BBK Solutions has detected a possible attack with the help of VLAN tags. Mathews is the head of the Network Administration department in BBK Solutions, and he has to come up with security measures to prevent such instances from occurring in the future. Which of the following security measures should Matthews consider keeping the VLAN pathway as the primary focus?

The native VLAN should be changed to a used VLAN ID

Auto-trunking on switch that do not need to support traffic from multiple VLANs should be enabled

All VLAN ranges should be accepted on each trunk

The default VLAN should not be used

The default VLAN should not be used

32
New cards

You are working on an IPv6 address 2608:FE10:1:AA:002:50FF:FE2B:E708. You want to create subnets within this IP address. Which of the following will you choose to alter when creating subnets for this address?

2608

FE10

1

AA

AA

33
New cards

Identify the current name of a DMZ (demilitarized zone).

ANDing

Network ID

Host ID

Screened subnet

Screened subnet

34
New cards

What will be the number of hosts per subnet in a 255.255.255.240 IPv4 class C subnet mask?

30

14

62

126

14

35
New cards

In the formula 2n = Y, what does n represent?

It equals the number of hosts available in each subnet

It equals the number of bits remaining in the host portion

It is the number of subnets that result

It is the number of bits that must be switched from the host address to the network ID

It is the number of bits that must be switched from the host address to the network ID

36
New cards

Phillips is a trainee who is currently on probation at ICP Solutions. Under which of the following groupings will he classify the network segment of the floors of a building connected by a LAN?

Geographic locations

Department boundaries

Device types

VLANs

Geographic locations

37
New cards

Rodri has been contracted by an ISP to set up an IPv6 address for MIL Ltd. The RIR (regional Internet registry) has assigned the ISP a block of 32-bit routing prefix. The ISP will provide MIL Ltd. with a /48 site prefix. Analyze which of the following scenarios will help Rodri in calculating the total number of possible subnets.

MIL Ltd. can create up to 65,536 subnets

MIL Ltd. can create up to 256 subnets

MIL Ltd. can create only one single subent

Rodri should use the 2n = Y formula to calculate the subnet

MIL Ltd. can create up to 65,536 subnets

38
New cards

You are a network analyst at a securities firm. You have to assign an identifier to each VLAN used in the network so that the connecting devices can identify which VLAN a transmission belongs to. Which of the following will you use in such a situation?

Stack master

VLAN hopping

SAID

MTU

SAID

39
New cards

The network administrator has instructed you to set up multiple logical VLANs to receive and transmit data. He has asked you to connect one of the switches to a router so that the interface can manage the traffic from multiple VLANs. Which of the following will you use in this scenario?

Trunking

Access port

Inter-VLAN routing

Data VLAN

Trunking

40
New cards

The network administrator has asked you to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would you use?

255.255.255.192

255.255.255.240

255.255.255.224

255.255.255.248

255.255.255.240

41
New cards

Analyze which of the following can be used to establish a static VLAN assignment for a device.

Client device information, such as MAC address or location

Authentication processes in cooperation with a RADIUS server

Assigning a VLAN based on the switch port the device is connected to

All WLAN traffic grouped within the same VLAN

Assigning a VLAN based on the switch port the device is connected to

42
New cards

You, as a network administrator, are calculating the range of host IP addresses for a subnet (the targeted subnet). If the next subnet's network ID is 192.168.50.119, what is the targeted subnet's broadcast address?

192.168.50.120

192.168.50.118

192.168.50.255

192.168.50.0

192.168.50.118

43
New cards

Brown Industries consults you to review and check for faults in the recently installed port-based VLAN network on its premises. The VLAN has been segmented according to Brown Industries' departments such as Sales, Finance, and Marketing. On inspection, you realize that a virtual sales client, which should have been plugged into port 6, has been plugged into port 1, which is reserved for marketing clients. What kind of configuration error are you facing in this situation?

Incorrect VLAN assignment

Incorrect port mode

VLAN isolation

Double tagging

Incorrect VLAN assignment

44
New cards

The part which identifies the network in an IPv4 address is known as ____.

the host ID

the site prefiex

the network ID

the VIP

the network ID

45
New cards

Murphy Communications has been running a VLAN-managed network to connect different devices. You as a network analyst want to assign a name to the VLAN network, but you are unable to do so. What kind of VLAN is most likely being used in the organization?

Default VLAN

Voice VLAN

Private VLAN

Management VLAN

Default VLAN

46
New cards

You as a network analyst want to make certain changes to a VLAN database, and you want these changes to be reflected in all the other switches in the network. Which of the following will you use?

Stack master

VLAN hopping

SAID

MTU

Stack master

47
New cards

Which of the following will allow subnets to be further subdivided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space?

VLSM

Site prefix

VIP

Classless addressing

VLSM

48
New cards

Which of the following VLANs receives all untagged frames from untagged ports?

Data VLAN

Voice VLAN

Native VLAN

Management VLAN

Native VLAN

49
New cards

Mason, a new network engineer in your organization, has set up the configuration of the switch ports to other network devices. On inspection, you, the network administrator, realize that the configuration has been made using access mode instead of trunk mode. What kind of a configuration error are you facing in this situation?

Incorrect VLAN assignment

Incorrect port mode

VLAN isolation

Double tagging

Incorrect port mode

50
New cards

You as a network administrator want to protect the network from unauthorized traffic, and for this reason, you decide to change the native VLAN to an unused VLAN so that the untagged traffic is essentially directed toward a dead-end. Which of the following commands will you use to do this on a Cisco switch?

switchport trunk native vlan

ip dhcp snooping

set port-mode trunk

set native-vlan-id

switchport trunk native vlan

51
New cards

Examine the following circumstances as a network analyst and analyze in which of the following conditions MANs (metropolitan area networks) cannot be useful.

Connecting a city’s police stations

Connecting a hospital with its regional medical centers

Connecting a home office with its branch offices and a warehouse location

Connecting a clothing manufacture to sell its products to customers worldwide

Connecting a clothing manufacture to sell its products to customers worldwide

52
New cards

You are working as an executive for a cable company. A client raises a request to set up a network that uses fiber-optic cabling to connect your company's distribution center to distribution hubs and then to optical nodes near its customers. From the following network options, which one would you recommend in the given scenario?

Cable broadband

DOCSIS

HFC

Cable modem

HFC

53
New cards

Which of the following devices serves as the endpoint for a dedicated connection between an ISP and a customer?

Line driver

CSU/DSU

NIU

DTE

CSU/DSU

54
New cards

Browski is a company that deals with SD-WAN (software-defined wide area network) units. The management of Browski wants to present an audio-video presentation at one of the network exhibitions to demonstrate its new product. As a network administrator working there, you have been asked to go through a few pointers in the presentation to verify the accuracy of the content. Analyze if any of these aspects do not apply to SD-WAN.

SD-WAN is transport agnostic

SD-WAN provides better intent-based management

SD-WAN has zero-touch provisioning

SD-WAN can be more expensive than leased lines

SD-WAN can be more expensive than leased lines

55
New cards

You are working as a network engineer at Krofter Securities. The organization uses Cisco's Linux OS in all of its workstations. The network administrator has asked you to use the route utility to delete some static routes used by the router. Which of the following commands will you use in this scenario?

route

route print

show ip route

show running-config

route

56
New cards

You are working as a network engineer with an ISP. A query has come to you from a client who requires a guarantee of minimum uptime percentages if the service goes down. Which of the following will you choose in this scenario?

Broadband

DIA

DSL

PTSN

DIA

57
New cards

Which of the following devices contains ports to connect both to an incoming telephone line and to a computer or network connectivity device?

NIU

PSTN

DSL modem

Local loop

DSL modem

58
New cards

You, as a network engineer, have recently established a network connection for three separate department buildings in a university. One of the departments has complained that the signal strength it receives is not the same as the signal strength the other two buildings receive. Which of the following will you use in this scenario?

Line drivers

CSU/DSU

NIU

DTE

Line drivers

59
New cards

Nathan has plans of opening a call center. He will require a network connection that will have a bare minimum of 3 Gbps upstream and at least 8 Gbps downstream throughput. Analyze which of the following will provide a solution to Nathan.

Using a DOCSIS 2.x (2.0 and 2.0 1 IPv6) for maximum throughput

Using DOCSIS 3.1 for maximum throughput

Using DOCSIS 3.0 for maximum throughput

Using DOCSIS 4.0 for maximum throughput

Using DOCSIS 4.0 for maximum throughput

60
New cards

A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.

Shared data

Low overhead, fast convergence

Stability

Multi-vendor routers

Low overhead, fast convergence

61
New cards

As a network analyst, you have to separate the digital communication of data in a GSM network. Which of the following will you use in this scenario?

SIM

CDMA

TDMA

TDM

TDMS

62
New cards

XYZ Ltd. is a company that has 12 regional offices around the world. All the major operations of the company are carried out from the headquarters based in New York. XYZ Ltd. has approached you, a network facilitator, to install a WAN service that can manage network configurations at multiple locations throughout the world. Which of the following WAN services would you advise to XYZ Ltd. in this scenario?

DSL

SD-WAN

Cable broadband

Fiber broadband

SD-WAN

63
New cards

Fox Agro, a small business, faces network congestion and connection failures, which affect the network. As a result, the quality of performance of the unit gets adversely affected. You are appointed as a network administrator to determine the best solution to this problem. Which type of routing path will you use to solve this problem?

Static route

Dynamic route

Default route

Gateway of last resort

Dynamic route

64
New cards

Which of the following statements about MPLS (multiprotocol label switching) is not true?

MPLS connections are highly scalable for businesses, which means a business can add more and longer connections for less cost than similarly scaled leased lines.

Customers can prioritize their own traffic across the WAN (wide area network) according to QoS (quality of service) attributes, such as giving VoIP traffic higher priority over email traffic.

The ability to label traffic offers more reliability, predictability, and security (when properly implemented) than when using cheaper connections over the open Internet.

MPLS does not offer any decreased latency

MPLS does not offer any decreased latency

65
New cards

An ISP's headquarters is located in Philadelphia, and it has a branch office in Canada. The ISP wants to ship an edge device to the branch location where a non-technical person can plug in the device without any configuration needed on-site. Which of the following should be used in this scenario?

Cable broadband

Leased line

MPLS

SD-WAN

SD-WAN

66
New cards

You are working as a technical specialist for an ISP. The network administrator has asked you to set up a router for a client with a routing protocol that will use a distance-vector algorithm and is limited to 15 hops. Which of the following will you use?

EIGRP

OSPF

BGP

RIPv2

RIPv2

67
New cards

Which of the following commands lists a router’s routing table information?

s default-gateway

ip default-network

show ip route

ip interface brief

show ip route

68
New cards

As a network administrator, a client has approached you to set up the network for MKV, a software company. The company requires sufficient amounts of data for both uploading and downloading purposes; however, it prefers a connection that has better download speed. Which of the following DSL varieties do you think is best suited for such a requirement?

ADSL

VDSL

SDSL

DWDM

VDSL

69
New cards

You are employed as a network engineer. While setting up a client's connection, the client requests you to display the concise network layer information of the device interface that is being installed. Which of the following commands will you use in this scenario?

sh int

sh ip int br

sh int tr

sh int sw

sh ip int br

70
New cards

Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario.

Use the EXEC mode to apply the changes

Use the global configuration mode to apply the changes

Use the interface configuration mode to apply the changes

Use the privileged EXEC mode to apply the changes

Use the privileged EXEC mode to apply the changes

71
New cards

Which of the following IGPs supports large networks, calculates more efficient best paths than RIPs, and uses algorithms that prevent routing loops?

OSPF

IS-IS

EIGRP

BGP

OSPF

72
New cards

White Hawks runs a baseball stadium, and it would like to set up a network that has a reasonable level of availability and effectiveness so that fans can receive a close and strong signal throughput when they watch a game. Analyze which of the following statements will help in understanding why a 5G service is ideal in this scenario.

Higher frequency for bands would increase the throughput

The cell density for the network must be close

Wider channels would help increase the speed

Client volume will increase the throughput

The cell density for the network must be close

73
New cards

Which of the following refers to any router outside an organization's AS(autonomous system), such as a router on the Internet backbone?

Routing table

Edge router

Exterior router

Core router

Exterior router

74
New cards

Beevan works as a network analyzer for an ISP. The network manager has asked him to use a protocol for the routers that can scan beyond the home territory and can instruct a group of routers to prefer one route over other available routes. Analyze which of the following should be used in this scenario.

EIGRP

IS-IS

BGP

OSPF

BGP

75
New cards

Your network administrator has asked you to change the subnet mask of the Cisco router used in the organization. Which of the following Cisco CLI modes would you apply in this scenario?

User EXEC

Privileged EXEC

Global configuration

Interface configuration

Interface configuration

76
New cards

Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele's password to a sensitive database in the law firm. What kind of password attack did she use?

A brute-force attack

A dictionary attack

A rainbow table attack

A zero-day attack

A brute-force attack

77
New cards

An organization hires you to handle the security policies of the organization. In order to protect the organization's network from data breaches and potential hacks, you decide to draft a policy that will require the employees of the organization to adhere to a certain set of rules while accessing the network's resources. To ensure that these rules are followed without fail, you decide to impose certain penalties for situations where violations may occur. Which of the following will help you achieve these standards?

PUA

AUP

NDA

Password policy

AUP

78
New cards

Which of the following anti-malware software will slow down your network performance considerably?

Host-based

Server-based

Network-based

Cloud-based

Server-based

79
New cards

Youhan has been placed as the security in charge of an organization. Which of the following should he use to monitor the movement and condition of equipment, inventory, and people?

CCTV

Motion detectors

Asset tags

Tamper detection

Asset tags

80
New cards

HealthCity Nursing Home is a newly opened hospital with many employees, doctors, nurses, and support staff. The upper management of the hospital wants to draft a security policy that outlines the guidelines, rules, restrictions, and consequences of violations, all of which help minimize the risk involved in allowing restricted access to some users. The doctors who have access to protected patient information must be informed what they can and can't do with that patient data and what special precautions they must take to protect patients' privacy. Certain checks and balances must also be maintained and defined in the policy measures in detail. Which of the following security policies should be used in this scenario?

An NDA (non-disclosure agreement)

An anti-malware

A PUA (privileged user agreement)

An AUP (acceptable use poicy)

A PUA (privileged user agreement)

81
New cards

Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn't yet or only very recently become public?

Vulnerability

Zero-day exploit

Exploit

Data breach

Zero-day exploit

82
New cards

In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?

Back doors

DNS poisoning

On-path attack

Deauth attack

On-path attack

83
New cards

Gary is a freelance network analyst. A client approaches him to provide a solution for his firm wherein employees have been found to carry sensitive information out of the office premises. This data breach has led to a lot of market speculations as a result of which there has been a significant drop in the share market prices of the company's stocks. Gary is contracted to find a solution to this issue. Analyze which of the following options should be carried out by Gary keeping in mind the sensitivity of the situation.

Deploy a DLP solution

Enforce the principle of least privilege

Maintain checks and balances on employee’s behavior

Provide social engineering awareness training

Deploy a DLP solution

84
New cards

Game Zone is a well-known games park located in Manhattan that allows gamers to engage in multiplayer competitions. The competitions function smoothly on the opening day, but on the following days, there are multiple instances of the computers getting disconnected temporarily from the wireless network. These connections however function normally when they are reconnected. Which type of attack is this most likely to be? 

DRDoS attack

Friendly DoS attack

PDoS attack

Deauth attack

Deauth attack

85
New cards

Ground Movers Ltd., a courier service provider, has recently encountered certain breaches that have led to packages being stolen and damaged. The company has contracted you, a network analyst, to fix this issue. You plan on installing a device that will be able to provide constant or periodic collection of information. This information can then be used by the management control software for monitoring and reporting. Which of the following devices will you install for Ground Movers Ltd.?

CCTV

Motion detectors

Asset tags

Tamper detection

Asset tags

86
New cards

The managing director of Seviicco Laminates wants to secure certain financial documents that can only be accessed by him and the finance team of the organization. He wants to install a sophisticated authentication process so that the documents are extremely safe. You have been contracted as a network analyst for this project. After having an overview of the office premises, you decide to provide this security via a specific barcode that will be used as a key to access the documents. Which of the following access control technologies will you install in this scenario?

Smart locker

Access badge

Biometrics

Locking cabinets

Smart locker

87
New cards

You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation?  

NDA

MDM

PUA

PAM

PAM

88
New cards

Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?

Vulnerability

Hacking

Exploit

Data breach

Vulnerability

89
New cards

You are working as a network administrator, and you want to conduct simulated attacks on a network to determine its weaknesses. To do so, you want to check for open ports so that you can remote in using that port and craft an attack. Which of the following software will you use to scan for open ports in this scenario?

Nmap

Nessus

Metaploit

Honeypot

Namp

90
New cards

Which of the following is not a social engineering strategy?

Phishing

Baiting

Quid pro quo

DoS

DoS

91
New cards

Andy Bryant is a network analyst at Freewoods Centre for Policy Research. There are approximately 35 employees currently working on various issues of policy making and research, and this requires access to the network's resources. He has been asked to set a list of dos and don'ts for all the employees to clarify what is acceptable use of company IT resources and what is not. He also needs to explain penalties for violations and describe how these measures protect the network's security. Analyze which of the following security policies Andy should implement in this scenario.

An AUP (acceptable use policy)

An NDA (non-disclosure agreement)

An anti-malware policy

A PUA (privileged user agreement)

An AUP (acceptable use policy)

92
New cards

In which of the following phases of the social engineering attack cycle will an attacker require the most time investment?

Building trust

Research

Exploit

Exit

Research

93
New cards

At a security training exercise, you had to devise a strategy to penetrate into an organization's data room by accessing one of their employee's ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?

Phishing

Baiting

Quid pro quo

Tailgating

Quid pro quo

94
New cards

Which of the following devices scans an individual's unique physical characters such as iris color patterns to verify the person's identity?

Access control vestibule

Access badge

Biometrics

Locking cabinets

Biometrics

95
New cards

William has been working as a senior networking professional at Mediaworks Ltd. The company has a very strict policy regarding employees' access to certain key rooms in the organization. The company wants William to provide a specific access technology to only a few selected employees so that they can access those certain rooms. Which of the following options are best suited for William in this scenario?

Access badges

Biometrics

Cipher Lock

Access control vestibule

Cipher Lock

96
New cards

Bryden is a network analyst who has been recruited into Big Bay Burger's security management. Which of the following terminologies must he use to explain to the company's employees about the possibility of someone using a deception in following them into a restricted area?

Phishing

Baiting

Piggybacking

Tailgating

Piggybacking

97
New cards

Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?

Quid pro quo

Phishing

Zero-day exploit

CVE

CVE

98
New cards

The organization where you have been working as a network analyst decides to provide BYOD (bring your own device) options to the employees to cut down on its operating costs. The company has asked you to handle the BYOD policies and the necessary documentation. You have decided to install a software that will automatically handle the configuration process for the wireless clients when they require network access. Which of the following will you use in such a scenario?

MDM

AUP

NDA

PUA

MDM

99
New cards

To ensure better security measures for the computers used in your organization, you, as a network administrator, have decided to update the passwords of each computer on a weekly basis. But managing and changing the passwords for all the computers is a tiresome task. Hence, you decide to apply a security measure with the help of a password management software. Which of the following software will you use in this scenario?

Meraki Systems Manager

VMware’s Workspace One

LastPass

Wireshark

LastPass

100
New cards

Huey Dewey Ltd. is a talent management company with over a hundred employees. Gary has been appointed as a system analyst to ensure security across the office networks during and after the period of employment. Some user accounts are given privileged access, which allows the users to perform more sensitive tasks, such as viewing or changing financial information, making configuration changes, or adjusting access privileges for other users. Analyze which of the following security precautions Gary should implement so that he can avoid users logging into the accounts even after their termination.

Limited use

Limited duration

Limited privacy

Limited access

Limited duration